iarxiv.org.rss.091.xml - sfeed_tests - sfeed tests and RSS and Atom files Err codemadness.org 70 hgit clone git://git.codemadness.org/sfeed_tests URL:git://git.codemadness.org/sfeed_tests codemadness.org 70 1Log /git/sfeed_tests/log.gph codemadness.org 70 1Files /git/sfeed_tests/files.gph codemadness.org 70 1Refs /git/sfeed_tests/refs.gph codemadness.org 70 1README /git/sfeed_tests/file/README.gph codemadness.org 70 1LICENSE /git/sfeed_tests/file/LICENSE.gph codemadness.org 70 i--- Err codemadness.org 70 iarxiv.org.rss.091.xml (806587B) Err codemadness.org 70 i--- Err codemadness.org 70 i 1 Err codemadness.org 70 i 2 Err codemadness.org 70 i 3 Err codemadness.org 70 i 5 Err codemadness.org 70 i 6 Err codemadness.org 70 i 7 Err codemadness.org 70 i 8 Err codemadness.org 70 i 9 cs updates on arXiv.org Err codemadness.org 70 i 10 http://fr.arxiv.org/ Err codemadness.org 70 i 11 Computer Science (cs) updates on the arXiv.org e-print archive Err codemadness.org 70 i 12 en-us Err codemadness.org 70 i 13 Fri, 30 Oct 2020 00:30:00 GMT Err codemadness.org 70 i 14 Fri, 30 Oct 2020 00:30:00 GMT Err codemadness.org 70 i 15 www-admin@arxiv.org Err codemadness.org 70 i 16 Err codemadness.org 70 i 17 Err codemadness.org 70 i 18 arXiv.org Err codemadness.org 70 i 19 http://fr.arxiv.org/icons/sfx.gif Err codemadness.org 70 i 20 http://fr.arxiv.org/ Err codemadness.org 70 i 21 Err codemadness.org 70 i 22 Err codemadness.org 70 i 23 Raw Audio for Depression Detection Can Be More Robust Against Gender Imbalance than Mel-Spectrogram Features. (arXiv:2010.15120v1 [cs.SD]) Err codemadness.org 70 i 24 http://fr.arxiv.org/abs/2010.15120 Err codemadness.org 70 i 25 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bailey_A/0/1/0/all/0/1">Andrew Bailey</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Plumbley_M/0/1/0/all/0/1">Mark D. Plumbley</a></p> Err codemadness.org 70 i 26 Err codemadness.org 70 i 27 <p>Depression is a large-scale mental health problem and a challenging area for Err codemadness.org 70 i 28 machine learning researchers in terms of the detection of depression. Datasets Err codemadness.org 70 i 29 such as the Distress Analysis Interview Corpus - Wizard of Oz have been created Err codemadness.org 70 i 30 to aid research in this area. However, on top of the challenges inherent in Err codemadness.org 70 i 31 accurately detecting depression, biases in datasets may result in skewed Err codemadness.org 70 i 32 classification performance. In this paper we examine gender bias in the Err codemadness.org 70 i 33 DAIC-WOZ dataset using audio-based deep neural networks. We show that gender Err codemadness.org 70 i 34 biases in DAIC-WOZ can lead to an overreporting of performance, which has been Err codemadness.org 70 i 35 overlooked in the past due to the same gender biases being present in the test Err codemadness.org 70 i 36 set. By using raw audio and different concepts from Fair Machine Learning, such Err codemadness.org 70 i 37 as data re-distribution, we can mitigate against the harmful effects of bias. Err codemadness.org 70 i 38 </p> Err codemadness.org 70 i 39 Err codemadness.org 70 i 40 Err codemadness.org 70 i 41 Err codemadness.org 70 i 42 papaya2: 2D Irreducible Minkowski Tensor computation. (arXiv:2010.15138v1 [cs.GR]) Err codemadness.org 70 i 43 http://fr.arxiv.org/abs/2010.15138 Err codemadness.org 70 i 44 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Schaller_F/0/1/0/all/0/1">Fabian M. Schaller</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wagner_J/0/1/0/all/0/1">Jenny Wagner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kapfer_S/0/1/0/all/0/1">Sebastian C. Kapfer</a></p> Err codemadness.org 70 i 45 Err codemadness.org 70 i 46 <p>A common challenge in scientific and technical domains is the quantitative Err codemadness.org 70 i 47 description of geometries and shapes, e.g. in the analysis of microscope Err codemadness.org 70 i 48 imagery or astronomical observation data. Frequently, it is desirable to go Err codemadness.org 70 i 49 beyond scalar shape metrics such as porosity and surface to volume ratios Err codemadness.org 70 i 50 because the samples are anisotropic or because direction-dependent quantities Err codemadness.org 70 i 51 such as conductances or elasticity are of interest. Minkowski Tensors are a Err codemadness.org 70 i 52 systematic family of versatile and robust higher-order shape descriptors that Err codemadness.org 70 i 53 allow for shape characterization of arbitrary order and promise a path to Err codemadness.org 70 i 54 systematic structure-function relationships for direction-dependent properties. Err codemadness.org 70 i 55 Papaya2 is a software to calculate 2D higher-order shape metrics with a library Err codemadness.org 70 i 56 interface, support for Irreducible Minkowski Tensors and interpolated marching Err codemadness.org 70 i 57 squares. Extensions to Matlab, JavaScript and Python are provided as well. Err codemadness.org 70 i 58 While the tensor of inertia is computed by many tools, we are not aware of Err codemadness.org 70 i 59 other open-source software which provides higher-rank shape characterization in Err codemadness.org 70 i 60 2D. Err codemadness.org 70 i 61 </p> Err codemadness.org 70 i 62 Err codemadness.org 70 i 63 Err codemadness.org 70 i 64 Err codemadness.org 70 i 65 DeSMOG: Detecting Stance in Media On Global Warming. (arXiv:2010.15149v1 [cs.CL]) Err codemadness.org 70 i 66 http://fr.arxiv.org/abs/2010.15149 Err codemadness.org 70 i 67 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Luo_Y/0/1/0/all/0/1">Yiwei Luo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Card_D/0/1/0/all/0/1">Dallas Card</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jurafsky_D/0/1/0/all/0/1">Dan Jurafsky</a></p> Err codemadness.org 70 i 68 Err codemadness.org 70 i 69 <p>Citing opinions is a powerful yet understudied strategy in argumentation. For Err codemadness.org 70 i 70 example, an environmental activist might say, "Leading scientists agree that Err codemadness.org 70 i 71 global warming is a serious concern," framing a clause which affirms their own Err codemadness.org 70 i 72 stance ("that global warming is serious") as an opinion endorsed ("[scientists] Err codemadness.org 70 i 73 agree") by a reputable source ("leading"). In contrast, a global warming denier Err codemadness.org 70 i 74 might frame the same clause as the opinion of an untrustworthy source with a Err codemadness.org 70 i 75 predicate connoting doubt: "Mistaken scientists claim [...]." Our work studies Err codemadness.org 70 i 76 opinion-framing in the global warming (GW) debate, an increasingly partisan Err codemadness.org 70 i 77 issue that has received little attention in NLP. We introduce DeSMOG, a dataset Err codemadness.org 70 i 78 of stance-labeled GW sentences, and train a BERT classifier to study novel Err codemadness.org 70 i 79 aspects of argumentation in how different sides of a debate represent their own Err codemadness.org 70 i 80 and each other's opinions. From 56K news articles, we find that similar Err codemadness.org 70 i 81 linguistic devices for self-affirming and opponent-doubting discourse are used Err codemadness.org 70 i 82 across GW-accepting and skeptic media, though GW-skeptical media shows more Err codemadness.org 70 i 83 opponent-doubt. We also find that authors often characterize sources as Err codemadness.org 70 i 84 hypocritical, by ascribing opinions expressing the author's own view to source Err codemadness.org 70 i 85 entities known to publicly endorse the opposing view. We release our stance Err codemadness.org 70 i 86 dataset, model, and lexicons of framing devices for future work on Err codemadness.org 70 i 87 opinion-framing and the automatic detection of GW stance. Err codemadness.org 70 i 88 </p> Err codemadness.org 70 i 89 Err codemadness.org 70 i 90 Err codemadness.org 70 i 91 Err codemadness.org 70 i 92 On the Optimality and Convergence Properties of the Learning Model Predictive Controller. (arXiv:2010.15153v1 [math.OC]) Err codemadness.org 70 i 93 http://fr.arxiv.org/abs/2010.15153 Err codemadness.org 70 i 94 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Rosolia_U/0/1/0/all/0/1">Ugo Rosolia</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Lian_Y/0/1/0/all/0/1">Yingzhao Lian</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Maddalena_E/0/1/0/all/0/1">Emilio T. Maddalena</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Ferrari_Trecate_G/0/1/0/all/0/1">Giancarlo Ferrari-Trecate</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Jones_C/0/1/0/all/0/1">Colin N. Jones</a></p> Err codemadness.org 70 i 95 Err codemadness.org 70 i 96 <p>In this technical note we analyse the performance improvement and optimality Err codemadness.org 70 i 97 properties of the Learning Model Predictive Control (LMPC) strategy for linear Err codemadness.org 70 i 98 deterministic systems. The LMPC framework is a policy iteration scheme where Err codemadness.org 70 i 99 closed-loop trajectories are used to update the control policy for the next Err codemadness.org 70 i 100 execution of the control task. We show that, when a Linear Independence Err codemadness.org 70 i 101 Constraint Qualification (LICQ) condition holds, the LMPC scheme guarantees Err codemadness.org 70 i 102 strict iterative performance improvement and optimality, meaning that the Err codemadness.org 70 i 103 closed-loop cost evaluated over the entire task converges asymptotically to the Err codemadness.org 70 i 104 optimal cost of the infinite-horizon control problem. Compared to previous Err codemadness.org 70 i 105 works this sufficient LICQ condition can be easily checked, it holds for a Err codemadness.org 70 i 106 larger class of systems and it can be used to adaptively select the prediction Err codemadness.org 70 i 107 horizon of the controller, as demonstrated by a numerical example. Err codemadness.org 70 i 108 </p> Err codemadness.org 70 i 109 Err codemadness.org 70 i 110 Err codemadness.org 70 i 111 Err codemadness.org 70 i 112 Kernel Aggregated Fast Multipole Method: Efficient summation of Laplace and Stokes kernel functions. (arXiv:2010.15155v1 [math.NA]) Err codemadness.org 70 i 113 http://fr.arxiv.org/abs/2010.15155 Err codemadness.org 70 i 114 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Yan_W/0/1/0/all/0/1">Wen Yan</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Blackwell_R/0/1/0/all/0/1">Robert Blackwell</a></p> Err codemadness.org 70 i 115 Err codemadness.org 70 i 116 <p>Many different simulation methods for Stokes flow problems involve a common Err codemadness.org 70 i 117 computationally intense task---the summation of a kernel function over $O(N^2)$ Err codemadness.org 70 i 118 pairs of points. One popular technique is the Kernel Independent Fast Multipole Err codemadness.org 70 i 119 Method (KIFMM), which constructs a spatial adaptive octree and places a small Err codemadness.org 70 i 120 number of equivalent multipole and local points around each octree box, and Err codemadness.org 70 i 121 completes the kernel sum with $O(N)$ performance. However, the KIFMM cannot be Err codemadness.org 70 i 122 used directly with nonlinear kernels, can be inefficient for complicated linear Err codemadness.org 70 i 123 kernels, and in general is difficult to implement compared to less-efficient Err codemadness.org 70 i 124 alternatives such as Ewald-type methods. Here we present the Kernel Aggregated Err codemadness.org 70 i 125 Fast Multipole Method (KAFMM), which overcomes these drawbacks by allowing Err codemadness.org 70 i 126 different kernel functions to be used for specific stages of octree traversal. Err codemadness.org 70 i 127 In many cases a simpler linear kernel suffices during the most extensive stage Err codemadness.org 70 i 128 of octree traversal, even for nonlinear kernel summation problems. The KAFMM Err codemadness.org 70 i 129 thereby improves computational efficiency in general and also allows efficient Err codemadness.org 70 i 130 evaluation of some nonlinear kernel functions such as the regularized Err codemadness.org 70 i 131 Stokeslet. We have implemented our method as an open-source software library Err codemadness.org 70 i 132 STKFMM with support for Laplace kernels, the Stokeslet, regularized Stokeslet, Err codemadness.org 70 i 133 Rotne-Prager-Yamakawa (RPY) tensor, and the Stokes double-layer and traction Err codemadness.org 70 i 134 operators. Open and periodic boundary conditions are supported for all kernels, Err codemadness.org 70 i 135 and the no-slip wall boundary condition is supported for the Stokeslet and RPY Err codemadness.org 70 i 136 tensor. The package is designed to be ready-to-use as well as being readily Err codemadness.org 70 i 137 extensible to additional kernels. Massive parallelism is supported with mixed Err codemadness.org 70 i 138 OpenMP and MPI. Err codemadness.org 70 i 139 </p> Err codemadness.org 70 i 140 Err codemadness.org 70 i 141 Err codemadness.org 70 i 142 Err codemadness.org 70 i 143 Diagnostic data integration using deep neural networks for real-time plasma analysis. (arXiv:2010.15156v1 [physics.comp-ph]) Err codemadness.org 70 i 144 http://fr.arxiv.org/abs/2010.15156 Err codemadness.org 70 i 145 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Garola_A/0/1/0/all/0/1">A. Rigoni Garola</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Cavazzana_R/0/1/0/all/0/1">R. Cavazzana</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Gobbin_M/0/1/0/all/0/1">M. Gobbin</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Delogu_R/0/1/0/all/0/1">R.S. Delogu</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Manduchi_G/0/1/0/all/0/1">G. Manduchi</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Taliercio_C/0/1/0/all/0/1">C. Taliercio</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Luchetta_A/0/1/0/all/0/1">A. Luchetta</a></p> Err codemadness.org 70 i 146 Err codemadness.org 70 i 147 <p>Recent advances in acquisition equipment is providing experiments with Err codemadness.org 70 i 148 growing amounts of precise yet affordable sensors. At the same time an improved Err codemadness.org 70 i 149 computational power, coming from new hardware resources (GPU, FPGA, ACAP), has Err codemadness.org 70 i 150 been made available at relatively low costs. This led us to explore the Err codemadness.org 70 i 151 possibility of completely renewing the chain of acquisition for a fusion Err codemadness.org 70 i 152 experiment, where many high-rate sources of data, coming from different Err codemadness.org 70 i 153 diagnostics, can be combined in a wide framework of algorithms. If on one hand Err codemadness.org 70 i 154 adding new data sources with different diagnostics enriches our knowledge about Err codemadness.org 70 i 155 physical aspects, on the other hand the dimensions of the overall model grow, Err codemadness.org 70 i 156 making relations among variables more and more opaque. A new approach for the Err codemadness.org 70 i 157 integration of such heterogeneous diagnostics, based on composition of deep Err codemadness.org 70 i 158 \textit{variational autoencoders}, could ease this problem, acting as a Err codemadness.org 70 i 159 structural sparse regularizer. This has been applied to RFX-mod experiment Err codemadness.org 70 i 160 data, integrating the soft X-ray linear images of plasma temperature with the Err codemadness.org 70 i 161 magnetic state. Err codemadness.org 70 i 162 </p> Err codemadness.org 70 i 163 <p>However to ensure a real-time signal analysis, those algorithmic techniques Err codemadness.org 70 i 164 must be adapted to run in well suited hardware. In particular it is shown that, Err codemadness.org 70 i 165 attempting a quantization of neurons transfer functions, such models can be Err codemadness.org 70 i 166 modified to create an embedded firmware. This firmware, approximating the deep Err codemadness.org 70 i 167 inference model to a set of simple operations, fits well with the simple logic Err codemadness.org 70 i 168 units that are largely abundant in FPGAs. This is the key factor that permits Err codemadness.org 70 i 169 the use of affordable hardware with complex deep neural topology and operates Err codemadness.org 70 i 170 them in real-time. Err codemadness.org 70 i 171 </p> Err codemadness.org 70 i 172 Err codemadness.org 70 i 173 Err codemadness.org 70 i 174 Err codemadness.org 70 i 175 Panoster: End-to-end Panoptic Segmentation of LiDAR Point Clouds. (arXiv:2010.15157v1 [cs.CV]) Err codemadness.org 70 i 176 http://fr.arxiv.org/abs/2010.15157 Err codemadness.org 70 i 177 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gasperini_S/0/1/0/all/0/1">Stefano Gasperini</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mahani_M/0/1/0/all/0/1">Mohammad-Ali Nikouei Mahani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Marcos_Ramiro_A/0/1/0/all/0/1">Alvaro Marcos-Ramiro</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Navab_N/0/1/0/all/0/1">Nassir Navab</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tombari_F/0/1/0/all/0/1">Federico Tombari</a></p> Err codemadness.org 70 i 178 Err codemadness.org 70 i 179 <p>Panoptic segmentation has recently unified semantic and instance Err codemadness.org 70 i 180 segmentation, previously addressed separately, thus taking a step further Err codemadness.org 70 i 181 towards creating more comprehensive and efficient perception systems. In this Err codemadness.org 70 i 182 paper, we present Panoster, a novel proposal-free panoptic segmentation method Err codemadness.org 70 i 183 for point clouds. Unlike previous approaches relying on several steps to group Err codemadness.org 70 i 184 pixels or points into objects, Panoster proposes a simplified framework Err codemadness.org 70 i 185 incorporating a learning-based clustering solution to identify instances. At Err codemadness.org 70 i 186 inference time, this acts as a class-agnostic semantic segmentation, allowing Err codemadness.org 70 i 187 Panoster to be fast, while outperforming prior methods in terms of accuracy. Err codemadness.org 70 i 188 Additionally, we showcase how our approach can be flexibly and effectively Err codemadness.org 70 i 189 applied on diverse existing semantic architectures to deliver panoptic Err codemadness.org 70 i 190 predictions. Err codemadness.org 70 i 191 </p> Err codemadness.org 70 i 192 Err codemadness.org 70 i 193 Err codemadness.org 70 i 194 Err codemadness.org 70 i 195 CNN Profiler on Polar Coordinate Images for Tropical Cyclone Structure Analysis. (arXiv:2010.15158v1 [cs.CV]) Err codemadness.org 70 i 196 http://fr.arxiv.org/abs/2010.15158 Err codemadness.org 70 i 197 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1">Boyo Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1">Buo-Fu Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hsiao_C/0/1/0/all/0/1">Chun-Min Hsiao</a></p> Err codemadness.org 70 i 198 Err codemadness.org 70 i 199 <p>Convolutional neural networks (CNN) have achieved great success in analyzing Err codemadness.org 70 i 200 tropical cyclones (TC) with satellite images in several tasks, such as TC Err codemadness.org 70 i 201 intensity estimation. In contrast, TC structure, which is conventionally Err codemadness.org 70 i 202 described by a few parameters estimated subjectively by meteorology Err codemadness.org 70 i 203 specialists, is still hard to be profiled objectively and routinely. This study Err codemadness.org 70 i 204 applies CNN on satellite images to create the entire TC structure profiles, Err codemadness.org 70 i 205 covering all the structural parameters. By utilizing the meteorological domain Err codemadness.org 70 i 206 knowledge to construct TC wind profiles based on historical structure Err codemadness.org 70 i 207 parameters, we provide valuable labels for training in our newly released Err codemadness.org 70 i 208 benchmark dataset. With such a dataset, we hope to attract more attention to Err codemadness.org 70 i 209 this crucial issue among data scientists. Meanwhile, a baseline is established Err codemadness.org 70 i 210 with a specialized convolutional model operating on polar-coordinates. We Err codemadness.org 70 i 211 discovered that it is more feasible and physically reasonable to extract Err codemadness.org 70 i 212 structural information on polar-coordinates, instead of Cartesian coordinates, Err codemadness.org 70 i 213 according to a TC's rotational and spiral natures. Experimental results on the Err codemadness.org 70 i 214 released benchmark dataset verified the robustness of the proposed model and Err codemadness.org 70 i 215 demonstrated the potential for applying deep learning techniques for this Err codemadness.org 70 i 216 barely developed yet important topic. Err codemadness.org 70 i 217 </p> Err codemadness.org 70 i 218 Err codemadness.org 70 i 219 Err codemadness.org 70 i 220 Err codemadness.org 70 i 221 Sizeless: Predicting the optimal size of serverless functions. (arXiv:2010.15162v1 [cs.DC]) Err codemadness.org 70 i 222 http://fr.arxiv.org/abs/2010.15162 Err codemadness.org 70 i 223 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Eismann_S/0/1/0/all/0/1">Simon Eismann</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bui_L/0/1/0/all/0/1">Long Bui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Grohmann_J/0/1/0/all/0/1">Johannes Grohmann</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Abad_C/0/1/0/all/0/1">Cristina L. Abad</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Herbst_N/0/1/0/all/0/1">Nikolas Herbst</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kounev_S/0/1/0/all/0/1">Samuel Kounev</a></p> Err codemadness.org 70 i 224 Err codemadness.org 70 i 225 <p>Serverless functions are a cloud computing paradigm that reduces operational Err codemadness.org 70 i 226 overheads for developers, because the cloud provider takes care of resource Err codemadness.org 70 i 227 management tasks such as resource provisioning, deployment, and auto-scaling. Err codemadness.org 70 i 228 The only resource management task that developers are still in charge of is Err codemadness.org 70 i 229 resource sizing, that is, selecting how much resources are allocated to each Err codemadness.org 70 i 230 worker instance. However, due to the challenging nature of resource sizing, Err codemadness.org 70 i 231 developers often neglect it despite its significant cost and performance Err codemadness.org 70 i 232 benefits. Existing approaches aiming to automate serverless functions resource Err codemadness.org 70 i 233 sizing require dedicated performance tests, which are time consuming to Err codemadness.org 70 i 234 implement and maintain. Err codemadness.org 70 i 235 </p> Err codemadness.org 70 i 236 <p>In this paper, we introduce Sizeless -- an approach to predict the optimal Err codemadness.org 70 i 237 resource size of a serverless function using monitoring data from a single Err codemadness.org 70 i 238 resource size. As our approach requires only production monitoring data, Err codemadness.org 70 i 239 developers no longer need to implement and maintain representative performance Err codemadness.org 70 i 240 tests. Furthermore, it enables cloud providers, which cannot engage in testing Err codemadness.org 70 i 241 the performance of user functions, to implement resource sizing on a platform Err codemadness.org 70 i 242 level and automate the last resource management task associated with serverless Err codemadness.org 70 i 243 functions. In our evaluation, Sizeless was able to predict the execution time Err codemadness.org 70 i 244 of the serverless functions of a realistic server-less application with a Err codemadness.org 70 i 245 median prediction accuracy of 93.1%. Using Sizeless to optimize the memory size Err codemadness.org 70 i 246 of this application results in a speedup of 16.7% while simultaneously Err codemadness.org 70 i 247 decreasing costs by 2.5%. Err codemadness.org 70 i 248 </p> Err codemadness.org 70 i 249 Err codemadness.org 70 i 250 Err codemadness.org 70 i 251 Err codemadness.org 70 i 252 Polymer Informatics with Multi-Task Learning. (arXiv:2010.15166v1 [cond-mat.mtrl-sci]) Err codemadness.org 70 i 253 http://fr.arxiv.org/abs/2010.15166 Err codemadness.org 70 i 254 <p>Authors: <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Kunneth_C/0/1/0/all/0/1">Christopher K&#xfc;nneth</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Rajan_A/0/1/0/all/0/1">Arunkumar Chitteth Rajan</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Tran_H/0/1/0/all/0/1">Huan Tran</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Chen_L/0/1/0/all/0/1">Lihua Chen</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Kim_C/0/1/0/all/0/1">Chiho Kim</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Ramprasad_R/0/1/0/all/0/1">Rampi Ramprasad</a></p> Err codemadness.org 70 i 255 Err codemadness.org 70 i 256 <p>Modern data-driven tools are transforming application-specific polymer Err codemadness.org 70 i 257 development cycles. Surrogate models that can be trained to predict the Err codemadness.org 70 i 258 properties of new polymers are becoming commonplace. Nevertheless, these models Err codemadness.org 70 i 259 do not utilize the full breadth of the knowledge available in datasets, which Err codemadness.org 70 i 260 are oftentimes sparse; inherent correlations between different property Err codemadness.org 70 i 261 datasets are disregarded. Here, we demonstrate the potency of multi-task Err codemadness.org 70 i 262 learning approaches that exploit such inherent correlations effectively, Err codemadness.org 70 i 263 particularly when some property dataset sizes are small. Data pertaining to 36 Err codemadness.org 70 i 264 different properties of over $13, 000$ polymers (corresponding to over $23,000$ Err codemadness.org 70 i 265 data points) are coalesced and supplied to deep-learning multi-task Err codemadness.org 70 i 266 architectures. Compared to conventional single-task learning models (that are Err codemadness.org 70 i 267 trained on individual property datasets independently), the multi-task approach Err codemadness.org 70 i 268 is accurate, efficient, scalable, and amenable to transfer learning as more Err codemadness.org 70 i 269 data on the same or different properties become available. Moreover, these Err codemadness.org 70 i 270 models are interpretable. Chemical rules, that explain how certain features Err codemadness.org 70 i 271 control trends in specific property values, emerge from the present work, Err codemadness.org 70 i 272 paving the way for the rational design of application specific polymers meeting Err codemadness.org 70 i 273 desired property or performance objectives. Err codemadness.org 70 i 274 </p> Err codemadness.org 70 i 275 Err codemadness.org 70 i 276 Err codemadness.org 70 i 277 Err codemadness.org 70 i 278 Semi-Grant-Free NOMA: Ergodic Rates Analysis with Random Deployed Users. (arXiv:2010.15169v1 [cs.IT]) Err codemadness.org 70 i 279 http://fr.arxiv.org/abs/2010.15169 Err codemadness.org 70 i 280 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1">Chao Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1">Yuanwei Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yi_W/0/1/0/all/0/1">Wenqiang Yi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qin_Z/0/1/0/all/0/1">Zhijin Qin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ding_Z/0/1/0/all/0/1">Zhiguo Ding</a></p> Err codemadness.org 70 i 281 Err codemadness.org 70 i 282 <p>Semi-grant-free (Semi-GF) non-orthogonal multiple access (NOMA) enables Err codemadness.org 70 i 283 grant-free (GF) and grant-based (GB) users to share the same resource blocks, Err codemadness.org 70 i 284 thereby balancing the connectivity and stability of communications. This letter Err codemadness.org 70 i 285 analyzes ergodic rates of Semi-GF NOMA systems. First, this paper exploits a Err codemadness.org 70 i 286 Semi-GF protocol, denoted as dynamic protocol, for selecting GF users into the Err codemadness.org 70 i 287 occupied GB channels via the GB user's instantaneous received power. Under this Err codemadness.org 70 i 288 protocol, the closed-form analytical and approximated expressions for ergodic Err codemadness.org 70 i 289 rates are derived. The numerical results illustrate that the GF user (weak NOMA Err codemadness.org 70 i 290 user) has a performance upper limit, while the ergodic rate of the GB user Err codemadness.org 70 i 291 (strong NOMA user) increases linearly versus the transmit signal-to-noise Err codemadness.org 70 i 292 ratio. Err codemadness.org 70 i 293 </p> Err codemadness.org 70 i 294 Err codemadness.org 70 i 295 Err codemadness.org 70 i 296 Err codemadness.org 70 i 297 Slicing a single wireless collision channel among throughput- and timeliness-sensitive services. (arXiv:2010.15171v1 [cs.IT]) Err codemadness.org 70 i 298 http://fr.arxiv.org/abs/2010.15171 Err codemadness.org 70 i 299 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Leyva_Mayorga_I/0/1/0/all/0/1">Israel Leyva-Mayorga</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chiariotti_F/0/1/0/all/0/1">Federico Chiariotti</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stefanovic_C/0/1/0/all/0/1">&#x10c;edomir Stefanovi&#x107;</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kalor_A/0/1/0/all/0/1">Anders E. Kal&#xf8;r</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Popovski_P/0/1/0/all/0/1">Petar Popovski</a></p> Err codemadness.org 70 i 300 Err codemadness.org 70 i 301 <p>The fifth generation (5G) wireless system has a platform-driven approach, Err codemadness.org 70 i 302 aiming to support heterogeneous connections with very diverse requirements. The Err codemadness.org 70 i 303 shared wireless resources should be sliced in a way that each user perceives Err codemadness.org 70 i 304 that its requirement has been met. Heterogeneity challenges the traditional Err codemadness.org 70 i 305 notion of resource efficiency, as the resource usage has cater for, e.g. rate Err codemadness.org 70 i 306 maximization for one user and timeliness requirement for another user. This Err codemadness.org 70 i 307 paper treats a model for radio access network (RAN) uplink, where a Err codemadness.org 70 i 308 throughput-demanding broadband user shares wireless resources with an Err codemadness.org 70 i 309 intermittently active user that wants to optimize the timeliness, expressed in Err codemadness.org 70 i 310 terms of latency-reliability or Age of Information (AoI). We evaluate the Err codemadness.org 70 i 311 trade-offs between throughput and timeliness for Orthogonal Multiple Access Err codemadness.org 70 i 312 (OMA) as well as Non-Orthogonal Multiple Access (NOMA) with successive Err codemadness.org 70 i 313 interference cancellation (SIC). We observe that NOMA with SIC, in a Err codemadness.org 70 i 314 conservative scenario with destructive collisions, is just slightly inferior to Err codemadness.org 70 i 315 that of OMA, which indicates that it may offer significant benefits in Err codemadness.org 70 i 316 practical deployments where the capture effect is frequently encountered. On Err codemadness.org 70 i 317 the other hand, finding the optimal configuration of NOMA with SIC depends on Err codemadness.org 70 i 318 the activity pattern of the intermittent user, to which OMA is insensitive. Err codemadness.org 70 i 319 </p> Err codemadness.org 70 i 320 Err codemadness.org 70 i 321 Err codemadness.org 70 i 322 Err codemadness.org 70 i 323 Improving Perceptual Quality by Phone-Fortified Perceptual Loss for Speech Enhancement. (arXiv:2010.15174v1 [cs.SD]) Err codemadness.org 70 i 324 http://fr.arxiv.org/abs/2010.15174 Err codemadness.org 70 i 325 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hsieh_T/0/1/0/all/0/1">Tsun-An Hsieh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yu_C/0/1/0/all/0/1">Cheng Yu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fu_S/0/1/0/all/0/1">Szu-Wei Fu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lu_X/0/1/0/all/0/1">Xugang Lu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tsao_Y/0/1/0/all/0/1">Yu Tsao</a></p> Err codemadness.org 70 i 326 Err codemadness.org 70 i 327 <p>Speech enhancement (SE) aims to improve speech quality and intelligibility, Err codemadness.org 70 i 328 which are both related to a smooth transition in speech segments that may carry Err codemadness.org 70 i 329 linguistic information, e.g. phones and syllables. In this study, we took Err codemadness.org 70 i 330 phonetic characteristics into account in the SE training process. Hence, we Err codemadness.org 70 i 331 designed a phone-fortified perceptual (PFP) loss, and the training of our SE Err codemadness.org 70 i 332 model was guided by PFP loss. In PFP loss, phonetic characteristics are Err codemadness.org 70 i 333 extracted by wav2vec, an unsupervised learning model based on the contrastive Err codemadness.org 70 i 334 predictive coding (CPC) criterion. Different from previous deep-feature-based Err codemadness.org 70 i 335 approaches, the proposed approach explicitly uses the phonetic information in Err codemadness.org 70 i 336 the deep feature extraction process to guide the SE model training. To test the Err codemadness.org 70 i 337 proposed approach, we first confirmed that the wav2vec representations carried Err codemadness.org 70 i 338 clear phonetic information using a t-distributed stochastic neighbor embedding Err codemadness.org 70 i 339 (t-SNE) analysis. Next, we observed that the proposed PFP loss was more Err codemadness.org 70 i 340 strongly correlated with the perceptual evaluation metrics than point-wise and Err codemadness.org 70 i 341 signal-level losses, thus achieving higher scores for standardized quality and Err codemadness.org 70 i 342 intelligibility evaluation metrics in the Voice Bank--DEMAND dataset. Err codemadness.org 70 i 343 </p> Err codemadness.org 70 i 344 Err codemadness.org 70 i 345 Err codemadness.org 70 i 346 Err codemadness.org 70 i 347 A Study on Efficiency in Continual Learning Inspired by Human Learning. (arXiv:2010.15187v1 [cs.LG]) Err codemadness.org 70 i 348 http://fr.arxiv.org/abs/2010.15187 Err codemadness.org 70 i 349 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ball_P/0/1/0/all/0/1">Philip J. Ball</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1">Yingzhen Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lamb_A/0/1/0/all/0/1">Angus Lamb</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1">Cheng Zhang</a></p> Err codemadness.org 70 i 350 Err codemadness.org 70 i 351 <p>Humans are efficient continual learning systems; we continually learn new Err codemadness.org 70 i 352 skills from birth with finite cells and resources. Our learning is highly Err codemadness.org 70 i 353 optimized both in terms of capacity and time while not suffering from Err codemadness.org 70 i 354 catastrophic forgetting. In this work we study the efficiency of continual Err codemadness.org 70 i 355 learning systems, taking inspiration from human learning. In particular, Err codemadness.org 70 i 356 inspired by the mechanisms of sleep, we evaluate popular pruning-based Err codemadness.org 70 i 357 continual learning algorithms, using PackNet as a case study. First, we Err codemadness.org 70 i 358 identify that weight freezing, which is used in continual learning without Err codemadness.org 70 i 359 biological justification, can result in over $2\times$ as many weights being Err codemadness.org 70 i 360 used for a given level of performance. Secondly, we note the similarity in Err codemadness.org 70 i 361 human day and night time behaviors to the training and pruning phases Err codemadness.org 70 i 362 respectively of PackNet. We study a setting where the pruning phase is given a Err codemadness.org 70 i 363 time budget, and identify connections between iterative pruning and multiple Err codemadness.org 70 i 364 sleep cycles in humans. We show there exists an optimal choice of iteration Err codemadness.org 70 i 365 v.s. epochs given different tasks. Err codemadness.org 70 i 366 </p> Err codemadness.org 70 i 367 Err codemadness.org 70 i 368 Err codemadness.org 70 i 369 Err codemadness.org 70 i 370 Explicit stabilized multirate method for stiff stochastic differential equations. (arXiv:2010.15193v1 [math.NA]) Err codemadness.org 70 i 371 http://fr.arxiv.org/abs/2010.15193 Err codemadness.org 70 i 372 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Abdulle_A/0/1/0/all/0/1">Assyr Abdulle</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Souza_G/0/1/0/all/0/1">Giacomo Rosilho de Souza</a></p> Err codemadness.org 70 i 373 Err codemadness.org 70 i 374 <p>Stabilized explicit methods are particularly efficient for large systems of Err codemadness.org 70 i 375 stiff stochastic differential equations (SDEs) due to their extended stability Err codemadness.org 70 i 376 domain. However, they loose their efficiency when a severe stiffness is induced Err codemadness.org 70 i 377 by very few "fast" degrees of freedom, as the stiff and nonstiff terms are Err codemadness.org 70 i 378 evaluated concurrently. Therefore, inspired by [A. Abdulle, M. J. Grote, and G. Err codemadness.org 70 i 379 Rosilho de Souza, Preprint (2020), <a href="/abs/2006.00744">arXiv:2006.00744</a>] we introduce a stochastic Err codemadness.org 70 i 380 modified equation whose stiffness depends solely on the "slow" terms. By Err codemadness.org 70 i 381 integrating this modified equation with a stabilized explicit scheme we devise Err codemadness.org 70 i 382 a multirate method which overcomes the bottleneck caused by a few severely Err codemadness.org 70 i 383 stiff terms and recovers the efficiency of stabilized schemes for large systems Err codemadness.org 70 i 384 of nonlinear SDEs. The scheme is not based on any scale separation assumption Err codemadness.org 70 i 385 of the SDE and therefore it is employable for problems stemming from the Err codemadness.org 70 i 386 spatial discretization of stochastic parabolic partial differential equations Err codemadness.org 70 i 387 on locally refined grids. The multirate scheme has strong order 1/2, weak order Err codemadness.org 70 i 388 1 and its stability is proved on a model problem. Numerical experiments confirm Err codemadness.org 70 i 389 the efficiency and accuracy of the scheme. Err codemadness.org 70 i 390 </p> Err codemadness.org 70 i 391 Err codemadness.org 70 i 392 Err codemadness.org 70 i 393 Err codemadness.org 70 i 394 Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments. (arXiv:2010.15195v1 [cs.LG]) Err codemadness.org 70 i 395 http://fr.arxiv.org/abs/2010.15195 Err codemadness.org 70 i 396 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Carvalho_W/0/1/0/all/0/1">Wilka Carvalho</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liang_A/0/1/0/all/0/1">Anthony Liang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_K/0/1/0/all/0/1">Kimin Lee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sohn_S/0/1/0/all/0/1">Sungryull Sohn</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1">Honglak Lee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lewis_R/0/1/0/all/0/1">Richard L. Lewis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_S/0/1/0/all/0/1">Satinder Singh</a></p> Err codemadness.org 70 i 397 Err codemadness.org 70 i 398 <p>First-person object-interaction tasks in high-fidelity, 3D, simulated Err codemadness.org 70 i 399 environments such as the AI2Thor virtual home-environment pose significant Err codemadness.org 70 i 400 sample-efficiency challenges for reinforcement learning (RL) agents learning Err codemadness.org 70 i 401 from sparse task rewards. To alleviate these challenges, prior work has Err codemadness.org 70 i 402 provided extensive supervision via a combination of reward-shaping, Err codemadness.org 70 i 403 ground-truth object-information, and expert demonstrations. In this work, we Err codemadness.org 70 i 404 show that one can learn object-interaction tasks from scratch without Err codemadness.org 70 i 405 supervision by learning an attentive object-model as an auxiliary task during Err codemadness.org 70 i 406 task learning with an object-centric relational RL agent. Our key insight is Err codemadness.org 70 i 407 that learning an object-model that incorporates object-attention into forward Err codemadness.org 70 i 408 prediction provides a dense learning signal for unsupervised representation Err codemadness.org 70 i 409 learning of both objects and their relationships. This, in turn, enables faster Err codemadness.org 70 i 410 policy learning for an object-centric relational RL agent. We demonstrate our Err codemadness.org 70 i 411 agent by introducing a set of challenging object-interaction tasks in the Err codemadness.org 70 i 412 AI2Thor environment where learning with our attentive object-model is key to Err codemadness.org 70 i 413 strong performance. Specifically, we compare our agent and relational RL agents Err codemadness.org 70 i 414 with alternative auxiliary tasks to a relational RL agent equipped with Err codemadness.org 70 i 415 ground-truth object-information, and show that learning with our object-model Err codemadness.org 70 i 416 best closes the performance gap in terms of both learning speed and maximum Err codemadness.org 70 i 417 success rate. Additionally, we find that incorporating object-attention into an Err codemadness.org 70 i 418 object-model's forward predictions is key to learning representations which Err codemadness.org 70 i 419 capture object-category and object-state. Err codemadness.org 70 i 420 </p> Err codemadness.org 70 i 421 Err codemadness.org 70 i 422 Err codemadness.org 70 i 423 Err codemadness.org 70 i 424 A fast and scalable computational framework for large-scale and high-dimensional Bayesian optimal experimental design. (arXiv:2010.15196v1 [math.NA]) Err codemadness.org 70 i 425 http://fr.arxiv.org/abs/2010.15196 Err codemadness.org 70 i 426 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Wu_K/0/1/0/all/0/1">Keyi Wu</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Chen_P/0/1/0/all/0/1">Peng Chen</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Ghattas_O/0/1/0/all/0/1">Omar Ghattas</a></p> Err codemadness.org 70 i 427 Err codemadness.org 70 i 428 <p>We develop a fast and scalable computational framework to solve large-scale Err codemadness.org 70 i 429 and high-dimensional Bayesian optimal experimental design problems. In Err codemadness.org 70 i 430 particular, we consider the problem of optimal observation sensor placement for Err codemadness.org 70 i 431 Bayesian inference of high-dimensional parameters governed by partial Err codemadness.org 70 i 432 differential equations (PDEs), which is formulated as an optimization problem Err codemadness.org 70 i 433 that seeks to maximize an expected information gain (EIG). Such optimization Err codemadness.org 70 i 434 problems are particularly challenging due to the curse of dimensionality for Err codemadness.org 70 i 435 high-dimensional parameters and the expensive solution of large-scale PDEs. To Err codemadness.org 70 i 436 address these challenges, we exploit two essential properties of such problems: Err codemadness.org 70 i 437 the low-rank structure of the Jacobian of the parameter-to-observable map to Err codemadness.org 70 i 438 extract the intrinsically low-dimensional data-informed subspace, and the high Err codemadness.org 70 i 439 correlation of the approximate EIGs by a series of approximations to reduce the Err codemadness.org 70 i 440 number of PDE solves. We propose an efficient offline-online decomposition for Err codemadness.org 70 i 441 the optimization problem: an offline stage of computing all the quantities that Err codemadness.org 70 i 442 require a limited number of PDE solves independent of parameter and data Err codemadness.org 70 i 443 dimensions, and an online stage of optimizing sensor placement that does not Err codemadness.org 70 i 444 require any PDE solve. For the online optimization, we propose a swapping Err codemadness.org 70 i 445 greedy algorithm that first construct an initial set of sensors using leverage Err codemadness.org 70 i 446 scores and then swap the chosen sensors with other candidates until certain Err codemadness.org 70 i 447 convergence criteria are met. We demonstrate the efficiency and scalability of Err codemadness.org 70 i 448 the proposed computational framework by a linear inverse problem of inferring Err codemadness.org 70 i 449 the initial condition for an advection-diffusion equation, and a nonlinear Err codemadness.org 70 i 450 inverse problem of inferring the diffusion coefficient of a log-normal Err codemadness.org 70 i 451 diffusion equation, with both the parameter and data dimensions ranging from a Err codemadness.org 70 i 452 few tens to a few thousands. Err codemadness.org 70 i 453 </p> Err codemadness.org 70 i 454 Err codemadness.org 70 i 455 Err codemadness.org 70 i 456 Err codemadness.org 70 i 457 Forecasting Hamiltonian dynamics without canonical coordinates. (arXiv:2010.15201v1 [cs.LG]) Err codemadness.org 70 i 458 http://fr.arxiv.org/abs/2010.15201 Err codemadness.org 70 i 459 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Choudhary_A/0/1/0/all/0/1">Anshul Choudhary</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lindner_J/0/1/0/all/0/1">John F. Lindner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Holliday_E/0/1/0/all/0/1">Elliott G. Holliday</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Miller_S/0/1/0/all/0/1">Scott T. Miller</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sinha_S/0/1/0/all/0/1">Sudeshna Sinha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ditto_W/0/1/0/all/0/1">William L. Ditto</a></p> Err codemadness.org 70 i 460 Err codemadness.org 70 i 461 <p>Conventional neural networks are universal function approximators, but Err codemadness.org 70 i 462 because they are unaware of underlying symmetries or physical laws, they may Err codemadness.org 70 i 463 need impractically many training data to approximate nonlinear dynamics. Err codemadness.org 70 i 464 Recently introduced Hamiltonian neural networks can efficiently learn and Err codemadness.org 70 i 465 forecast dynamical systems that conserve energy, but they require special Err codemadness.org 70 i 466 inputs called canonical coordinates, which may be hard to infer from data. Here Err codemadness.org 70 i 467 we significantly expand the scope of such networks by demonstrating a simple Err codemadness.org 70 i 468 way to train them with any set of generalised coordinates, including easily Err codemadness.org 70 i 469 observable ones. Err codemadness.org 70 i 470 </p> Err codemadness.org 70 i 471 Err codemadness.org 70 i 472 Err codemadness.org 70 i 473 Err codemadness.org 70 i 474 Micromobility in Smart Cities: A Closer Look at Shared Dockless E-Scooters via Big Social Data. (arXiv:2010.15203v1 [cs.SI]) Err codemadness.org 70 i 475 http://fr.arxiv.org/abs/2010.15203 Err codemadness.org 70 i 476 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1">Yunhe Feng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhong_D/0/1/0/all/0/1">Dong Zhong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sun_P/0/1/0/all/0/1">Peng Sun</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zheng_W/0/1/0/all/0/1">Weijian Zheng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cao_Q/0/1/0/all/0/1">Qinglei Cao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Luo_X/0/1/0/all/0/1">Xi Luo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lu_Z/0/1/0/all/0/1">Zheng Lu</a></p> Err codemadness.org 70 i 477 Err codemadness.org 70 i 478 <p>The micromobility is shaping first- and last-mile travels in urban areas. Err codemadness.org 70 i 479 Recently, shared dockless electric scooters (e-scooters) have emerged as a Err codemadness.org 70 i 480 daily alternative to driving for short-distance commuters in large cities due Err codemadness.org 70 i 481 to the affordability, easy accessibility via an app, and zero emissions. Err codemadness.org 70 i 482 Meanwhile, e-scooters come with challenges in city management, such as traffic Err codemadness.org 70 i 483 rules, public safety, parking regulations, and liability issues. In this paper, Err codemadness.org 70 i 484 we collected and investigated 5.8 million scooter-tagged tweets and 144,197 Err codemadness.org 70 i 485 images, generated by 2.7 million users from October 2018 to March 2020, to take Err codemadness.org 70 i 486 a closer look at shared e-scooters via crowdsourcing data analytics. We Err codemadness.org 70 i 487 profiled e-scooter usages from spatial-temporal perspectives, explored Err codemadness.org 70 i 488 different business roles (i.e., riders, gig workers, and ridesharing Err codemadness.org 70 i 489 companies), examined operation patterns (e.g., injury types, and parking Err codemadness.org 70 i 490 behaviors), and conducted sentiment analysis. To our best knowledge, this paper Err codemadness.org 70 i 491 is the first large-scale systematic study on shared e-scooters using big social Err codemadness.org 70 i 492 data. Err codemadness.org 70 i 493 </p> Err codemadness.org 70 i 494 Err codemadness.org 70 i 495 Err codemadness.org 70 i 496 Err codemadness.org 70 i 497 Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters. (arXiv:2010.15206v1 [cs.DC]) Err codemadness.org 70 i 498 http://fr.arxiv.org/abs/2010.15206 Err codemadness.org 70 i 499 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_Q/0/1/0/all/0/1">Qiong Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Manandhar_S/0/1/0/all/0/1">Sunil Manandhar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1">Zhenming Liu</a></p> Err codemadness.org 70 i 500 Err codemadness.org 70 i 501 <p>Large-scale interactive web services and advanced AI applications make Err codemadness.org 70 i 502 sophisticated decisions in real-time, based on executing a massive amount of Err codemadness.org 70 i 503 computation tasks on thousands of servers. Task schedulers, which often operate Err codemadness.org 70 i 504 in heterogeneous and volatile environments, require high throughput, i.e., Err codemadness.org 70 i 505 scheduling millions of tasks per second, and low latency, i.e., incurring Err codemadness.org 70 i 506 minimal scheduling delays for millisecond-level tasks. Scheduling is further Err codemadness.org 70 i 507 complicated by other users' workloads in a shared system, other background Err codemadness.org 70 i 508 activities, and the diverse hardware configurations inside datacenters. Err codemadness.org 70 i 509 </p> Err codemadness.org 70 i 510 <p>We present Rosella, a new self-driving, distributed approach for task Err codemadness.org 70 i 511 scheduling in heterogeneous clusters. Our system automatically learns the Err codemadness.org 70 i 512 compute environment and adjust its scheduling policy in real-time. The solution Err codemadness.org 70 i 513 provides high throughput and low latency simultaneously, because it runs in Err codemadness.org 70 i 514 parallel on multiple machines with minimum coordination and only performs Err codemadness.org 70 i 515 simple operations for each scheduling decision. Our learning module monitors Err codemadness.org 70 i 516 total system load, and uses the information to dynamically determine optimal Err codemadness.org 70 i 517 estimation strategy for the backends' compute-power. Our scheduling policy Err codemadness.org 70 i 518 generalizes power-of-two-choice algorithms to handle heterogeneous workers, Err codemadness.org 70 i 519 reducing the max queue length of $O(\log n)$ obtained by prior algorithms to Err codemadness.org 70 i 520 $O(\log \log n)$. We implement a Rosella prototype and evaluate it with a Err codemadness.org 70 i 521 variety of workloads. Experimental results show that Rosella significantly Err codemadness.org 70 i 522 reduces task response times, and adapts to environment changes quickly. Err codemadness.org 70 i 523 </p> Err codemadness.org 70 i 524 Err codemadness.org 70 i 525 Err codemadness.org 70 i 526 Err codemadness.org 70 i 527 Ground Roll Suppression using Convolutional Neural Networks. (arXiv:2010.15209v1 [eess.IV]) Err codemadness.org 70 i 528 http://fr.arxiv.org/abs/2010.15209 Err codemadness.org 70 i 529 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Oliveira_D/0/1/0/all/0/1">Dario Augusto Borges Oliveira</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Semin_D/0/1/0/all/0/1">Daniil Semin</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zaytsev_S/0/1/0/all/0/1">Semen Zaytsev</a></p> Err codemadness.org 70 i 530 Err codemadness.org 70 i 531 <p>Seismic data processing plays a major role in seismic exploration as it Err codemadness.org 70 i 532 conditions much of the seismic interpretation performance. In this context, Err codemadness.org 70 i 533 generating reliable post-stack seismic data depends also on disposing of an Err codemadness.org 70 i 534 efficient pre-stack noise attenuation tool. Here we tackle ground roll noise, Err codemadness.org 70 i 535 one of the most challenging and common noises observed in pre-stack seismic Err codemadness.org 70 i 536 data. Since ground roll is characterized by relative low frequencies and high Err codemadness.org 70 i 537 amplitudes, most commonly used approaches for its suppression are based on Err codemadness.org 70 i 538 frequency-amplitude filters for ground roll characteristic bands. However, when Err codemadness.org 70 i 539 signal and noise share the same frequency ranges, these methods usually deliver Err codemadness.org 70 i 540 also signal suppression or residual noise. In this paper we take advantage of Err codemadness.org 70 i 541 the highly non-linear features of convolutional neural networks, and propose to Err codemadness.org 70 i 542 use different architectures to detect ground roll in shot gathers and Err codemadness.org 70 i 543 ultimately to suppress them using conditional generative adversarial networks. Err codemadness.org 70 i 544 Additionally, we propose metrics to evaluate ground roll suppression, and Err codemadness.org 70 i 545 report strong results compared to expert filtering. Finally, we discuss Err codemadness.org 70 i 546 generalization of trained models for similar and different geologies to better Err codemadness.org 70 i 547 understand the feasibility of our proposal in real applications. Err codemadness.org 70 i 548 </p> Err codemadness.org 70 i 549 Err codemadness.org 70 i 550 Err codemadness.org 70 i 551 Err codemadness.org 70 i 552 On Linearizability and the Termination of Randomized Algorithms. (arXiv:2010.15210v1 [cs.DC]) Err codemadness.org 70 i 553 http://fr.arxiv.org/abs/2010.15210 Err codemadness.org 70 i 554 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hadzilacos_V/0/1/0/all/0/1">Vassos Hadzilacos</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hu_X/0/1/0/all/0/1">Xing Hu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Toueg_S/0/1/0/all/0/1">Sam Toueg</a></p> Err codemadness.org 70 i 555 Err codemadness.org 70 i 556 <p>We study the question of whether the "termination with probability 1" Err codemadness.org 70 i 557 property of a randomized algorithm is preserved when one replaces the atomic Err codemadness.org 70 i 558 registers that the algorithm uses with linearizable (implementations of) Err codemadness.org 70 i 559 registers. We show that in general this is not so: roughly speaking, every Err codemadness.org 70 i 560 randomized algorithm A has a corresponding algorithm A' that solves the same Err codemadness.org 70 i 561 problem if the registers that it uses are atomic or strongly-linearizable, but Err codemadness.org 70 i 562 does not terminate if these registers are replaced with "merely" linearizable Err codemadness.org 70 i 563 ones. Together with a previous result shown in [15], this implies that one Err codemadness.org 70 i 564 cannot use the well-known ABD implementation of registers in message-passing Err codemadness.org 70 i 565 systems to automatically transform any randomized algorithm that works in Err codemadness.org 70 i 566 shared-memory systems into a randomized algorithm that works in message-passing Err codemadness.org 70 i 567 systems: with a strong adversary the resulting algorithm may not terminate. Err codemadness.org 70 i 568 </p> Err codemadness.org 70 i 569 Err codemadness.org 70 i 570 Err codemadness.org 70 i 571 Err codemadness.org 70 i 572 Safety-Aware Cascade Controller Tuning Using Constrained Bayesian Optimization. (arXiv:2010.15211v1 [eess.SY]) Err codemadness.org 70 i 573 http://fr.arxiv.org/abs/2010.15211 Err codemadness.org 70 i 574 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Konig_C/0/1/0/all/0/1">Christopher K&#xf6;nig</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Khosravi_M/0/1/0/all/0/1">Mohammad Khosravi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Maier_M/0/1/0/all/0/1">Markus Maier</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Smith_R/0/1/0/all/0/1">Roy S. Smith</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Rupenyan_A/0/1/0/all/0/1">Alisa Rupenyan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Lygeros_J/0/1/0/all/0/1">John Lygeros</a></p> Err codemadness.org 70 i 575 Err codemadness.org 70 i 576 <p>This paper presents an automated, model-free, data-driven method for the safe Err codemadness.org 70 i 577 tuning of PID cascade controller gains based on Bayesian optimization. The Err codemadness.org 70 i 578 optimization objective is composed of data-driven performance metrics and Err codemadness.org 70 i 579 modeled using Gaussian processes. We further introduce a data-driven constraint Err codemadness.org 70 i 580 that captures the stability requirements from system data. Numerical evaluation Err codemadness.org 70 i 581 shows that the proposed approach outperforms relay feedback autotuning and Err codemadness.org 70 i 582 quickly converges to the global optimum, thanks to a tailored stopping Err codemadness.org 70 i 583 criterion. We demonstrate the performance of the method in simulations and Err codemadness.org 70 i 584 experiments on a linear axis drive of a grinding machine. For experimental Err codemadness.org 70 i 585 implementation, in addition to the introduced safety constraint, we integrate a Err codemadness.org 70 i 586 method for automatic detection of the critical gains and extend the Err codemadness.org 70 i 587 optimization objective with a penalty depending on the proximity of the current Err codemadness.org 70 i 588 candidate points to the critical gains. The resulting automated tuning method Err codemadness.org 70 i 589 optimizes system performance while ensuring stability and standardization. Err codemadness.org 70 i 590 </p> Err codemadness.org 70 i 591 Err codemadness.org 70 i 592 Err codemadness.org 70 i 593 Err codemadness.org 70 i 594 Away from Trolley Problems and Toward Risk Management. (arXiv:2010.15217v1 [cs.CY]) Err codemadness.org 70 i 595 http://fr.arxiv.org/abs/2010.15217 Err codemadness.org 70 i 596 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Goodall_N/0/1/0/all/0/1">Noah J. Goodall</a></p> Err codemadness.org 70 i 597 Err codemadness.org 70 i 598 <p>As automated vehicles receive more attention from the media, there has been Err codemadness.org 70 i 599 an equivalent increase in the coverage of the ethical choices a vehicle may be Err codemadness.org 70 i 600 forced to make in certain crash situations with no clear safe outcome. Much of Err codemadness.org 70 i 601 this coverage has focused on a philosophical thought experiment known as the Err codemadness.org 70 i 602 "trolley problem," and substituting an automated vehicle for the trolley and Err codemadness.org 70 i 603 the car's software for the bystander. While this is a stark and straightforward Err codemadness.org 70 i 604 example of ethical decision making for an automated vehicle, it risks Err codemadness.org 70 i 605 marginalizing the entire field if it is to become the only ethical problem in Err codemadness.org 70 i 606 the public's mind. In this chapter, I discuss the shortcomings of the trolley Err codemadness.org 70 i 607 problem, and introduce more nuanced examples that involve crash risk and Err codemadness.org 70 i 608 uncertainty. Risk management is introduced as an alternative approach, and its Err codemadness.org 70 i 609 ethical dimensions are discussed. Err codemadness.org 70 i 610 </p> Err codemadness.org 70 i 611 Err codemadness.org 70 i 612 Err codemadness.org 70 i 613 Err codemadness.org 70 i 614 StencilFlow: Mapping Large Stencil Programs to Distributed Spatial Computing Systems. (arXiv:2010.15218v1 [cs.DC]) Err codemadness.org 70 i 615 http://fr.arxiv.org/abs/2010.15218 Err codemadness.org 70 i 616 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Licht_J/0/1/0/all/0/1">Johannes de Fine Licht</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kuster_A/0/1/0/all/0/1">Andreas Kuster</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Matteis_T/0/1/0/all/0/1">Tiziano De Matteis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ben_Nun_T/0/1/0/all/0/1">Tal Ben-Nun</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hofer_D/0/1/0/all/0/1">Dominic Hofer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hoefler_T/0/1/0/all/0/1">Torsten Hoefler</a></p> Err codemadness.org 70 i 617 Err codemadness.org 70 i 618 <p>Spatial computing devices have been shown to significantly accelerate stencil Err codemadness.org 70 i 619 computations, but have so far relied on unrolling the iterative dimension of a Err codemadness.org 70 i 620 single stencil operation to increase temporal locality. This work considers the Err codemadness.org 70 i 621 general case of mapping directed acyclic graphs of heterogeneous stencil Err codemadness.org 70 i 622 computations to spatial computing systems, assuming large input programs Err codemadness.org 70 i 623 without an iterative component. StencilFlow maximizes temporal locality and Err codemadness.org 70 i 624 ensures deadlock freedom in this setting, providing end-to-end analysis and Err codemadness.org 70 i 625 mapping from a high-level program description to distributed hardware. We Err codemadness.org 70 i 626 evaluate the generated architectures on an FPGA testbed, demonstrating the Err codemadness.org 70 i 627 highest single-device and multi-device performance recorded for stencil Err codemadness.org 70 i 628 programs on FPGAs to date, then leverage the framework to study a complex Err codemadness.org 70 i 629 stencil program from a production weather simulation application. Our work Err codemadness.org 70 i 630 enables productively targeting distributed spatial computing systems with large Err codemadness.org 70 i 631 stencil programs, and offers insight into architecture characteristics required Err codemadness.org 70 i 632 for their efficient execution in practice. Err codemadness.org 70 i 633 </p> Err codemadness.org 70 i 634 Err codemadness.org 70 i 635 Err codemadness.org 70 i 636 Err codemadness.org 70 i 637 Geometric Sampling of Networks. (arXiv:2010.15221v1 [math.DG]) Err codemadness.org 70 i 638 http://fr.arxiv.org/abs/2010.15221 Err codemadness.org 70 i 639 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Barkanass_V/0/1/0/all/0/1">Vladislav Barkanass</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Jost_J/0/1/0/all/0/1">J&#xfc;rgen Jost</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Saucan_E/0/1/0/all/0/1">Emil Saucan</a></p> Err codemadness.org 70 i 640 Err codemadness.org 70 i 641 <p>Motivated by the methods and results of manifold sampling based on Ricci Err codemadness.org 70 i 642 curvature, we propose a similar approach for networks. To this end we make Err codemadness.org 70 i 643 appeal to three types of discrete curvature, namely the graph Forman-, full Err codemadness.org 70 i 644 Forman- and Haantjes-Ricci curvatures for edge-based and node-based sampling. Err codemadness.org 70 i 645 We present the results of experiments on real life networks, as well as for Err codemadness.org 70 i 646 square grids arising in Image Processing. Moreover, we consider fitting Ricci Err codemadness.org 70 i 647 flows and we employ them for the detection of networks' backbone. We also Err codemadness.org 70 i 648 develop embedding kernels related to the Forman-Ricci curvatures and employ Err codemadness.org 70 i 649 them for the detection of the coarse structure of networks, as well as for Err codemadness.org 70 i 650 network visualization with applications to SVM. The relation between the Ricci Err codemadness.org 70 i 651 curvature of the original manifold and that of a Ricci curvature driven Err codemadness.org 70 i 652 discretization is also studied. Err codemadness.org 70 i 653 </p> Err codemadness.org 70 i 654 Err codemadness.org 70 i 655 Err codemadness.org 70 i 656 Err codemadness.org 70 i 657 Exploring complex networks with the ICON R package. (arXiv:2010.15222v1 [cs.SI]) Err codemadness.org 70 i 658 http://fr.arxiv.org/abs/2010.15222 Err codemadness.org 70 i 659 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wadhwa_R/0/1/0/all/0/1">Raoul R. Wadhwa</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Scott_J/0/1/0/all/0/1">Jacob G. Scott</a></p> Err codemadness.org 70 i 660 Err codemadness.org 70 i 661 <p>We introduce ICON, an R package that contains 1075 complex network datasets Err codemadness.org 70 i 662 in a standard edgelist format. All provided datasets have associated citations Err codemadness.org 70 i 663 and have been indexed by the Colorado Index of Complex Networks - also referred Err codemadness.org 70 i 664 to as ICON. In addition to supplying a large and diverse corpus of useful Err codemadness.org 70 i 665 real-world networks, ICON also implements an S3 generic to work with the Err codemadness.org 70 i 666 network and ggnetwork R packages for network analysis and visualization, Err codemadness.org 70 i 667 respectively. Sample code in this report also demonstrates how ICON can be used Err codemadness.org 70 i 668 in conjunction with the igraph package. Currently, the Comprehensive R Archive Err codemadness.org 70 i 669 Network hosts ICON v0.4.0. We hope that ICON will serve as a standard corpus Err codemadness.org 70 i 670 for complex network research and prevent redundant work that would be otherwise Err codemadness.org 70 i 671 necessary by individual research groups. The open source code for ICON and for Err codemadness.org 70 i 672 this reproducible report can be found at https://github.com/rrrlw/ICON. Err codemadness.org 70 i 673 </p> Err codemadness.org 70 i 674 Err codemadness.org 70 i 675 Err codemadness.org 70 i 676 Err codemadness.org 70 i 677 A Visuospatial Dataset for Naturalistic Verb Learning. (arXiv:2010.15225v1 [cs.CL]) Err codemadness.org 70 i 678 http://fr.arxiv.org/abs/2010.15225 Err codemadness.org 70 i 679 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ebert_D/0/1/0/all/0/1">Dylan Ebert</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pavlick_E/0/1/0/all/0/1">Ellie Pavlick</a></p> Err codemadness.org 70 i 680 Err codemadness.org 70 i 681 <p>We introduce a new dataset for training and evaluating grounded language Err codemadness.org 70 i 682 models. Our data is collected within a virtual reality environment and is Err codemadness.org 70 i 683 designed to emulate the quality of language data to which a pre-verbal child is Err codemadness.org 70 i 684 likely to have access: That is, naturalistic, spontaneous speech paired with Err codemadness.org 70 i 685 richly grounded visuospatial context. We use the collected data to compare Err codemadness.org 70 i 686 several distributional semantics models for verb learning. We evaluate neural Err codemadness.org 70 i 687 models based on 2D (pixel) features as well as feature-engineered models based Err codemadness.org 70 i 688 on 3D (symbolic, spatial) features, and show that neither modeling approach Err codemadness.org 70 i 689 achieves satisfactory performance. Our results are consistent with evidence Err codemadness.org 70 i 690 from child language acquisition that emphasizes the difficulty of learning Err codemadness.org 70 i 691 verbs from naive distributional data. We discuss avenues for future work on Err codemadness.org 70 i 692 cognitively-inspired grounded language learning, and release our corpus with Err codemadness.org 70 i 693 the intent of facilitating research on the topic. Err codemadness.org 70 i 694 </p> Err codemadness.org 70 i 695 Err codemadness.org 70 i 696 Err codemadness.org 70 i 697 Err codemadness.org 70 i 698 Speech-Based Emotion Recognition using Neural Networks and Information Visualization. (arXiv:2010.15229v1 [cs.HC]) Err codemadness.org 70 i 699 http://fr.arxiv.org/abs/2010.15229 Err codemadness.org 70 i 700 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Almahmoud_J/0/1/0/all/0/1">Jumana Almahmoud</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kikkeri_K/0/1/0/all/0/1">Kruthika Kikkeri</a></p> Err codemadness.org 70 i 701 Err codemadness.org 70 i 702 <p>Emotions recognition is commonly employed for health assessment. However, the Err codemadness.org 70 i 703 typical metric for evaluation in therapy is based on patient-doctor appraisal. Err codemadness.org 70 i 704 This process can fall into the issue of subjectivity, while also requiring Err codemadness.org 70 i 705 healthcare professionals to deal with copious amounts of information. Thus, Err codemadness.org 70 i 706 machine learning algorithms can be a useful tool for the classification of Err codemadness.org 70 i 707 emotions. While several models have been developed in this domain, there is a Err codemadness.org 70 i 708 lack of userfriendly representations of the emotion classification systems for Err codemadness.org 70 i 709 therapy. We propose a tool which enables users to take speech samples and Err codemadness.org 70 i 710 identify a range of emotions (happy, sad, angry, surprised, neutral, clam, Err codemadness.org 70 i 711 disgust, and fear) from audio elements through a machine learning model. The Err codemadness.org 70 i 712 dashboard is designed based on local therapists' needs for intuitive Err codemadness.org 70 i 713 representations of speech data in order to gain insights and informative Err codemadness.org 70 i 714 analyses of their sessions with their patients. Err codemadness.org 70 i 715 </p> Err codemadness.org 70 i 716 Err codemadness.org 70 i 717 Err codemadness.org 70 i 718 Err codemadness.org 70 i 719 Construction Payment Automation Using Blockchain-Enabled Smart Contracts and Reality Capture Technologies. (arXiv:2010.15232v1 [cs.CR]) Err codemadness.org 70 i 720 http://fr.arxiv.org/abs/2010.15232 Err codemadness.org 70 i 721 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hamledari_H/0/1/0/all/0/1">Hesam Hamledari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fischer_M/0/1/0/all/0/1">Martin Fischer</a></p> Err codemadness.org 70 i 722 Err codemadness.org 70 i 723 <p>This paper presents a smart contract-based solution for autonomous Err codemadness.org 70 i 724 administration of construction progress payments. It bridges the gap between Err codemadness.org 70 i 725 payments (cash flow) and the progress assessments at job sites (product flow) Err codemadness.org 70 i 726 enabled by reality capture technologies and building information modeling Err codemadness.org 70 i 727 (BIM). The approach eliminates the reliance on the centralized and heavily Err codemadness.org 70 i 728 intermediated mechanisms of existing payment applications. The construction Err codemadness.org 70 i 729 progress is stored in a distributed manner using content addressable file Err codemadness.org 70 i 730 sharing; it is broadcasted to a smart contract which automates the on-chain Err codemadness.org 70 i 731 payment settlements and the transfer of lien rights. The method was Err codemadness.org 70 i 732 successfully used for processing payments to 7 subcontractors in two commercial Err codemadness.org 70 i 733 construction projects where progress monitoring was performed using a Err codemadness.org 70 i 734 camera-equipped unmanned aerial vehicle (UAV) and an unmanned ground vehicle Err codemadness.org 70 i 735 (UGV) equipped with a laser scanner. The results show promise for the method's Err codemadness.org 70 i 736 potential for increasing the frequency, granularity, and transparency of Err codemadness.org 70 i 737 payments. The paper is concluded with a discussion of implications for project Err codemadness.org 70 i 738 management, introducing a new model of project as a singleton state machine. Err codemadness.org 70 i 739 </p> Err codemadness.org 70 i 740 Err codemadness.org 70 i 741 Err codemadness.org 70 i 742 Err codemadness.org 70 i 743 Accurate Prostate Cancer Detection and Segmentation on Biparametric MRI using Non-local Mask R-CNN with Histopathological Ground Truth. (arXiv:2010.15233v1 [eess.IV]) Err codemadness.org 70 i 744 http://fr.arxiv.org/abs/2010.15233 Err codemadness.org 70 i 745 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Dai_Z/0/1/0/all/0/1">Zhenzhen Dai</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Jambor_I/0/1/0/all/0/1">Ivan Jambor</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Taimen_P/0/1/0/all/0/1">Pekka Taimen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pantelic_M/0/1/0/all/0/1">Milan Pantelic</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Elshaikh_M/0/1/0/all/0/1">Mohamed Elshaikh</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Rogers_C/0/1/0/all/0/1">Craig Rogers</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ettala_O/0/1/0/all/0/1">Otto Ettala</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Bostrom_P/0/1/0/all/0/1">Peter Bostr&#xf6;m</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Aronen_H/0/1/0/all/0/1">Hannu Aronen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Merisaari_H/0/1/0/all/0/1">Harri Merisaari</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wen_N/0/1/0/all/0/1">Ning Wen</a></p> Err codemadness.org 70 i 746 Err codemadness.org 70 i 747 <p>Purpose: We aimed to develop deep machine learning (DL) models to improve the Err codemadness.org 70 i 748 detection and segmentation of intraprostatic lesions (IL) on bp-MRI by using Err codemadness.org 70 i 749 whole amount prostatectomy specimen-based delineations. We also aimed to Err codemadness.org 70 i 750 investigate whether transfer learning and self-training would improve results Err codemadness.org 70 i 751 with small amount labelled data. Err codemadness.org 70 i 752 </p> Err codemadness.org 70 i 753 <p>Methods: 158 patients had suspicious lesions delineated on MRI based on Err codemadness.org 70 i 754 bp-MRI, 64 patients had ILs delineated on MRI based on whole mount Err codemadness.org 70 i 755 prostatectomy specimen sections, 40 patients were unlabelled. A non-local Mask Err codemadness.org 70 i 756 R-CNN was proposed to improve the segmentation accuracy. Transfer learning was Err codemadness.org 70 i 757 investigated by fine-tuning a model trained using MRI-based delineations with Err codemadness.org 70 i 758 prostatectomy-based delineations. Two label selection strategies were Err codemadness.org 70 i 759 investigated in self-training. The performance of models was evaluated by 3D Err codemadness.org 70 i 760 detection rate, dice similarity coefficient (DSC), 95 percentile Hausdrauff (95 Err codemadness.org 70 i 761 HD, mm) and true positive ratio (TPR). Err codemadness.org 70 i 762 </p> Err codemadness.org 70 i 763 <p>Results: With prostatectomy-based delineations, the non-local Mask R-CNN with Err codemadness.org 70 i 764 fine-tuning and self-training significantly improved all evaluation metrics. Err codemadness.org 70 i 765 For the model with the highest detection rate and DSC, 80.5% (33/41) of lesions Err codemadness.org 70 i 766 in all Gleason Grade Groups (GGG) were detected with DSC of 0.548[0.165], 95 HD Err codemadness.org 70 i 767 of 5.72[3.17] and TPR of 0.613[0.193]. Among them, 94.7% (18/19) of lesions Err codemadness.org 70 i 768 with GGG &gt; 2 were detected with DSC of 0.604[0.135], 95 HD of 6.26[3.44] and Err codemadness.org 70 i 769 TPR of 0.580[0.190]. Err codemadness.org 70 i 770 </p> Err codemadness.org 70 i 771 <p>Conclusion: DL models can achieve high prostate cancer detection and Err codemadness.org 70 i 772 segmentation accuracy on bp-MRI based on annotations from histologic images. To Err codemadness.org 70 i 773 further improve the performance, more data with annotations of both MRI and Err codemadness.org 70 i 774 whole amount prostatectomy specimens are required. Err codemadness.org 70 i 775 </p> Err codemadness.org 70 i 776 Err codemadness.org 70 i 777 Err codemadness.org 70 i 778 Err codemadness.org 70 i 779 Linear Regression Games: Convergence Guarantees to Approximate Out-of-Distribution Solutions. (arXiv:2010.15234v1 [cs.LG]) Err codemadness.org 70 i 780 http://fr.arxiv.org/abs/2010.15234 Err codemadness.org 70 i 781 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ahuja_K/0/1/0/all/0/1">Kartik Ahuja</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shanmugam_K/0/1/0/all/0/1">Karthikeyan Shanmugam</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dhurandhar_A/0/1/0/all/0/1">Amit Dhurandhar</a></p> Err codemadness.org 70 i 782 Err codemadness.org 70 i 783 <p>Recently, invariant risk minimization (IRM) (Arjovsky et al.) was proposed as Err codemadness.org 70 i 784 a promising solution to address out-of-distribution (OOD) generalization. In Err codemadness.org 70 i 785 Ahuja et al., it was shown that solving for the Nash equilibria of a new class Err codemadness.org 70 i 786 of "ensemble-games" is equivalent to solving IRM. In this work, we extend the Err codemadness.org 70 i 787 framework in Ahuja et al. for linear regressions by projecting the Err codemadness.org 70 i 788 ensemble-game on an $\ell_{\infty}$ ball. We show that such projections help Err codemadness.org 70 i 789 achieve non-trivial OOD guarantees despite not achieving perfect invariance. Err codemadness.org 70 i 790 For linear models with confounders, we prove that Nash equilibria of these Err codemadness.org 70 i 791 games are closer to the ideal OOD solutions than the standard empirical risk Err codemadness.org 70 i 792 minimization (ERM) and we also provide learning algorithms that provably Err codemadness.org 70 i 793 converge to these Nash Equilibria. Empirical comparisons of the proposed Err codemadness.org 70 i 794 approach with the state-of-the-art show consistent gains in achieving OOD Err codemadness.org 70 i 795 solutions in several settings involving anti-causal variables and confounders. Err codemadness.org 70 i 796 </p> Err codemadness.org 70 i 797 Err codemadness.org 70 i 798 Err codemadness.org 70 i 799 Err codemadness.org 70 i 800 SD-Access: Practical Experiences in Designing and Deploying Software Defined Enterprise Networks. (arXiv:2010.15236v1 [cs.NI]) Err codemadness.org 70 i 801 http://fr.arxiv.org/abs/2010.15236 Err codemadness.org 70 i 802 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Paillisse_J/0/1/0/all/0/1">Jordi Paillisse</a> (1 and 2), <a href="http://fr.arxiv.org/find/cs/1/au:+Portoles_M/0/1/0/all/0/1">Marc Portoles</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Lopez_A/0/1/0/all/0/1">Albert Lopez</a> (1), <a href="http://fr.arxiv.org/find/cs/1/au:+Rodriguez_Natal_A/0/1/0/all/0/1">Alberto Rodriguez-Natal</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Iacobacci_D/0/1/0/all/0/1">David Iacobacci</a> (3), <a href="http://fr.arxiv.org/find/cs/1/au:+Leong_J/0/1/0/all/0/1">Johnson Leong</a> (4), <a href="http://fr.arxiv.org/find/cs/1/au:+Moreno_V/0/1/0/all/0/1">Victor Moreno</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Cabellos_A/0/1/0/all/0/1">Albert Cabellos</a> (1), <a href="http://fr.arxiv.org/find/cs/1/au:+Maino_F/0/1/0/all/0/1">Fabio Maino</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Hooda_S/0/1/0/all/0/1">Sanjay Hooda</a> (2) ((1) UPC-BarcelonaTech, Barcelona, Spain, (2) Cisco, San Jose, USA, (3) BMP LLP, (4) Uber Technologies Inc., San Francisco, USA)</p> Err codemadness.org 70 i 803 Err codemadness.org 70 i 804 <p>Enterprise Networks, over the years, have become more and more complex trying Err codemadness.org 70 i 805 to keep up with new requirements that challenge traditional solutions. Just to Err codemadness.org 70 i 806 mention one out of many possible examples, technologies such as Virtual LANs Err codemadness.org 70 i 807 (VLANs) struggle to address the scalability and operational requirements Err codemadness.org 70 i 808 introduced by Internet of Things (IoT) use cases. To keep up with these Err codemadness.org 70 i 809 challenges we have identified four main requirements that are common across Err codemadness.org 70 i 810 modern enterprise networks: (i) scalable mobility, (ii) endpoint segmentation, Err codemadness.org 70 i 811 (iii) simplified administration, and (iv) resource optimization. To address Err codemadness.org 70 i 812 these challenges we designed SDA (Software Defined Access), a solution for Err codemadness.org 70 i 813 modern enterprise networks that leverages Software-Defined Networking (SDN) and Err codemadness.org 70 i 814 other state of the art techniques. In this paper we present the design, Err codemadness.org 70 i 815 implementation and evaluation of SDA. Specifically, SDA: (i) leverages a Err codemadness.org 70 i 816 combination of an overlay approach with an event-driven protocol (LISP) to Err codemadness.org 70 i 817 dynamically adapt to traffic and mobility patterns while preserving resources, Err codemadness.org 70 i 818 and (ii) enforces dynamic endpoint groups for scalable segmentation with low Err codemadness.org 70 i 819 operational burden. We present our experience with deploying SDA in two Err codemadness.org 70 i 820 real-life scenarios: an enterprise campus, and a large warehouse with mobile Err codemadness.org 70 i 821 robots. Our evaluation shows that SDA, when compared with traditional Err codemadness.org 70 i 822 enterprise networks, can (i) reduce overall data plane forwarding state up to Err codemadness.org 70 i 823 70% thanks to a reactive protocol using a centralized routing server, and (ii) Err codemadness.org 70 i 824 reduce by an order of magnitude the handover delays in scenarios of massive Err codemadness.org 70 i 825 mobility with respect to other approaches. Finally, we discuss lessons learned Err codemadness.org 70 i 826 while deploying and operating SDA, and possible optimizations regarding the use Err codemadness.org 70 i 827 of an event-driven protocol and group-based segmentation. Err codemadness.org 70 i 828 </p> Err codemadness.org 70 i 829 Err codemadness.org 70 i 830 Err codemadness.org 70 i 831 Err codemadness.org 70 i 832 Bandit Policies for Reliable Cellular Network Handovers in Extreme Mobility. (arXiv:2010.15237v1 [cs.LG]) Err codemadness.org 70 i 833 http://fr.arxiv.org/abs/2010.15237 Err codemadness.org 70 i 834 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1">Yuanjie Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Datta_E/0/1/0/all/0/1">Esha Datta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ding_J/0/1/0/all/0/1">Jiaxin Ding</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shroff_N/0/1/0/all/0/1">Ness Shroff</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_X/0/1/0/all/0/1">Xin Liu</a></p> Err codemadness.org 70 i 835 Err codemadness.org 70 i 836 <p>The demand for seamless Internet access under extreme user mobility, such as Err codemadness.org 70 i 837 on high-speed trains and vehicles, has become a norm rather than an exception. Err codemadness.org 70 i 838 However, the 4G/5G mobile network is not always reliable to meet this demand, Err codemadness.org 70 i 839 with non-negligible failures during the handover between base stations. A Err codemadness.org 70 i 840 fundamental challenge of reliability is to balance the exploration of more Err codemadness.org 70 i 841 measurements for satisfactory handover, and exploitation for timely handover Err codemadness.org 70 i 842 (before the fast-moving user leaves the serving base station's radio coverage). Err codemadness.org 70 i 843 This paper formulates this trade-off in extreme mobility as a composition of Err codemadness.org 70 i 844 two distinct multi-armed bandit problems. We propose Bandit and Threshold Err codemadness.org 70 i 845 Tuning (BATT) to minimize the regret of handover failures in extreme mobility. Err codemadness.org 70 i 846 BATT uses $\epsilon$-binary-search to optimize the threshold of the serving Err codemadness.org 70 i 847 cell's signal strength to initiate the handover procedure with Err codemadness.org 70 i 848 $\mathcal{O}(\log J \log T)$ regret.It further devises opportunistic Thompson Err codemadness.org 70 i 849 sampling, which optimizes the sequence of the target cells to measure for Err codemadness.org 70 i 850 reliable handover with $\mathcal{O}(\log T)$ regret.Our experiment over a real Err codemadness.org 70 i 851 LTE dataset from Chinese high-speed rails validates significant regret Err codemadness.org 70 i 852 reduction and a 29.1% handover failure reduction. Err codemadness.org 70 i 853 </p> Err codemadness.org 70 i 854 Err codemadness.org 70 i 855 Err codemadness.org 70 i 856 Err codemadness.org 70 i 857 Cloud-Based Dynamic Programming for an Electric City Bus Energy Management Considering Real-Time Passenger Load Prediction. (arXiv:2010.15239v1 [eess.SY]) Err codemadness.org 70 i 858 http://fr.arxiv.org/abs/2010.15239 Err codemadness.org 70 i 859 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1">Junzhe Shi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Xu_B/0/1/0/all/0/1">Bin Xu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhou_X/0/1/0/all/0/1">Xingyu Zhou</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Hou_J/0/1/0/all/0/1">Jun Hou</a></p> Err codemadness.org 70 i 860 Err codemadness.org 70 i 861 <p>Electric city bus gains popularity in recent years for its low greenhouse gas Err codemadness.org 70 i 862 emission, low noise level, etc. Different from a passenger car, the weight of a Err codemadness.org 70 i 863 city bus varies significantly with different amounts of onboard passengers, Err codemadness.org 70 i 864 which is not well studied in existing literature. This study proposes a Err codemadness.org 70 i 865 passenger load prediction model using day-of-week, time-of-day, weather, Err codemadness.org 70 i 866 temperatures, wind levels, and holiday information as inputs. The average Err codemadness.org 70 i 867 model, Regression Tree, Gradient Boost Decision Tree, and Neural Networks Err codemadness.org 70 i 868 models are compared in the passenger load prediction. The Gradient Boost Err codemadness.org 70 i 869 Decision Tree model is selected due to its best accuracy and high stability. Err codemadness.org 70 i 870 Given the predicted passenger load, dynamic programming algorithm determines Err codemadness.org 70 i 871 the optimal power demand for supercapacitor and battery by optimizing the Err codemadness.org 70 i 872 battery aging and energy usage in the cloud. Then rule extraction is conducted Err codemadness.org 70 i 873 on dynamic programming results, and the rule is real-time loaded to onboard Err codemadness.org 70 i 874 controllers of vehicles. The proposed cloud-based dynamic programming and rule Err codemadness.org 70 i 875 extraction framework with the passenger load prediction shows 4% and 11% fewer Err codemadness.org 70 i 876 bus operating costs in off-peak and peak hours, respectively. The operating Err codemadness.org 70 i 877 cost by the proposed framework is less than 1% shy of the dynamic programming Err codemadness.org 70 i 878 with the true passenger load information. Err codemadness.org 70 i 879 </p> Err codemadness.org 70 i 880 Err codemadness.org 70 i 881 Err codemadness.org 70 i 882 Err codemadness.org 70 i 883 Test Set Optimization by Machine Learning Algorithms. (arXiv:2010.15240v1 [cs.LG]) Err codemadness.org 70 i 884 http://fr.arxiv.org/abs/2010.15240 Err codemadness.org 70 i 885 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Fu_K/0/1/0/all/0/1">Kaiming Fu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jin_Y/0/1/0/all/0/1">Yulu Jin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Z/0/1/0/all/0/1">Zhousheng Chen</a></p> Err codemadness.org 70 i 886 Err codemadness.org 70 i 887 <p>Diagnosis results are highly dependent on the volume of test set. To derive Err codemadness.org 70 i 888 the most efficient test set, we propose several machine learning based methods Err codemadness.org 70 i 889 to predict the minimum amount of test data that produces relatively accurate Err codemadness.org 70 i 890 diagnosis. By collecting outputs from failing circuits, the feature matrix and Err codemadness.org 70 i 891 label vector are generated, which involves the inference information of the Err codemadness.org 70 i 892 test termination point. Thus we develop a prediction model to fit the data and Err codemadness.org 70 i 893 determine when to terminate testing. The considered methods include LASSO and Err codemadness.org 70 i 894 Support Vector Machine(SVM) where the relationship between goals(label) and Err codemadness.org 70 i 895 predictors(feature matrix) are considered to be linear in LASSO and nonlinear Err codemadness.org 70 i 896 in SVM. Numerical results show that SVM reaches a diagnosis accuracy of 90.4% Err codemadness.org 70 i 897 while deducting the volume of test set by 35.24%. Err codemadness.org 70 i 898 </p> Err codemadness.org 70 i 899 Err codemadness.org 70 i 900 Err codemadness.org 70 i 901 Err codemadness.org 70 i 902 A marine radioisotope gamma-ray spectrum analysis method based on Monte Carlo simulation and MLP neural network. (arXiv:2010.15245v1 [physics.ins-det]) Err codemadness.org 70 i 903 http://fr.arxiv.org/abs/2010.15245 Err codemadness.org 70 i 904 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Dai_W/0/1/0/all/0/1">Wenhan Dai</a> (1), <a href="http://fr.arxiv.org/find/physics/1/au:+Zeng_Z/0/1/0/all/0/1">Zhi Zeng</a> (1), <a href="http://fr.arxiv.org/find/physics/1/au:+Dou_D/0/1/0/all/0/1">Daowei Dou</a> (1), <a href="http://fr.arxiv.org/find/physics/1/au:+Ma_H/0/1/0/all/0/1">Hao Ma</a> (1), <a href="http://fr.arxiv.org/find/physics/1/au:+Chen_J/0/1/0/all/0/1">Jianping Chen</a> (1 and 2), <a href="http://fr.arxiv.org/find/physics/1/au:+Li_J/0/1/0/all/0/1">Junli Li</a> (1), <a href="http://fr.arxiv.org/find/physics/1/au:+Zhang_H/0/1/0/all/0/1">Hui Zhang</a> (1) ((1) Department of Engineering Physics, Tsinghua University, Beijing, China, (2) College of Nuclear Science and Technology, Beijing Normal University, Beijing, China)</p> Err codemadness.org 70 i 905 Err codemadness.org 70 i 906 <p>A multilayer perceptron (MLP) neural network is built to analyze the Cs-137 Err codemadness.org 70 i 907 concentration in seawater via gamma-ray spectrums measured by a LaBr3 detector. Err codemadness.org 70 i 908 The MLP is trained and tested by a large data set generated by combining Err codemadness.org 70 i 909 measured and Monte Carlo simulated spectrums under the assumption that all the Err codemadness.org 70 i 910 measured spectrums have 0 Cs-137 concentration. And the performance of MLP is Err codemadness.org 70 i 911 evaluated and compared with the traditional net-peak area method. The results Err codemadness.org 70 i 912 show an improvement of 7% in accuracy and 0.036 in the ROC-curve area compared Err codemadness.org 70 i 913 to those of the net peak area method. And the influence of the assumption of Err codemadness.org 70 i 914 Cs-137 concentration in the training data set on the classifying performance of Err codemadness.org 70 i 915 MLP is evaluated. Err codemadness.org 70 i 916 </p> Err codemadness.org 70 i 917 Err codemadness.org 70 i 918 Err codemadness.org 70 i 919 Err codemadness.org 70 i 920 Semantic video segmentation for autonomous driving. (arXiv:2010.15250v1 [cs.CV]) Err codemadness.org 70 i 921 http://fr.arxiv.org/abs/2010.15250 Err codemadness.org 70 i 922 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chau_M/0/1/0/all/0/1">Minh Triet Chau</a></p> Err codemadness.org 70 i 923 Err codemadness.org 70 i 924 <p>We aim to solve semantic video segmentation in autonomous driving, namely Err codemadness.org 70 i 925 road detection in real time video, using techniques discussed in (Shelhamer et Err codemadness.org 70 i 926 al., 2016a). While fully convolutional network gives good result, we show that Err codemadness.org 70 i 927 the speed can be halved while preserving the accuracy. The test dataset being Err codemadness.org 70 i 928 used is KITTI, which consists of real footage from Germany's streets. Err codemadness.org 70 i 929 </p> Err codemadness.org 70 i 930 Err codemadness.org 70 i 931 Err codemadness.org 70 i 932 Err codemadness.org 70 i 933 Fusion Models for Improved Visual Captioning. (arXiv:2010.15251v1 [cs.CV]) Err codemadness.org 70 i 934 http://fr.arxiv.org/abs/2010.15251 Err codemadness.org 70 i 935 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kalimuthu_M/0/1/0/all/0/1">Marimuthu Kalimuthu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mogadala_A/0/1/0/all/0/1">Aditya Mogadala</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mosbach_M/0/1/0/all/0/1">Marius Mosbach</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Klakow_D/0/1/0/all/0/1">Dietrich Klakow</a></p> Err codemadness.org 70 i 936 Err codemadness.org 70 i 937 <p>Visual captioning aims to generate textual descriptions given images. Err codemadness.org 70 i 938 Traditionally, the captioning models are trained on human annotated datasets Err codemadness.org 70 i 939 such as Flickr30k and MS-COCO, which are limited in size and diversity. This Err codemadness.org 70 i 940 limitation hinders the generalization capabilities of these models while also Err codemadness.org 70 i 941 rendering them to often make mistakes. Language models can, however, be trained Err codemadness.org 70 i 942 on vast amounts of freely available unlabelled data and have recently emerged Err codemadness.org 70 i 943 as successful language encoders and coherent text generators. Meanwhile, Err codemadness.org 70 i 944 several unimodal and multimodal fusion techniques have been proven to work well Err codemadness.org 70 i 945 for natural language generation and automatic speech recognition. Building on Err codemadness.org 70 i 946 these recent developments, and with an aim of improving the quality of Err codemadness.org 70 i 947 generated captions, the contribution of our work in this paper is two-fold: Err codemadness.org 70 i 948 First, we propose a generic multimodal model fusion framework for caption Err codemadness.org 70 i 949 generation as well as emendation where we utilize different fusion strategies Err codemadness.org 70 i 950 to integrate a pretrained Auxiliary Language Model (AuxLM) within the Err codemadness.org 70 i 951 traditional encoder-decoder visual captioning frameworks. Next, we employ the Err codemadness.org 70 i 952 same fusion strategies to integrate a pretrained Masked Language Model (MLM), Err codemadness.org 70 i 953 namely BERT, with a visual captioning model, viz. Show, Attend, and Tell, for Err codemadness.org 70 i 954 emending both syntactic and semantic errors in captions. Our caption emendation Err codemadness.org 70 i 955 experiments on three benchmark image captioning datasets, viz. Flickr8k, Err codemadness.org 70 i 956 Flickr30k, and MSCOCO, show improvements over the baseline, indicating the Err codemadness.org 70 i 957 usefulness of our proposed multimodal fusion strategies. Further, we perform a Err codemadness.org 70 i 958 preliminary qualitative analysis on the emended captions and identify error Err codemadness.org 70 i 959 categories based on the type of corrections. Err codemadness.org 70 i 960 </p> Err codemadness.org 70 i 961 Err codemadness.org 70 i 962 Err codemadness.org 70 i 963 Err codemadness.org 70 i 964 Model Minimization For Online Predictability. (arXiv:2010.15255v1 [cs.AI]) Err codemadness.org 70 i 965 http://fr.arxiv.org/abs/2010.15255 Err codemadness.org 70 i 966 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gopalakrishnan_S/0/1/0/all/0/1">Sriram Gopalakrishnan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kambhampati_S/0/1/0/all/0/1">Subbarao Kambhampati</a></p> Err codemadness.org 70 i 967 Err codemadness.org 70 i 968 <p>For humans in a teaming scenario, context switching between reasoning about a Err codemadness.org 70 i 969 teammate's behavior and thinking about thier own task can slow us down, Err codemadness.org 70 i 970 especially if the cognitive cost of predicting the teammate's actions is high. Err codemadness.org 70 i 971 So if we can make the prediction of a robot-teammate's actions quicker, then Err codemadness.org 70 i 972 the human can be more productive. In this paper we present an approach to Err codemadness.org 70 i 973 constrain the actions of a robot so as to increase predictability (specifically Err codemadness.org 70 i 974 online predictability) while keeping the plan costs of the robot within Err codemadness.org 70 i 975 acceptable limits. Existing works on human-robot interaction do not consider Err codemadness.org 70 i 976 the computational cost for predictability, which we consider in our approach. Err codemadness.org 70 i 977 We approach this problem from the perspective of directed graph minimization, Err codemadness.org 70 i 978 and we connect the concept of predictability to the out-degree of vertices. We Err codemadness.org 70 i 979 present an algorithm to minimize graphs for predictability, and contrast this Err codemadness.org 70 i 980 with minimization for legibility (goal inference) and optimality. Err codemadness.org 70 i 981 </p> Err codemadness.org 70 i 982 Err codemadness.org 70 i 983 Err codemadness.org 70 i 984 Err codemadness.org 70 i 985 DNSMOS: A Non-Intrusive Perceptual Objective Speech Quality metric to evaluate Noise Suppressors. (arXiv:2010.15258v1 [cs.SD]) Err codemadness.org 70 i 986 http://fr.arxiv.org/abs/2010.15258 Err codemadness.org 70 i 987 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Reddy_C/0/1/0/all/0/1">Chandan K A Reddy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gopal_V/0/1/0/all/0/1">Vishak Gopal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cutler_R/0/1/0/all/0/1">Ross Cutler</a></p> Err codemadness.org 70 i 988 Err codemadness.org 70 i 989 <p>Human subjective evaluation is the gold standard to evaluate speech quality Err codemadness.org 70 i 990 optimized for human perception. Perceptual objective metrics serve as a proxy Err codemadness.org 70 i 991 for subjective scores. The conventional and widely used metrics require a Err codemadness.org 70 i 992 reference clean speech signal, which is unavailable in real recordings. The Err codemadness.org 70 i 993 no-reference approaches correlate poorly with human ratings and are not widely Err codemadness.org 70 i 994 adopted in the research community. One of the biggest use cases of these Err codemadness.org 70 i 995 perceptual objective metrics is to evaluate noise suppression algorithms. This Err codemadness.org 70 i 996 paper introduces a multi-stage self-teaching based perceptual objective metric Err codemadness.org 70 i 997 that is designed to evaluate noise suppressors. The proposed method generalizes Err codemadness.org 70 i 998 well in challenging test conditions with a high correlation to human ratings. Err codemadness.org 70 i 999 </p> Err codemadness.org 70 i 1000 Err codemadness.org 70 i 1001 Err codemadness.org 70 i 1002 Err codemadness.org 70 i 1003 Object sieving and morphological closing to reduce false detections in wide-area aerial imagery. (arXiv:2010.15260v1 [cs.CV]) Err codemadness.org 70 i 1004 http://fr.arxiv.org/abs/2010.15260 Err codemadness.org 70 i 1005 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gao_X/0/1/0/all/0/1">Xin Gao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ram_S/0/1/0/all/0/1">Sundaresh Ram</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rodriguez_J/0/1/0/all/0/1">Jeffrey J. Rodriguez</a></p> Err codemadness.org 70 i 1006 Err codemadness.org 70 i 1007 <p>For object detection in wide-area aerial imagery, post-processing is usually Err codemadness.org 70 i 1008 needed to reduce false detections. We propose a two-stage post-processing Err codemadness.org 70 i 1009 scheme which comprises an area-thresholding sieving process and a morphological Err codemadness.org 70 i 1010 closing operation. We use two wide-area aerial videos to compare the Err codemadness.org 70 i 1011 performance of five object detection algorithms in the absence and in the Err codemadness.org 70 i 1012 presence of our post-processing scheme. The automatic detection results are Err codemadness.org 70 i 1013 compared with the ground-truth objects. Several metrics are used for Err codemadness.org 70 i 1014 performance comparison. Err codemadness.org 70 i 1015 </p> Err codemadness.org 70 i 1016 Err codemadness.org 70 i 1017 Err codemadness.org 70 i 1018 Err codemadness.org 70 i 1019 Deep Shells: Unsupervised Shape Correspondence with Optimal Transport. (arXiv:2010.15261v1 [cs.CV]) Err codemadness.org 70 i 1020 http://fr.arxiv.org/abs/2010.15261 Err codemadness.org 70 i 1021 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Eisenberger_M/0/1/0/all/0/1">Marvin Eisenberger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Toker_A/0/1/0/all/0/1">Aysim Toker</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Leal_Taixe_L/0/1/0/all/0/1">Laura Leal-Taix&#xe9;</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cremers_D/0/1/0/all/0/1">Daniel Cremers</a></p> Err codemadness.org 70 i 1022 Err codemadness.org 70 i 1023 <p>We propose a novel unsupervised learning approach to 3D shape correspondence Err codemadness.org 70 i 1024 that builds a multiscale matching pipeline into a deep neural network. This Err codemadness.org 70 i 1025 approach is based on smooth shells, the current state-of-the-art axiomatic Err codemadness.org 70 i 1026 correspondence method, which requires an a priori stochastic search over the Err codemadness.org 70 i 1027 space of initial poses. Our goal is to replace this costly preprocessing step Err codemadness.org 70 i 1028 by directly learning good initializations from the input surfaces. To that end, Err codemadness.org 70 i 1029 we systematically derive a fully differentiable, hierarchical matching pipeline Err codemadness.org 70 i 1030 from entropy regularized optimal transport. This allows us to combine it with a Err codemadness.org 70 i 1031 local feature extractor based on smooth, truncated spectral convolution Err codemadness.org 70 i 1032 filters. Finally, we show that the proposed unsupervised method significantly Err codemadness.org 70 i 1033 improves over the state-of-the-art on multiple datasets, even in comparison to Err codemadness.org 70 i 1034 the most recent supervised methods. Moreover, we demonstrate compelling Err codemadness.org 70 i 1035 generalization results by applying our learned filters to examples that Err codemadness.org 70 i 1036 significantly deviate from the training set. Err codemadness.org 70 i 1037 </p> Err codemadness.org 70 i 1038 Err codemadness.org 70 i 1039 Err codemadness.org 70 i 1040 Err codemadness.org 70 i 1041 CopyNext: Explicit Span Copying and Alignment in Sequence to Sequence Models. (arXiv:2010.15266v1 [cs.CL]) Err codemadness.org 70 i 1042 http://fr.arxiv.org/abs/2010.15266 Err codemadness.org 70 i 1043 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_A/0/1/0/all/0/1">Abhinav Singh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xia_P/0/1/0/all/0/1">Patrick Xia</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qin_G/0/1/0/all/0/1">Guanghui Qin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yarmohammadi_M/0/1/0/all/0/1">Mahsa Yarmohammadi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Durme_B/0/1/0/all/0/1">Benjamin Van Durme</a></p> Err codemadness.org 70 i 1044 Err codemadness.org 70 i 1045 <p>Copy mechanisms are employed in sequence to sequence models (seq2seq) to Err codemadness.org 70 i 1046 generate reproductions of words from the input to the output. These frameworks, Err codemadness.org 70 i 1047 operating at the lexical type level, fail to provide an explicit alignment that Err codemadness.org 70 i 1048 records where each token was copied from. Further, they require contiguous Err codemadness.org 70 i 1049 token sequences from the input (spans) to be copied individually. We present a Err codemadness.org 70 i 1050 model with an explicit token-level copy operation and extend it to copying Err codemadness.org 70 i 1051 entire spans. Our model provides hard alignments between spans in the input and Err codemadness.org 70 i 1052 output, allowing for nontraditional applications of seq2seq, like information Err codemadness.org 70 i 1053 extraction. We demonstrate the approach on Nested Named Entity Recognition, Err codemadness.org 70 i 1054 achieving near state-of-the-art accuracy with an order of magnitude increase in Err codemadness.org 70 i 1055 decoding speed. Err codemadness.org 70 i 1056 </p> Err codemadness.org 70 i 1057 Err codemadness.org 70 i 1058 Err codemadness.org 70 i 1059 Err codemadness.org 70 i 1060 Understanding the Pathologies of Approximate Policy Evaluation when Combined with Greedification in Reinforcement Learning. (arXiv:2010.15268v1 [cs.LG]) Err codemadness.org 70 i 1061 http://fr.arxiv.org/abs/2010.15268 Err codemadness.org 70 i 1062 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Young_K/0/1/0/all/0/1">Kenny Young</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sutton_R/0/1/0/all/0/1">Richard S. Sutton</a></p> Err codemadness.org 70 i 1063 Err codemadness.org 70 i 1064 <p>Despite empirical success, the theory of reinforcement learning (RL) with Err codemadness.org 70 i 1065 value function approximation remains fundamentally incomplete. Prior work has Err codemadness.org 70 i 1066 identified a variety of pathological behaviours that arise in RL algorithms Err codemadness.org 70 i 1067 that combine approximate on-policy evaluation and greedification. One prominent Err codemadness.org 70 i 1068 example is policy oscillation, wherein an algorithm may cycle indefinitely Err codemadness.org 70 i 1069 between policies, rather than converging to a fixed point. What is not well Err codemadness.org 70 i 1070 understood however is the quality of the policies in the region of oscillation. Err codemadness.org 70 i 1071 In this paper we present simple examples illustrating that in addition to Err codemadness.org 70 i 1072 policy oscillation and multiple fixed points -- the same basic issue can lead Err codemadness.org 70 i 1073 to convergence to the worst possible policy for a given approximation. Such Err codemadness.org 70 i 1074 behaviours can arise when algorithms optimize evaluation accuracy weighted by Err codemadness.org 70 i 1075 the distribution of states that occur under the current policy, but greedify Err codemadness.org 70 i 1076 based on the value of states which are rare or nonexistent under this Err codemadness.org 70 i 1077 distribution. This means the values used for greedification are unreliable and Err codemadness.org 70 i 1078 can steer the policy in undesirable directions. Our observation that this can Err codemadness.org 70 i 1079 lead to the worst possible policy shows that in a general sense such algorithms Err codemadness.org 70 i 1080 are unreliable. The existence of such examples helps to narrow the kind of Err codemadness.org 70 i 1081 theoretical guarantees that are possible and the kind of algorithmic ideas that Err codemadness.org 70 i 1082 are likely to be helpful. We demonstrate analytically and experimentally that Err codemadness.org 70 i 1083 such pathological behaviours can impact a wide range of RL and dynamic Err codemadness.org 70 i 1084 programming algorithms; such behaviours can arise both with and without Err codemadness.org 70 i 1085 bootstrapping, and with linear function approximation as well as with more Err codemadness.org 70 i 1086 complex parameterized functions like neural networks. Err codemadness.org 70 i 1087 </p> Err codemadness.org 70 i 1088 Err codemadness.org 70 i 1089 Err codemadness.org 70 i 1090 Err codemadness.org 70 i 1091 GloFlow: Global Image Alignment for Creation of Whole Slide Images for Pathology from Video. (arXiv:2010.15269v1 [eess.IV]) Err codemadness.org 70 i 1092 http://fr.arxiv.org/abs/2010.15269 Err codemadness.org 70 i 1093 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Krishna_V/0/1/0/all/0/1">Viswesh Krishna</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Joshi_A/0/1/0/all/0/1">Anirudh Joshi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Bulterys_P/0/1/0/all/0/1">Philip L. Bulterys</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Yang_E/0/1/0/all/0/1">Eric Yang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ng_A/0/1/0/all/0/1">Andrew Y. Ng</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Rajpurkar_P/0/1/0/all/0/1">Pranav Rajpurkar</a></p> Err codemadness.org 70 i 1094 Err codemadness.org 70 i 1095 <p>The application of deep learning to pathology assumes the existence of Err codemadness.org 70 i 1096 digital whole slide images of pathology slides. However, slide digitization is Err codemadness.org 70 i 1097 bottlenecked by the high cost of precise motor stages in slide scanners that Err codemadness.org 70 i 1098 are needed for position information used for slide stitching. We propose Err codemadness.org 70 i 1099 GloFlow, a two-stage method for creating a whole slide image using optical Err codemadness.org 70 i 1100 flow-based image registration with global alignment using a computationally Err codemadness.org 70 i 1101 tractable graph-pruning approach. In the first stage, we train an optical flow Err codemadness.org 70 i 1102 predictor to predict pairwise translations between successive video frames to Err codemadness.org 70 i 1103 approximate a stitch. In the second stage, this approximate stitch is used to Err codemadness.org 70 i 1104 create a neighborhood graph to produce a corrected stitch. On a simulated Err codemadness.org 70 i 1105 dataset of video scans of WSIs, we find that our method outperforms known Err codemadness.org 70 i 1106 approaches to slide-stitching, and stitches WSIs resembling those produced by Err codemadness.org 70 i 1107 slide scanners. Err codemadness.org 70 i 1108 </p> Err codemadness.org 70 i 1109 Err codemadness.org 70 i 1110 Err codemadness.org 70 i 1111 Err codemadness.org 70 i 1112 A globally convergent modified Newton method for the direct minimization of the Ohta-Kawasaki energy with application to the directed self-assembly of diblock copolymers. (arXiv:2010.15271v1 [physics.comp-ph]) Err codemadness.org 70 i 1113 http://fr.arxiv.org/abs/2010.15271 Err codemadness.org 70 i 1114 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Cao_L/0/1/0/all/0/1">Lianghao Cao</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Ghattas_O/0/1/0/all/0/1">Omar Ghattas</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Oden_J/0/1/0/all/0/1">J. Tinsley Oden</a></p> Err codemadness.org 70 i 1115 Err codemadness.org 70 i 1116 <p>We propose a fast and robust scheme for the direct minimization of the Err codemadness.org 70 i 1117 Ohta-Kawasaki energy that characterizes the microphase separation of diblock Err codemadness.org 70 i 1118 copolymer melts. The scheme employs a globally convergent modified Newton Err codemadness.org 70 i 1119 method with line search which is shown to be mass-conservative, Err codemadness.org 70 i 1120 energy-descending, asymptotically quadratically convergent, and three orders of Err codemadness.org 70 i 1121 magnitude more efficient than the commonly-used gradient flow approach. The Err codemadness.org 70 i 1122 regularity and the first-order condition of minimizers are analyzed. A Err codemadness.org 70 i 1123 numerical study of the chemical substrate guided directed self-assembly of Err codemadness.org 70 i 1124 diblock copolymer melts, based on a novel polymer-substrate interaction model Err codemadness.org 70 i 1125 and the proposed scheme, is provided. Err codemadness.org 70 i 1126 </p> Err codemadness.org 70 i 1127 Err codemadness.org 70 i 1128 Err codemadness.org 70 i 1129 Err codemadness.org 70 i 1130 The distribution of inhibitory neurons in the C. elegans connectome facilitates self-optimization of coordinated neural activity. (arXiv:2010.15272v1 [q-bio.NC]) Err codemadness.org 70 i 1131 http://fr.arxiv.org/abs/2010.15272 Err codemadness.org 70 i 1132 <p>Authors: <a href="http://fr.arxiv.org/find/q-bio/1/au:+Morales_A/0/1/0/all/0/1">Alejandro Morales</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Froese_T/0/1/0/all/0/1">Tom Froese</a></p> Err codemadness.org 70 i 1133 Err codemadness.org 70 i 1134 <p>The nervous system of the nematode soil worm Caenorhabditis elegans exhibits Err codemadness.org 70 i 1135 remarkable complexity despite the worm's small size. A general challenge is to Err codemadness.org 70 i 1136 better understand the relationship between neural organization and neural Err codemadness.org 70 i 1137 activity at the system level, including the functional roles of inhibitory Err codemadness.org 70 i 1138 connections. Here we implemented an abstract simulation model of the C. elegans Err codemadness.org 70 i 1139 connectome that approximates the neurotransmitter identity of each neuron, and Err codemadness.org 70 i 1140 we explored the functional role of these physiological differences for neural Err codemadness.org 70 i 1141 activity. In particular, we created a Hopfield neural network in which all of Err codemadness.org 70 i 1142 the worm's neurons characterized by inhibitory neurotransmitters are assigned Err codemadness.org 70 i 1143 inhibitory outgoing connections. Then, we created a control condition in which Err codemadness.org 70 i 1144 the same number of inhibitory connections are arbitrarily distributed across Err codemadness.org 70 i 1145 the network. A comparison of these two conditions revealed that the biological Err codemadness.org 70 i 1146 distribution of inhibitory connections facilitates the self-optimization of Err codemadness.org 70 i 1147 coordinated neural activity compared with an arbitrary distribution of Err codemadness.org 70 i 1148 inhibitory connections. Err codemadness.org 70 i 1149 </p> Err codemadness.org 70 i 1150 Err codemadness.org 70 i 1151 Err codemadness.org 70 i 1152 Err codemadness.org 70 i 1153 Representation learning for improved interpretability and classification accuracy of clinical factors from EEG. (arXiv:2010.15274v1 [cs.LG]) Err codemadness.org 70 i 1154 http://fr.arxiv.org/abs/2010.15274 Err codemadness.org 70 i 1155 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Honke_G/0/1/0/all/0/1">Garrett Honke</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Higgins_I/0/1/0/all/0/1">Irina Higgins</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Thigpen_N/0/1/0/all/0/1">Nina Thigpen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Miskovic_V/0/1/0/all/0/1">Vladimir Miskovic</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Link_K/0/1/0/all/0/1">Katie Link</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gupta_P/0/1/0/all/0/1">Pramod Gupta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Klawohn_J/0/1/0/all/0/1">Julia Klawohn</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hajcak_G/0/1/0/all/0/1">Greg Hajcak</a></p> Err codemadness.org 70 i 1156 Err codemadness.org 70 i 1157 <p>Despite extensive standardization, diagnostic interviews for mental health Err codemadness.org 70 i 1158 disorders encompass substantial subjective judgment. Previous studies have Err codemadness.org 70 i 1159 demonstrated that EEG-based neural measures can function as reliable objective Err codemadness.org 70 i 1160 correlates of depression, or even predictors of depression and its course. Err codemadness.org 70 i 1161 However, their clinical utility has not been fully realized because of 1) the Err codemadness.org 70 i 1162 lack of automated ways to deal with the inherent noise associated with EEG data Err codemadness.org 70 i 1163 at scale, and 2) the lack of knowledge of which aspects of the EEG signal may Err codemadness.org 70 i 1164 be markers of a clinical disorder. Here we adapt an unsupervised pipeline from Err codemadness.org 70 i 1165 the recent deep representation learning literature to address these problems by Err codemadness.org 70 i 1166 1) learning a disentangled representation using $\beta$-VAE to denoise the Err codemadness.org 70 i 1167 signal, and 2) extracting interpretable features associated with a sparse set Err codemadness.org 70 i 1168 of clinical labels using a Symbol-Concept Association Network (SCAN). We Err codemadness.org 70 i 1169 demonstrate that our method is able to outperform the canonical hand-engineered Err codemadness.org 70 i 1170 baseline classification method on a number of factors, including participant Err codemadness.org 70 i 1171 age and depression diagnosis. Furthermore, our method recovers a representation Err codemadness.org 70 i 1172 that can be used to automatically extract denoised Event Related Potentials Err codemadness.org 70 i 1173 (ERPs) from novel, single EEG trajectories, and supports fast supervised Err codemadness.org 70 i 1174 re-mapping to various clinical labels, allowing clinicians to re-use a single Err codemadness.org 70 i 1175 EEG representation regardless of updates to the standardized diagnostic system. Err codemadness.org 70 i 1176 Finally, single factors of the learned disentangled representations often Err codemadness.org 70 i 1177 correspond to meaningful markers of clinical factors, as automatically detected Err codemadness.org 70 i 1178 by SCAN, allowing for human interpretability and post-hoc expert analysis of Err codemadness.org 70 i 1179 the recommendations made by the model. Err codemadness.org 70 i 1180 </p> Err codemadness.org 70 i 1181 Err codemadness.org 70 i 1182 Err codemadness.org 70 i 1183 Err codemadness.org 70 i 1184 A direct method for solving inverse Sturm-Liouville problems. (arXiv:2010.15275v1 [math.NA]) Err codemadness.org 70 i 1185 http://fr.arxiv.org/abs/2010.15275 Err codemadness.org 70 i 1186 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Kravchenko_V/0/1/0/all/0/1">Vladislav V. Kravchenko</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Torba_S/0/1/0/all/0/1">Sergii M. Torba</a></p> Err codemadness.org 70 i 1187 Err codemadness.org 70 i 1188 <p>We consider two main inverse Sturm-Liouville problems: the problem of Err codemadness.org 70 i 1189 recovery of the potential and the boundary conditions from two spectra or from Err codemadness.org 70 i 1190 a spectral density function. A simple method for practical solution of such Err codemadness.org 70 i 1191 problems is developed, based on the transmutation operator approach, new Err codemadness.org 70 i 1192 Neumann series of Bessel functions representations for solutions and the Err codemadness.org 70 i 1193 Gelfand-Levitan equation. The method allows one to reduce the inverse Err codemadness.org 70 i 1194 Sturm-Liouville problem directly to a system of linear algebraic equations, Err codemadness.org 70 i 1195 such that the potential is recovered from the first element of the solution Err codemadness.org 70 i 1196 vector. We prove the stability of the method and show its numerical efficiency Err codemadness.org 70 i 1197 with several numerical examples. Err codemadness.org 70 i 1198 </p> Err codemadness.org 70 i 1199 Err codemadness.org 70 i 1200 Err codemadness.org 70 i 1201 Err codemadness.org 70 i 1202 Class-incremental learning: survey and performance evaluation. (arXiv:2010.15277v1 [cs.LG]) Err codemadness.org 70 i 1203 http://fr.arxiv.org/abs/2010.15277 Err codemadness.org 70 i 1204 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Masana_M/0/1/0/all/0/1">Marc Masana</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_X/0/1/0/all/0/1">Xialei Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Twardowski_B/0/1/0/all/0/1">Bartlomiej Twardowski</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Menta_M/0/1/0/all/0/1">Mikel Menta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bagdanov_A/0/1/0/all/0/1">Andrew D. Bagdanov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Weijer_J/0/1/0/all/0/1">Joost van de Weijer</a></p> Err codemadness.org 70 i 1205 Err codemadness.org 70 i 1206 <p>For future learning systems incremental learning is desirable, because it Err codemadness.org 70 i 1207 allows for: efficient resource usage by eliminating the need to retrain from Err codemadness.org 70 i 1208 scratch at the arrival of new data; reduced memory usage by preventing or Err codemadness.org 70 i 1209 limiting the amount of data required to be stored -- also important when Err codemadness.org 70 i 1210 privacy limitations are imposed; and learning that more closely resembles human Err codemadness.org 70 i 1211 learning. The main challenge for incremental learning is catastrophic Err codemadness.org 70 i 1212 forgetting, which refers to the precipitous drop in performance on previously Err codemadness.org 70 i 1213 learned tasks after learning a new one. Incremental learning of deep neural Err codemadness.org 70 i 1214 networks has seen explosive growth in recent years. Initial work focused on Err codemadness.org 70 i 1215 task incremental learning, where a task-ID is provided at inference time. Err codemadness.org 70 i 1216 Recently we have seen a shift towards class-incremental learning where the Err codemadness.org 70 i 1217 learner must classify at inference time between all classes seen in previous Err codemadness.org 70 i 1218 tasks without recourse to a task-ID. In this paper, we provide a complete Err codemadness.org 70 i 1219 survey of existing methods for incremental learning, and in particular we Err codemadness.org 70 i 1220 perform an extensive experimental evaluation on twelve class-incremental Err codemadness.org 70 i 1221 methods. We consider several new experimental scenarios, including a comparison Err codemadness.org 70 i 1222 of class-incremental methods on multiple large-scale datasets, investigation Err codemadness.org 70 i 1223 into small and large domain shifts, and comparison on various network Err codemadness.org 70 i 1224 architectures. Err codemadness.org 70 i 1225 </p> Err codemadness.org 70 i 1226 Err codemadness.org 70 i 1227 Err codemadness.org 70 i 1228 Err codemadness.org 70 i 1229 Specification description and verification of multitask hybrid systems in the OTS/CafeOBJ method. (arXiv:2010.15280v1 [cs.SE]) Err codemadness.org 70 i 1230 http://fr.arxiv.org/abs/2010.15280 Err codemadness.org 70 i 1231 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nakamura_M/0/1/0/all/0/1">Masaki Nakamura</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sakakibara_K/0/1/0/all/0/1">Kazutoshi Sakakibara</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ogata_K/0/1/0/all/0/1">Kazuhiro Ogata</a></p> Err codemadness.org 70 i 1232 Err codemadness.org 70 i 1233 <p>To develop IoT and/or CSP systems, we need consider both continuous data from Err codemadness.org 70 i 1234 physical world and discrete data in computer systems. Such a system is called a Err codemadness.org 70 i 1235 hybrid system. Because of density of continuous data, it is not easy to do Err codemadness.org 70 i 1236 software testing to ensure reliability of hybrid systems. Moreover, the size of Err codemadness.org 70 i 1237 the state space increases exponentially for multitask systems. Formal Err codemadness.org 70 i 1238 descriptions of hybrid systems may help us to verify desired properties of a Err codemadness.org 70 i 1239 given system formally with computer supports. In this paper, we propose a way Err codemadness.org 70 i 1240 to describe a formal specification of a given multitask hybrid system as an Err codemadness.org 70 i 1241 observational transition system in CafeOBJ algebraic specification language and Err codemadness.org 70 i 1242 verify it by the proof score method based on equational reasoning implemented Err codemadness.org 70 i 1243 in CafeOBJ interpreter. Err codemadness.org 70 i 1244 </p> Err codemadness.org 70 i 1245 Err codemadness.org 70 i 1246 Err codemadness.org 70 i 1247 Err codemadness.org 70 i 1248 GENs: Generative Encoding Networks. (arXiv:2010.15283v1 [cs.LG]) Err codemadness.org 70 i 1249 http://fr.arxiv.org/abs/2010.15283 Err codemadness.org 70 i 1250 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Saha_S/0/1/0/all/0/1">Surojit Saha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Elhabian_S/0/1/0/all/0/1">Shireen Elhabian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Whitaker_R/0/1/0/all/0/1">Ross T. Whitaker</a></p> Err codemadness.org 70 i 1251 Err codemadness.org 70 i 1252 <p>Mapping data from and/or onto a known family of distributions has become an Err codemadness.org 70 i 1253 important topic in machine learning and data analysis. Deep generative models Err codemadness.org 70 i 1254 (e.g., generative adversarial networks ) have been used effectively to match Err codemadness.org 70 i 1255 known and unknown distributions. Nonetheless, when the form of the target Err codemadness.org 70 i 1256 distribution is known, analytical methods are advantageous in providing robust Err codemadness.org 70 i 1257 results with provable properties. In this paper, we propose and analyze the use Err codemadness.org 70 i 1258 of nonparametric density methods to estimate the Jensen-Shannon divergence for Err codemadness.org 70 i 1259 matching unknown data distributions to known target distributions, such Err codemadness.org 70 i 1260 Gaussian or mixtures of Gaussians, in latent spaces. This analytical method has Err codemadness.org 70 i 1261 several advantages: better behavior when training sample quantity is low, Err codemadness.org 70 i 1262 provable convergence properties, and relatively few parameters, which can be Err codemadness.org 70 i 1263 derived analytically. Using the proposed method, we enforce the latent Err codemadness.org 70 i 1264 representation of an autoencoder to match a target distribution in a learning Err codemadness.org 70 i 1265 framework that we call a {\em generative encoding network}. Here, we present Err codemadness.org 70 i 1266 the numerical methods; derive the expected distribution of the data in the Err codemadness.org 70 i 1267 latent space; evaluate the properties of the latent space, sample Err codemadness.org 70 i 1268 reconstruction, and generated samples; show the advantages over the adversarial Err codemadness.org 70 i 1269 counterpart; and demonstrate the application of the method in real world. Err codemadness.org 70 i 1270 </p> Err codemadness.org 70 i 1271 Err codemadness.org 70 i 1272 Err codemadness.org 70 i 1273 Err codemadness.org 70 i 1274 Speech-Image Semantic Alignment Does Not Depend on Any Prior Classification Tasks. (arXiv:2010.15288v1 [cs.LG]) Err codemadness.org 70 i 1275 http://fr.arxiv.org/abs/2010.15288 Err codemadness.org 70 i 1276 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mortazavi_M/0/1/0/all/0/1">Masood S. Mortazavi</a></p> Err codemadness.org 70 i 1277 Err codemadness.org 70 i 1278 <p>Semantically-aligned $(speech, image)$ datasets can be used to explore Err codemadness.org 70 i 1279 "visually-grounded speech". In a majority of existing investigations, features Err codemadness.org 70 i 1280 of an image signal are extracted using neural networks "pre-trained" on other Err codemadness.org 70 i 1281 tasks (e.g., classification on ImageNet). In still others, pre-trained networks Err codemadness.org 70 i 1282 are used to extract audio features prior to semantic embedding. Without Err codemadness.org 70 i 1283 "transfer learning" through pre-trained initialization or pre-trained feature Err codemadness.org 70 i 1284 extraction, previous results have tended to show low rates of recall in $speech Err codemadness.org 70 i 1285 \rightarrow image$ and $image \rightarrow speech$ queries. Err codemadness.org 70 i 1286 </p> Err codemadness.org 70 i 1287 <p>Choosing appropriate neural architectures for encoders in the speech and Err codemadness.org 70 i 1288 image branches and using large datasets, one can obtain competitive recall Err codemadness.org 70 i 1289 rates without any reliance on any pre-trained initialization or feature Err codemadness.org 70 i 1290 extraction: $(speech,image)$ semantic alignment and $speech \rightarrow image$ Err codemadness.org 70 i 1291 and $image \rightarrow speech$ retrieval are canonical tasks worthy of Err codemadness.org 70 i 1292 independent investigation of their own and allow one to explore other Err codemadness.org 70 i 1293 questions---e.g., the size of the audio embedder can be reduced significantly Err codemadness.org 70 i 1294 with little loss of recall rates in $speech \rightarrow image$ and $image Err codemadness.org 70 i 1295 \rightarrow speech$ queries. Err codemadness.org 70 i 1296 </p> Err codemadness.org 70 i 1297 Err codemadness.org 70 i 1298 Err codemadness.org 70 i 1299 Err codemadness.org 70 i 1300 Link inference of noisy delay-coupled networks: Machine learning and opto-electronic experimental tests. (arXiv:2010.15289v1 [nlin.AO]) Err codemadness.org 70 i 1301 http://fr.arxiv.org/abs/2010.15289 Err codemadness.org 70 i 1302 <p>Authors: <a href="http://fr.arxiv.org/find/nlin/1/au:+Banerjee_A/0/1/0/all/0/1">Amitava Banerjee</a>, <a href="http://fr.arxiv.org/find/nlin/1/au:+Hart_J/0/1/0/all/0/1">Joseph D. Hart</a>, <a href="http://fr.arxiv.org/find/nlin/1/au:+Roy_R/0/1/0/all/0/1">Rajarshi Roy</a>, <a href="http://fr.arxiv.org/find/nlin/1/au:+Ott_E/0/1/0/all/0/1">Edward Ott</a></p> Err codemadness.org 70 i 1303 Err codemadness.org 70 i 1304 <p>We devise a machine learning technique to solve the general problem of Err codemadness.org 70 i 1305 inferring network links that have time-delays. The goal is to do this purely Err codemadness.org 70 i 1306 from time-series data of the network nodal states. This task has applications Err codemadness.org 70 i 1307 in fields ranging from applied physics and engineering to neuroscience and Err codemadness.org 70 i 1308 biology. To achieve this, we first train a type of machine learning system Err codemadness.org 70 i 1309 known as reservoir computing to mimic the dynamics of the unknown network. We Err codemadness.org 70 i 1310 formulate and test a technique that uses the trained parameters of the Err codemadness.org 70 i 1311 reservoir system output layer to deduce an estimate of the unknown network Err codemadness.org 70 i 1312 structure. Our technique, by its nature, is non-invasive, but is motivated by Err codemadness.org 70 i 1313 the widely-used invasive network inference method whereby the responses to Err codemadness.org 70 i 1314 active perturbations applied to the network are observed and employed to infer Err codemadness.org 70 i 1315 network links (e.g., knocking down genes to infer gene regulatory networks). We Err codemadness.org 70 i 1316 test this technique on experimental and simulated data from delay-coupled Err codemadness.org 70 i 1317 opto-electronic oscillator networks. We show that the technique often yields Err codemadness.org 70 i 1318 very good results particularly if the system does not exhibit synchrony. We Err codemadness.org 70 i 1319 also find that the presence of dynamical noise can strikingly enhance the Err codemadness.org 70 i 1320 accuracy and ability of our technique, especially in networks that exhibit Err codemadness.org 70 i 1321 synchrony. Err codemadness.org 70 i 1322 </p> Err codemadness.org 70 i 1323 Err codemadness.org 70 i 1324 Err codemadness.org 70 i 1325 Err codemadness.org 70 i 1326 Fact or Factitious? Contextualized Opinion Spam Detection. (arXiv:2010.15296v1 [cs.AI]) Err codemadness.org 70 i 1327 http://fr.arxiv.org/abs/2010.15296 Err codemadness.org 70 i 1328 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kennedy_S/0/1/0/all/0/1">Stefan Kennedy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Walsh_N/0/1/0/all/0/1">Niall Walsh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sloka_K/0/1/0/all/0/1">Kirils Sloka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Foster_J/0/1/0/all/0/1">Jennifer Foster</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+McCarren_A/0/1/0/all/0/1">Andrew McCarren</a></p> Err codemadness.org 70 i 1329 Err codemadness.org 70 i 1330 <p>In this paper we perform an analytic comparison of a number of techniques Err codemadness.org 70 i 1331 used to detect fake and deceptive online reviews. We apply a number machine Err codemadness.org 70 i 1332 learning approaches found to be effective, and introduce our own approach by Err codemadness.org 70 i 1333 fine-tuning state of the art contextualised embeddings. The results we obtain Err codemadness.org 70 i 1334 show the potential of contextualised embeddings for fake review detection, and Err codemadness.org 70 i 1335 lay the groundwork for future research in this area. Err codemadness.org 70 i 1336 </p> Err codemadness.org 70 i 1337 Err codemadness.org 70 i 1338 Err codemadness.org 70 i 1339 Err codemadness.org 70 i 1340 Analysis of Chorin-Type Projection Methods for the Stochastic Stokes Equations with General Multiplicative Noises. (arXiv:2010.15297v1 [math.NA]) Err codemadness.org 70 i 1341 http://fr.arxiv.org/abs/2010.15297 Err codemadness.org 70 i 1342 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Feng_X/0/1/0/all/0/1">Xiaobing Feng</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Vo_L/0/1/0/all/0/1">Liet Vo</a></p> Err codemadness.org 70 i 1343 Err codemadness.org 70 i 1344 <p>This paper is concerned with numerical analysis of two fully discrete Err codemadness.org 70 i 1345 Chorin-type projection methods for the stochastic Stokes equations with general Err codemadness.org 70 i 1346 non-solenoidal multiplicative noise. The first scheme is the standard Chorin Err codemadness.org 70 i 1347 scheme and the second one is a modified Chorin scheme which is designed by Err codemadness.org 70 i 1348 employing the Helmholtz decomposition on the noise function at each time step Err codemadness.org 70 i 1349 to produce a projected divergence-free noise and a "pseudo pressure" after Err codemadness.org 70 i 1350 combining the original pressure and the curl-free part of the decomposition. Err codemadness.org 70 i 1351 Optimal order rates of the convergence are proved for both velocity and Err codemadness.org 70 i 1352 pressure approximations of these two (semi-discrete) Chorin schemes. It is Err codemadness.org 70 i 1353 crucial to measure the errors in appropriate norms. The fully discrete finite Err codemadness.org 70 i 1354 element methods are formulated by discretizing both semi-discrete Chorin Err codemadness.org 70 i 1355 schemes in space by the standard finite element method. Suboptimal order error Err codemadness.org 70 i 1356 estimates are derived for both fully discrete methods. It is proved that all Err codemadness.org 70 i 1357 spatial error constants contain a growth factor $k^{-1/2}$, where $k$ denotes Err codemadness.org 70 i 1358 the time step size, which explains the deteriorating performance of the Err codemadness.org 70 i 1359 standard Chorin scheme when $k\to 0$ and the space mesh size is fixed as Err codemadness.org 70 i 1360 observed earlier in the numerical tests of [9]. Numerical results are also Err codemadness.org 70 i 1361 provided to guage the performance of the proposed numerical methods and to Err codemadness.org 70 i 1362 validate the sharpness of the theoretical error estimates. Err codemadness.org 70 i 1363 </p> Err codemadness.org 70 i 1364 Err codemadness.org 70 i 1365 Err codemadness.org 70 i 1366 Err codemadness.org 70 i 1367 Uncovering Latent Biases in Text: Method and Application to Peer Review. (arXiv:2010.15300v1 [cs.CL]) Err codemadness.org 70 i 1368 http://fr.arxiv.org/abs/2010.15300 Err codemadness.org 70 i 1369 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Manzoor_E/0/1/0/all/0/1">Emaad Manzoor</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shah_N/0/1/0/all/0/1">Nihar B. Shah</a></p> Err codemadness.org 70 i 1370 Err codemadness.org 70 i 1371 <p>Quantifying systematic disparities in numerical quantities such as employment Err codemadness.org 70 i 1372 rates and wages between population subgroups provides compelling evidence for Err codemadness.org 70 i 1373 the existence of societal biases. However, biases in the text written for Err codemadness.org 70 i 1374 members of different subgroups (such as in recommendation letters for male and Err codemadness.org 70 i 1375 non-male candidates), though widely reported anecdotally, remain challenging to Err codemadness.org 70 i 1376 quantify. In this work, we introduce a novel framework to quantify bias in text Err codemadness.org 70 i 1377 caused by the visibility of subgroup membership indicators. We develop a Err codemadness.org 70 i 1378 nonparametric estimation and inference procedure to estimate this bias. We then Err codemadness.org 70 i 1379 formalize an identification strategy to causally link the estimated bias to the Err codemadness.org 70 i 1380 visibility of subgroup membership indicators, provided observations from time Err codemadness.org 70 i 1381 periods both before and after an identity-hiding policy change. We identify an Err codemadness.org 70 i 1382 application wherein "ground truth" bias can be inferred to evaluate our Err codemadness.org 70 i 1383 framework, instead of relying on synthetic or secondary data. Specifically, we Err codemadness.org 70 i 1384 apply our framework to quantify biases in the text of peer reviews from a Err codemadness.org 70 i 1385 reputed machine learning conference before and after the conference adopted a Err codemadness.org 70 i 1386 double-blind reviewing policy. We show evidence of biases in the review ratings Err codemadness.org 70 i 1387 that serves as "ground truth", and show that our proposed framework accurately Err codemadness.org 70 i 1388 detects these biases from the review text without having access to the review Err codemadness.org 70 i 1389 ratings. Err codemadness.org 70 i 1390 </p> Err codemadness.org 70 i 1391 Err codemadness.org 70 i 1392 Err codemadness.org 70 i 1393 Err codemadness.org 70 i 1394 Point Cloud Attribute Compression via Successive Subspace Graph Transform. (arXiv:2010.15302v1 [cs.CV]) Err codemadness.org 70 i 1395 http://fr.arxiv.org/abs/2010.15302 Err codemadness.org 70 i 1396 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1">Yueru Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shao_Y/0/1/0/all/0/1">Yiting Shao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_J/0/1/0/all/0/1">Jing Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_G/0/1/0/all/0/1">Ge Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kuo_C/0/1/0/all/0/1">C.-C. Jay Kuo</a></p> Err codemadness.org 70 i 1397 Err codemadness.org 70 i 1398 <p>Inspired by the recently proposed successive subspace learning (SSL) Err codemadness.org 70 i 1399 principles, we develop a successive subspace graph transform (SSGT) to address Err codemadness.org 70 i 1400 point cloud attribute compression in this work. The octree geometry structure Err codemadness.org 70 i 1401 is utilized to partition the point cloud, where every node of the octree Err codemadness.org 70 i 1402 represents a point cloud subspace with a certain spatial size. We design a Err codemadness.org 70 i 1403 weighted graph with self-loop to describe the subspace and define a graph Err codemadness.org 70 i 1404 Fourier transform based on the normalized graph Laplacian. The transforms are Err codemadness.org 70 i 1405 applied to large point clouds from the leaf nodes to the root node of the Err codemadness.org 70 i 1406 octree recursively, while the represented subspace is expanded from the Err codemadness.org 70 i 1407 smallest one to the whole point cloud successively. It is shown by experimental Err codemadness.org 70 i 1408 results that the proposed SSGT method offers better R-D performances than the Err codemadness.org 70 i 1409 previous Region Adaptive Haar Transform (RAHT) method. Err codemadness.org 70 i 1410 </p> Err codemadness.org 70 i 1411 Err codemadness.org 70 i 1412 Err codemadness.org 70 i 1413 Err codemadness.org 70 i 1414 Automatic joint damage quantification using computer vision and deep learning. (arXiv:2010.15303v1 [cs.CV]) Err codemadness.org 70 i 1415 http://fr.arxiv.org/abs/2010.15303 Err codemadness.org 70 i 1416 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tran_Q/0/1/0/all/0/1">Quang Tran</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Roesler_J/0/1/0/all/0/1">Jeffery R. Roesler</a></p> Err codemadness.org 70 i 1417 Err codemadness.org 70 i 1418 <p>Joint raveled or spalled damage (henceforth called joint damage) can affect Err codemadness.org 70 i 1419 the safety and long-term performance of concrete pavements. It is important to Err codemadness.org 70 i 1420 assess and quantify the joint damage over time to assist in building action Err codemadness.org 70 i 1421 plans for maintenance, predicting maintenance costs, and maximize the concrete Err codemadness.org 70 i 1422 pavement service life. A framework for the accurate, autonomous, and rapid Err codemadness.org 70 i 1423 quantification of joint damage with a low-cost camera is proposed using a Err codemadness.org 70 i 1424 computer vision technique with a deep learning (DL) algorithm. The DL model is Err codemadness.org 70 i 1425 employed to train 263 images of sawcuts with joint damage. The trained DL model Err codemadness.org 70 i 1426 is used for pixel-wise color-masking joint damage in a series of query 2D Err codemadness.org 70 i 1427 images, which are used to reconstruct a 3D image using open-source structure Err codemadness.org 70 i 1428 from motion algorithm. Another damage quantification algorithm using a color Err codemadness.org 70 i 1429 threshold is applied to detect and compute the surface area of the damage in Err codemadness.org 70 i 1430 the 3D reconstructed image. The effectiveness of the framework was validated Err codemadness.org 70 i 1431 through inspecting joint damage at four transverse contraction joints in Err codemadness.org 70 i 1432 Illinois, USA, including three acceptable joints and one unacceptable joint by Err codemadness.org 70 i 1433 visual inspection. The results show the framework achieves 76% recall and 10% Err codemadness.org 70 i 1434 error. Err codemadness.org 70 i 1435 </p> Err codemadness.org 70 i 1436 Err codemadness.org 70 i 1437 Err codemadness.org 70 i 1438 Err codemadness.org 70 i 1439 ACCDOA: Activity-Coupled Cartesian Direction of Arrival Representation for Sound Event Localization and Detection. (arXiv:2010.15306v1 [eess.AS]) Err codemadness.org 70 i 1440 http://fr.arxiv.org/abs/2010.15306 Err codemadness.org 70 i 1441 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Shimada_K/0/1/0/all/0/1">Kazuki Shimada</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Koyama_Y/0/1/0/all/0/1">Yuichiro Koyama</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Takahashi_N/0/1/0/all/0/1">Naoya Takahashi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Takahashi_S/0/1/0/all/0/1">Shusuke Takahashi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Mitsufuji_Y/0/1/0/all/0/1">Yuki Mitsufuji</a></p> Err codemadness.org 70 i 1442 Err codemadness.org 70 i 1443 <p>Neural-network (NN)-based methods show high performance in sound event Err codemadness.org 70 i 1444 localization and detection (SELD). Conventional NN-based methods use two Err codemadness.org 70 i 1445 branches for a sound event detection (SED) target and a direction-of-arrival Err codemadness.org 70 i 1446 (DOA) target. The two-branch representation with a single network has to decide Err codemadness.org 70 i 1447 how to balance the two objectives during optimization. Using two networks Err codemadness.org 70 i 1448 dedicated to each task increases system complexity and network size. To address Err codemadness.org 70 i 1449 these problems, we propose an activity-coupled Cartesian DOA (ACCDOA) Err codemadness.org 70 i 1450 representation, which assigns a sound event activity to the length of a Err codemadness.org 70 i 1451 corresponding Cartesian DOA vector. The ACCDOA representation enables us to Err codemadness.org 70 i 1452 solve a SELD task with a single target and has two advantages: avoiding the Err codemadness.org 70 i 1453 necessity of balancing the objectives and model size increase. In experimental Err codemadness.org 70 i 1454 evaluations with the DCASE 2020 Task 3 dataset, the ACCDOA representation Err codemadness.org 70 i 1455 outperformed the two-branch representation in SELD metrics with a smaller Err codemadness.org 70 i 1456 network size. The ACCDOA-based SELD system also performed better than Err codemadness.org 70 i 1457 state-of-the-art SELD systems in terms of localization and location-dependent Err codemadness.org 70 i 1458 detection. Err codemadness.org 70 i 1459 </p> Err codemadness.org 70 i 1460 Err codemadness.org 70 i 1461 Err codemadness.org 70 i 1462 Err codemadness.org 70 i 1463 DeviceTTS: A Small-Footprint, Fast, Stable Network for On-Device Text-to-Speech. (arXiv:2010.15311v1 [eess.AS]) Err codemadness.org 70 i 1464 http://fr.arxiv.org/abs/2010.15311 Err codemadness.org 70 i 1465 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Huang_Z/0/1/0/all/0/1">Zhiying Huang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_H/0/1/0/all/0/1">Hao Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Lei_M/0/1/0/all/0/1">Ming Lei</a></p> Err codemadness.org 70 i 1466 Err codemadness.org 70 i 1467 <p>With the number of smart devices increasing, the demand for on-device Err codemadness.org 70 i 1468 text-to-speech (TTS) increases rapidly. In recent years, many prominent Err codemadness.org 70 i 1469 End-to-End TTS methods have been proposed, and have greatly improved the Err codemadness.org 70 i 1470 quality of synthesized speech. However, to ensure the qualified speech, most Err codemadness.org 70 i 1471 TTS systems depend on large and complex neural network models, and it's hard to Err codemadness.org 70 i 1472 deploy these TTS systems on-device. In this paper, a small-footprint, fast, Err codemadness.org 70 i 1473 stable network for on-device TTS is proposed, named as DeviceTTS. DeviceTTS Err codemadness.org 70 i 1474 makes use of a duration predictor as a bridge between encoder and decoder so as Err codemadness.org 70 i 1475 to avoid the problem of words skipping and repeating in Tacotron. As we all Err codemadness.org 70 i 1476 know, model size is a key factor for on-device TTS. For DeviceTTS, Deep Err codemadness.org 70 i 1477 Feedforward Sequential Memory Network (DFSMN) is used as the basic component. Err codemadness.org 70 i 1478 Moreover, to speed up inference, mix-resolution decoder is proposed for balance Err codemadness.org 70 i 1479 the inference speed and speech quality. Experiences are done with WORLD and Err codemadness.org 70 i 1480 LPCNet vocoder. Finally, with only 1.4 million model parameters and 0.099 Err codemadness.org 70 i 1481 GFLOPS, DeviceTTS achieves comparable performance with Tacotron and FastSpeech. Err codemadness.org 70 i 1482 As far as we know, the DeviceTTS can meet the needs of most of the devices in Err codemadness.org 70 i 1483 practical application. Err codemadness.org 70 i 1484 </p> Err codemadness.org 70 i 1485 Err codemadness.org 70 i 1486 Err codemadness.org 70 i 1487 Err codemadness.org 70 i 1488 "where is this relationship going?": Understanding Relationship Trajectories in Narrative Text. (arXiv:2010.15313v1 [cs.CL]) Err codemadness.org 70 i 1489 http://fr.arxiv.org/abs/2010.15313 Err codemadness.org 70 i 1490 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+You_K/0/1/0/all/0/1">Keen You</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Goldwasser_D/0/1/0/all/0/1">Dan Goldwasser</a></p> Err codemadness.org 70 i 1491 Err codemadness.org 70 i 1492 <p>We examine a new commonsense reasoning task: given a narrative describing a Err codemadness.org 70 i 1493 social interaction that centers on two protagonists, systems make inferences Err codemadness.org 70 i 1494 about the underlying relationship trajectory. Specifically, we propose two Err codemadness.org 70 i 1495 evaluation tasks: Relationship Outlook Prediction MCQ and Resolution Prediction Err codemadness.org 70 i 1496 MCQ. In Relationship Outlook Prediction, a system maps an interaction to a Err codemadness.org 70 i 1497 relationship outlook that captures how the interaction is expected to change Err codemadness.org 70 i 1498 the relationship. In Resolution Prediction, a system attributes a given Err codemadness.org 70 i 1499 relationship outlook to a particular resolution that explains the outcome. Err codemadness.org 70 i 1500 These two tasks parallel two real-life questions that people frequently ponder Err codemadness.org 70 i 1501 upon as they navigate different social situations: "where is this relationship Err codemadness.org 70 i 1502 going?" and "how did we end up here?". To facilitate the investigation of human Err codemadness.org 70 i 1503 social relationships through these two tasks, we construct a new dataset, Err codemadness.org 70 i 1504 Social Narrative Tree, which consists of 1250 stories documenting a variety of Err codemadness.org 70 i 1505 daily social interactions. The narratives encode a multitude of social elements Err codemadness.org 70 i 1506 that interweave to give rise to rich commonsense knowledge of how relationships Err codemadness.org 70 i 1507 evolve with respect to social interactions. We establish baseline performances Err codemadness.org 70 i 1508 using language models and the accuracies are significantly lower than human Err codemadness.org 70 i 1509 performance. The results demonstrate that models need to look beyond syntactic Err codemadness.org 70 i 1510 and semantic signals to comprehend complex human relationships. Err codemadness.org 70 i 1511 </p> Err codemadness.org 70 i 1512 Err codemadness.org 70 i 1513 Err codemadness.org 70 i 1514 Err codemadness.org 70 i 1515 Recurrent neural circuits for contour detection. (arXiv:2010.15314v1 [cs.CV]) Err codemadness.org 70 i 1516 http://fr.arxiv.org/abs/2010.15314 Err codemadness.org 70 i 1517 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Linsley_D/0/1/0/all/0/1">Drew Linsley</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1">Junkyung Kim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ashok_A/0/1/0/all/0/1">Alekh Ashok</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Serre_T/0/1/0/all/0/1">Thomas Serre</a></p> Err codemadness.org 70 i 1518 Err codemadness.org 70 i 1519 <p>We introduce a deep recurrent neural network architecture that approximates Err codemadness.org 70 i 1520 visual cortical circuits. We show that this architecture, which we refer to as Err codemadness.org 70 i 1521 the gamma-net, learns to solve contour detection tasks with better sample Err codemadness.org 70 i 1522 efficiency than state-of-the-art feedforward networks, while also exhibiting a Err codemadness.org 70 i 1523 classic perceptual illusion, known as the orientation-tilt illusion. Correcting Err codemadness.org 70 i 1524 this illusion significantly reduces gamma-net contour detection accuracy by Err codemadness.org 70 i 1525 driving it to prefer low-level edges over high-level object boundary contours. Err codemadness.org 70 i 1526 Overall, our study suggests that the orientation-tilt illusion is a byproduct Err codemadness.org 70 i 1527 of neural circuits that help biological visual systems achieve robust and Err codemadness.org 70 i 1528 efficient contour detection, and that incorporating these circuits in Err codemadness.org 70 i 1529 artificial neural networks can improve computer vision. Err codemadness.org 70 i 1530 </p> Err codemadness.org 70 i 1531 Err codemadness.org 70 i 1532 Err codemadness.org 70 i 1533 Err codemadness.org 70 i 1534 Exploring Generative Adversarial Networks for Image-to-Image Translation in STEM Simulation. (arXiv:2010.15315v1 [cs.CV]) Err codemadness.org 70 i 1535 http://fr.arxiv.org/abs/2010.15315 Err codemadness.org 70 i 1536 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lawrence_N/0/1/0/all/0/1">Nick Lawrence</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shen_M/0/1/0/all/0/1">Mingren Shen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yin_R/0/1/0/all/0/1">Ruiqi Yin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_C/0/1/0/all/0/1">Cloris Feng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Morgan_D/0/1/0/all/0/1">Dane Morgan</a></p> Err codemadness.org 70 i 1537 Err codemadness.org 70 i 1538 <p>The use of accurate scanning transmission electron microscopy (STEM) image Err codemadness.org 70 i 1539 simulation methods require large computation times that can make their use Err codemadness.org 70 i 1540 infeasible for the simulation of many images. Other simulation methods based on Err codemadness.org 70 i 1541 linear imaging models, such as the convolution method, are much faster but are Err codemadness.org 70 i 1542 too inaccurate to be used in application. In this paper, we explore deep Err codemadness.org 70 i 1543 learning models that attempt to translate a STEM image produced by the Err codemadness.org 70 i 1544 convolution method to a prediction of the high accuracy multislice image. We Err codemadness.org 70 i 1545 then compare our results to those of regression methods. We find that using the Err codemadness.org 70 i 1546 deep learning model Generative Adversarial Network (GAN) provides us with the Err codemadness.org 70 i 1547 best results and performs at a similar accuracy level to previous regression Err codemadness.org 70 i 1548 models on the same dataset. Codes and data for this project can be found in Err codemadness.org 70 i 1549 this GitHub repository, https://github.com/uw-cmg/GAN-STEM-Conv2MultiSlice. Err codemadness.org 70 i 1550 </p> Err codemadness.org 70 i 1551 Err codemadness.org 70 i 1552 Err codemadness.org 70 i 1553 Err codemadness.org 70 i 1554 Multiple Sclerosis Severity Classification From Clinical Text. (arXiv:2010.15316v1 [cs.CL]) Err codemadness.org 70 i 1555 http://fr.arxiv.org/abs/2010.15316 Err codemadness.org 70 i 1556 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Costa_A/0/1/0/all/0/1">Alister D Costa</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Denkovski_S/0/1/0/all/0/1">Stefan Denkovski</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Malyska_M/0/1/0/all/0/1">Michal Malyska</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Moon_S/0/1/0/all/0/1">Sae Young Moon</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rufino_B/0/1/0/all/0/1">Brandon Rufino</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_Z/0/1/0/all/0/1">Zhen Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Killian_T/0/1/0/all/0/1">Taylor Killian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ghassemi_M/0/1/0/all/0/1">Marzyeh Ghassemi</a></p> Err codemadness.org 70 i 1557 Err codemadness.org 70 i 1558 <p>Multiple Sclerosis (MS) is a chronic, inflammatory and degenerative Err codemadness.org 70 i 1559 neurological disease, which is monitored by a specialist using the Expanded Err codemadness.org 70 i 1560 Disability Status Scale (EDSS) and recorded in unstructured text in the form of Err codemadness.org 70 i 1561 a neurology consult note. An EDSS measurement contains an overall "EDSS" score Err codemadness.org 70 i 1562 and several functional subscores. Typically, expert knowledge is required to Err codemadness.org 70 i 1563 interpret consult notes and generate these scores. Previous approaches used Err codemadness.org 70 i 1564 limited context length Word2Vec embeddings and keyword searches to predict Err codemadness.org 70 i 1565 scores given a consult note, but often failed when scores were not explicitly Err codemadness.org 70 i 1566 stated. In this work, we present MS-BERT, the first publicly available Err codemadness.org 70 i 1567 transformer model trained on real clinical data other than MIMIC. Next, we Err codemadness.org 70 i 1568 present MSBC, a classifier that applies MS-BERT to generate embeddings and Err codemadness.org 70 i 1569 predict EDSS and functional subscores. Lastly, we explore combining MSBC with Err codemadness.org 70 i 1570 other models through the use of Snorkel to generate scores for unlabelled Err codemadness.org 70 i 1571 consult notes. MSBC achieves state-of-the-art performance on all metrics and Err codemadness.org 70 i 1572 prediction tasks and outperforms the models generated from the Snorkel Err codemadness.org 70 i 1573 ensemble. We improve Macro-F1 by 0.12 (to 0.88) for predicting EDSS and on Err codemadness.org 70 i 1574 average by 0.29 (to 0.63) for predicting functional subscores over previous Err codemadness.org 70 i 1575 Word2Vec CNN and rule-based approaches. Err codemadness.org 70 i 1576 </p> Err codemadness.org 70 i 1577 Err codemadness.org 70 i 1578 Err codemadness.org 70 i 1579 Err codemadness.org 70 i 1580 The IQIYI System for Voice Conversion Challenge 2020. (arXiv:2010.15317v1 [cs.SD]) Err codemadness.org 70 i 1581 http://fr.arxiv.org/abs/2010.15317 Err codemadness.org 70 i 1582 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gan_W/0/1/0/all/0/1">Wendong Gan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_H/0/1/0/all/0/1">Haitao Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yan_Y/0/1/0/all/0/1">Yin Yan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1">Jianwei Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wen_B/0/1/0/all/0/1">Bolong Wen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xu_X/0/1/0/all/0/1">Xueping Xu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_H/0/1/0/all/0/1">Hai Li</a></p> Err codemadness.org 70 i 1583 Err codemadness.org 70 i 1584 <p>This paper presents the IQIYI voice conversion system (T24) for Voice Err codemadness.org 70 i 1585 Conversion 2020. In the competition, each target speaker has 70 sentences. We Err codemadness.org 70 i 1586 have built an end-to-end voice conversion system based on PPG. First, the ASR Err codemadness.org 70 i 1587 acoustic model calculates the BN feature, which represents the content-related Err codemadness.org 70 i 1588 information in the speech. Then the Mel feature is calculated through an Err codemadness.org 70 i 1589 improved prosody tacotron model. Finally, the Mel spectrum is converted to wav Err codemadness.org 70 i 1590 through an improved LPCNet. The evaluation results show that this system can Err codemadness.org 70 i 1591 achieve better voice conversion effects. In the case of using 16k rather than Err codemadness.org 70 i 1592 24k sampling rate audio, the conversion result is relatively good in Err codemadness.org 70 i 1593 naturalness and similarity. Among them, our best results are in the similarity Err codemadness.org 70 i 1594 evaluation of the Task 2, the 2nd in the ASV-based objective evaluation and the Err codemadness.org 70 i 1595 5th in the subjective evaluation. Err codemadness.org 70 i 1596 </p> Err codemadness.org 70 i 1597 Err codemadness.org 70 i 1598 Err codemadness.org 70 i 1599 Err codemadness.org 70 i 1600 Gaussian Processes Model-based Control of Underactuated Balance Robots. (arXiv:2010.15320v1 [cs.RO]) Err codemadness.org 70 i 1601 http://fr.arxiv.org/abs/2010.15320 Err codemadness.org 70 i 1602 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_K/0/1/0/all/0/1">Kuo Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yi_J/0/1/0/all/0/1">Jingang Yi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Song_D/0/1/0/all/0/1">Dezhen Song</a></p> Err codemadness.org 70 i 1603 Err codemadness.org 70 i 1604 <p>Ranging from cart-pole systems and autonomous bicycles to bipedal robots, Err codemadness.org 70 i 1605 control of these underactuated balance robots aims to achieve both external Err codemadness.org 70 i 1606 (actuated) subsystem trajectory tracking and internal (unactuated) subsystem Err codemadness.org 70 i 1607 balancing tasks with limited actuation authority. This paper proposes a Err codemadness.org 70 i 1608 learning model-based control framework for underactuated balance robots. The Err codemadness.org 70 i 1609 key idea to simultaneously achieve tracking and balancing tasks is to design Err codemadness.org 70 i 1610 control strategies in slow- and fast-time scales, respectively. In slow-time Err codemadness.org 70 i 1611 scale, model predictive control (MPC) is used to generate the desired internal Err codemadness.org 70 i 1612 subsystem trajectory that encodes the external subsystem tracking performance Err codemadness.org 70 i 1613 and control input. In fast-time scale, the actual internal trajectory is Err codemadness.org 70 i 1614 stabilized to the desired internal trajectory by using an inverse dynamics Err codemadness.org 70 i 1615 controller. The coupling effects between the external and internal subsystems Err codemadness.org 70 i 1616 are captured through the planned internal trajectory profile and the dual Err codemadness.org 70 i 1617 structural properties of the robotic systems. The control design is based on Err codemadness.org 70 i 1618 Gaussian processes (GPs) regression model that are learned from experiments Err codemadness.org 70 i 1619 without need of priori knowledge about the robot dynamics nor successful Err codemadness.org 70 i 1620 balance demonstration. The GPs provide estimates of modeling uncertainties of Err codemadness.org 70 i 1621 the robotic systems and these uncertainty estimations are incorporated in the Err codemadness.org 70 i 1622 MPC design to enhance the control robustness to modeling errors. The Err codemadness.org 70 i 1623 learning-based control design is analyzed with guaranteed stability and Err codemadness.org 70 i 1624 performance. The proposed design is demonstrated by experiments on a Furuta Err codemadness.org 70 i 1625 pendulum and an autonomous bikebot. Err codemadness.org 70 i 1626 </p> Err codemadness.org 70 i 1627 Err codemadness.org 70 i 1628 Err codemadness.org 70 i 1629 Err codemadness.org 70 i 1630 Improvement of EAST Data Acquisition Configuration Management. (arXiv:2010.15322v1 [physics.ins-det]) Err codemadness.org 70 i 1631 http://fr.arxiv.org/abs/2010.15322 Err codemadness.org 70 i 1632 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Ying_C/0/1/0/all/0/1">Chen Ying</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Shi_L/0/1/0/all/0/1">Li Shi</a></p> Err codemadness.org 70 i 1633 Err codemadness.org 70 i 1634 <p>The data acquisition console is an important component of the EAST data Err codemadness.org 70 i 1635 acquisition system which provides unified data acquisition and long-term data Err codemadness.org 70 i 1636 storage for diagnostics. The data acquisition console is used to manage the Err codemadness.org 70 i 1637 data acquisition configuration information and control the data acquisition Err codemadness.org 70 i 1638 workflow. The data acquisition console has been developed many years, and with Err codemadness.org 70 i 1639 increasing of data acquisition nodes and emergence of new control nodes, the Err codemadness.org 70 i 1640 function of configuration management has become inadequate. It is going to Err codemadness.org 70 i 1641 update the configuration management function of data acquisition console. The Err codemadness.org 70 i 1642 upgraded data acquisition console based on LabVIEW should be oriented to the Err codemadness.org 70 i 1643 data acquisition administrator, with the functions of managing data acquisition Err codemadness.org 70 i 1644 nodes, managing control nodes, setting and publishing configuration parameters, Err codemadness.org 70 i 1645 batch management, database backup, monitoring the status of data acquisition Err codemadness.org 70 i 1646 nodes, controlling the data acquisition workflow, and shot simulation data Err codemadness.org 70 i 1647 acquisition test. The upgraded data acquisition console has been designed and Err codemadness.org 70 i 1648 under testing recently. Err codemadness.org 70 i 1649 </p> Err codemadness.org 70 i 1650 Err codemadness.org 70 i 1651 Err codemadness.org 70 i 1652 Err codemadness.org 70 i 1653 Do Wide and Deep Networks Learn the Same Things? Uncovering How Neural Network Representations Vary with Width and Depth. (arXiv:2010.15327v1 [cs.LG]) Err codemadness.org 70 i 1654 http://fr.arxiv.org/abs/2010.15327 Err codemadness.org 70 i 1655 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nguyen_T/0/1/0/all/0/1">Thao Nguyen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Raghu_M/0/1/0/all/0/1">Maithra Raghu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kornblith_S/0/1/0/all/0/1">Simon Kornblith</a></p> Err codemadness.org 70 i 1656 Err codemadness.org 70 i 1657 <p>A key factor in the success of deep neural networks is the ability to scale Err codemadness.org 70 i 1658 models to improve performance by varying the architecture depth and width. This Err codemadness.org 70 i 1659 simple property of neural network design has resulted in highly effective Err codemadness.org 70 i 1660 architectures for a variety of tasks. Nevertheless, there is limited Err codemadness.org 70 i 1661 understanding of effects of depth and width on the learned representations. In Err codemadness.org 70 i 1662 this paper, we study this fundamental question. We begin by investigating how Err codemadness.org 70 i 1663 varying depth and width affects model hidden representations, finding a Err codemadness.org 70 i 1664 characteristic block structure in the hidden representations of larger capacity Err codemadness.org 70 i 1665 (wider or deeper) models. We demonstrate that this block structure arises when Err codemadness.org 70 i 1666 model capacity is large relative to the size of the training set, and is Err codemadness.org 70 i 1667 indicative of the underlying layers preserving and propagating the dominant Err codemadness.org 70 i 1668 principal component of their representations. This discovery has important Err codemadness.org 70 i 1669 ramifications for features learned by different models, namely, representations Err codemadness.org 70 i 1670 outside the block structure are often similar across architectures with varying Err codemadness.org 70 i 1671 widths and depths, but the block structure is unique to each model. We analyze Err codemadness.org 70 i 1672 the output predictions of different model architectures, finding that even when Err codemadness.org 70 i 1673 the overall accuracy is similar, wide and deep models exhibit distinctive error Err codemadness.org 70 i 1674 patterns and variations across classes. Err codemadness.org 70 i 1675 </p> Err codemadness.org 70 i 1676 Err codemadness.org 70 i 1677 Err codemadness.org 70 i 1678 Err codemadness.org 70 i 1679 Scalable Attack-Resistant Obfuscation of Logic Circuits. (arXiv:2010.15329v1 [cs.CR]) Err codemadness.org 70 i 1680 http://fr.arxiv.org/abs/2010.15329 Err codemadness.org 70 i 1681 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Alaql_A/0/1/0/all/0/1">Abdulrahman Alaql</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bhunia_S/0/1/0/all/0/1">Swarup Bhunia</a></p> Err codemadness.org 70 i 1682 Err codemadness.org 70 i 1683 <p>Hardware IP protection has been one of the most critical areas of research in Err codemadness.org 70 i 1684 the past years. Recently, attacks on hardware IPs (such as reverse engineering Err codemadness.org 70 i 1685 or cloning) have evolved as attackers have developed sophisticated techniques. Err codemadness.org 70 i 1686 Therefore, hardware obfuscation has been introduced as a powerful tool to Err codemadness.org 70 i 1687 protect IPs against piracy attacks. However, many recent attempts to break Err codemadness.org 70 i 1688 existing obfuscation methods have been successful in unlocking the IP and Err codemadness.org 70 i 1689 restoring its functionality. In this paper, we propose SARO, a Scalable Err codemadness.org 70 i 1690 Attack-Resistant Obfuscation that provides a robust functional and structural Err codemadness.org 70 i 1691 design transformation process. SARO treats the target circuit as a graph, and Err codemadness.org 70 i 1692 performs a partitioning algorithm to produce a set of sub-graphs, then applies Err codemadness.org 70 i 1693 our novel Truth Table Transformation (T3) process to each partition. We also Err codemadness.org 70 i 1694 propose the $T3_{metric}$, which is developed to quantify the structural and Err codemadness.org 70 i 1695 functional design transformation level caused by the obfuscation process. We Err codemadness.org 70 i 1696 evaluate SARO on ISCAS85 and EPFL benchmarks, and provide full security and Err codemadness.org 70 i 1697 performance analysis of our proposed framework. Err codemadness.org 70 i 1698 </p> Err codemadness.org 70 i 1699 Err codemadness.org 70 i 1700 Err codemadness.org 70 i 1701 Err codemadness.org 70 i 1702 Learning Sampling Distributions Using Local 3D Workspace Decompositions for Motion Planning in High Dimensions. (arXiv:2010.15335v1 [cs.RO]) Err codemadness.org 70 i 1703 http://fr.arxiv.org/abs/2010.15335 Err codemadness.org 70 i 1704 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chamzas_C/0/1/0/all/0/1">Constantinos Chamzas</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kingston_Z/0/1/0/all/0/1">Zachary Kingston</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Quintero_Pena_C/0/1/0/all/0/1">Carlos Quintero-Pe&#xf1;a</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shrivastava_A/0/1/0/all/0/1">Anshumali Shrivastava</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kavraki_L/0/1/0/all/0/1">Lydia E. Kavraki</a></p> Err codemadness.org 70 i 1705 Err codemadness.org 70 i 1706 <p>Earlier work has shown that reusing experience from prior motion planning Err codemadness.org 70 i 1707 problems can improve the efficiency of similar, future motion planning queries. Err codemadness.org 70 i 1708 However, for robots with many degrees-of-freedom, these methods exhibit poor Err codemadness.org 70 i 1709 generalization across different environments and often require large datasets Err codemadness.org 70 i 1710 that are impractical to gather. We present SPARK and FLAME , two Err codemadness.org 70 i 1711 experience-based frameworks for sampling-based planning applicable to complex Err codemadness.org 70 i 1712 manipulators in 3 D environments. Both combine samplers associated with Err codemadness.org 70 i 1713 features from a workspace decomposition into a global biased sampling Err codemadness.org 70 i 1714 distribution. SPARK decomposes the environment based on exact geometry while Err codemadness.org 70 i 1715 FLAME is more general, and uses an octree-based decomposition obtained from Err codemadness.org 70 i 1716 sensor data. We demonstrate the effectiveness of SPARK and FLAME on a Fetch Err codemadness.org 70 i 1717 robot tasked with challenging pick-and-place manipulation problems. Our Err codemadness.org 70 i 1718 approaches can be trained incrementally and significantly improve performance Err codemadness.org 70 i 1719 with only a handful of examples, generalizing better over diverse tasks and Err codemadness.org 70 i 1720 environments as compared to prior approaches. Err codemadness.org 70 i 1721 </p> Err codemadness.org 70 i 1722 Err codemadness.org 70 i 1723 Err codemadness.org 70 i 1724 Err codemadness.org 70 i 1725 SAR-NAS: Skeleton-based Action Recognition via Neural Architecture Searching. (arXiv:2010.15336v1 [cs.CV]) Err codemadness.org 70 i 1726 http://fr.arxiv.org/abs/2010.15336 Err codemadness.org 70 i 1727 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_H/0/1/0/all/0/1">Haoyuan Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hou_Y/0/1/0/all/0/1">Yonghong Hou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_P/0/1/0/all/0/1">Pichao Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Guo_Z/0/1/0/all/0/1">Zihui Guo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1">Wanqing Li</a></p> Err codemadness.org 70 i 1728 Err codemadness.org 70 i 1729 <p>This paper presents a study of automatic design of neural network Err codemadness.org 70 i 1730 architectures for skeleton-based action recognition. Specifically, we encode a Err codemadness.org 70 i 1731 skeleton-based action instance into a tensor and carefully define a set of Err codemadness.org 70 i 1732 operations to build two types of network cells: normal cells and reduction Err codemadness.org 70 i 1733 cells. The recently developed DARTS (Differentiable Architecture Search) is Err codemadness.org 70 i 1734 adopted to search for an effective network architecture that is built upon the Err codemadness.org 70 i 1735 two types of cells. All operations are 2D based in order to reduce the overall Err codemadness.org 70 i 1736 computation and search space. Experiments on the challenging NTU RGB+D and Err codemadness.org 70 i 1737 Kinectics datasets have verified that most of the networks developed to date Err codemadness.org 70 i 1738 for skeleton-based action recognition are likely not compact and efficient. The Err codemadness.org 70 i 1739 proposed method provides an approach to search for such a compact network that Err codemadness.org 70 i 1740 is able to achieve comparative or even better performance than the Err codemadness.org 70 i 1741 state-of-the-art methods. Err codemadness.org 70 i 1742 </p> Err codemadness.org 70 i 1743 Err codemadness.org 70 i 1744 Err codemadness.org 70 i 1745 Err codemadness.org 70 i 1746 A New "Model-Free" Method Combined with Neural Network for MIMO Systems. (arXiv:2010.15338v1 [eess.SY]) Err codemadness.org 70 i 1747 http://fr.arxiv.org/abs/2010.15338 Err codemadness.org 70 i 1748 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_F/0/1/0/all/0/1">Feilong Zhang</a></p> Err codemadness.org 70 i 1749 Err codemadness.org 70 i 1750 <p>In this brief, a model-free adaptive predictive control (MFAPC) is proposed. Err codemadness.org 70 i 1751 It outperforms the current model-free adaptive control (MFAC) for not only Err codemadness.org 70 i 1752 solving the time delay problem in multiple-input multiple-output (MIMO) systems Err codemadness.org 70 i 1753 but also relaxing the current rigorous assumptions for sake of a wider Err codemadness.org 70 i 1754 applicable range. The most attractive merit of the proposed controller is that Err codemadness.org 70 i 1755 the controller design, performance analysis and applications are easy for Err codemadness.org 70 i 1756 engineers to realize. Furthermore, the problem of how to choose the matrix Err codemadness.org 70 i 1757 {\lambda} is finished by analyzing the function of the closed-loop poles rather Err codemadness.org 70 i 1758 than the previous contraction mapping method. Additionally, in view of the Err codemadness.org 70 i 1759 nonlinear modeling capability and adaptability of neural networks (NNs), we Err codemadness.org 70 i 1760 combine these two classes of algorithms together. The feasibility and several Err codemadness.org 70 i 1761 interesting results of the proposed method are shown in simulations. Err codemadness.org 70 i 1762 </p> Err codemadness.org 70 i 1763 Err codemadness.org 70 i 1764 Err codemadness.org 70 i 1765 Err codemadness.org 70 i 1766 Identifying safe intersection design through unsupervised feature extraction from satellite imagery. (arXiv:2010.15343v1 [cs.CV]) Err codemadness.org 70 i 1767 http://fr.arxiv.org/abs/2010.15343 Err codemadness.org 70 i 1768 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wijnands_J/0/1/0/all/0/1">Jasper S. Wijnands</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_H/0/1/0/all/0/1">Haifeng Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nice_K/0/1/0/all/0/1">Kerry A. Nice</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Thompson_J/0/1/0/all/0/1">Jason Thompson</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Scully_K/0/1/0/all/0/1">Katherine Scully</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Guo_J/0/1/0/all/0/1">Jingqiu Guo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stevenson_M/0/1/0/all/0/1">Mark Stevenson</a></p> Err codemadness.org 70 i 1769 Err codemadness.org 70 i 1770 <p>The World Health Organization has listed the design of safer intersections as Err codemadness.org 70 i 1771 a key intervention to reduce global road trauma. This article presents the Err codemadness.org 70 i 1772 first study to systematically analyze the design of all intersections in a Err codemadness.org 70 i 1773 large country, based on aerial imagery and deep learning. Approximately 900,000 Err codemadness.org 70 i 1774 satellite images were downloaded for all intersections in Australia and Err codemadness.org 70 i 1775 customized computer vision techniques emphasized the road infrastructure. A Err codemadness.org 70 i 1776 deep autoencoder extracted high-level features, including the intersection's Err codemadness.org 70 i 1777 type, size, shape, lane markings, and complexity, which were used to cluster Err codemadness.org 70 i 1778 similar designs. An Australian telematics data set linked infrastructure design Err codemadness.org 70 i 1779 to driving behaviors captured during 66 million kilometers of driving. This Err codemadness.org 70 i 1780 showed more frequent hard acceleration events (per vehicle) at four- than Err codemadness.org 70 i 1781 three-way intersections, relatively low hard deceleration frequencies at Err codemadness.org 70 i 1782 T-intersections, and consistently low average speeds on roundabouts. Overall, Err codemadness.org 70 i 1783 domain-specific feature extraction enabled the identification of infrastructure Err codemadness.org 70 i 1784 improvements that could result in safer driving behaviors, potentially reducing Err codemadness.org 70 i 1785 road trauma. Err codemadness.org 70 i 1786 </p> Err codemadness.org 70 i 1787 Err codemadness.org 70 i 1788 Err codemadness.org 70 i 1789 Err codemadness.org 70 i 1790 Sea-Net: Squeeze-And-Excitation Attention Net For Diabetic Retinopathy Grading. (arXiv:2010.15344v1 [cs.CV]) Err codemadness.org 70 i 1791 http://fr.arxiv.org/abs/2010.15344 Err codemadness.org 70 i 1792 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_Z/0/1/0/all/0/1">Ziyuan Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chopra_K/0/1/0/all/0/1">Kartik Chopra</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zeng_Z/0/1/0/all/0/1">Zeng Zeng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1">Xiaoli Li</a></p> Err codemadness.org 70 i 1793 Err codemadness.org 70 i 1794 <p>Diabetes is one of the most common disease in individuals. \textit{Diabetic Err codemadness.org 70 i 1795 retinopathy} (DR) is a complication of diabetes, which could lead to blindness. Err codemadness.org 70 i 1796 Automatic DR grading based on retinal images provides a great diagnostic and Err codemadness.org 70 i 1797 prognostic value for treatment planning. However, the subtle differences among Err codemadness.org 70 i 1798 severity levels make it difficult to capture important features using Err codemadness.org 70 i 1799 conventional methods. To alleviate the problems, a new deep learning Err codemadness.org 70 i 1800 architecture for robust DR grading is proposed, referred to as SEA-Net, in Err codemadness.org 70 i 1801 which, spatial attention and channel attention are alternatively carried out Err codemadness.org 70 i 1802 and boosted with each other, improving the classification performance. In Err codemadness.org 70 i 1803 addition, a hybrid loss function is proposed to further maximize the Err codemadness.org 70 i 1804 inter-class distance and reduce the intra-class variability. Experimental Err codemadness.org 70 i 1805 results have shown the effectiveness of the proposed architecture. Err codemadness.org 70 i 1806 </p> Err codemadness.org 70 i 1807 Err codemadness.org 70 i 1808 Err codemadness.org 70 i 1809 Err codemadness.org 70 i 1810 Developing Augmented Reality based Gaming Model to Teach Ethical Education in Primary Schools. (arXiv:2010.15346v1 [cs.CY]) Err codemadness.org 70 i 1811 http://fr.arxiv.org/abs/2010.15346 Err codemadness.org 70 i 1812 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ali_M/0/1/0/all/0/1">Mohammad Ali</a></p> Err codemadness.org 70 i 1813 Err codemadness.org 70 i 1814 <p>Education sector is adopting new technologies for both teaching and learning Err codemadness.org 70 i 1815 pedagogy. Augmented Reality (AR) is a new technology that can be used in the Err codemadness.org 70 i 1816 educational pedagogy to enhance the engagement with students. Students interact Err codemadness.org 70 i 1817 with AR-based educational material for more visualization and explanation. Err codemadness.org 70 i 1818 Therefore, the use of AR in education is becoming more popular. However, most Err codemadness.org 70 i 1819 researches narrate the use of AR technologies in the field of English, Maths, Err codemadness.org 70 i 1820 Science, Culture, Arts, and History education but the absence of ethical Err codemadness.org 70 i 1821 education is visible. In our paper, we design the system and develop an Err codemadness.org 70 i 1822 AR-based mobile game model in the field of Ethical education for pre-primary Err codemadness.org 70 i 1823 students. Students from pre-primary require more interactive lessons than Err codemadness.org 70 i 1824 theoretical concepts. So, we use AR technology to develop a game which offers Err codemadness.org 70 i 1825 interactive procedures where students can learn with fun and engage with the Err codemadness.org 70 i 1826 context. Finally, we develop a prototype that works with our research Err codemadness.org 70 i 1827 objective. We conclude our paper with future works. Err codemadness.org 70 i 1828 </p> Err codemadness.org 70 i 1829 Err codemadness.org 70 i 1830 Err codemadness.org 70 i 1831 Err codemadness.org 70 i 1832 Distance Invariant Sparse Autoencoder for Wireless Signal Strength Mapping. (arXiv:2010.15347v1 [eess.SP]) Err codemadness.org 70 i 1833 http://fr.arxiv.org/abs/2010.15347 Err codemadness.org 70 i 1834 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Miyagusuku_R/0/1/0/all/0/1">Renato Miyagusuku</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ozaki_K/0/1/0/all/0/1">Koichi Ozaki</a></p> Err codemadness.org 70 i 1835 Err codemadness.org 70 i 1836 <p>Wireless signal strength based localization can enable robust localization Err codemadness.org 70 i 1837 for robots using inexpensive sensors. For this, a location-to-signal-strength Err codemadness.org 70 i 1838 map has to be learned for each access point in the environment. Due to the Err codemadness.org 70 i 1839 ubiquity of Wireless networks in most environments, this can result in tens or Err codemadness.org 70 i 1840 hundreds of maps. To reduce the dimensionality of this problem, we employ Err codemadness.org 70 i 1841 autoencoders, which are a popular unsupervised approach for feature extraction Err codemadness.org 70 i 1842 and data compression. In particular, we propose the use of sparse autoencoders Err codemadness.org 70 i 1843 that learn latent spaces that preserve the relative distance between inputs. Err codemadness.org 70 i 1844 Distance invariance between input and latent spaces allows our system to Err codemadness.org 70 i 1845 successfully learn compact representations that allow precise data Err codemadness.org 70 i 1846 reconstruction but also have a low impact on localization performance when Err codemadness.org 70 i 1847 using maps from the latent space rather than the input space. We demonstrate Err codemadness.org 70 i 1848 the feasibility of our approach by performing experiments in outdoor Err codemadness.org 70 i 1849 environments. Err codemadness.org 70 i 1850 </p> Err codemadness.org 70 i 1851 Err codemadness.org 70 i 1852 Err codemadness.org 70 i 1853 Err codemadness.org 70 i 1854 A Hybrid Position/Force Controller for Joint Robots. (arXiv:2010.15350v1 [cs.RO]) Err codemadness.org 70 i 1855 http://fr.arxiv.org/abs/2010.15350 Err codemadness.org 70 i 1856 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Xie_S/0/1/0/all/0/1">Shengwen Xie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ren_J/0/1/0/all/0/1">Juan Ren</a></p> Err codemadness.org 70 i 1857 Err codemadness.org 70 i 1858 <p>In this paper, we present a hybrid position/force controller for operating Err codemadness.org 70 i 1859 joint robots. The hybrid controller has two goals---motion tracking and force Err codemadness.org 70 i 1860 regulating. As long as these two goals are not mutually exclusive, they can be Err codemadness.org 70 i 1861 decoupled in some way. In this work, we make use of the smooth and invertible Err codemadness.org 70 i 1862 mapping from joint space to task space to decouple the two control goals and Err codemadness.org 70 i 1863 design controllers separately. The traditional motion controller in task space Err codemadness.org 70 i 1864 is used for motion control, while the force controller is designed through Err codemadness.org 70 i 1865 manipulating the desired trajectory to regulate the force indirectly. Two case Err codemadness.org 70 i 1866 studies---contour tracking/polishing surfaces and grabbing boxes with two Err codemadness.org 70 i 1867 robotic arms---are presented to show the efficacy of the hybrid controller, and Err codemadness.org 70 i 1868 simulations with physics engines are carried out to validate the efficacy of Err codemadness.org 70 i 1869 the proposed method. Err codemadness.org 70 i 1870 </p> Err codemadness.org 70 i 1871 Err codemadness.org 70 i 1872 Err codemadness.org 70 i 1873 Err codemadness.org 70 i 1874 An automated and multi-parametric algorithm for objective analysis of meibography images. (arXiv:2010.15352v1 [eess.IV]) Err codemadness.org 70 i 1875 http://fr.arxiv.org/abs/2010.15352 Err codemadness.org 70 i 1876 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Xiao_P/0/1/0/all/0/1">Peng Xiao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Luo_Z/0/1/0/all/0/1">Zhongzhou Luo</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Deng_Y/0/1/0/all/0/1">Yuqing Deng</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wang_G/0/1/0/all/0/1">Gengyuan Wang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Yuan_J/0/1/0/all/0/1">Jin Yuan</a></p> Err codemadness.org 70 i 1877 Err codemadness.org 70 i 1878 <p>Meibography is a non-contact imaging technique used by ophthalmologists to Err codemadness.org 70 i 1879 assist in the evaluation and diagnosis of meibomian gland dysfunction (MGD). Err codemadness.org 70 i 1880 While artificial qualitative analysis of meibography images could lead to low Err codemadness.org 70 i 1881 repeatability and efficiency and multi-parametric analysis is demanding to Err codemadness.org 70 i 1882 offer more comprehensive information in discovering subtle changes of meibomian Err codemadness.org 70 i 1883 glands during MGD progression, we developed an automated and multi-parametric Err codemadness.org 70 i 1884 algorithm for objective and quantitative analysis of meibography images. The Err codemadness.org 70 i 1885 full architecture of the algorithm can be divided into three steps: (1) Err codemadness.org 70 i 1886 segmentation of the tarsal conjunctiva area as the region of interest (ROI); Err codemadness.org 70 i 1887 (2) segmentation and identification of glands within the ROI; and (3) Err codemadness.org 70 i 1888 quantitative multi-parametric analysis including newly defined gland diameter Err codemadness.org 70 i 1889 deformation index (DI), gland tortuosity index (TI), and glands signal index Err codemadness.org 70 i 1890 (SI). To evaluate the performance of the automated algorithm, the similarity Err codemadness.org 70 i 1891 index (k) and the segmentation error including the false positive rate (r_P) Err codemadness.org 70 i 1892 and the false negative rate (r_N) are calculated between the manually defined Err codemadness.org 70 i 1893 ground truth and the automatic segmentations of both the ROI and meibomian Err codemadness.org 70 i 1894 glands of 15 typical meibography images. The feasibility of the algorithm is Err codemadness.org 70 i 1895 demonstrated in analyzing typical meibograhy images. Err codemadness.org 70 i 1896 </p> Err codemadness.org 70 i 1897 Err codemadness.org 70 i 1898 Err codemadness.org 70 i 1899 Err codemadness.org 70 i 1900 Domain decomposition and partitioning methods for mixed finite element discretizations of the Biot system of poroelasticity. (arXiv:2010.15353v1 [math.NA]) Err codemadness.org 70 i 1901 http://fr.arxiv.org/abs/2010.15353 Err codemadness.org 70 i 1902 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Jayadharan_M/0/1/0/all/0/1">Manu Jayadharan</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Khattatov_E/0/1/0/all/0/1">Eldar Khattatov</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Yotov_I/0/1/0/all/0/1">Ivan Yotov</a></p> Err codemadness.org 70 i 1903 Err codemadness.org 70 i 1904 <p>We develop non-overlapping domain decomposition methods for the Biot system Err codemadness.org 70 i 1905 of poroelasticity in a mixed form. The solid deformation is modeled with a Err codemadness.org 70 i 1906 mixed three-field formulation with weak stress symmetry. The fluid flow is Err codemadness.org 70 i 1907 modeled with a mixed Darcy formulation. We introduce displacement and pressure Err codemadness.org 70 i 1908 Lagrange multipliers on the subdomain interfaces to impose weakly continuity of Err codemadness.org 70 i 1909 normal stress and normal velocity, respectively. The global problem is reduced Err codemadness.org 70 i 1910 to an interface problem for the Lagrange multipliers, which is solved by a Err codemadness.org 70 i 1911 Krylov space iterative method. We study both monolithic and split methods. In Err codemadness.org 70 i 1912 the monolithic method, a coupled displacement-pressure interface problem is Err codemadness.org 70 i 1913 solved, with each iteration requiring the solution of local Biot problems. We Err codemadness.org 70 i 1914 show that the resulting interface operator is positive definite and analyze the Err codemadness.org 70 i 1915 convergence of the iteration. We further study drained split and fixed stress Err codemadness.org 70 i 1916 Biot splittings, in which case we solve separate interface problems requiring Err codemadness.org 70 i 1917 elasticity and Darcy solves. We analyze the stability of the split Err codemadness.org 70 i 1918 formulations. Numerical experiments are presented to illustrate the convergence Err codemadness.org 70 i 1919 of the domain decomposition methods and compare their accuracy and efficiency. Err codemadness.org 70 i 1920 </p> Err codemadness.org 70 i 1921 Err codemadness.org 70 i 1922 Err codemadness.org 70 i 1923 Err codemadness.org 70 i 1924 Reconfigurable Intelligent Surface Aided Secure Transmission: Outage-Constrained Energy-Efficiency Maximization. (arXiv:2010.15354v1 [cs.IT]) Err codemadness.org 70 i 1925 http://fr.arxiv.org/abs/2010.15354 Err codemadness.org 70 i 1926 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Z/0/1/0/all/0/1">Zongze Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shuai Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wen_M/0/1/0/all/0/1">Miaowen Wen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_Y/0/1/0/all/0/1">Yik-Chung Wu</a></p> Err codemadness.org 70 i 1927 Err codemadness.org 70 i 1928 <p>Reconfigurable intelligent surface (RIS) has the potential to significantly Err codemadness.org 70 i 1929 enhance the network secure transmission performance by reconfiguring the Err codemadness.org 70 i 1930 wireless propagation environment. However, due to the passive nature of Err codemadness.org 70 i 1931 eavesdroppers and the cascaded channel brought by the RIS, the eavesdroppers' Err codemadness.org 70 i 1932 channel state information is imperfectly obtained at the base station. Under Err codemadness.org 70 i 1933 the channel uncertainty, the optimal phase-shift, power allocation, and Err codemadness.org 70 i 1934 transmission rate design for secure transmission is currently unknown due to Err codemadness.org 70 i 1935 the difficulty of handling the probabilistic constraint with coupled variables. Err codemadness.org 70 i 1936 To fill this gap, this paper formulates a problem of energy-efficient secure Err codemadness.org 70 i 1937 transmission design while incorporating the probabilistic constraint. By Err codemadness.org 70 i 1938 transforming the probabilistic constraint and decoupling variables, the secure Err codemadness.org 70 i 1939 energy efficiency maximization problem can be solved via alternatively Err codemadness.org 70 i 1940 executing difference-of-convex programming and semidefinite relaxation Err codemadness.org 70 i 1941 technique. To scale the solution to massive antennas and reflecting elements Err codemadness.org 70 i 1942 scenario, a fast first-order algorithm with low complexity is further proposed. Err codemadness.org 70 i 1943 Simulation results show that the proposed first-order algorithm achieves Err codemadness.org 70 i 1944 identical performance to the conventional method but saves at least two orders Err codemadness.org 70 i 1945 of magnitude in computation time. Moreover, the resultant RIS aided secure Err codemadness.org 70 i 1946 transmission significantly improves the energy efficiency compared to baseline Err codemadness.org 70 i 1947 schemes of random phase-shift, fixed phase-shift, and RIS ignoring CSI Err codemadness.org 70 i 1948 uncertainty. Err codemadness.org 70 i 1949 </p> Err codemadness.org 70 i 1950 Err codemadness.org 70 i 1951 Err codemadness.org 70 i 1952 Err codemadness.org 70 i 1953 Financial ticket intelligent recognition system based on deep learning. (arXiv:2010.15356v1 [cs.LG]) Err codemadness.org 70 i 1954 http://fr.arxiv.org/abs/2010.15356 Err codemadness.org 70 i 1955 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tian_F/0/1/0/all/0/1">Fukang Tian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_H/0/1/0/all/0/1">Haiyu Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xu_B/0/1/0/all/0/1">Bo Xu</a></p> Err codemadness.org 70 i 1956 Err codemadness.org 70 i 1957 <p>Facing the rapid growth in the issuance of financial tickets (or bills, Err codemadness.org 70 i 1958 invoices etc.), traditional manual invoice reimbursement and financial Err codemadness.org 70 i 1959 accounting system are imposing an increasing burden on financial accountants Err codemadness.org 70 i 1960 and consuming excessive manpower. To solve this problem, we proposes an Err codemadness.org 70 i 1961 iterative self-learning Framework of Financial Ticket intelligent Recognition Err codemadness.org 70 i 1962 System (FFTRS), which can support the fast iterative updating and extensibility Err codemadness.org 70 i 1963 of the algorithm model, which are the fundamental requirements for a practical Err codemadness.org 70 i 1964 financial accounting system. In addition, we designed a simple yet efficient Err codemadness.org 70 i 1965 Financial Ticket Faster Detection network (FTFDNet) and an intelligent data Err codemadness.org 70 i 1966 warehouse of financial ticket are designed to strengthen its efficiency and Err codemadness.org 70 i 1967 performance. At present, the system can recognize 194 kinds of financial Err codemadness.org 70 i 1968 tickets and has an automatic iterative optimization mechanism, which means, Err codemadness.org 70 i 1969 with the increase of application time, the types of tickets supported by the Err codemadness.org 70 i 1970 system will continue to increase, and the accuracy of recognition will continue Err codemadness.org 70 i 1971 to improve. Experimental results show that the average recognition accuracy of Err codemadness.org 70 i 1972 the system is 97.07%, and the average running time for a single ticket is Err codemadness.org 70 i 1973 175.67ms. The practical value of the system has been tested in a commercial Err codemadness.org 70 i 1974 application, which makes a beneficial attempt for the deep learning technology Err codemadness.org 70 i 1975 in financial accounting work. Err codemadness.org 70 i 1976 </p> Err codemadness.org 70 i 1977 Err codemadness.org 70 i 1978 Err codemadness.org 70 i 1979 Err codemadness.org 70 i 1980 A stochastic optimization algorithm for analyzing planar central and balanced configurations in the $n$-body problem. (arXiv:2010.15358v1 [math.DS]) Err codemadness.org 70 i 1981 http://fr.arxiv.org/abs/2010.15358 Err codemadness.org 70 i 1982 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Doicu_A/0/1/0/all/0/1">Alexandru Doicu</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Zhao_L/0/1/0/all/0/1">Lei Zhao</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Doicu_A/0/1/0/all/0/1">Adrian Doicu</a></p> Err codemadness.org 70 i 1983 Err codemadness.org 70 i 1984 <p>A stochastic optimization algorithm for analyzing planar central and balanced Err codemadness.org 70 i 1985 configurations in the $n$-body problem is presented. We find a comprehensive Err codemadness.org 70 i 1986 list of equal mass central configurations satisfying the Morse equality up to Err codemadness.org 70 i 1987 $n=12$. We show some exemplary balanced configurations in the case $n=5$, as Err codemadness.org 70 i 1988 well as some balanced configurations without any axis of symmetry in the cases Err codemadness.org 70 i 1989 $n=4$ and $n=10$. Err codemadness.org 70 i 1990 </p> Err codemadness.org 70 i 1991 Err codemadness.org 70 i 1992 Err codemadness.org 70 i 1993 Err codemadness.org 70 i 1994 Combining Self-Training and Self-Supervised Learning for Unsupervised Disfluency Detection. (arXiv:2010.15360v1 [cs.CL]) Err codemadness.org 70 i 1995 http://fr.arxiv.org/abs/2010.15360 Err codemadness.org 70 i 1996 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shaolei Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1">Zhongyuan Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Che_W/0/1/0/all/0/1">Wanxiang Che</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1">Ting Liu</a></p> Err codemadness.org 70 i 1997 Err codemadness.org 70 i 1998 <p>Most existing approaches to disfluency detection heavily rely on Err codemadness.org 70 i 1999 human-annotated corpora, which is expensive to obtain in practice. There have Err codemadness.org 70 i 2000 been several proposals to alleviate this issue with, for instance, Err codemadness.org 70 i 2001 self-supervised learning techniques, but they still require human-annotated Err codemadness.org 70 i 2002 corpora. In this work, we explore the unsupervised learning paradigm which can Err codemadness.org 70 i 2003 potentially work with unlabeled text corpora that are cheaper and easier to Err codemadness.org 70 i 2004 obtain. Our model builds upon the recent work on Noisy Student Training, a Err codemadness.org 70 i 2005 semi-supervised learning approach that extends the idea of self-training. Err codemadness.org 70 i 2006 Experimental results on the commonly used English Switchboard test set show Err codemadness.org 70 i 2007 that our approach achieves competitive performance compared to the previous Err codemadness.org 70 i 2008 state-of-the-art supervised systems using contextualized word embeddings (e.g. Err codemadness.org 70 i 2009 BERT and ELECTRA). Err codemadness.org 70 i 2010 </p> Err codemadness.org 70 i 2011 Err codemadness.org 70 i 2012 Err codemadness.org 70 i 2013 Err codemadness.org 70 i 2014 Model-Agnostic Counterfactual Reasoning for Eliminating Popularity Bias in Recommender System. (arXiv:2010.15363v1 [cs.IR]) Err codemadness.org 70 i 2015 http://fr.arxiv.org/abs/2010.15363 Err codemadness.org 70 i 2016 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_T/0/1/0/all/0/1">Tianxin Wei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_F/0/1/0/all/0/1">Fuli Feng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1">Jiawei Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shi_C/0/1/0/all/0/1">Chufeng Shi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_Z/0/1/0/all/0/1">Ziwei Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yi_J/0/1/0/all/0/1">Jinfeng Yi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_X/0/1/0/all/0/1">Xiangnan He</a></p> Err codemadness.org 70 i 2017 Err codemadness.org 70 i 2018 <p>The general aim of the recommender system is to provide personalized Err codemadness.org 70 i 2019 suggestions to users, which is opposed to suggesting popular items. However, Err codemadness.org 70 i 2020 the normal training paradigm, i.e., fitting a recommender model to recover the Err codemadness.org 70 i 2021 user behavior data with pointwise or pairwise loss, makes the model biased Err codemadness.org 70 i 2022 towards popular items. This results in the terrible Matthew effect, making Err codemadness.org 70 i 2023 popular items be more frequently recommended and become even more popular. Err codemadness.org 70 i 2024 Existing work addresses this issue with Inverse Propensity Weighting (IPW), Err codemadness.org 70 i 2025 which decreases the impact of popular items on the training and increases the Err codemadness.org 70 i 2026 impact of long-tail items. Although theoretically sound, IPW methods are highly Err codemadness.org 70 i 2027 sensitive to the weighting strategy, which is notoriously difficult to tune. Err codemadness.org 70 i 2028 </p> Err codemadness.org 70 i 2029 <p>In this work, we explore the popularity bias issue from a novel and Err codemadness.org 70 i 2030 fundamental perspective -- cause-effect. We identify that popularity bias lies Err codemadness.org 70 i 2031 in the direct effect from the item node to the ranking score, such that an Err codemadness.org 70 i 2032 item's intrinsic property is the cause of mistakenly assigning it a higher Err codemadness.org 70 i 2033 ranking score. To eliminate popularity bias, it is essential to answer the Err codemadness.org 70 i 2034 counterfactual question that what the ranking score would be if the model only Err codemadness.org 70 i 2035 uses item property. To this end, we formulate a causal graph to describe the Err codemadness.org 70 i 2036 important cause-effect relations in the recommendation process. During Err codemadness.org 70 i 2037 training, we perform multi-task learning to achieve the contribution of each Err codemadness.org 70 i 2038 cause; during testing, we perform counterfactual inference to remove the effect Err codemadness.org 70 i 2039 of item popularity. Remarkably, our solution amends the learning process of Err codemadness.org 70 i 2040 recommendation which is agnostic to a wide range of models. We demonstrate it Err codemadness.org 70 i 2041 on Matrix Factorization (MF) and LightGCN, which are representative of the Err codemadness.org 70 i 2042 conventional and state-of-the-art model for collaborative filtering. Err codemadness.org 70 i 2043 Experiments on five real-world datasets demonstrate the effectiveness of our Err codemadness.org 70 i 2044 method. Err codemadness.org 70 i 2045 </p> Err codemadness.org 70 i 2046 Err codemadness.org 70 i 2047 Err codemadness.org 70 i 2048 Err codemadness.org 70 i 2049 Online State-Time Trajectory Planning Using Timed-ESDF in Highly Dynamic Environments. (arXiv:2010.15364v1 [cs.RO]) Err codemadness.org 70 i 2050 http://fr.arxiv.org/abs/2010.15364 Err codemadness.org 70 i 2051 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhu_D/0/1/0/all/0/1">Delong Zhu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_T/0/1/0/all/0/1">Tong Zhou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lin_J/0/1/0/all/0/1">Jiahui Lin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fang_Y/0/1/0/all/0/1">Yuqi Fang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Meng_M/0/1/0/all/0/1">Max Q.-H. Meng</a></p> Err codemadness.org 70 i 2052 Err codemadness.org 70 i 2053 <p>Online state-time trajectory planning in highly dynamic environments remains Err codemadness.org 70 i 2054 an unsolved problem due to the unpredictable motions of moving obstacles and Err codemadness.org 70 i 2055 the curse of dimensionality from the state-time space. Existing state-time Err codemadness.org 70 i 2056 planners are typically implemented based on randomized sampling approaches or Err codemadness.org 70 i 2057 path searching on discretized state graph. The smoothness, path clearance, and Err codemadness.org 70 i 2058 planning efficiency of these planners are usually not satisfying. In this work, Err codemadness.org 70 i 2059 we propose a gradient-based planner over the state-time space for online Err codemadness.org 70 i 2060 trajectory generation in highly dynamic environments. To enable the Err codemadness.org 70 i 2061 gradient-based optimization, we propose a Timed-ESDT that supports distance and Err codemadness.org 70 i 2062 gradient queries with state-time keys. Based on the Timed-ESDT, we also define Err codemadness.org 70 i 2063 a smooth prior and an obstacle likelihood function that is compatible with the Err codemadness.org 70 i 2064 state-time space. The trajectory planning is then formulated to a MAP problem Err codemadness.org 70 i 2065 and solved by an efficient numerical optimizer. Moreover, to improve the Err codemadness.org 70 i 2066 optimality of the planner, we also define a state-time graph and then conduct Err codemadness.org 70 i 2067 path searching on it to find a better initialization for the optimizer. By Err codemadness.org 70 i 2068 integrating the graph searching, the planning quality is significantly Err codemadness.org 70 i 2069 improved. Experiment results on simulated and benchmark datasets show that our Err codemadness.org 70 i 2070 planner can outperform the state-of-the-art methods, demonstrating its Err codemadness.org 70 i 2071 significant advantages over the traditional ones. Err codemadness.org 70 i 2072 </p> Err codemadness.org 70 i 2073 Err codemadness.org 70 i 2074 Err codemadness.org 70 i 2075 Err codemadness.org 70 i 2076 Infinite Time Solutions of Numerical Schemes for Advection Problems. (arXiv:2010.15365v1 [math.NA]) Err codemadness.org 70 i 2077 http://fr.arxiv.org/abs/2010.15365 Err codemadness.org 70 i 2078 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Biswas_A/0/1/0/all/0/1">Abhijit Biswas</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Seibold_B/0/1/0/all/0/1">Benjamin Seibold</a></p> Err codemadness.org 70 i 2079 Err codemadness.org 70 i 2080 <p>This paper addresses the question whether there are numerical schemes for Err codemadness.org 70 i 2081 constant-coefficient advection problems that can yield convergent solutions for Err codemadness.org 70 i 2082 an infinite time horizon. The motivation is that such methods may serve as Err codemadness.org 70 i 2083 building blocks for long-time accurate solutions in more complex Err codemadness.org 70 i 2084 advection-dominated problems. After establishing a new notion of convergence in Err codemadness.org 70 i 2085 an infinite time limit of numerical methods, we first show that linear methods Err codemadness.org 70 i 2086 cannot meet this convergence criterion. Then we present a new numerical Err codemadness.org 70 i 2087 methodology, based on a nonlinear jet scheme framework. We show that these Err codemadness.org 70 i 2088 methods do satisfy the new convergence criterion, thus establishing that Err codemadness.org 70 i 2089 numerical methods exist that converge on an infinite time horizon, and Err codemadness.org 70 i 2090 demonstrate the long-time accuracy gains incurred by this property. Err codemadness.org 70 i 2091 </p> Err codemadness.org 70 i 2092 Err codemadness.org 70 i 2093 Err codemadness.org 70 i 2094 Err codemadness.org 70 i 2095 Self-supervised Pre-training Reduces Label Permutation Instability of Speech Separation. (arXiv:2010.15366v1 [cs.SD]) Err codemadness.org 70 i 2096 http://fr.arxiv.org/abs/2010.15366 Err codemadness.org 70 i 2097 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Huang_S/0/1/0/all/0/1">Sung-Feng Huang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chuang_S/0/1/0/all/0/1">Shun-Po Chuang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_D/0/1/0/all/0/1">Da-Rong Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1">Yi-Chen Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_G/0/1/0/all/0/1">Gene-Ping Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1">Hung-yi Lee</a></p> Err codemadness.org 70 i 2098 Err codemadness.org 70 i 2099 <p>Speech separation has been well-developed while there are still problems Err codemadness.org 70 i 2100 waiting to be solved. The main problem we focus on in this paper is the Err codemadness.org 70 i 2101 frequent label permutation switching of permutation invariant training (PIT). Err codemadness.org 70 i 2102 For N-speaker separation, there would be N! possible label permutations. How to Err codemadness.org 70 i 2103 stably select correct label permutations is a long-standing problem. In this Err codemadness.org 70 i 2104 paper, we utilize self-supervised pre-training to stabilize the label Err codemadness.org 70 i 2105 permutations. Among several types of self-supervised tasks, speech enhancement Err codemadness.org 70 i 2106 based pre-training tasks show significant effectiveness in our experiments. Err codemadness.org 70 i 2107 When using off-the-shelf pre-trained models, training duration could be Err codemadness.org 70 i 2108 shortened to one-third to two-thirds. Furthermore, even taking pre-training Err codemadness.org 70 i 2109 time into account, the entire training process could still be shorter without a Err codemadness.org 70 i 2110 performance drop when using a larger batch size. Err codemadness.org 70 i 2111 </p> Err codemadness.org 70 i 2112 Err codemadness.org 70 i 2113 Err codemadness.org 70 i 2114 Err codemadness.org 70 i 2115 Learning Centric Wireless Resource Allocation for Edge Computing: Algorithm and Experiment. (arXiv:2010.15371v1 [cs.IT]) Err codemadness.org 70 i 2116 http://fr.arxiv.org/abs/2010.15371 Err codemadness.org 70 i 2117 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_L/0/1/0/all/0/1">Liangkai Zhou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hong_Y/0/1/0/all/0/1">Yuncong Hong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shuai Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Han_R/0/1/0/all/0/1">Ruihua Han</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_D/0/1/0/all/0/1">Dachuan Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_R/0/1/0/all/0/1">Rui Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hao_Q/0/1/0/all/0/1">Qi Hao</a></p> Err codemadness.org 70 i 2118 Err codemadness.org 70 i 2119 <p>Edge intelligence is an emerging network architecture that integrates Err codemadness.org 70 i 2120 sensing, communication, computing components, and supports various machine Err codemadness.org 70 i 2121 learning applications, where a fundamental communication question is: how to Err codemadness.org 70 i 2122 allocate the limited wireless resources (such as time, energy) to the Err codemadness.org 70 i 2123 simultaneous model training of heterogeneous learning tasks? Existing methods Err codemadness.org 70 i 2124 ignore two important facts: 1) different models have heterogeneous demands on Err codemadness.org 70 i 2125 training data; 2) there is a mismatch between the simulated environment and the Err codemadness.org 70 i 2126 real-world environment. As a result, they could lead to low learning Err codemadness.org 70 i 2127 performance in practice. This paper proposes the learning centric wireless Err codemadness.org 70 i 2128 resource allocation (LCWRA) scheme that maximizes the worst learning Err codemadness.org 70 i 2129 performance of multiple classification tasks. Analysis shows that the optimal Err codemadness.org 70 i 2130 transmission time has an inverse power relationship with respect to the Err codemadness.org 70 i 2131 classification error. Finally, both simulation and experimental results are Err codemadness.org 70 i 2132 provided to verify the performance of the proposed LCWRA scheme and its Err codemadness.org 70 i 2133 robustness in real implementation. Err codemadness.org 70 i 2134 </p> Err codemadness.org 70 i 2135 Err codemadness.org 70 i 2136 Err codemadness.org 70 i 2137 Err codemadness.org 70 i 2138 Learning Personalized Discretionary Lane-Change Initiation for Fully Autonomous Driving Based on Reinforcement Learning. (arXiv:2010.15372v1 [cs.HC]) Err codemadness.org 70 i 2139 http://fr.arxiv.org/abs/2010.15372 Err codemadness.org 70 i 2140 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1">Zhuoxi Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1">Zheng Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_B/0/1/0/all/0/1">Bo Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nakano_K/0/1/0/all/0/1">Kimihiko Nakano</a></p> Err codemadness.org 70 i 2141 Err codemadness.org 70 i 2142 <p>In this article, the authors present a novel method to learn the personalized Err codemadness.org 70 i 2143 tactic of discretionary lane-change initiation for fully autonomous vehicles Err codemadness.org 70 i 2144 through human-computer interactions. Instead of learning from human-driving Err codemadness.org 70 i 2145 demonstrations, a reinforcement learning technique is employed to learn how to Err codemadness.org 70 i 2146 initiate lane changes from traffic context, the action of a self-driving Err codemadness.org 70 i 2147 vehicle, and in-vehicle user feedback. The proposed offline algorithm rewards Err codemadness.org 70 i 2148 the action-selection strategy when the user gives positive feedback and Err codemadness.org 70 i 2149 penalizes it when negative feedback. Also, a multi-dimensional driving scenario Err codemadness.org 70 i 2150 is considered to represent a more realistic lane-change trade-off. The results Err codemadness.org 70 i 2151 show that the lane-change initiation model obtained by this method can Err codemadness.org 70 i 2152 reproduce the personal lane-change tactic, and the performance of the Err codemadness.org 70 i 2153 customized models (average accuracy 86.1%) is much better than that of the Err codemadness.org 70 i 2154 non-customized models (average accuracy 75.7%). This method allows continuous Err codemadness.org 70 i 2155 improvement of customization for users during fully autonomous driving even Err codemadness.org 70 i 2156 without human-driving experience, which will significantly enhance the user Err codemadness.org 70 i 2157 acceptance of high-level autonomy of self-driving vehicles. Err codemadness.org 70 i 2158 </p> Err codemadness.org 70 i 2159 Err codemadness.org 70 i 2160 Err codemadness.org 70 i 2161 Err codemadness.org 70 i 2162 Solving Sparse Linear Inverse Problems in Communication Systems: A Deep Learning Approach With Adaptive Depth. (arXiv:2010.15376v1 [eess.SP]) Err codemadness.org 70 i 2163 http://fr.arxiv.org/abs/2010.15376 Err codemadness.org 70 i 2164 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Chen_W/0/1/0/all/0/1">Wei Chen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_B/0/1/0/all/0/1">Bowen Zhang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Jin_S/0/1/0/all/0/1">Shi Jin</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ai_B/0/1/0/all/0/1">Bo Ai</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhong_Z/0/1/0/all/0/1">Zhangdui Zhong</a></p> Err codemadness.org 70 i 2165 Err codemadness.org 70 i 2166 <p>Sparse signal recovery problems from noisy linear measurements appear in many Err codemadness.org 70 i 2167 areas of wireless communications. In recent years, deep learning (DL) based Err codemadness.org 70 i 2168 approaches have attracted interests of researchers to solve the sparse linear Err codemadness.org 70 i 2169 inverse problem by unfolding iterative algorithms as neural networks. Err codemadness.org 70 i 2170 Typically, research concerning DL assume a fixed number of network layers. Err codemadness.org 70 i 2171 However, it ignores a key character in traditional iterative algorithms, where Err codemadness.org 70 i 2172 the number of iterations required for convergence changes with varying sparsity Err codemadness.org 70 i 2173 levels. By investigating on the projected gradient descent, we unveil the Err codemadness.org 70 i 2174 drawbacks of the existing DL methods with fixed depth. Then we propose an Err codemadness.org 70 i 2175 end-to-end trainable DL architecture, which involves an extra halting score at Err codemadness.org 70 i 2176 each layer. Therefore, the proposed method learns how many layers to execute to Err codemadness.org 70 i 2177 emit an output, and the network depth is dynamically adjusted for each task in Err codemadness.org 70 i 2178 the inference phase. We conduct experiments using both synthetic data and Err codemadness.org 70 i 2179 applications including random access in massive MTC and massive MIMO channel Err codemadness.org 70 i 2180 estimation, and the results demonstrate the improved efficiency for the Err codemadness.org 70 i 2181 proposed approach. Err codemadness.org 70 i 2182 </p> Err codemadness.org 70 i 2183 Err codemadness.org 70 i 2184 Err codemadness.org 70 i 2185 Err codemadness.org 70 i 2186 Supervised sequential pattern mining of event sequences in sport to identify important patterns of play: an application to rugby union. (arXiv:2010.15377v1 [cs.LG]) Err codemadness.org 70 i 2187 http://fr.arxiv.org/abs/2010.15377 Err codemadness.org 70 i 2188 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bunker_R/0/1/0/all/0/1">Rory Bunker</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fujii_K/0/1/0/all/0/1">Keisuke Fujii</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hanada_H/0/1/0/all/0/1">Hiroyuki Hanada</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Takeuchi_I/0/1/0/all/0/1">Ichiro Takeuchi</a></p> Err codemadness.org 70 i 2189 Err codemadness.org 70 i 2190 <p>Given a set of sequences comprised of time-ordered events, sequential pattern Err codemadness.org 70 i 2191 mining is useful to identify frequent sub-sequences from different sequences or Err codemadness.org 70 i 2192 within the same sequence. However, in sport, these techniques cannot determine Err codemadness.org 70 i 2193 the importance of particular patterns of play to good or bad outcomes, which is Err codemadness.org 70 i 2194 often of greater interest to coaches. In this study, we apply a supervised Err codemadness.org 70 i 2195 sequential pattern mining algorithm called safe pattern pruning (SPP) to 490 Err codemadness.org 70 i 2196 labelled event sequences representing passages of play from one rugby team's Err codemadness.org 70 i 2197 matches from the 2018 Japan Top League, and then evaluate the importance of the Err codemadness.org 70 i 2198 obtained sub-sequences to points-scoring outcomes. Linebreaks, successful Err codemadness.org 70 i 2199 lineouts, regained kicks in play, repeated phase-breakdown play, and failed Err codemadness.org 70 i 2200 opposition exit plays were identified as important patterns of play for the Err codemadness.org 70 i 2201 team scoring. When sequences were labelled with points scoring outcomes for the Err codemadness.org 70 i 2202 opposition teams, opposition team linebreaks, errors made by the team, Err codemadness.org 70 i 2203 opposition team lineouts, and repeated phase-breakdown play by the opposition Err codemadness.org 70 i 2204 team were identified as important patterns of play for the opposition team Err codemadness.org 70 i 2205 scoring. By virtue of its supervised nature and pruning properties, SPP Err codemadness.org 70 i 2206 obtained a greater variety of generally more sophisticated patterns than the Err codemadness.org 70 i 2207 well-known unsupervised PrefixSpan algorithm. Err codemadness.org 70 i 2208 </p> Err codemadness.org 70 i 2209 Err codemadness.org 70 i 2210 Err codemadness.org 70 i 2211 Err codemadness.org 70 i 2212 Collaborative Method for Incremental Learning on Classification and Generation. (arXiv:2010.15378v1 [cs.CV]) Err codemadness.org 70 i 2213 http://fr.arxiv.org/abs/2010.15378 Err codemadness.org 70 i 2214 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_B/0/1/0/all/0/1">Byungju Kim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_J/0/1/0/all/0/1">Jaeyoung Lee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_K/0/1/0/all/0/1">Kyungsu Kim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_S/0/1/0/all/0/1">Sungjin Kim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1">Junmo Kim</a></p> Err codemadness.org 70 i 2215 Err codemadness.org 70 i 2216 <p>Although well-trained deep neural networks have shown remarkable performance Err codemadness.org 70 i 2217 on numerous tasks, they rapidly forget what they have learned as soon as they Err codemadness.org 70 i 2218 begin to learn with additional data with the previous data stop being provided. Err codemadness.org 70 i 2219 In this paper, we introduce a novel algorithm, Incremental Class Learning with Err codemadness.org 70 i 2220 Attribute Sharing (ICLAS), for incremental class learning with deep neural Err codemadness.org 70 i 2221 networks. As one of its component, we also introduce a generative model, Err codemadness.org 70 i 2222 incGAN, which can generate images with increased variety compared with the Err codemadness.org 70 i 2223 training data. Under challenging environment of data deficiency, ICLAS Err codemadness.org 70 i 2224 incrementally trains classification and the generation networks. Since ICLAS Err codemadness.org 70 i 2225 trains both networks, our algorithm can perform multiple times of incremental Err codemadness.org 70 i 2226 class learning. The experiments on MNIST dataset demonstrate the advantages of Err codemadness.org 70 i 2227 our algorithm. Err codemadness.org 70 i 2228 </p> Err codemadness.org 70 i 2229 Err codemadness.org 70 i 2230 Err codemadness.org 70 i 2231 Err codemadness.org 70 i 2232 The Performance Analysis of Generalized Margin Maximizer (GMM) on Separable Data. (arXiv:2010.15379v1 [stat.ML]) Err codemadness.org 70 i 2233 http://fr.arxiv.org/abs/2010.15379 Err codemadness.org 70 i 2234 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Salehi_F/0/1/0/all/0/1">Fariborz Salehi</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Abbasi_E/0/1/0/all/0/1">Ehsan Abbasi</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Hassibi_B/0/1/0/all/0/1">Babak Hassibi</a></p> Err codemadness.org 70 i 2235 Err codemadness.org 70 i 2236 <p>Logistic models are commonly used for binary classification tasks. The Err codemadness.org 70 i 2237 success of such models has often been attributed to their connection to Err codemadness.org 70 i 2238 maximum-likelihood estimators. It has been shown that gradient descent Err codemadness.org 70 i 2239 algorithm, when applied on the logistic loss, converges to the max-margin Err codemadness.org 70 i 2240 classifier (a.k.a. hard-margin SVM). The performance of the max-margin Err codemadness.org 70 i 2241 classifier has been recently analyzed. Inspired by these results, in this Err codemadness.org 70 i 2242 paper, we present and study a more general setting, where the underlying Err codemadness.org 70 i 2243 parameters of the logistic model possess certain structures (sparse, Err codemadness.org 70 i 2244 block-sparse, low-rank, etc.) and introduce a more general framework (which is Err codemadness.org 70 i 2245 referred to as "Generalized Margin Maximizer", GMM). While classical max-margin Err codemadness.org 70 i 2246 classifiers minimize the $2$-norm of the parameter vector subject to linearly Err codemadness.org 70 i 2247 separating the data, GMM minimizes any arbitrary convex function of the Err codemadness.org 70 i 2248 parameter vector. We provide a precise analysis of the performance of GMM via Err codemadness.org 70 i 2249 the solution of a system of nonlinear equations. We also provide a detailed Err codemadness.org 70 i 2250 study for three special cases: ($1$) $\ell_2$-GMM that is the max-margin Err codemadness.org 70 i 2251 classifier, ($2$) $\ell_1$-GMM which encourages sparsity, and ($3$) Err codemadness.org 70 i 2252 $\ell_{\infty}$-GMM which is often used when the parameter vector has binary Err codemadness.org 70 i 2253 entries. Our theoretical results are validated by extensive simulation results Err codemadness.org 70 i 2254 across a range of parameter values, problem instances, and model structures. Err codemadness.org 70 i 2255 </p> Err codemadness.org 70 i 2256 Err codemadness.org 70 i 2257 Err codemadness.org 70 i 2258 Err codemadness.org 70 i 2259 Learning to Actively Learn: A Robust Approach. (arXiv:2010.15382v1 [cs.LG]) Err codemadness.org 70 i 2260 http://fr.arxiv.org/abs/2010.15382 Err codemadness.org 70 i 2261 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jifan Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jamieson_K/0/1/0/all/0/1">Kevin Jamieson</a></p> Err codemadness.org 70 i 2262 Err codemadness.org 70 i 2263 <p>This work proposes a procedure for designing algorithms for specific adaptive Err codemadness.org 70 i 2264 data collection tasks like active learning and pure-exploration multi-armed Err codemadness.org 70 i 2265 bandits. Unlike the design of traditional adaptive algorithms that rely on Err codemadness.org 70 i 2266 concentration of measure and careful analysis to justify the correctness and Err codemadness.org 70 i 2267 sample complexity of the procedure, our adaptive algorithm is learned via Err codemadness.org 70 i 2268 adversarial training over equivalence classes of problems derived from Err codemadness.org 70 i 2269 information theoretic lower bounds. In particular, a single adaptive learning Err codemadness.org 70 i 2270 algorithm is learned that competes with the best adaptive algorithm learned for Err codemadness.org 70 i 2271 each equivalence class. Our procedure takes as input just the available Err codemadness.org 70 i 2272 queries, set of hypotheses, loss function, and total query budget. This is in Err codemadness.org 70 i 2273 contrast to existing meta-learning work that learns an adaptive algorithm Err codemadness.org 70 i 2274 relative to an explicit, user-defined subset or prior distribution over Err codemadness.org 70 i 2275 problems which can be challenging to define and be mismatched to the instance Err codemadness.org 70 i 2276 encountered at test time. This work is particularly focused on the regime when Err codemadness.org 70 i 2277 the total query budget is very small, such as a few dozen, which is much Err codemadness.org 70 i 2278 smaller than those budgets typically considered by theoretically derived Err codemadness.org 70 i 2279 algorithms. We perform synthetic experiments to justify the stability and Err codemadness.org 70 i 2280 effectiveness of the training procedure, and then evaluate the method on tasks Err codemadness.org 70 i 2281 derived from real data including a noisy 20 Questions game and a joke Err codemadness.org 70 i 2282 recommendation task. Err codemadness.org 70 i 2283 </p> Err codemadness.org 70 i 2284 Err codemadness.org 70 i 2285 Err codemadness.org 70 i 2286 Err codemadness.org 70 i 2287 Prediction-Based Power Oversubscription in Cloud Platforms. (arXiv:2010.15388v1 [cs.DC]) Err codemadness.org 70 i 2288 http://fr.arxiv.org/abs/2010.15388 Err codemadness.org 70 i 2289 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kumbhare_A/0/1/0/all/0/1">Alok Kumbhare</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Azimi_R/0/1/0/all/0/1">Reza Azimi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Manousakis_I/0/1/0/all/0/1">Ioannis Manousakis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bonde_A/0/1/0/all/0/1">Anand Bonde</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frujeri_F/0/1/0/all/0/1">Felipe Frujeri</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mahalingam_N/0/1/0/all/0/1">Nithish Mahalingam</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Misra_P/0/1/0/all/0/1">Pulkit Misra</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Javadi_S/0/1/0/all/0/1">Seyyed Ahmad Javadi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Schroeder_B/0/1/0/all/0/1">Bianca Schroeder</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fontoura_M/0/1/0/all/0/1">Marcus Fontoura</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bianchini_R/0/1/0/all/0/1">Ricardo Bianchini</a></p> Err codemadness.org 70 i 2290 Err codemadness.org 70 i 2291 <p>Datacenter designers rely on conservative estimates of IT equipment power Err codemadness.org 70 i 2292 draw to provision resources. This leaves resources underutilized and requires Err codemadness.org 70 i 2293 more datacenters to be built. Prior work has used power capping to shave the Err codemadness.org 70 i 2294 rare power peaks and add more servers to the datacenter, thereby Err codemadness.org 70 i 2295 oversubscribing its resources and lowering capital costs. This works well when Err codemadness.org 70 i 2296 the workloads and their server placements are known. Unfortunately, these Err codemadness.org 70 i 2297 factors are unknown in public clouds, forcing providers to limit the Err codemadness.org 70 i 2298 oversubscription so that performance is never impacted. Err codemadness.org 70 i 2299 </p> Err codemadness.org 70 i 2300 <p>In this paper, we argue that providers can use predictions of workload Err codemadness.org 70 i 2301 performance criticality and virtual machine (VM) resource utilization to Err codemadness.org 70 i 2302 increase oversubscription. This poses many challenges, such as identifying the Err codemadness.org 70 i 2303 performance-critical workloads from black-box VMs, creating support for Err codemadness.org 70 i 2304 criticality-aware power management, and increasing oversubscription while Err codemadness.org 70 i 2305 limiting the impact of capping. We address these challenges for the hardware Err codemadness.org 70 i 2306 and software infrastructures of Microsoft Azure. The results show that we Err codemadness.org 70 i 2307 enable a 2x increase in oversubscription with minimum impact to critical Err codemadness.org 70 i 2308 workloads. Err codemadness.org 70 i 2309 </p> Err codemadness.org 70 i 2310 Err codemadness.org 70 i 2311 Err codemadness.org 70 i 2312 Err codemadness.org 70 i 2313 Learning Audio Embeddings with User Listening Data for Content-based Music Recommendation. (arXiv:2010.15389v1 [cs.SD]) Err codemadness.org 70 i 2314 http://fr.arxiv.org/abs/2010.15389 Err codemadness.org 70 i 2315 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_K/0/1/0/all/0/1">Ke Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liang_B/0/1/0/all/0/1">Beici Liang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ma_X/0/1/0/all/0/1">Xiaoshuan Ma</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gu_M/0/1/0/all/0/1">Minwei Gu</a></p> Err codemadness.org 70 i 2316 Err codemadness.org 70 i 2317 <p>Personalized recommendation on new track releases has always been a Err codemadness.org 70 i 2318 challenging problem in the music industry. To combat this problem, we first Err codemadness.org 70 i 2319 explore user listening history and demographics to construct a user embedding Err codemadness.org 70 i 2320 representing the user's music preference. With the user embedding and audio Err codemadness.org 70 i 2321 data from user's liked and disliked tracks, an audio embedding can be obtained Err codemadness.org 70 i 2322 for each track using metric learning with Siamese networks. For a new track, we Err codemadness.org 70 i 2323 can decide the best group of users to recommend by computing the similarity Err codemadness.org 70 i 2324 between the track's audio embedding and different user embeddings, Err codemadness.org 70 i 2325 respectively. The proposed system yields state-of-the-art performance on Err codemadness.org 70 i 2326 content-based music recommendation tested with millions of users and tracks. Err codemadness.org 70 i 2327 Also, we extract audio embeddings as features for music genre classification Err codemadness.org 70 i 2328 tasks. The results show the generalization ability of our audio embeddings. Err codemadness.org 70 i 2329 </p> Err codemadness.org 70 i 2330 Err codemadness.org 70 i 2331 Err codemadness.org 70 i 2332 Err codemadness.org 70 i 2333 Multitask Bandit Learning through Heterogeneous Feedback Aggregation. (arXiv:2010.15390v1 [cs.LG]) Err codemadness.org 70 i 2334 http://fr.arxiv.org/abs/2010.15390 Err codemadness.org 70 i 2335 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1">Zhi Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1">Chicheng Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_M/0/1/0/all/0/1">Manish Kumar Singh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Riek_L/0/1/0/all/0/1">Laurel D. Riek</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chaudhuri_K/0/1/0/all/0/1">Kamalika Chaudhuri</a></p> Err codemadness.org 70 i 2336 Err codemadness.org 70 i 2337 <p>In many real-world applications, multiple agents seek to learn how to perform Err codemadness.org 70 i 2338 highly related yet slightly different tasks in an online bandit learning Err codemadness.org 70 i 2339 protocol. We formulate this problem as the $\epsilon$-multi-player multi-armed Err codemadness.org 70 i 2340 bandit problem, in which a set of players concurrently interact with a set of Err codemadness.org 70 i 2341 arms, and for each arm, the reward distributions for all players are similar Err codemadness.org 70 i 2342 but not necessarily identical. We develop an upper confidence bound-based Err codemadness.org 70 i 2343 algorithm, RobustAgg$(\epsilon)$, that adaptively aggregates rewards collected Err codemadness.org 70 i 2344 by different players. In the setting where an upper bound on the pairwise Err codemadness.org 70 i 2345 similarities of reward distributions between players is known, we achieve Err codemadness.org 70 i 2346 instance-dependent regret guarantees that depend on the amenability of Err codemadness.org 70 i 2347 information sharing across players. We complement these upper bounds with Err codemadness.org 70 i 2348 nearly matching lower bounds. In the setting where pairwise similarities are Err codemadness.org 70 i 2349 unknown, we provide a lower bound, as well as an algorithm that trades off Err codemadness.org 70 i 2350 minimax regret guarantees for adaptivity to unknown similarity structure. Err codemadness.org 70 i 2351 </p> Err codemadness.org 70 i 2352 Err codemadness.org 70 i 2353 Err codemadness.org 70 i 2354 Err codemadness.org 70 i 2355 Robustifying Binary Classification to Adversarial Perturbation. (arXiv:2010.15391v1 [cs.LG]) Err codemadness.org 70 i 2356 http://fr.arxiv.org/abs/2010.15391 Err codemadness.org 70 i 2357 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Salehi_F/0/1/0/all/0/1">Fariborz Salehi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hassibi_B/0/1/0/all/0/1">Babak Hassibi</a></p> Err codemadness.org 70 i 2358 Err codemadness.org 70 i 2359 <p>Despite the enormous success of machine learning models in various Err codemadness.org 70 i 2360 applications, most of these models lack resilience to (even small) Err codemadness.org 70 i 2361 perturbations in their input data. Hence, new methods to robustify machine Err codemadness.org 70 i 2362 learning models seem very essential. To this end, in this paper we consider the Err codemadness.org 70 i 2363 problem of binary classification with adversarial perturbations. Investigating Err codemadness.org 70 i 2364 the solution to a min-max optimization (which considers the worst-case loss in Err codemadness.org 70 i 2365 the presence of adversarial perturbations) we introduce a generalization to the Err codemadness.org 70 i 2366 max-margin classifier which takes into account the power of the adversary in Err codemadness.org 70 i 2367 manipulating the data. We refer to this classifier as the "Robust Max-margin" Err codemadness.org 70 i 2368 (RM) classifier. Under some mild assumptions on the loss function, we Err codemadness.org 70 i 2369 theoretically show that the gradient descent iterates (with sufficiently small Err codemadness.org 70 i 2370 step size) converge to the RM classifier in its direction. Therefore, the RM Err codemadness.org 70 i 2371 classifier can be studied to compute various performance measures (e.g. Err codemadness.org 70 i 2372 generalization error) of binary classification with adversarial perturbations. Err codemadness.org 70 i 2373 </p> Err codemadness.org 70 i 2374 Err codemadness.org 70 i 2375 Err codemadness.org 70 i 2376 Err codemadness.org 70 i 2377 Off-Policy Interval Estimation with Lipschitz Value Iteration. (arXiv:2010.15392v1 [cs.LG]) Err codemadness.org 70 i 2378 http://fr.arxiv.org/abs/2010.15392 Err codemadness.org 70 i 2379 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tang_Z/0/1/0/all/0/1">Ziyang Tang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1">Yihao Feng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_N/0/1/0/all/0/1">Na Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Peng_J/0/1/0/all/0/1">Jian Peng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Q/0/1/0/all/0/1">Qiang Liu</a></p> Err codemadness.org 70 i 2380 Err codemadness.org 70 i 2381 <p>Off-policy evaluation provides an essential tool for evaluating the effects Err codemadness.org 70 i 2382 of different policies or treatments using only observed data. When applied to Err codemadness.org 70 i 2383 high-stakes scenarios such as medical diagnosis or financial decision-making, Err codemadness.org 70 i 2384 it is crucial to provide provably correct upper and lower bounds of the Err codemadness.org 70 i 2385 expected reward, not just a classical single point estimate, to the end-users, Err codemadness.org 70 i 2386 as executing a poor policy can be very costly. In this work, we propose a Err codemadness.org 70 i 2387 provably correct method for obtaining interval bounds for off-policy evaluation Err codemadness.org 70 i 2388 in a general continuous setting. The idea is to search for the maximum and Err codemadness.org 70 i 2389 minimum values of the expected reward among all the Lipschitz Q-functions that Err codemadness.org 70 i 2390 are consistent with the observations, which amounts to solving a constrained Err codemadness.org 70 i 2391 optimization problem on a Lipschitz function space. We go on to introduce a Err codemadness.org 70 i 2392 Lipschitz value iteration method to monotonically tighten the interval, which Err codemadness.org 70 i 2393 is simple yet efficient and provably convergent. We demonstrate the practical Err codemadness.org 70 i 2394 efficiency of our method on a range of benchmarks. Err codemadness.org 70 i 2395 </p> Err codemadness.org 70 i 2396 Err codemadness.org 70 i 2397 Err codemadness.org 70 i 2398 Err codemadness.org 70 i 2399 Discovery and classification of Twitter bots. (arXiv:2010.15393v1 [cs.SI]) Err codemadness.org 70 i 2400 http://fr.arxiv.org/abs/2010.15393 Err codemadness.org 70 i 2401 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shevtsov_A/0/1/0/all/0/1">Alexander Shevtsov Alexander Shevtsov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Oikonomidou_M/0/1/0/all/0/1">Maria Oikonomidou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Antonakaki_D/0/1/0/all/0/1">Despoina Antonakaki</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pratikakis_P/0/1/0/all/0/1">Polyvios Pratikakis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kanterakis_A/0/1/0/all/0/1">Alexandros Kanterakis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ioannidis_S/0/1/0/all/0/1">Sotiris Ioannidis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fragopoulou_P/0/1/0/all/0/1">Paraskevi Fragopoulou</a></p> Err codemadness.org 70 i 2402 Err codemadness.org 70 i 2403 <p>A very large number of people use Online Social Networks daily. Such Err codemadness.org 70 i 2404 platforms thus become attractive targets for agents that seek to gain access to Err codemadness.org 70 i 2405 the attention of large audiences, and influence perceptions or opinions. Err codemadness.org 70 i 2406 Botnets, collections of automated accounts controlled by a single agent, are a Err codemadness.org 70 i 2407 common mechanism for exerting maximum influence. Botnets may be used to better Err codemadness.org 70 i 2408 infiltrate the social graph over time and to create an illusion of community Err codemadness.org 70 i 2409 behavior, amplifying their message and increasing persuasion. Err codemadness.org 70 i 2410 </p> Err codemadness.org 70 i 2411 <p>This paper investigates Twitter botnets, their behavior, their interaction Err codemadness.org 70 i 2412 with user communities and their evolution over time. We analyzed a dense crawl Err codemadness.org 70 i 2413 of a subset of Twitter traffic, amounting to nearly all interactions by Err codemadness.org 70 i 2414 Greek-speaking Twitter users for a period of 36 months. We detected over a Err codemadness.org 70 i 2415 million events where seemingly unrelated accounts tweeted nearly identical Err codemadness.org 70 i 2416 content at nearly the same time. We filtered these concurrent content injection Err codemadness.org 70 i 2417 events and detected a set of 1,850 accounts that repeatedly exhibit this Err codemadness.org 70 i 2418 pattern of behavior, suggesting that they are fully or in part controlled and Err codemadness.org 70 i 2419 orchestrated by the same software. We found botnets that appear for brief Err codemadness.org 70 i 2420 intervals and disappear, as well as botnets that evolve and grow, spanning the Err codemadness.org 70 i 2421 duration of our dataset. We analyze statistical differences between bot Err codemadness.org 70 i 2422 accounts and human users, as well as botnet interaction with user communities Err codemadness.org 70 i 2423 and Twitter trending topics. Err codemadness.org 70 i 2424 </p> Err codemadness.org 70 i 2425 Err codemadness.org 70 i 2426 Err codemadness.org 70 i 2427 Err codemadness.org 70 i 2428 Smart Homes: Security Challenges and Privacy Concerns. (arXiv:2010.15394v1 [cs.CR]) Err codemadness.org 70 i 2429 http://fr.arxiv.org/abs/2010.15394 Err codemadness.org 70 i 2430 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hall_F/0/1/0/all/0/1">Fraser Hall</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Maglaras_L/0/1/0/all/0/1">Leandros Maglaras</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Aivaliotis_T/0/1/0/all/0/1">Theodoros Aivaliotis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xagoraris_L/0/1/0/all/0/1">Loukas Xagoraris</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kantzavelou_I/0/1/0/all/0/1">Ioanna Kantzavelou</a></p> Err codemadness.org 70 i 2431 Err codemadness.org 70 i 2432 <p>Development and growth of Internet of Things (IoT) technology has Err codemadness.org 70 i 2433 exponentially increased over the course of the last 10 years since its Err codemadness.org 70 i 2434 inception, and as a result has directly influenced the popularity and size of Err codemadness.org 70 i 2435 smart homes. In this article we present the main technologies and applications Err codemadness.org 70 i 2436 that constitute a smart home, we identify the main security and privacy Err codemadness.org 70 i 2437 challenges that smart home face and we provide good practices to mitigate those Err codemadness.org 70 i 2438 threats. Err codemadness.org 70 i 2439 </p> Err codemadness.org 70 i 2440 Err codemadness.org 70 i 2441 Err codemadness.org 70 i 2442 Err codemadness.org 70 i 2443 Channel Estimation and Equalization for CP-OFDM-based OTFS in Fractional Doppler Channels. (arXiv:2010.15396v1 [cs.IT]) Err codemadness.org 70 i 2444 http://fr.arxiv.org/abs/2010.15396 Err codemadness.org 70 i 2445 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hashimoto_N/0/1/0/all/0/1">Noriyuki Hashimoto</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Osawa_N/0/1/0/all/0/1">Noboru Osawa</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yamazaki_K/0/1/0/all/0/1">Kosuke Yamazaki</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ibi_S/0/1/0/all/0/1">Shinsuke Ibi</a></p> Err codemadness.org 70 i 2446 Err codemadness.org 70 i 2447 <p>Orthogonal time frequency and space (OTFS) modulation is a promising Err codemadness.org 70 i 2448 technology that satisfies high Doppler requirements for future mobile systems. Err codemadness.org 70 i 2449 OTFS modulation encodes information symbols and pilot symbols into the Err codemadness.org 70 i 2450 two-dimensional (2D) delay-Doppler (DD) domain. The received symbols suffer Err codemadness.org 70 i 2451 from inter-Doppler interference (IDI) in the fading channels with fractional Err codemadness.org 70 i 2452 Doppler shifts that are sampled at noninteger indices in the DD domain. IDI has Err codemadness.org 70 i 2453 been treated as an unavoidable effect because the fractional Doppler shifts Err codemadness.org 70 i 2454 cannot be obtained directly from the received pilot symbols. In this paper, we Err codemadness.org 70 i 2455 provide a solution to channel estimation for fractional Doppler channels. The Err codemadness.org 70 i 2456 proposed estimation provides new insight into the OTFS input-output relation in Err codemadness.org 70 i 2457 the DD domain as a 2D circular convolution with a small approximation. Err codemadness.org 70 i 2458 According to the input-output relation, we also provide a low-complexity Err codemadness.org 70 i 2459 channel equalization method using the estimated channel information. We Err codemadness.org 70 i 2460 demonstrate the error performance of the proposed channel estimation and Err codemadness.org 70 i 2461 equalization in several channels by simulations. The simulation results show Err codemadness.org 70 i 2462 that in high-mobility environments, the total system utilizing the proposed Err codemadness.org 70 i 2463 methods outperforms orthogonal frequency division multiplexing (OFDM) with Err codemadness.org 70 i 2464 ideal channel estimation and a conventional channel estimation method using a Err codemadness.org 70 i 2465 pseudo sequence. Err codemadness.org 70 i 2466 </p> Err codemadness.org 70 i 2467 Err codemadness.org 70 i 2468 Err codemadness.org 70 i 2469 Err codemadness.org 70 i 2470 Free-boundary conformal parameterization of point clouds. (arXiv:2010.15399v1 [cs.CG]) Err codemadness.org 70 i 2471 http://fr.arxiv.org/abs/2010.15399 Err codemadness.org 70 i 2472 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1">Yechen Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Choi_G/0/1/0/all/0/1">Gary P. T. Choi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lui_L/0/1/0/all/0/1">Lok Ming Lui</a></p> Err codemadness.org 70 i 2473 Err codemadness.org 70 i 2474 <p>With the advancement in 3D scanning technology, there has been a surge of Err codemadness.org 70 i 2475 interest in the use of point clouds in science and engineering. To facilitate Err codemadness.org 70 i 2476 the computations and analyses of point clouds, prior works have considered Err codemadness.org 70 i 2477 parameterizing them onto some simple planar domains with a fixed boundary shape Err codemadness.org 70 i 2478 such as a unit circle or a rectangle. However, the geometry of the fixed shape Err codemadness.org 70 i 2479 may lead to some undesirable distortion in the parameterization. It is Err codemadness.org 70 i 2480 therefore more natural to consider free-boundary conformal parameterizations of Err codemadness.org 70 i 2481 point clouds, which minimize the local geometric distortion of the mapping Err codemadness.org 70 i 2482 without constraining the overall shape. In this work, we propose a novel Err codemadness.org 70 i 2483 approximation scheme of the Laplace--Beltrami operator on point clouds and Err codemadness.org 70 i 2484 utilize it for developing a free-boundary conformal parameterization method for Err codemadness.org 70 i 2485 disk-type point clouds. With the aid of the free-boundary conformal Err codemadness.org 70 i 2486 parameterization, high-quality point cloud meshing can be easily achieved. Err codemadness.org 70 i 2487 Furthermore, we show that using the idea of conformal welding in complex Err codemadness.org 70 i 2488 analysis, the point cloud conformal parameterization can be computed in a Err codemadness.org 70 i 2489 divide-and-conquer manner. Experimental results are presented to demonstrate Err codemadness.org 70 i 2490 the effectiveness of the proposed method. Err codemadness.org 70 i 2491 </p> Err codemadness.org 70 i 2492 Err codemadness.org 70 i 2493 Err codemadness.org 70 i 2494 Err codemadness.org 70 i 2495 On Efficient and Scalable Time-Continuous Spatial Crowdsourcing -- Full Version. (arXiv:2010.15404v1 [cs.DB]) Err codemadness.org 70 i 2496 http://fr.arxiv.org/abs/2010.15404 Err codemadness.org 70 i 2497 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_T/0/1/0/all/0/1">Ting Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xie_X/0/1/0/all/0/1">Xike Xie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cao_X/0/1/0/all/0/1">Xin Cao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pedersen_T/0/1/0/all/0/1">Torben Bach Pedersen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yang Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xiao_M/0/1/0/all/0/1">Mingjun Xiao</a></p> Err codemadness.org 70 i 2498 Err codemadness.org 70 i 2499 <p>The proliferation of advanced mobile terminals opened up a new crowdsourcing Err codemadness.org 70 i 2500 avenue, spatial crowdsourcing, to utilize the crowd potential to perform Err codemadness.org 70 i 2501 real-world tasks. In this work, we study a new type of spatial crowdsourcing, Err codemadness.org 70 i 2502 called time-continuous spatial crowdsourcing (TCSC in short). It supports broad Err codemadness.org 70 i 2503 applications for long-term continuous spatial data acquisition, ranging from Err codemadness.org 70 i 2504 environmental monitoring to traffic surveillance in citizen science and Err codemadness.org 70 i 2505 crowdsourcing projects. However, due to limited budgets and limited Err codemadness.org 70 i 2506 availability of workers in practice, the data collected is often incomplete, Err codemadness.org 70 i 2507 incurring data deficiency problem. To tackle that, in this work, we first Err codemadness.org 70 i 2508 propose an entropy-based quality metric, which captures the joint effects of Err codemadness.org 70 i 2509 incompletion in data acquisition and the imprecision in data interpolation. Err codemadness.org 70 i 2510 Based on that, we investigate quality-aware task assignment methods for both Err codemadness.org 70 i 2511 single- and multi-task scenarios. We show the NP-hardness of the single-task Err codemadness.org 70 i 2512 case, and design polynomial-time algorithms with guaranteed approximation Err codemadness.org 70 i 2513 ratios. We study novel indexing and pruning techniques for further enhancing Err codemadness.org 70 i 2514 the performance in practice. Then, we extend the solution to multi-task Err codemadness.org 70 i 2515 scenarios and devise a parallel framework for speeding up the process of Err codemadness.org 70 i 2516 optimization. We conduct extensive experiments on both real and synthetic Err codemadness.org 70 i 2517 datasets to show the effectiveness of our proposals. Err codemadness.org 70 i 2518 </p> Err codemadness.org 70 i 2519 Err codemadness.org 70 i 2520 Err codemadness.org 70 i 2521 Err codemadness.org 70 i 2522 Conversation Graph: Data Augmentation, Training and Evaluation for Non-Deterministic Dialogue Management. (arXiv:2010.15411v1 [cs.CL]) Err codemadness.org 70 i 2523 http://fr.arxiv.org/abs/2010.15411 Err codemadness.org 70 i 2524 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gritta_M/0/1/0/all/0/1">Milan Gritta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lampouras_G/0/1/0/all/0/1">Gerasimos Lampouras</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Iacobacci_I/0/1/0/all/0/1">Ignacio Iacobacci</a></p> Err codemadness.org 70 i 2525 Err codemadness.org 70 i 2526 <p>Task-oriented dialogue systems typically rely on large amounts of Err codemadness.org 70 i 2527 high-quality training data or require complex handcrafted rules. However, Err codemadness.org 70 i 2528 existing datasets are often limited in size considering the complexity of the Err codemadness.org 70 i 2529 dialogues. Additionally, conventional training signal inference is not suitable Err codemadness.org 70 i 2530 for non-deterministic agent behaviour, i.e. considering multiple actions as Err codemadness.org 70 i 2531 valid in identical dialogue states. We propose the Conversation Graph Err codemadness.org 70 i 2532 (ConvGraph), a graph-based representation of dialogues that can be exploited Err codemadness.org 70 i 2533 for data augmentation, multi-reference training and evaluation of Err codemadness.org 70 i 2534 non-deterministic agents. ConvGraph generates novel dialogue paths to augment Err codemadness.org 70 i 2535 data volume and diversity. Intrinsic and extrinsic evaluation across three Err codemadness.org 70 i 2536 datasets shows that data augmentation and/or multi-reference training with Err codemadness.org 70 i 2537 ConvGraph can improve dialogue success rates by up to 6.4%. Err codemadness.org 70 i 2538 </p> Err codemadness.org 70 i 2539 Err codemadness.org 70 i 2540 Err codemadness.org 70 i 2541 Err codemadness.org 70 i 2542 Measuring and Harnessing Transference in Multi-Task Learning. (arXiv:2010.15413v1 [cs.LG]) Err codemadness.org 70 i 2543 http://fr.arxiv.org/abs/2010.15413 Err codemadness.org 70 i 2544 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Fifty_C/0/1/0/all/0/1">Christopher Fifty</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Amid_E/0/1/0/all/0/1">Ehsan Amid</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_Z/0/1/0/all/0/1">Zhe Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yu_T/0/1/0/all/0/1">Tianhe Yu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Anil_R/0/1/0/all/0/1">Rohan Anil</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Finn_C/0/1/0/all/0/1">Chelsea Finn</a></p> Err codemadness.org 70 i 2545 Err codemadness.org 70 i 2546 <p>Multi-task learning can leverage information learned by one task to benefit Err codemadness.org 70 i 2547 the training of other tasks. Despite this capacity, na\"ive formulations often Err codemadness.org 70 i 2548 degrade performance and in particular, identifying the tasks that would benefit Err codemadness.org 70 i 2549 from co-training remains a challenging design question. In this paper, we Err codemadness.org 70 i 2550 analyze the dynamics of information transfer, or transference, across tasks Err codemadness.org 70 i 2551 throughout training. Specifically, we develop a similarity measure that can Err codemadness.org 70 i 2552 quantify transference among tasks and use this quantity to both better Err codemadness.org 70 i 2553 understand the optimization dynamics of multi-task learning as well as improve Err codemadness.org 70 i 2554 overall learning performance. In the latter case, we propose two methods to Err codemadness.org 70 i 2555 leverage our transference metric. The first operates at a macro-level by Err codemadness.org 70 i 2556 selecting which tasks should train together while the second functions at a Err codemadness.org 70 i 2557 micro-level by determining how to combine task gradients at each training step. Err codemadness.org 70 i 2558 We find these methods can lead to significant improvement over prior work on Err codemadness.org 70 i 2559 three supervised multi-task learning benchmarks and one multi-task Err codemadness.org 70 i 2560 reinforcement learning paradigm. Err codemadness.org 70 i 2561 </p> Err codemadness.org 70 i 2562 Err codemadness.org 70 i 2563 Err codemadness.org 70 i 2564 Err codemadness.org 70 i 2565 A Novel Anomaly Detection Algorithm for Hybrid Production Systems based on Deep Learning and Timed Automata. (arXiv:2010.15415v1 [cs.LG]) Err codemadness.org 70 i 2566 http://fr.arxiv.org/abs/2010.15415 Err codemadness.org 70 i 2567 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hranisavljevic_N/0/1/0/all/0/1">Nemanja Hranisavljevic</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Niggemann_O/0/1/0/all/0/1">Oliver Niggemann</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Maier_A/0/1/0/all/0/1">Alexander Maier</a></p> Err codemadness.org 70 i 2568 Err codemadness.org 70 i 2569 <p>Performing anomaly detection in hybrid systems is a challenging task since it Err codemadness.org 70 i 2570 requires analysis of timing behavior and mutual dependencies of both discrete Err codemadness.org 70 i 2571 and continuous signals. Typically, it requires modeling system behavior, which Err codemadness.org 70 i 2572 is often accomplished manually by human engineers. Using machine learning for Err codemadness.org 70 i 2573 creating a behavioral model from observations has advantages, such as lower Err codemadness.org 70 i 2574 development costs and fewer requirements for specific knowledge about the Err codemadness.org 70 i 2575 system. The paper presents DAD:DeepAnomalyDetection, a new approach for Err codemadness.org 70 i 2576 automatic model learning and anomaly detection in hybrid production systems. It Err codemadness.org 70 i 2577 combines deep learning and timed automata for creating behavioral model from Err codemadness.org 70 i 2578 observations. The ability of deep belief nets to extract binary features from Err codemadness.org 70 i 2579 real-valued inputs is used for transformation of continuous to discrete Err codemadness.org 70 i 2580 signals. These signals, together with the original discrete signals are than Err codemadness.org 70 i 2581 handled in an identical way. Anomaly detection is performed by the comparison Err codemadness.org 70 i 2582 of actual and predicted system behavior. The algorithm has been applied to few Err codemadness.org 70 i 2583 data sets including two from real systems and has shown promising results. Err codemadness.org 70 i 2584 </p> Err codemadness.org 70 i 2585 Err codemadness.org 70 i 2586 Err codemadness.org 70 i 2587 Err codemadness.org 70 i 2588 ProCAN: Progressive Growing Channel Attentive Non-Local Network for Lung Nodule Classification. (arXiv:2010.15417v1 [eess.IV]) Err codemadness.org 70 i 2589 http://fr.arxiv.org/abs/2010.15417 Err codemadness.org 70 i 2590 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Al_Shabi_M/0/1/0/all/0/1">Mundher Al-Shabi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Shak_K/0/1/0/all/0/1">Kelvin Shak</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Tan_M/0/1/0/all/0/1">Maxine Tan</a></p> Err codemadness.org 70 i 2591 Err codemadness.org 70 i 2592 <p>Lung cancer classification in screening computed tomography (CT) scans is one Err codemadness.org 70 i 2593 of the most crucial tasks for early detection of this disease. Many lives can Err codemadness.org 70 i 2594 be saved if we are able to accurately classify malignant/ cancerous lung Err codemadness.org 70 i 2595 nodules. Consequently, several deep learning based models have been proposed Err codemadness.org 70 i 2596 recently to classify lung nodules as malignant or benign. Nevertheless, the Err codemadness.org 70 i 2597 large variation in the size and heterogeneous appearance of the nodules makes Err codemadness.org 70 i 2598 this task an extremely challenging one. We propose a new Progressive Growing Err codemadness.org 70 i 2599 Channel Attentive Non-Local (ProCAN) network for lung nodule classification. Err codemadness.org 70 i 2600 The proposed method addresses this challenge from three different aspects. Err codemadness.org 70 i 2601 First, we enrich the Non-Local network by adding channel-wise attention Err codemadness.org 70 i 2602 capability to it. Second, we apply Curriculum Learning principles, whereby we Err codemadness.org 70 i 2603 first train our model on easy examples before hard/ difficult ones. Third, as Err codemadness.org 70 i 2604 the classification task gets harder during the Curriculum learning, our model Err codemadness.org 70 i 2605 is progressively grown to increase its capability of handling the task at hand. Err codemadness.org 70 i 2606 We examined our proposed method on two different public datasets and compared Err codemadness.org 70 i 2607 its performance with state-of-the-art methods in the literature. The results Err codemadness.org 70 i 2608 show that the ProCAN model outperforms state-of-the-art methods and achieves an Err codemadness.org 70 i 2609 AUC of 98.05% and accuracy of 95.28% on the LIDC-IDRI dataset. Moreover, we Err codemadness.org 70 i 2610 conducted extensive ablation studies to analyze the contribution and effects of Err codemadness.org 70 i 2611 each new component of our proposed method. Err codemadness.org 70 i 2612 </p> Err codemadness.org 70 i 2613 Err codemadness.org 70 i 2614 Err codemadness.org 70 i 2615 Err codemadness.org 70 i 2616 Scalable Graph Neural Networks via Bidirectional Propagation. (arXiv:2010.15421v1 [cs.LG]) Err codemadness.org 70 i 2617 http://fr.arxiv.org/abs/2010.15421 Err codemadness.org 70 i 2618 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_M/0/1/0/all/0/1">Ming Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_Z/0/1/0/all/0/1">Zhewei Wei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ding_B/0/1/0/all/0/1">Bolin Ding</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1">Yaliang Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yuan_Y/0/1/0/all/0/1">Ye Yuan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Du_X/0/1/0/all/0/1">Xiaoyong Du</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wen_J/0/1/0/all/0/1">Ji-Rong Wen</a></p> Err codemadness.org 70 i 2619 Err codemadness.org 70 i 2620 <p>Graph Neural Networks (GNN) is an emerging field for learning on Err codemadness.org 70 i 2621 non-Euclidean data. Recently, there has been increased interest in designing Err codemadness.org 70 i 2622 GNN that scales to large graphs. Most existing methods use "graph sampling" or Err codemadness.org 70 i 2623 "layer-wise sampling" techniques to reduce training time. However, these Err codemadness.org 70 i 2624 methods still suffer from degrading performance and scalability problems when Err codemadness.org 70 i 2625 applying to graphs with billions of edges. This paper presents GBP, a scalable Err codemadness.org 70 i 2626 GNN that utilizes a localized bidirectional propagation process from both the Err codemadness.org 70 i 2627 feature vectors and the training/testing nodes. Theoretical analysis shows that Err codemadness.org 70 i 2628 GBP is the first method that achieves sub-linear time complexity for both the Err codemadness.org 70 i 2629 precomputation and the training phases. An extensive empirical study Err codemadness.org 70 i 2630 demonstrates that GBP achieves state-of-the-art performance with significantly Err codemadness.org 70 i 2631 less training/testing time. Most notably, GBP can deliver superior performance Err codemadness.org 70 i 2632 on a graph with over 60 million nodes and 1.8 billion edges in less than half Err codemadness.org 70 i 2633 an hour on a single machine. Err codemadness.org 70 i 2634 </p> Err codemadness.org 70 i 2635 Err codemadness.org 70 i 2636 Err codemadness.org 70 i 2637 Err codemadness.org 70 i 2638 Tilde at WMT 2020: News Task Systems. (arXiv:2010.15423v1 [cs.CL]) Err codemadness.org 70 i 2639 http://fr.arxiv.org/abs/2010.15423 Err codemadness.org 70 i 2640 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Krislauks_R/0/1/0/all/0/1">Rihards Kri&#x161;lauks</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pinnis_M/0/1/0/all/0/1">M&#x101;rcis Pinnis</a></p> Err codemadness.org 70 i 2641 Err codemadness.org 70 i 2642 <p>This paper describes Tilde's submission to the WMT2020 shared task on news Err codemadness.org 70 i 2643 translation for both directions of the English-Polish language pair in both the Err codemadness.org 70 i 2644 constrained and the unconstrained tracks. We follow our submissions from the Err codemadness.org 70 i 2645 previous years and build our baseline systems to be morphologically motivated Err codemadness.org 70 i 2646 sub-word unit-based Transformer base models that we train using the Marian Err codemadness.org 70 i 2647 machine translation toolkit. Additionally, we experiment with different Err codemadness.org 70 i 2648 parallel and monolingual data selection schemes, as well as sampled Err codemadness.org 70 i 2649 back-translation. Our final models are ensembles of Transformer base and Err codemadness.org 70 i 2650 Transformer big models that feature right-to-left re-ranking. Err codemadness.org 70 i 2651 </p> Err codemadness.org 70 i 2652 Err codemadness.org 70 i 2653 Err codemadness.org 70 i 2654 Err codemadness.org 70 i 2655 Detection of asteroid trails in Hubble Space Telescope images using Deep Learning. (arXiv:2010.15425v1 [astro-ph.IM]) Err codemadness.org 70 i 2656 http://fr.arxiv.org/abs/2010.15425 Err codemadness.org 70 i 2657 <p>Authors: <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Parfeni_A/0/1/0/all/0/1">Andrei A. Parfeni</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Caramete_L/0/1/0/all/0/1">Laurentiu I. Caramete</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Dobre_A/0/1/0/all/0/1">Andreea M. Dobre</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Bach_N/0/1/0/all/0/1">Nguyen Tran Bach</a></p> Err codemadness.org 70 i 2658 Err codemadness.org 70 i 2659 <p>We present an application of Deep Learning for the image recognition of Err codemadness.org 70 i 2660 asteroid trails in single-exposure photos taken by the Hubble Space Telescope. Err codemadness.org 70 i 2661 Using algorithms based on multi-layered deep Convolutional Neural Networks, we Err codemadness.org 70 i 2662 report accuracies of above 80% on the validation set. Our project was motivated Err codemadness.org 70 i 2663 by the Hubble Asteroid Hunter project on Zooniverse, which focused on Err codemadness.org 70 i 2664 identifying these objects in order to localize and better characterize them. We Err codemadness.org 70 i 2665 aim to demonstrate that Machine Learning techniques can be very useful in Err codemadness.org 70 i 2666 trying to solve problems that are closely related to Astronomy and Err codemadness.org 70 i 2667 Astrophysics, but that they are still not developed enough for very specific Err codemadness.org 70 i 2668 tasks. Err codemadness.org 70 i 2669 </p> Err codemadness.org 70 i 2670 Err codemadness.org 70 i 2671 Err codemadness.org 70 i 2672 Err codemadness.org 70 i 2673 Physics-informed deep learning for flow and deformation in poroelastic media. (arXiv:2010.15426v1 [cs.CE]) Err codemadness.org 70 i 2674 http://fr.arxiv.org/abs/2010.15426 Err codemadness.org 70 i 2675 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bekele_Y/0/1/0/all/0/1">Yared W. Bekele</a></p> Err codemadness.org 70 i 2676 Err codemadness.org 70 i 2677 <p>A physics-informed neural network is presented for poroelastic problems with Err codemadness.org 70 i 2678 coupled flow and deformation processes. The governing equilibrium and mass Err codemadness.org 70 i 2679 balance equations are discussed and specific derivations for two-dimensional Err codemadness.org 70 i 2680 cases are presented. A fully-connected deep neural network is used for Err codemadness.org 70 i 2681 training. Barry and Mercer's source problem with time-dependent fluid Err codemadness.org 70 i 2682 injection/extraction in an idealized poroelastic medium, which has an exact Err codemadness.org 70 i 2683 analytical solution, is used as a numerical example. A random sample from the Err codemadness.org 70 i 2684 analytical solution is used as training data and the performance of the model Err codemadness.org 70 i 2685 is tested by predicting the solution on the entire domain after training. The Err codemadness.org 70 i 2686 deep learning model predicts the horizontal and vertical deformations well Err codemadness.org 70 i 2687 while the error in the predicted pore pressure predictions is slightly higher Err codemadness.org 70 i 2688 because of the sparsity of the pore pressure values. Err codemadness.org 70 i 2689 </p> Err codemadness.org 70 i 2690 Err codemadness.org 70 i 2691 Err codemadness.org 70 i 2692 Err codemadness.org 70 i 2693 Sparse Signal Reconstruction for Nonlinear Models via Piecewise Rational Optimization. (arXiv:2010.15427v1 [math.OC]) Err codemadness.org 70 i 2694 http://fr.arxiv.org/abs/2010.15427 Err codemadness.org 70 i 2695 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Marmin_A/0/1/0/all/0/1">Arthur Marmin</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Castella_M/0/1/0/all/0/1">Marc Castella</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Pesquet_J/0/1/0/all/0/1">Jean-Christophe Pesquet</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Duval_L/0/1/0/all/0/1">Laurent Duval</a></p> Err codemadness.org 70 i 2696 Err codemadness.org 70 i 2697 <p>We propose a method to reconstruct sparse signals degraded by a nonlinear Err codemadness.org 70 i 2698 distortion and acquired at a limited sampling rate. Our method formulates the Err codemadness.org 70 i 2699 reconstruction problem as a nonconvex minimization of the sum of a data fitting Err codemadness.org 70 i 2700 term and a penalization term. In contrast with most previous works which settle Err codemadness.org 70 i 2701 for approximated local solutions, we seek for a global solution to the obtained Err codemadness.org 70 i 2702 challenging nonconvex problem. Our global approach relies on the so-called Err codemadness.org 70 i 2703 Lasserre relaxation of polynomial optimization. We here specifically include in Err codemadness.org 70 i 2704 our approach the case of piecewise rational functions, which makes it possible Err codemadness.org 70 i 2705 to address a wide class of nonconvex exact and continuous relaxations of the Err codemadness.org 70 i 2706 $\ell_0$ penalization function. Additionally, we study the complexity of the Err codemadness.org 70 i 2707 optimization problem. It is shown how to use the structure of the problem to Err codemadness.org 70 i 2708 lighten the computational burden efficiently. Finally, numerical simulations Err codemadness.org 70 i 2709 illustrate the benefits of our method in terms of both global optimality and Err codemadness.org 70 i 2710 signal reconstruction. Err codemadness.org 70 i 2711 </p> Err codemadness.org 70 i 2712 Err codemadness.org 70 i 2713 Err codemadness.org 70 i 2714 Err codemadness.org 70 i 2715 Self-paced Data Augmentation for Training Neural Networks. (arXiv:2010.15434v1 [cs.LG]) Err codemadness.org 70 i 2716 http://fr.arxiv.org/abs/2010.15434 Err codemadness.org 70 i 2717 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Takase_T/0/1/0/all/0/1">Tomoumi Takase</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Karakida_R/0/1/0/all/0/1">Ryo Karakida</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Asoh_H/0/1/0/all/0/1">Hideki Asoh</a></p> Err codemadness.org 70 i 2718 Err codemadness.org 70 i 2719 <p>Data augmentation is widely used for machine learning; however, an effective Err codemadness.org 70 i 2720 method to apply data augmentation has not been established even though it Err codemadness.org 70 i 2721 includes several factors that should be tuned carefully. One such factor is Err codemadness.org 70 i 2722 sample suitability, which involves selecting samples that are suitable for data Err codemadness.org 70 i 2723 augmentation. A typical method that applies data augmentation to all training Err codemadness.org 70 i 2724 samples disregards sample suitability, which may reduce classifier performance. Err codemadness.org 70 i 2725 To address this problem, we propose the self-paced augmentation (SPA) to Err codemadness.org 70 i 2726 automatically and dynamically select suitable samples for data augmentation Err codemadness.org 70 i 2727 when training a neural network. The proposed method mitigates the deterioration Err codemadness.org 70 i 2728 of generalization performance caused by ineffective data augmentation. We Err codemadness.org 70 i 2729 discuss two reasons the proposed SPA works relative to curriculum learning and Err codemadness.org 70 i 2730 desirable changes to loss function instability. Experimental results Err codemadness.org 70 i 2731 demonstrate that the proposed SPA can improve the generalization performance, Err codemadness.org 70 i 2732 particularly when the number of training samples is small. In addition, the Err codemadness.org 70 i 2733 proposed SPA outperforms the state-of-the-art RandAugment method. Err codemadness.org 70 i 2734 </p> Err codemadness.org 70 i 2735 Err codemadness.org 70 i 2736 Err codemadness.org 70 i 2737 Err codemadness.org 70 i 2738 Group-Harmonic and Group-Closeness Maximization -- Approximation and Engineering. (arXiv:2010.15435v1 [cs.DS]) Err codemadness.org 70 i 2739 http://fr.arxiv.org/abs/2010.15435 Err codemadness.org 70 i 2740 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Angriman_E/0/1/0/all/0/1">Eugenio Angriman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Becker_R/0/1/0/all/0/1">Ruben Becker</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+DAngelo_G/0/1/0/all/0/1">Gianlorenzo D&#x27;Angelo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gilbert_H/0/1/0/all/0/1">Hugo Gilbert</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Grinten_A/0/1/0/all/0/1">Alexander van der Grinten</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Meyerhenke_H/0/1/0/all/0/1">Henning Meyerhenke</a></p> Err codemadness.org 70 i 2741 Err codemadness.org 70 i 2742 <p>Centrality measures characterize important nodes in networks. Efficiently Err codemadness.org 70 i 2743 computing such nodes has received a lot of attention. When considering the Err codemadness.org 70 i 2744 generalization of computing central groups of nodes, challenging optimization Err codemadness.org 70 i 2745 problems occur. In this work, we study two such problems, group-harmonic Err codemadness.org 70 i 2746 maximization and group-closeness maximization both from a theoretical and from Err codemadness.org 70 i 2747 an algorithm engineering perspective. Err codemadness.org 70 i 2748 </p> Err codemadness.org 70 i 2749 <p>On the theoretical side, we obtain the following results. For group-harmonic Err codemadness.org 70 i 2750 maximization, unless $P=NP$, there is no polynomial-time algorithm that Err codemadness.org 70 i 2751 achieves an approximation factor better than $1-1/e$ (directed) and $1-1/(4e)$ Err codemadness.org 70 i 2752 (undirected), even for unweighted graphs. On the positive side, we show that a Err codemadness.org 70 i 2753 greedy algorithm achieves an approximation factor of $\lambda(1-2/e)$ Err codemadness.org 70 i 2754 (directed) and $\lambda(1-1/e)/2$ (undirected), where $\lambda$ is the ratio of Err codemadness.org 70 i 2755 minimal and maximal edge weights. For group-closeness maximization, the Err codemadness.org 70 i 2756 undirected case is $NP$-hard to be approximated to within a factor better than Err codemadness.org 70 i 2757 $1-1/(e+1)$ and a constant approximation factor is achieved by a local-search Err codemadness.org 70 i 2758 algorithm. For the directed case, however, we show that, for any Err codemadness.org 70 i 2759 $\epsilon&lt;1/2$, the problem is $NP$-hard to be approximated within a factor of Err codemadness.org 70 i 2760 $4|V|^{-\epsilon}$. Err codemadness.org 70 i 2761 </p> Err codemadness.org 70 i 2762 <p>From the algorithm engineering perspective, we provide efficient Err codemadness.org 70 i 2763 implementations of the above greedy and local search algorithms. In our Err codemadness.org 70 i 2764 experimental study we show that, on small instances where an optimum solution Err codemadness.org 70 i 2765 can be computed in reasonable time, the quality of both the greedy and the Err codemadness.org 70 i 2766 local search algorithms come very close to the optimum. On larger instances, Err codemadness.org 70 i 2767 our local search algorithms yield results with superior quality compared to Err codemadness.org 70 i 2768 existing greedy and local search solutions, at the cost of additional running Err codemadness.org 70 i 2769 time. We thus advocate local search for scenarios where solution quality is of Err codemadness.org 70 i 2770 highest concern. Err codemadness.org 70 i 2771 </p> Err codemadness.org 70 i 2772 Err codemadness.org 70 i 2773 Err codemadness.org 70 i 2774 Err codemadness.org 70 i 2775 Affordance-Aware Handovers with Human Arm Mobility Constraints. (arXiv:2010.15436v1 [cs.RO]) Err codemadness.org 70 i 2776 http://fr.arxiv.org/abs/2010.15436 Err codemadness.org 70 i 2777 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ardon_P/0/1/0/all/0/1">Paola Ard&#xf3;n</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cabrera_M/0/1/0/all/0/1">Maria E. Cabrera</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pairet_E/0/1/0/all/0/1">&#xc8;ric Pairet</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Petrick_R/0/1/0/all/0/1">Ronald P. A. Petrick</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ramamoorthy_S/0/1/0/all/0/1">Subramanian Ramamoorthy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lohan_K/0/1/0/all/0/1">Katrin S. Lohan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cakmak_M/0/1/0/all/0/1">Maya Cakmak</a></p> Err codemadness.org 70 i 2778 Err codemadness.org 70 i 2779 <p>Reasoning about object handover configurations allows an assistive agent to Err codemadness.org 70 i 2780 estimate the appropriateness of handover for a receiver with different arm Err codemadness.org 70 i 2781 mobility capacities. While there are existing approaches to estimating the Err codemadness.org 70 i 2782 effectiveness of handovers, their findings are limited to users without arm Err codemadness.org 70 i 2783 mobility impairments and to specific objects. Therefore, current Err codemadness.org 70 i 2784 state-of-the-art approaches are unable to hand over novel objects to receivers Err codemadness.org 70 i 2785 with different arm mobility capacities. We propose a method that generalises Err codemadness.org 70 i 2786 handover behaviours to previously unseen objects, subject to the constraint of Err codemadness.org 70 i 2787 a user's arm mobility levels and the task context. We propose a Err codemadness.org 70 i 2788 heuristic-guided hierarchically optimised cost whose optimisation adapts object Err codemadness.org 70 i 2789 configurations for receivers with low arm mobility. This also ensures that the Err codemadness.org 70 i 2790 robot grasps consider the context of the user's upcoming task, i.e., the usage Err codemadness.org 70 i 2791 of the object. To understand preferences over handover configurations, we Err codemadness.org 70 i 2792 report on the findings of an online study, wherein we presented different Err codemadness.org 70 i 2793 handover methods, including ours, to $259$ users with different levels of arm Err codemadness.org 70 i 2794 mobility. We encapsulate these preferences in a SRL that is able to reason Err codemadness.org 70 i 2795 about the most suitable handover configuration given a receiver's arm mobility Err codemadness.org 70 i 2796 and upcoming task. We find that people's preferences over handover methods are Err codemadness.org 70 i 2797 correlated to their arm mobility capacities. In experiments with a PR2 robotic Err codemadness.org 70 i 2798 platform, we obtained an average handover accuracy of $90.8\%$ when Err codemadness.org 70 i 2799 generalising handovers to novel objects. Err codemadness.org 70 i 2800 </p> Err codemadness.org 70 i 2801 Err codemadness.org 70 i 2802 Err codemadness.org 70 i 2803 Err codemadness.org 70 i 2804 Memory Attentive Fusion: External Language Model Integration for Transformer-based Sequence-to-Sequence Model. (arXiv:2010.15437v1 [cs.CL]) Err codemadness.org 70 i 2805 http://fr.arxiv.org/abs/2010.15437 Err codemadness.org 70 i 2806 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ihori_M/0/1/0/all/0/1">Mana Ihori</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Masumura_R/0/1/0/all/0/1">Ryo Masumura</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Makishima_N/0/1/0/all/0/1">Naoki Makishima</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tanaka_T/0/1/0/all/0/1">Tomohiro Tanaka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Takashima_A/0/1/0/all/0/1">Akihiko Takashima</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Orihashi_S/0/1/0/all/0/1">Shota Orihashi</a></p> Err codemadness.org 70 i 2807 Err codemadness.org 70 i 2808 <p>This paper presents a novel fusion method for integrating an external Err codemadness.org 70 i 2809 language model (LM) into the Transformer based sequence-to-sequence (seq2seq) Err codemadness.org 70 i 2810 model. While paired data are basically required to train the seq2seq model, the Err codemadness.org 70 i 2811 external LM can be trained with only unpaired data. Thus, it is important to Err codemadness.org 70 i 2812 leverage memorized knowledge in the external LM for building the seq2seq model, Err codemadness.org 70 i 2813 since it is hard to prepare a large amount of paired data. However, the Err codemadness.org 70 i 2814 existing fusion methods assume that the LM is integrated with recurrent neural Err codemadness.org 70 i 2815 network-based seq2seq models instead of the Transformer. Therefore, this paper Err codemadness.org 70 i 2816 proposes a fusion method that can explicitly utilize network structures in the Err codemadness.org 70 i 2817 Transformer. The proposed method, called {\bf memory attentive fusion}, Err codemadness.org 70 i 2818 leverages the Transformer-style attention mechanism that repeats source-target Err codemadness.org 70 i 2819 attention in a multi-hop manner for reading the memorized knowledge in the LM. Err codemadness.org 70 i 2820 Our experiments on two text-style conversion tasks demonstrate that the Err codemadness.org 70 i 2821 proposed method performs better than conventional fusion methods. Err codemadness.org 70 i 2822 </p> Err codemadness.org 70 i 2823 Err codemadness.org 70 i 2824 Err codemadness.org 70 i 2825 Err codemadness.org 70 i 2826 Modeling and Control of COVID-19 Epidemic through Testing Policies. (arXiv:2010.15438v1 [math.OC]) Err codemadness.org 70 i 2827 http://fr.arxiv.org/abs/2010.15438 Err codemadness.org 70 i 2828 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Niazi_M/0/1/0/all/0/1">Muhammad Umar B. Niazi</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Kibangou_A/0/1/0/all/0/1">Alain Kibangou</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Canudas_de_Wit_C/0/1/0/all/0/1">Carlos Canudas-de-Wit</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Nikitin_D/0/1/0/all/0/1">Denis Nikitin</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Tumash_L/0/1/0/all/0/1">Liudmila Tumash</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Bliman_P/0/1/0/all/0/1">Pierre-Alexandre Bliman</a></p> Err codemadness.org 70 i 2829 Err codemadness.org 70 i 2830 <p>Testing for the infected cases is one of the most important mechanisms to Err codemadness.org 70 i 2831 control an epidemic. It enables to isolate the detected infected individuals, Err codemadness.org 70 i 2832 thereby limiting the disease transmission to the susceptible population. Err codemadness.org 70 i 2833 However, despite the significance of testing policies, the recent literature on Err codemadness.org 70 i 2834 the subject lacks a control-theoretic perspective. In this work, an epidemic Err codemadness.org 70 i 2835 model that incorporates the testing rate as a control input is presented. The Err codemadness.org 70 i 2836 proposed model differentiates the undetected infected from the detected Err codemadness.org 70 i 2837 infected cases, who are assumed to be removed from the disease spreading Err codemadness.org 70 i 2838 process in the population. First, the model is estimated and validated for Err codemadness.org 70 i 2839 COVID-19 data in France. Then, two testing policies are proposed, the so-called Err codemadness.org 70 i 2840 best-effort strategy for testing (BEST) and constant optimal strategy for Err codemadness.org 70 i 2841 testing (COST). The BEST policy is a suppression strategy that provides a lower Err codemadness.org 70 i 2842 bound on the testing rate such that the epidemic switches from a spreading to a Err codemadness.org 70 i 2843 non-spreading state. The COST policy is a mitigation strategy that provides an Err codemadness.org 70 i 2844 optimal value of testing rate that minimizes the peak value of the infected Err codemadness.org 70 i 2845 population when the total stockpile of tests is limited. Both testing policies Err codemadness.org 70 i 2846 are evaluated by predicting the number of active intensive care unit (ICU) Err codemadness.org 70 i 2847 cases and the cumulative number of deaths due to COVID-19. Err codemadness.org 70 i 2848 </p> Err codemadness.org 70 i 2849 Err codemadness.org 70 i 2850 Err codemadness.org 70 i 2851 Err codemadness.org 70 i 2852 FlatNet: Towards Photorealistic Scene Reconstruction from Lensless Measurements. (arXiv:2010.15440v1 [eess.IV]) Err codemadness.org 70 i 2853 http://fr.arxiv.org/abs/2010.15440 Err codemadness.org 70 i 2854 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Khan_S/0/1/0/all/0/1">Salman S. Khan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sundar_V/0/1/0/all/0/1">Varun Sundar</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Boominathan_V/0/1/0/all/0/1">Vivek Boominathan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Veeraraghavan_A/0/1/0/all/0/1">Ashok Veeraraghavan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Mitra_K/0/1/0/all/0/1">Kaushik Mitra</a></p> Err codemadness.org 70 i 2855 Err codemadness.org 70 i 2856 <p>Lensless imaging has emerged as a potential solution towards realizing Err codemadness.org 70 i 2857 ultra-miniature cameras by eschewing the bulky lens in a traditional camera. Err codemadness.org 70 i 2858 Without a focusing lens, the lensless cameras rely on computational algorithms Err codemadness.org 70 i 2859 to recover the scenes from multiplexed measurements. However, the current Err codemadness.org 70 i 2860 iterative-optimization-based reconstruction algorithms produce noisier and Err codemadness.org 70 i 2861 perceptually poorer images. In this work, we propose a non-iterative deep Err codemadness.org 70 i 2862 learning based reconstruction approach that results in orders of magnitude Err codemadness.org 70 i 2863 improvement in image quality for lensless reconstructions. Our approach, called Err codemadness.org 70 i 2864 $\textit{FlatNet}$, lays down a framework for reconstructing high-quality Err codemadness.org 70 i 2865 photorealistic images from mask-based lensless cameras, where the camera's Err codemadness.org 70 i 2866 forward model formulation is known. FlatNet consists of two stages: (1) an Err codemadness.org 70 i 2867 inversion stage that maps the measurement into a space of intermediate Err codemadness.org 70 i 2868 reconstruction by learning parameters within the forward model formulation, and Err codemadness.org 70 i 2869 (2) a perceptual enhancement stage that improves the perceptual quality of this Err codemadness.org 70 i 2870 intermediate reconstruction. These stages are trained together in an end-to-end Err codemadness.org 70 i 2871 manner. We show high-quality reconstructions by performing extensive Err codemadness.org 70 i 2872 experiments on real and challenging scenes using two different types of Err codemadness.org 70 i 2873 lensless prototypes: one which uses a separable forward model and another, Err codemadness.org 70 i 2874 which uses a more general non-separable cropped-convolution model. Our Err codemadness.org 70 i 2875 end-to-end approach is fast, produces photorealistic reconstructions, and is Err codemadness.org 70 i 2876 easy to adopt for other mask-based lensless cameras. Err codemadness.org 70 i 2877 </p> Err codemadness.org 70 i 2878 Err codemadness.org 70 i 2879 Err codemadness.org 70 i 2880 Err codemadness.org 70 i 2881 Self-awareness in intelligent vehicles: Feature based dynamic Bayesian models for abnormality detection. (arXiv:2010.15441v1 [cs.LG]) Err codemadness.org 70 i 2882 http://fr.arxiv.org/abs/2010.15441 Err codemadness.org 70 i 2883 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kanapram_D/0/1/0/all/0/1">Divya Thekke Kanapram</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Marin_Plaza_P/0/1/0/all/0/1">Pablo Marin-Plaza</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Marcenaro_L/0/1/0/all/0/1">Lucio Marcenaro</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Martin_D/0/1/0/all/0/1">David Martin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Escalera_A/0/1/0/all/0/1">Arturo de la Escalera</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Regazzoni_C/0/1/0/all/0/1">Carlo Regazzoni</a></p> Err codemadness.org 70 i 2884 Err codemadness.org 70 i 2885 <p>The evolution of Intelligent Transportation Systems in recent times Err codemadness.org 70 i 2886 necessitates the development of self-awareness in agents. Before the intensive Err codemadness.org 70 i 2887 use of Machine Learning, the detection of abnormalities was manually programmed Err codemadness.org 70 i 2888 by checking every variable and creating huge nested conditions that are very Err codemadness.org 70 i 2889 difficult to track. This paper aims to introduce a novel method to develop Err codemadness.org 70 i 2890 self-awareness in autonomous vehicles that mainly focuses on detecting abnormal Err codemadness.org 70 i 2891 situations around the considered agents. Multi-sensory time-series data from Err codemadness.org 70 i 2892 the vehicles are used to develop the data-driven Dynamic Bayesian Network (DBN) Err codemadness.org 70 i 2893 models used for future state prediction and the detection of dynamic Err codemadness.org 70 i 2894 abnormalities. Moreover, an initial level collective awareness model that can Err codemadness.org 70 i 2895 perform joint anomaly detection in co-operative tasks is proposed. The GNG Err codemadness.org 70 i 2896 algorithm learns the DBN models' discrete node variables; probabilistic Err codemadness.org 70 i 2897 transition links connect the node variables. A Markov Jump Particle Filter Err codemadness.org 70 i 2898 (MJPF) is applied to predict future states and detect when the vehicle is Err codemadness.org 70 i 2899 potentially misbehaving using learned DBNs as filter parameters. In this paper, Err codemadness.org 70 i 2900 datasets from real experiments of autonomous vehicles performing various tasks Err codemadness.org 70 i 2901 used to learn and test a set of switching DBN models. Err codemadness.org 70 i 2902 </p> Err codemadness.org 70 i 2903 Err codemadness.org 70 i 2904 Err codemadness.org 70 i 2905 Err codemadness.org 70 i 2906 Advanced Python Performance Monitoring with Score-P. (arXiv:2010.15444v1 [cs.DC]) Err codemadness.org 70 i 2907 http://fr.arxiv.org/abs/2010.15444 Err codemadness.org 70 i 2908 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gocht_A/0/1/0/all/0/1">Andreas Gocht</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Schone_R/0/1/0/all/0/1">Robert Sch&#xf6;ne</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frenzel_J/0/1/0/all/0/1">Jan Frenzel</a></p> Err codemadness.org 70 i 2909 Err codemadness.org 70 i 2910 <p>Within the last years, Python became more prominent in the scientific Err codemadness.org 70 i 2911 community and is now used for simulations, machine learning, and data analysis. Err codemadness.org 70 i 2912 All these tasks profit from additional compute power offered by parallelism and Err codemadness.org 70 i 2913 offloading. In the domain of High Performance Computing (HPC), we can look back Err codemadness.org 70 i 2914 to decades of experience exploiting different levels of parallelism on the Err codemadness.org 70 i 2915 core, node or inter-node level, as well as utilising accelerators. By using Err codemadness.org 70 i 2916 performance analysis tools to investigate all these levels of parallelism, we Err codemadness.org 70 i 2917 can tune applications for unprecedented performance. Unfortunately, standard Err codemadness.org 70 i 2918 Python performance analysis tools cannot cope with highly parallel programs. Err codemadness.org 70 i 2919 Since the development of such software is complex and error-prone, we Err codemadness.org 70 i 2920 demonstrate an easy-to-use solution based on an existing tool infrastructure Err codemadness.org 70 i 2921 for performance analysis. In this paper, we describe how to apply the Err codemadness.org 70 i 2922 established instrumentation framework \scorep to trace Python applications. We Err codemadness.org 70 i 2923 finish with a study of the overhead that users can expect for instrumenting Err codemadness.org 70 i 2924 their applications. Err codemadness.org 70 i 2925 </p> Err codemadness.org 70 i 2926 Err codemadness.org 70 i 2927 Err codemadness.org 70 i 2928 Err codemadness.org 70 i 2929 Progressive Voice Trigger Detection: Accuracy vs Latency. (arXiv:2010.15446v1 [eess.AS]) Err codemadness.org 70 i 2930 http://fr.arxiv.org/abs/2010.15446 Err codemadness.org 70 i 2931 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Sigtia_S/0/1/0/all/0/1">Siddharth Sigtia</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Bridle_J/0/1/0/all/0/1">John Bridle</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Richards_H/0/1/0/all/0/1">Hywel Richards</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Clark_P/0/1/0/all/0/1">Pascal Clark</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Marchi_E/0/1/0/all/0/1">Erik Marchi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Garg_V/0/1/0/all/0/1">Vineet Garg</a></p> Err codemadness.org 70 i 2932 Err codemadness.org 70 i 2933 <p>We present an architecture for voice trigger detection for virtual Err codemadness.org 70 i 2934 assistants. The main idea in this work is to exploit information in words that Err codemadness.org 70 i 2935 immediately follow the trigger phrase. We first demonstrate that by including Err codemadness.org 70 i 2936 more audio context after a detected trigger phrase, we can indeed get a more Err codemadness.org 70 i 2937 accurate decision. However, waiting to listen to more audio each time incurs a Err codemadness.org 70 i 2938 latency increase. Progressive Voice Trigger Detection allows us to trade-off Err codemadness.org 70 i 2939 latency and accuracy by accepting clear trigger candidates quickly, but waiting Err codemadness.org 70 i 2940 for more context to decide whether to accept more marginal examples. Using a Err codemadness.org 70 i 2941 two-stage architecture, we show that by delaying the decision for just 3% of Err codemadness.org 70 i 2942 detected true triggers in the test set, we are able to obtain a relative Err codemadness.org 70 i 2943 improvement of 66% in false rejection rate, while incurring only a negligible Err codemadness.org 70 i 2944 increase in latency. Err codemadness.org 70 i 2945 </p> Err codemadness.org 70 i 2946 Err codemadness.org 70 i 2947 Err codemadness.org 70 i 2948 Err codemadness.org 70 i 2949 Capacity-achieving codes: a review on double transitivity. (arXiv:2010.15453v1 [cs.IT]) Err codemadness.org 70 i 2950 http://fr.arxiv.org/abs/2010.15453 Err codemadness.org 70 i 2951 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ivanov_K/0/1/0/all/0/1">Kirill Ivanov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Urbanke_R/0/1/0/all/0/1">R&#xfc;diger L. Urbanke</a></p> Err codemadness.org 70 i 2952 Err codemadness.org 70 i 2953 <p>Recently it was proved that if a linear code is invariant under the action of Err codemadness.org 70 i 2954 a doubly transitive permutation group, it achieves the capacity of erasure Err codemadness.org 70 i 2955 channel. Therefore, it is of sufficient interest to classify all codes, Err codemadness.org 70 i 2956 invariant under such permutation groups. We take a step in this direction and Err codemadness.org 70 i 2957 give a review of all suitable groups and the known results on codes invariant Err codemadness.org 70 i 2958 under these groups. It turns out that there are capacity-achieving families of Err codemadness.org 70 i 2959 algebraic geometric codes. Err codemadness.org 70 i 2960 </p> Err codemadness.org 70 i 2961 Err codemadness.org 70 i 2962 Err codemadness.org 70 i 2963 Err codemadness.org 70 i 2964 Scalable Federated Learning over Passive Optical Networks. (arXiv:2010.15454v1 [cs.NI]) Err codemadness.org 70 i 2965 http://fr.arxiv.org/abs/2010.15454 Err codemadness.org 70 i 2966 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1">Jun Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_L/0/1/0/all/0/1">Lei Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1">Jiajia Chen</a></p> Err codemadness.org 70 i 2967 Err codemadness.org 70 i 2968 <p>Two-step aggregation is introduced to facilitate scalable federated learning Err codemadness.org 70 i 2969 (SFL) over passive optical networks (PONs). Results reveal that the SFL keeps Err codemadness.org 70 i 2970 the required PON upstream bandwidth constant regardless of the number of Err codemadness.org 70 i 2971 involved clients, while bringing ~10% learning accuracy improvement. Err codemadness.org 70 i 2972 </p> Err codemadness.org 70 i 2973 Err codemadness.org 70 i 2974 Err codemadness.org 70 i 2975 Err codemadness.org 70 i 2976 Optimal Sharing and and Fair Cost Allocation of Community Energy Storage. (arXiv:2010.15455v1 [cs.GT]) Err codemadness.org 70 i 2977 http://fr.arxiv.org/abs/2010.15455 Err codemadness.org 70 i 2978 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_Y/0/1/0/all/0/1">Yu Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hu_G/0/1/0/all/0/1">Guoqiang Hu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Spanos_C/0/1/0/all/0/1">Costas J. Spanos</a></p> Err codemadness.org 70 i 2979 Err codemadness.org 70 i 2980 <p>This paper studies an ES sharing model where multiple buildings cooperatively Err codemadness.org 70 i 2981 invest and share a community ES (CES) to harness economic benefits from on-site Err codemadness.org 70 i 2982 renewable integration and utility price arbitrage. Particularly, we formulate Err codemadness.org 70 i 2983 the problem that integrates the optimal ES sizing, operation and cost Err codemadness.org 70 i 2984 allocation as a coalition game, which are generally addressed separately in the Err codemadness.org 70 i 2985 literature. Particularly, we address the fair ex-post cost allocation which has Err codemadness.org 70 i 2986 not been well studied. To overcome the computational challenge of computing the Err codemadness.org 70 i 2987 entire information of explicit characteristic functions that takes exponential Err codemadness.org 70 i 2988 time, we propose a fair cost allocation based on nucleolus by employing a Err codemadness.org 70 i 2989 constraints generation technique. We study the fairness and computational Err codemadness.org 70 i 2990 efficiency of the method through a number of case studies. The numeric results Err codemadness.org 70 i 2991 imply that the proposed method outperforms the Shapley approach and Err codemadness.org 70 i 2992 proportional method either in computational efficiency or fairness. Notably, Err codemadness.org 70 i 2993 for the proposed method, only a small fraction of characteristic functions Err codemadness.org 70 i 2994 (2.54%) is computed to achieve the cost allocation versus the entire Err codemadness.org 70 i 2995 information required by Shapley approach. With the proposed cost allocation, we Err codemadness.org 70 i 2996 investigate the enhanced economic benefits of the CES model for individual Err codemadness.org 70 i 2997 buildings over individual ES (IES) installation. We see the CES model provides Err codemadness.org 70 i 2998 higher cost reduction to each committed buildings. Moreover, the value of Err codemadness.org 70 i 2999 storage is obviously improved (about 1.83 times) with the CES model over the Err codemadness.org 70 i 3000 IES model. Err codemadness.org 70 i 3001 </p> Err codemadness.org 70 i 3002 Err codemadness.org 70 i 3003 Err codemadness.org 70 i 3004 Err codemadness.org 70 i 3005 Multilayer Clustered Graph Learning. (arXiv:2010.15456v1 [cs.LG]) Err codemadness.org 70 i 3006 http://fr.arxiv.org/abs/2010.15456 Err codemadness.org 70 i 3007 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gheche_M/0/1/0/all/0/1">Mireille El Gheche</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frossard_P/0/1/0/all/0/1">Pascal Frossard</a></p> Err codemadness.org 70 i 3008 Err codemadness.org 70 i 3009 <p>Multilayer graphs are appealing mathematical tools for modeling multiple Err codemadness.org 70 i 3010 types of relationship in the data. In this paper, we aim at analyzing Err codemadness.org 70 i 3011 multilayer graphs by properly combining the information provided by individual Err codemadness.org 70 i 3012 layers, while preserving the specific structure that allows us to eventually Err codemadness.org 70 i 3013 identify communities or clusters that are crucial in the analysis of graph Err codemadness.org 70 i 3014 data. To do so, we learn a clustered representative graph by solving an Err codemadness.org 70 i 3015 optimization problem that involves a data fidelity term to the observed layers, Err codemadness.org 70 i 3016 and a regularization pushing for a sparse and community-aware graph. We use the Err codemadness.org 70 i 3017 contrastive loss as a data fidelity term, in order to properly aggregate the Err codemadness.org 70 i 3018 observed layers into a representative graph. The regularization is based on a Err codemadness.org 70 i 3019 measure of graph sparsification called "effective resistance", coupled with a Err codemadness.org 70 i 3020 penalization of the first few eigenvalues of the representative graph Laplacian Err codemadness.org 70 i 3021 matrix to favor the formation of communities. The proposed optimization problem Err codemadness.org 70 i 3022 is nonconvex but fully differentiable, and thus can be solved via the projected Err codemadness.org 70 i 3023 gradient method. Experiments show that our method leads to a significant Err codemadness.org 70 i 3024 improvement w.r.t. state-of-the-art multilayer graph learning algorithms for Err codemadness.org 70 i 3025 solving clustering problems. Err codemadness.org 70 i 3026 </p> Err codemadness.org 70 i 3027 Err codemadness.org 70 i 3028 Err codemadness.org 70 i 3029 Err codemadness.org 70 i 3030 FiGLearn: Filter and Graph Learning using Optimal Transport. (arXiv:2010.15457v1 [cs.LG]) Err codemadness.org 70 i 3031 http://fr.arxiv.org/abs/2010.15457 Err codemadness.org 70 i 3032 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Minder_M/0/1/0/all/0/1">Matthias Minder</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Farsijani_Z/0/1/0/all/0/1">Zahra Farsijani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shah_D/0/1/0/all/0/1">Dhruti Shah</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gheche_M/0/1/0/all/0/1">Mireille El Gheche</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frossard_P/0/1/0/all/0/1">Pascal Frossard</a></p> Err codemadness.org 70 i 3033 Err codemadness.org 70 i 3034 <p>In many applications, a dataset can be considered as a set of observed Err codemadness.org 70 i 3035 signals that live on an unknown underlying graph structure. Some of these Err codemadness.org 70 i 3036 signals may be seen as white noise that has been filtered on the graph topology Err codemadness.org 70 i 3037 by a graph filter. Hence, the knowledge of the filter and the graph provides Err codemadness.org 70 i 3038 valuable information about the underlying data generation process and the Err codemadness.org 70 i 3039 complex interactions that arise in the dataset. We hence introduce a novel Err codemadness.org 70 i 3040 graph signal processing framework for jointly learning the graph and its Err codemadness.org 70 i 3041 generating filter from signal observations. We cast a new optimisation problem Err codemadness.org 70 i 3042 that minimises the Wasserstein distance between the distribution of the signal Err codemadness.org 70 i 3043 observations and the filtered signal distribution model. Our proposed method Err codemadness.org 70 i 3044 outperforms state-of-the-art graph learning frameworks on synthetic data. We Err codemadness.org 70 i 3045 then apply our method to a temperature anomaly dataset, and further show how Err codemadness.org 70 i 3046 this framework can be used to infer missing values if only very little Err codemadness.org 70 i 3047 information is available. Err codemadness.org 70 i 3048 </p> Err codemadness.org 70 i 3049 Err codemadness.org 70 i 3050 Err codemadness.org 70 i 3051 Err codemadness.org 70 i 3052 Named Entity Recognition for Social Media Texts with Semantic Augmentation. (arXiv:2010.15458v1 [cs.CL]) Err codemadness.org 70 i 3053 http://fr.arxiv.org/abs/2010.15458 Err codemadness.org 70 i 3054 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nie_Y/0/1/0/all/0/1">Yuyang Nie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1">Yuanhe Tian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wan_X/0/1/0/all/0/1">Xiang Wan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Song_Y/0/1/0/all/0/1">Yan Song</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dai_B/0/1/0/all/0/1">Bo Dai</a></p> Err codemadness.org 70 i 3055 Err codemadness.org 70 i 3056 <p>Existing approaches for named entity recognition suffer from data sparsity Err codemadness.org 70 i 3057 problems when conducted on short and informal texts, especially user-generated Err codemadness.org 70 i 3058 social media content. Semantic augmentation is a potential way to alleviate Err codemadness.org 70 i 3059 this problem. Given that rich semantic information is implicitly preserved in Err codemadness.org 70 i 3060 pre-trained word embeddings, they are potential ideal resources for semantic Err codemadness.org 70 i 3061 augmentation. In this paper, we propose a neural-based approach to NER for Err codemadness.org 70 i 3062 social media texts where both local (from running text) and augmented semantics Err codemadness.org 70 i 3063 are taken into account. In particular, we obtain the augmented semantic Err codemadness.org 70 i 3064 information from a large-scale corpus, and propose an attentive semantic Err codemadness.org 70 i 3065 augmentation module and a gate module to encode and aggregate such information, Err codemadness.org 70 i 3066 respectively. Extensive experiments are performed on three benchmark datasets Err codemadness.org 70 i 3067 collected from English and Chinese social media platforms, where the results Err codemadness.org 70 i 3068 demonstrate the superiority of our approach to previous studies across all Err codemadness.org 70 i 3069 three datasets. Err codemadness.org 70 i 3070 </p> Err codemadness.org 70 i 3071 Err codemadness.org 70 i 3072 Err codemadness.org 70 i 3073 Err codemadness.org 70 i 3074 Concatenated Codes for Recovery From Multiple Reads of DNA Sequences. (arXiv:2010.15461v1 [cs.IT]) Err codemadness.org 70 i 3075 http://fr.arxiv.org/abs/2010.15461 Err codemadness.org 70 i 3076 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lenz_A/0/1/0/all/0/1">Andreas Lenz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Maarouf_I/0/1/0/all/0/1">Issam Maarouf</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Welter_L/0/1/0/all/0/1">Lorenz Welter</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wachter_Zeh_A/0/1/0/all/0/1">Antonia Wachter-Zeh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rosnes_E/0/1/0/all/0/1">Eirik Rosnes</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Amat_A/0/1/0/all/0/1">Alexandre Graell i Amat</a></p> Err codemadness.org 70 i 3077 Err codemadness.org 70 i 3078 <p>Decoding sequences that stem from multiple transmissions of a codeword over Err codemadness.org 70 i 3079 an insertion, deletion, and substitution channel is a critical component of Err codemadness.org 70 i 3080 efficient deoxyribonucleic acid (DNA) data storage systems. In this paper, we Err codemadness.org 70 i 3081 consider a concatenated coding scheme with an outer low-density parity-check Err codemadness.org 70 i 3082 code and either an inner convolutional code or a block code. We propose two new Err codemadness.org 70 i 3083 decoding algorithms for inference from multiple received sequences, both Err codemadness.org 70 i 3084 combining the inner code and channel to a joint hidden Markov model to infer Err codemadness.org 70 i 3085 symbolwise a posteriori probabilities (APPs). The first decoder computes the Err codemadness.org 70 i 3086 exact APPs by jointly decoding the received sequences, whereas the second Err codemadness.org 70 i 3087 decoder approximates the APPs by combining the results of separately decoded Err codemadness.org 70 i 3088 received sequences. Using the proposed algorithms, we evaluate the performance Err codemadness.org 70 i 3089 of decoding multiple received sequences by means of achievable information Err codemadness.org 70 i 3090 rates and Monte-Carlo simulations. We show significant performance gains Err codemadness.org 70 i 3091 compared to a single received sequence. Err codemadness.org 70 i 3092 </p> Err codemadness.org 70 i 3093 Err codemadness.org 70 i 3094 Err codemadness.org 70 i 3095 Err codemadness.org 70 i 3096 Self-Supervised Video Representation Using Pretext-Contrastive Learning. (arXiv:2010.15464v1 [cs.CV]) Err codemadness.org 70 i 3097 http://fr.arxiv.org/abs/2010.15464 Err codemadness.org 70 i 3098 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tao_L/0/1/0/all/0/1">Li Tao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_X/0/1/0/all/0/1">Xueting Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yamasaki_T/0/1/0/all/0/1">Toshihiko Yamasaki</a></p> Err codemadness.org 70 i 3099 Err codemadness.org 70 i 3100 <p>Pretext tasks and contrastive learning have been successful in Err codemadness.org 70 i 3101 self-supervised learning for video retrieval and recognition. In this study, we Err codemadness.org 70 i 3102 analyze their optimization targets and utilize the hyper-sphere feature space Err codemadness.org 70 i 3103 to explore the connections between them, indicating the compatibility and Err codemadness.org 70 i 3104 consistency of these two different learning methods. Based on the analysis, we Err codemadness.org 70 i 3105 propose a self-supervised training method, referred as Pretext-Contrastive Err codemadness.org 70 i 3106 Learning (PCL), to learn video representations. Extensive experiments based on Err codemadness.org 70 i 3107 different combinations of pretext task baselines and contrastive losses confirm Err codemadness.org 70 i 3108 the strong agreement with their self-supervised learning targets, demonstrating Err codemadness.org 70 i 3109 the effectiveness and the generality of PCL. The combination of pretext tasks Err codemadness.org 70 i 3110 and contrastive losses showed significant improvements in both video retrieval Err codemadness.org 70 i 3111 and recognition over the corresponding baselines. And we can also outperform Err codemadness.org 70 i 3112 current state-of-the-art methods in the same manner. Further, our PCL is Err codemadness.org 70 i 3113 flexible and can be applied to almost all existing pretext task methods. Err codemadness.org 70 i 3114 </p> Err codemadness.org 70 i 3115 Err codemadness.org 70 i 3116 Err codemadness.org 70 i 3117 Err codemadness.org 70 i 3118 Improving Named Entity Recognition with Attentive Ensemble of Syntactic Information. (arXiv:2010.15466v1 [cs.CL]) Err codemadness.org 70 i 3119 http://fr.arxiv.org/abs/2010.15466 Err codemadness.org 70 i 3120 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nie_Y/0/1/0/all/0/1">Yuyang Nie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1">Yuanhe Tian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Song_Y/0/1/0/all/0/1">Yan Song</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ao_X/0/1/0/all/0/1">Xiang Ao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wan_X/0/1/0/all/0/1">Xiang Wan</a></p> Err codemadness.org 70 i 3121 Err codemadness.org 70 i 3122 <p>Named entity recognition (NER) is highly sensitive to sentential syntactic Err codemadness.org 70 i 3123 and semantic properties where entities may be extracted according to how they Err codemadness.org 70 i 3124 are used and placed in the running text. To model such properties, one could Err codemadness.org 70 i 3125 rely on existing resources to providing helpful knowledge to the NER task; some Err codemadness.org 70 i 3126 existing studies proved the effectiveness of doing so, and yet are limited in Err codemadness.org 70 i 3127 appropriately leveraging the knowledge such as distinguishing the important Err codemadness.org 70 i 3128 ones for particular context. In this paper, we improve NER by leveraging Err codemadness.org 70 i 3129 different types of syntactic information through attentive ensemble, which Err codemadness.org 70 i 3130 functionalizes by the proposed key-value memory networks, syntax attention, and Err codemadness.org 70 i 3131 the gate mechanism for encoding, weighting and aggregating such syntactic Err codemadness.org 70 i 3132 information, respectively. Experimental results on six English and Chinese Err codemadness.org 70 i 3133 benchmark datasets suggest the effectiveness of the proposed model and show Err codemadness.org 70 i 3134 that it outperforms previous studies on all experiment datasets. Err codemadness.org 70 i 3135 </p> Err codemadness.org 70 i 3136 Err codemadness.org 70 i 3137 Err codemadness.org 70 i 3138 Err codemadness.org 70 i 3139 Emergence of Spatial Coordinates via Exploration. (arXiv:2010.15469v1 [cs.LG]) Err codemadness.org 70 i 3140 http://fr.arxiv.org/abs/2010.15469 Err codemadness.org 70 i 3141 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Laflaquiere_A/0/1/0/all/0/1">Alban Laflaqui&#xe8;re</a></p> Err codemadness.org 70 i 3142 Err codemadness.org 70 i 3143 <p>Spatial knowledge is a fundamental building block for the development of Err codemadness.org 70 i 3144 advanced perceptive and cognitive abilities. Traditionally, in robotics, the Err codemadness.org 70 i 3145 Euclidean (x,y,z) coordinate system and the agent's forward model are defined a Err codemadness.org 70 i 3146 priori. We show that a naive agent can autonomously build an internal Err codemadness.org 70 i 3147 coordinate system, with the same dimension and metric regularity as the Err codemadness.org 70 i 3148 external space, simply by learning to predict the outcome of sensorimotor Err codemadness.org 70 i 3149 transitions in a self-supervised way. Err codemadness.org 70 i 3150 </p> Err codemadness.org 70 i 3151 Err codemadness.org 70 i 3152 Err codemadness.org 70 i 3153 Err codemadness.org 70 i 3154 Hybrid mimetic finite-difference and virtual element formulation for coupled poromechanics. (arXiv:2010.15470v1 [math.NA]) Err codemadness.org 70 i 3155 http://fr.arxiv.org/abs/2010.15470 Err codemadness.org 70 i 3156 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Borio_A/0/1/0/all/0/1">Andrea Borio</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Hamon_F/0/1/0/all/0/1">Fran&#xe7;ois Hamon</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Castelletto_N/0/1/0/all/0/1">Nicola Castelletto</a>, <a href="http://fr.arxiv.org/find/math/1/au:+White_J/0/1/0/all/0/1">Joshua A. White</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Settgast_R/0/1/0/all/0/1">Randolph R. Settgast</a></p> Err codemadness.org 70 i 3157 Err codemadness.org 70 i 3158 <p>We present a hybrid mimetic finite-difference and virtual element formulation Err codemadness.org 70 i 3159 for coupled single-phase poromechanics on unstructured meshes. The key Err codemadness.org 70 i 3160 advantage of the scheme is that it is convergent on complex meshes containing Err codemadness.org 70 i 3161 highly distorted cells with arbitrary shapes. We use a local pressure-jump Err codemadness.org 70 i 3162 stabilization method based on unstructured macro-elements to prevent the Err codemadness.org 70 i 3163 development of spurious pressure modes in incompressible problems approaching Err codemadness.org 70 i 3164 undrained conditions. A scalable linear solution strategy is obtained using a Err codemadness.org 70 i 3165 block-triangular preconditioner designed specifically for the saddle-point Err codemadness.org 70 i 3166 systems arising from the proposed discretization. The accuracy and efficiency Err codemadness.org 70 i 3167 of our approach are demonstrated numerically on two-dimensional benchmark Err codemadness.org 70 i 3168 problems. Err codemadness.org 70 i 3169 </p> Err codemadness.org 70 i 3170 Err codemadness.org 70 i 3171 Err codemadness.org 70 i 3172 Err codemadness.org 70 i 3173 Iteratively reweighted greedy set cover. (arXiv:2010.15476v1 [cs.DS]) Err codemadness.org 70 i 3174 http://fr.arxiv.org/abs/2010.15476 Err codemadness.org 70 i 3175 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Alexa_M/0/1/0/all/0/1">Marc Alexa</a></p> Err codemadness.org 70 i 3176 Err codemadness.org 70 i 3177 <p>We empirically analyze a simple heuristic for large sparse set cover Err codemadness.org 70 i 3178 problems. It uses the weighted greedy algorithm as a basic building block. By Err codemadness.org 70 i 3179 multiplicative updates of the weights attached to the elements, the greedy Err codemadness.org 70 i 3180 solution is iteratively improved. The implementation of this algorithm is Err codemadness.org 70 i 3181 trivial and the algorithm is essentially free of parameters that would require Err codemadness.org 70 i 3182 tuning. More iterations can only improve the solution. This set of features Err codemadness.org 70 i 3183 makes the approach attractive for practical problems. Err codemadness.org 70 i 3184 </p> Err codemadness.org 70 i 3185 Err codemadness.org 70 i 3186 Err codemadness.org 70 i 3187 Err codemadness.org 70 i 3188 Learned infinite elements. (arXiv:2010.15479v1 [math.NA]) Err codemadness.org 70 i 3189 http://fr.arxiv.org/abs/2010.15479 Err codemadness.org 70 i 3190 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Hohage_T/0/1/0/all/0/1">Thorsten Hohage</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Lehrenfeld_C/0/1/0/all/0/1">Christoph Lehrenfeld</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Preuss_J/0/1/0/all/0/1">Janosch Preuss</a></p> Err codemadness.org 70 i 3191 Err codemadness.org 70 i 3192 <p>We study the numerical solution of scalar time-harmonic wave equations on Err codemadness.org 70 i 3193 unbounded domains which can be split into a bounded interior domain of primary Err codemadness.org 70 i 3194 interest and an exterior domain with separable geometry. To compute the Err codemadness.org 70 i 3195 solution in the interior domain, approximations to the Dirichlet-to-Neumann Err codemadness.org 70 i 3196 (DtN) map of the exterior domain have to be imposed as transparent boundary Err codemadness.org 70 i 3197 conditions on the artificial coupling boundary. Although the DtN map can be Err codemadness.org 70 i 3198 computed by separation of variables, it is a nonlocal operator with dense Err codemadness.org 70 i 3199 matrix representations, and hence computationally inefficient. Therefore, Err codemadness.org 70 i 3200 approximations of DtN maps by sparse matrices, usually involving additional Err codemadness.org 70 i 3201 degrees of freedom, have been studied intensively in the literature using a Err codemadness.org 70 i 3202 variety of approaches including different types of infinite elements, local Err codemadness.org 70 i 3203 non-reflecting boundary conditions, and perfectly matched layers. The entries Err codemadness.org 70 i 3204 of these sparse matrices are derived analytically, e.g. from transformations or Err codemadness.org 70 i 3205 asymptotic expansions of solutions to the differential equation in the exterior Err codemadness.org 70 i 3206 domain. In contrast, in this paper we propose to `learn' the matrix entries Err codemadness.org 70 i 3207 from the DtN map in its separated form by solving an optimization problem as a Err codemadness.org 70 i 3208 preprocessing step. Theoretical considerations suggest that the approximation Err codemadness.org 70 i 3209 quality of learned infinite elements improves exponentially with increasing Err codemadness.org 70 i 3210 number of infinite element degrees of freedom, which is confirmed in numerical Err codemadness.org 70 i 3211 experiments. These numerical studies also show that learned infinite elements Err codemadness.org 70 i 3212 outperform state-of-the-art methods for the Helmholtz equation. At the same Err codemadness.org 70 i 3213 time, learned infinite elements are much more flexible than traditional methods Err codemadness.org 70 i 3214 as they, e.g., work similarly well for exterior domains involving strong Err codemadness.org 70 i 3215 reflections, for example, for the atmosphere of the Sun, which is strongly Err codemadness.org 70 i 3216 inhomogeneous and exhibits reflections at the corona. Err codemadness.org 70 i 3217 </p> Err codemadness.org 70 i 3218 Err codemadness.org 70 i 3219 Err codemadness.org 70 i 3220 Err codemadness.org 70 i 3221 Convergence of Constrained Anderson Acceleration. (arXiv:2010.15482v1 [math.NA]) Err codemadness.org 70 i 3222 http://fr.arxiv.org/abs/2010.15482 Err codemadness.org 70 i 3223 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Barre_M/0/1/0/all/0/1">Mathieu Barr&#xe9;</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Taylor_A/0/1/0/all/0/1">Adrien Taylor</a>, <a href="http://fr.arxiv.org/find/math/1/au:+dAspremont_A/0/1/0/all/0/1">Alexandre d&#x27;Aspremont</a></p> Err codemadness.org 70 i 3224 Err codemadness.org 70 i 3225 <p>We prove non asymptotic linear convergence rates for the constrained Anderson Err codemadness.org 70 i 3226 acceleration extrapolation scheme. These guarantees come from new upper bounds Err codemadness.org 70 i 3227 on the constrained Chebyshev problem, which consists in minimizing the maximum Err codemadness.org 70 i 3228 absolute value of a polynomial on a bounded real interval with $l_1$ Err codemadness.org 70 i 3229 constraints on its coefficients vector. Constrained Anderson Acceleration has a Err codemadness.org 70 i 3230 numerical cost comparable to that of the original scheme. Err codemadness.org 70 i 3231 </p> Err codemadness.org 70 i 3232 Err codemadness.org 70 i 3233 Err codemadness.org 70 i 3234 Err codemadness.org 70 i 3235 Beyond cross-entropy: learning highly separable feature distributions for robust and accurate classification. (arXiv:2010.15487v1 [cs.CV]) Err codemadness.org 70 i 3236 http://fr.arxiv.org/abs/2010.15487 Err codemadness.org 70 i 3237 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ali_A/0/1/0/all/0/1">Arslan Ali</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Migliorati_A/0/1/0/all/0/1">Andrea Migliorati</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bianchi_T/0/1/0/all/0/1">Tiziano Bianchi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Magli_E/0/1/0/all/0/1">Enrico Magli</a></p> Err codemadness.org 70 i 3238 Err codemadness.org 70 i 3239 <p>Deep learning has shown outstanding performance in several applications Err codemadness.org 70 i 3240 including image classification. However, deep classifiers are known to be Err codemadness.org 70 i 3241 highly vulnerable to adversarial attacks, in that a minor perturbation of the Err codemadness.org 70 i 3242 input can easily lead to an error. Providing robustness to adversarial attacks Err codemadness.org 70 i 3243 is a very challenging task especially in problems involving a large number of Err codemadness.org 70 i 3244 classes, as it typically comes at the expense of an accuracy decrease. In this Err codemadness.org 70 i 3245 work, we propose the Gaussian class-conditional simplex (GCCS) loss: a novel Err codemadness.org 70 i 3246 approach for training deep robust multiclass classifiers that provides Err codemadness.org 70 i 3247 adversarial robustness while at the same time achieving or even surpassing the Err codemadness.org 70 i 3248 classification accuracy of state-of-the-art methods. Differently from other Err codemadness.org 70 i 3249 frameworks, the proposed method learns a mapping of the input classes onto Err codemadness.org 70 i 3250 target distributions in a latent space such that the classes are linearly Err codemadness.org 70 i 3251 separable. Instead of maximizing the likelihood of target labels for individual Err codemadness.org 70 i 3252 samples, our objective function pushes the network to produce feature Err codemadness.org 70 i 3253 distributions yielding high inter-class separation. The mean values of the Err codemadness.org 70 i 3254 distributions are centered on the vertices of a simplex such that each class is Err codemadness.org 70 i 3255 at the same distance from every other class. We show that the regularization of Err codemadness.org 70 i 3256 the latent space based on our approach yields excellent classification accuracy Err codemadness.org 70 i 3257 and inherently provides robustness to multiple adversarial attacks, both Err codemadness.org 70 i 3258 targeted and untargeted, outperforming state-of-the-art approaches over Err codemadness.org 70 i 3259 challenging datasets. Err codemadness.org 70 i 3260 </p> Err codemadness.org 70 i 3261 Err codemadness.org 70 i 3262 Err codemadness.org 70 i 3263 Err codemadness.org 70 i 3264 Linearizing Combinators. (arXiv:2010.15490v1 [math.CT]) Err codemadness.org 70 i 3265 http://fr.arxiv.org/abs/2010.15490 Err codemadness.org 70 i 3266 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Cockett_R/0/1/0/all/0/1">Robin Cockett</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Lemay_J/0/1/0/all/0/1">Jean-Simon Pacaud Lemay</a></p> Err codemadness.org 70 i 3267 Err codemadness.org 70 i 3268 <p>In 2017, Bauer, Johnson, Osborne, Riehl, and Tebbe (BJORT) showed that the Err codemadness.org 70 i 3269 Abelian functor calculus provides an example of a Cartesian differential Err codemadness.org 70 i 3270 category. The definition of a Cartesian differential category is based on a Err codemadness.org 70 i 3271 differential combinator which directly formalizes the total derivative from Err codemadness.org 70 i 3272 multivariable calculus. However, in the aforementioned work the authors used Err codemadness.org 70 i 3273 techniques from Goodwillie's functor calculus to establish a linearization Err codemadness.org 70 i 3274 process from which they then derived a differential combinator. This raised the Err codemadness.org 70 i 3275 question of what the precise relationship between linearization and having a Err codemadness.org 70 i 3276 differential combinator might be. Err codemadness.org 70 i 3277 </p> Err codemadness.org 70 i 3278 <p>In this paper, we introduce the notion of a linearizing combinator which Err codemadness.org 70 i 3279 abstracts linearization in the Abelian functor calculus. We then use it to Err codemadness.org 70 i 3280 provide an alternative axiomatization of a Cartesian differential category. Err codemadness.org 70 i 3281 Every Cartesian differential category comes equipped with a canonical Err codemadness.org 70 i 3282 linearizing combinator obtained by differentiation at zero. Conversely, a Err codemadness.org 70 i 3283 differential combinator can be constructed \`a la BJORT when one has a system Err codemadness.org 70 i 3284 of partial linearizing combinators in each context. Thus, while linearizing Err codemadness.org 70 i 3285 combinators do provide an alternative axiomatization of Cartesian differential Err codemadness.org 70 i 3286 categories, an explicit notion of partial linearization is required. This is in Err codemadness.org 70 i 3287 contrast to the situation for differential combinators where partial Err codemadness.org 70 i 3288 differentiation is automatic in the presence of total differentiation. The Err codemadness.org 70 i 3289 ability to form a system of partial linearizing combinators from a total Err codemadness.org 70 i 3290 linearizing combinator, while not being possible in general, is possible when Err codemadness.org 70 i 3291 the setting is Cartesian closed. Err codemadness.org 70 i 3292 </p> Err codemadness.org 70 i 3293 Err codemadness.org 70 i 3294 Err codemadness.org 70 i 3295 Err codemadness.org 70 i 3296 A Novel Fast 3D Single Image Super-Resolution Algorithm. (arXiv:2010.15491v1 [eess.IV]) Err codemadness.org 70 i 3297 http://fr.arxiv.org/abs/2010.15491 Err codemadness.org 70 i 3298 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Tuador_N/0/1/0/all/0/1">Nwigbo Kenule Tuador</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pham_D/0/1/0/all/0/1">Duong Hung Pham</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Michetti_J/0/1/0/all/0/1">J&#xe9;r&#xf4;me Michetti</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Basarab_A/0/1/0/all/0/1">Adrian Basarab</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kouame_D/0/1/0/all/0/1">Denis Kouam&#xe9;</a></p> Err codemadness.org 70 i 3299 Err codemadness.org 70 i 3300 <p>This paper introduces a novel computationally efficient method of solving the Err codemadness.org 70 i 3301 3D single image super-resolution (SR) problem, i.e., reconstruction of a Err codemadness.org 70 i 3302 high-resolution volume from its low-resolution counterpart. The main Err codemadness.org 70 i 3303 contribution lies in the original way of handling simultaneously the associated Err codemadness.org 70 i 3304 decimation and blurring operators, based on their underlying properties in the Err codemadness.org 70 i 3305 frequency domain. In particular, the proposed decomposition technique of the 3D Err codemadness.org 70 i 3306 decimation operator allows a straightforward implementation for Tikhonov Err codemadness.org 70 i 3307 regularization, and can be further used to take into consideration other Err codemadness.org 70 i 3308 regularization functions such as the total variation, enabling the Err codemadness.org 70 i 3309 computational cost of state-of-the-art algorithms to be considerably decreased. Err codemadness.org 70 i 3310 Numerical experiments carried out showed that the proposed approach outperforms Err codemadness.org 70 i 3311 existing 3D SR methods. Err codemadness.org 70 i 3312 </p> Err codemadness.org 70 i 3313 Err codemadness.org 70 i 3314 Err codemadness.org 70 i 3315 Err codemadness.org 70 i 3316 "What, not how" -- Solving an under-actuated insertion task from scratch. (arXiv:2010.15492v1 [cs.RO]) Err codemadness.org 70 i 3317 http://fr.arxiv.org/abs/2010.15492 Err codemadness.org 70 i 3318 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Vezzani_G/0/1/0/all/0/1">Giulia Vezzani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Neunert_M/0/1/0/all/0/1">Michael Neunert</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wulfmeier_M/0/1/0/all/0/1">Markus Wulfmeier</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jeong_R/0/1/0/all/0/1">Rae Jeong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lampe_T/0/1/0/all/0/1">Thomas Lampe</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Siegel_N/0/1/0/all/0/1">Noah Siegel</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hafner_R/0/1/0/all/0/1">Roland Hafner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Abdolmaleki_A/0/1/0/all/0/1">Abbas Abdolmaleki</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Riedmiller_M/0/1/0/all/0/1">Martin Riedmiller</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nori_F/0/1/0/all/0/1">Francesco Nori</a></p> Err codemadness.org 70 i 3319 Err codemadness.org 70 i 3320 <p>Robot manipulation requires a complex set of skills that need to be carefully Err codemadness.org 70 i 3321 combined and coordinated to solve a task. Yet, most ReinforcementLearning (RL) Err codemadness.org 70 i 3322 approaches in robotics study tasks which actually consist only of a single Err codemadness.org 70 i 3323 manipulation skill, such as grasping an object or inserting a pre-grasped Err codemadness.org 70 i 3324 object. As a result the skill ('how' to solve the task) but not the actual goal Err codemadness.org 70 i 3325 of a complete manipulation ('what' to solve) is specified. In contrast, we Err codemadness.org 70 i 3326 study a complex manipulation goal that requires an agent to learn and combine Err codemadness.org 70 i 3327 diverse manipulation skills. We propose a challenging, highly under-actuated Err codemadness.org 70 i 3328 peg-in-hole task with a free, rotational asymmetrical peg, requiring a broad Err codemadness.org 70 i 3329 range of manipulation skills. While correct peg (re-)orientation is a Err codemadness.org 70 i 3330 requirement for successful insertion, there is no reward associated with it. Err codemadness.org 70 i 3331 Hence an agent needs to understand this pre-condition and learn the skill to Err codemadness.org 70 i 3332 fulfil it. The final insertion reward is sparse, allowing freedom in the Err codemadness.org 70 i 3333 solution and leading to complex emerging behaviour not envisioned during the Err codemadness.org 70 i 3334 task design. We tackle the problem in a multi-task RL framework using Scheduled Err codemadness.org 70 i 3335 Auxiliary Control (SAC-X) combined with Regularized Hierarchical Policy Err codemadness.org 70 i 3336 Optimization (RHPO) which successfully solves the task in simulation and from Err codemadness.org 70 i 3337 scratch on a single robot where data is severely limited. Err codemadness.org 70 i 3338 </p> Err codemadness.org 70 i 3339 Err codemadness.org 70 i 3340 Err codemadness.org 70 i 3341 Err codemadness.org 70 i 3342 Enhancing Vulnerable Road User Safety: A Survey of Existing Practices and Consideration for Using Mobile Devices for V2X Connections. (arXiv:2010.15502v1 [cs.NI]) Err codemadness.org 70 i 3343 http://fr.arxiv.org/abs/2010.15502 Err codemadness.org 70 i 3344 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dasanayaka_N/0/1/0/all/0/1">Nishanthi Dasanayaka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hasan_K/0/1/0/all/0/1">Khondokar Fida Hasan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_C/0/1/0/all/0/1">Charles Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1">Yanming Feng</a></p> Err codemadness.org 70 i 3345 Err codemadness.org 70 i 3346 <p>Vulnerable road users (VRUs) such as pedestrians, cyclists and motorcyclists Err codemadness.org 70 i 3347 are at the highest risk in the road traffic environment. Globally, over half of Err codemadness.org 70 i 3348 road traffic deaths are vulnerable road users. Although substantial efforts are Err codemadness.org 70 i 3349 being made to improve VRU safety from engineering solutions to law enforcement, Err codemadness.org 70 i 3350 the death toll of VRUs' continues to rise. The emerging technology, Cooperative Err codemadness.org 70 i 3351 Intelligent Transportation System (C-ITS), has the proven potential to enhance Err codemadness.org 70 i 3352 road safety by enabling wireless communication to exchange information among Err codemadness.org 70 i 3353 road users. Such exchanged information is utilized for creating situational Err codemadness.org 70 i 3354 awareness and detecting any potential collisions in advance to take necessary Err codemadness.org 70 i 3355 measures to avoid any possible road casualties. The current state-of-the-art Err codemadness.org 70 i 3356 solutions of C-ITS for VRU safety, however, are limited to unidirectional Err codemadness.org 70 i 3357 communication where VRUs are only responsible for alerting their presence to Err codemadness.org 70 i 3358 drivers with the intention of avoiding collisions. This one-way interaction is Err codemadness.org 70 i 3359 substantially limiting the enormous potential of C-ITS which otherwise can be Err codemadness.org 70 i 3360 employed to devise a more effective solution for the VRU safety where VRU can Err codemadness.org 70 i 3361 be equipped with bidirectional communication with full C-ITS functionalities. Err codemadness.org 70 i 3362 To address such problems and to explore better C-ITS solution suggestions for Err codemadness.org 70 i 3363 VRU, this paper reviewed and evaluated the current technologies and safety Err codemadness.org 70 i 3364 methods proposed for VRU safety over the period 2007-2020. Later, it presents Err codemadness.org 70 i 3365 the design considerations for a cellular-based Vehicle-to-VRU (V2VRU) Err codemadness.org 70 i 3366 communication system along with potential challenges of a cellular-based Err codemadness.org 70 i 3367 approach to provide necessary recommendations. Err codemadness.org 70 i 3368 </p> Err codemadness.org 70 i 3369 Err codemadness.org 70 i 3370 Err codemadness.org 70 i 3371 Err codemadness.org 70 i 3372 A stochastic $\theta$-SEIHRD model: adding randomness to the COVID-19 spread. (arXiv:2010.15504v1 [math.NA]) Err codemadness.org 70 i 3373 http://fr.arxiv.org/abs/2010.15504 Err codemadness.org 70 i 3374 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Leitao_A/0/1/0/all/0/1">&#xc1;lvaro Leitao</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Vazquez_C/0/1/0/all/0/1">Carlos V&#xe1;zquez</a></p> Err codemadness.org 70 i 3375 Err codemadness.org 70 i 3376 <p>In this article we mainly extend the deterministic model developed in [10] to Err codemadness.org 70 i 3377 a stochastic setting. More precisely, we incorporated randomness in some Err codemadness.org 70 i 3378 coefficients by assuming that they follow a prescribed stochastic dynamics. In Err codemadness.org 70 i 3379 this way, the model variables are now represented by stochastic process, that Err codemadness.org 70 i 3380 can be simulated by appropriately solve the system of stochastic differential Err codemadness.org 70 i 3381 equations. Thus, the model becomes more complete and flexible than the Err codemadness.org 70 i 3382 deterministic analogous, as it incorporates additional uncertainties which are Err codemadness.org 70 i 3383 present in more realistic situations. In particular, confidence intervals for Err codemadness.org 70 i 3384 the main variables and worst case scenarios can be computed. Err codemadness.org 70 i 3385 </p> Err codemadness.org 70 i 3386 Err codemadness.org 70 i 3387 Err codemadness.org 70 i 3388 Err codemadness.org 70 i 3389 Dynamic Formation Reshaping Based on Point Set Registration in a Swarm of Drones. (arXiv:2010.15506v1 [cs.RO]) Err codemadness.org 70 i 3390 http://fr.arxiv.org/abs/2010.15506 Err codemadness.org 70 i 3391 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1">Jawad N. Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1">Sherif A.S. Mohamed</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1">Mohammad-Hashem Haghbayan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1">Jukka Heikkonen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1">Hannu Tenhunen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_M/0/1/0/all/0/1">Muhammad Mehboob Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1">Juha Plosila</a></p> Err codemadness.org 70 i 3392 Err codemadness.org 70 i 3393 <p>This work focuses on the formation reshaping in an optimized manner in Err codemadness.org 70 i 3394 autonomous swarm of drones. Here, the two main problems are: 1) how to break Err codemadness.org 70 i 3395 and reshape the initial formation in an optimal manner, and 2) how to do such Err codemadness.org 70 i 3396 reformation while minimizing the overall deviation of the drones and the Err codemadness.org 70 i 3397 overall time, i.e., without slowing down. To address the first problem, we Err codemadness.org 70 i 3398 introduce a set of routines for the drones/agents to follow while reshaping to Err codemadness.org 70 i 3399 a secondary formation shape. And the second problem is resolved by utilizing Err codemadness.org 70 i 3400 the temperature function reduction technique, originally used in the point set Err codemadness.org 70 i 3401 registration process. The goal is to be able to dynamically reform the shape of Err codemadness.org 70 i 3402 multi-agent based swarm in near-optimal manner while going through narrow Err codemadness.org 70 i 3403 openings between, for instance obstacles, and then bringing the agents back to Err codemadness.org 70 i 3404 their original shape after passing through the narrow passage using point set Err codemadness.org 70 i 3405 registration technique. Err codemadness.org 70 i 3406 </p> Err codemadness.org 70 i 3407 Err codemadness.org 70 i 3408 Err codemadness.org 70 i 3409 Err codemadness.org 70 i 3410 Dynamic Resource-aware Corner Detection for Bio-inspired Vision Sensors. (arXiv:2010.15507v1 [cs.CV]) Err codemadness.org 70 i 3411 http://fr.arxiv.org/abs/2010.15507 Err codemadness.org 70 i 3412 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1">Sherif A.S. Mohamed</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1">Jawad N. Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1">Mohammad-hashem Haghbayan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Miele_A/0/1/0/all/0/1">Antonio Miele</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1">Jukka Heikkonen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1">Hannu Tenhunen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1">Juha Plosila</a></p> Err codemadness.org 70 i 3413 Err codemadness.org 70 i 3414 <p>Event-based cameras are vision devices that transmit only brightness changes Err codemadness.org 70 i 3415 with low latency and ultra-low power consumption. Such characteristics make Err codemadness.org 70 i 3416 event-based cameras attractive in the field of localization and object tracking Err codemadness.org 70 i 3417 in resource-constrained systems. Since the number of generated events in such Err codemadness.org 70 i 3418 cameras is huge, the selection and filtering of the incoming events are Err codemadness.org 70 i 3419 beneficial from both increasing the accuracy of the features and reducing the Err codemadness.org 70 i 3420 computational load. In this paper, we present an algorithm to detect Err codemadness.org 70 i 3421 asynchronous corners from a stream of events in real-time on embedded systems. Err codemadness.org 70 i 3422 The algorithm is called the Three Layer Filtering-Harris or TLF-Harris Err codemadness.org 70 i 3423 algorithm. The algorithm is based on an events' filtering strategy whose Err codemadness.org 70 i 3424 purpose is 1) to increase the accuracy by deliberately eliminating some Err codemadness.org 70 i 3425 incoming events, i.e., noise, and 2) to improve the real-time performance of Err codemadness.org 70 i 3426 the system, i.e., preserving a constant throughput in terms of input events per Err codemadness.org 70 i 3427 second, by discarding unnecessary events with a limited accuracy loss. An Err codemadness.org 70 i 3428 approximation of the Harris algorithm, in turn, is used to exploit its Err codemadness.org 70 i 3429 high-quality detection capability with a low-complexity implementation to Err codemadness.org 70 i 3430 enable seamless real-time performance on embedded computing platforms. The Err codemadness.org 70 i 3431 proposed algorithm is capable of selecting the best corner candidate among Err codemadness.org 70 i 3432 neighbors and achieves an average execution time savings of 59 % compared with Err codemadness.org 70 i 3433 the conventional Harris score. Moreover, our approach outperforms the competing Err codemadness.org 70 i 3434 methods, such as eFAST, eHarris, and FA-Harris, in terms of real-time Err codemadness.org 70 i 3435 performance, and surpasses Arc* in terms of accuracy. Err codemadness.org 70 i 3436 </p> Err codemadness.org 70 i 3437 Err codemadness.org 70 i 3438 Err codemadness.org 70 i 3439 Err codemadness.org 70 i 3440 FullSubNet: A Full-Band and Sub-Band Fusion Model for Real-Time Single-Channel Speech Enhancement. (arXiv:2010.15508v1 [eess.AS]) Err codemadness.org 70 i 3441 http://fr.arxiv.org/abs/2010.15508 Err codemadness.org 70 i 3442 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1">Xiang Hao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1">Xiangdong Su</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Horaud_R/0/1/0/all/0/1">Radu Horaud</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_X/0/1/0/all/0/1">Xiaofei Li</a></p> Err codemadness.org 70 i 3443 Err codemadness.org 70 i 3444 <p>This paper proposes a full-band and sub-band fusion model, named as Err codemadness.org 70 i 3445 FullSubNet, for single-channel real-time speech enhancement. Full-band and Err codemadness.org 70 i 3446 sub-band refer to the models that input full-band and sub-band noisy spectral Err codemadness.org 70 i 3447 feature, output full-band and sub-band speech target, respectively. The Err codemadness.org 70 i 3448 sub-band model processes each frequency independently. Its input consists of Err codemadness.org 70 i 3449 one frequency and several context frequencies. The output is the prediction of Err codemadness.org 70 i 3450 the clean speech target for the corresponding frequency. These two types of Err codemadness.org 70 i 3451 models have distinct characteristics. The full-band model can capture the Err codemadness.org 70 i 3452 global spectral context and the long-distance cross-band dependencies. However, Err codemadness.org 70 i 3453 it lacks the ability to modeling signal stationarity and attending the local Err codemadness.org 70 i 3454 spectral pattern. The sub-band model is just the opposite. In our proposed Err codemadness.org 70 i 3455 FullSubNet, we connect a pure full-band model and a pure sub-band model Err codemadness.org 70 i 3456 sequentially and use practical joint training to integrate these two types of Err codemadness.org 70 i 3457 models' advantages. We conducted experiments on the DNS challenge (INTERSPEECH Err codemadness.org 70 i 3458 2020) dataset to evaluate the proposed method. Experimental results show that Err codemadness.org 70 i 3459 full-band and sub-band information are complementary, and the FullSubNet can Err codemadness.org 70 i 3460 effectively integrate them. Besides, the performance of the FullSubNet also Err codemadness.org 70 i 3461 exceeds that of the top-ranked methods in the DNS Challenge (INTERSPEECH 2020). Err codemadness.org 70 i 3462 </p> Err codemadness.org 70 i 3463 Err codemadness.org 70 i 3464 Err codemadness.org 70 i 3465 Err codemadness.org 70 i 3466 Night vision obstacle detection and avoidance based on Bio-Inspired Vision Sensors. (arXiv:2010.15509v1 [cs.CV]) Err codemadness.org 70 i 3467 http://fr.arxiv.org/abs/2010.15509 Err codemadness.org 70 i 3468 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1">Jawad N. Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1">Sherif A.S. Mohamed</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1">Mohammad-hashem Haghbayan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1">Jukka Heikkonen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1">Hannu Tenhunen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_M/0/1/0/all/0/1">Muhammad Mehboob Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1">Juha Plosila</a></p> Err codemadness.org 70 i 3469 Err codemadness.org 70 i 3470 <p>Moving towards autonomy, unmanned vehicles rely heavily on state-of-the-art Err codemadness.org 70 i 3471 collision avoidance systems (CAS). However, the detection of obstacles Err codemadness.org 70 i 3472 especially during night-time is still a challenging task since the lighting Err codemadness.org 70 i 3473 conditions are not sufficient for traditional cameras to function properly. Err codemadness.org 70 i 3474 Therefore, we exploit the powerful attributes of event-based cameras to perform Err codemadness.org 70 i 3475 obstacle detection in low lighting conditions. Event cameras trigger events Err codemadness.org 70 i 3476 asynchronously at high output temporal rate with high dynamic range of up to Err codemadness.org 70 i 3477 120 $dB$. The algorithm filters background activity noise and extracts objects Err codemadness.org 70 i 3478 using robust Hough transform technique. The depth of each detected object is Err codemadness.org 70 i 3479 computed by triangulating 2D features extracted utilising LC-Harris. Finally, Err codemadness.org 70 i 3480 asynchronous adaptive collision avoidance (AACA) algorithm is applied for Err codemadness.org 70 i 3481 effective avoidance. Qualitative evaluation is compared using event-camera and Err codemadness.org 70 i 3482 traditional camera. Err codemadness.org 70 i 3483 </p> Err codemadness.org 70 i 3484 Err codemadness.org 70 i 3485 Err codemadness.org 70 i 3486 Err codemadness.org 70 i 3487 Asynchronous Corner Tracking Algorithm based on Lifetime of Events for DAVIS Cameras. (arXiv:2010.15510v1 [cs.CV]) Err codemadness.org 70 i 3488 http://fr.arxiv.org/abs/2010.15510 Err codemadness.org 70 i 3489 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1">Sherif A.S. Mohamed</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1">Jawad N. Yasin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1">Mohammad-Hashem Haghbayan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Miele_A/0/1/0/all/0/1">Antonio Miele</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1">Jukka Heikkonen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1">Hannu Tenhunen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1">Juha Plosila</a></p> Err codemadness.org 70 i 3490 Err codemadness.org 70 i 3491 <p>Event cameras, i.e., the Dynamic and Active-pixel Vision Sensor (DAVIS) ones, Err codemadness.org 70 i 3492 capture the intensity changes in the scene and generates a stream of events in Err codemadness.org 70 i 3493 an asynchronous fashion. The output rate of such cameras can reach up to 10 Err codemadness.org 70 i 3494 million events per second in high dynamic environments. DAVIS cameras use novel Err codemadness.org 70 i 3495 vision sensors that mimic human eyes. Their attractive attributes, such as high Err codemadness.org 70 i 3496 output rate, High Dynamic Range (HDR), and high pixel bandwidth, make them an Err codemadness.org 70 i 3497 ideal solution for applications that require high-frequency tracking. Moreover, Err codemadness.org 70 i 3498 applications that operate in challenging lighting scenarios can exploit the Err codemadness.org 70 i 3499 high HDR of event cameras, i.e., 140 dB compared to 60 dB of traditional Err codemadness.org 70 i 3500 cameras. In this paper, a novel asynchronous corner tracking method is proposed Err codemadness.org 70 i 3501 that uses both events and intensity images captured by a DAVIS camera. The Err codemadness.org 70 i 3502 Harris algorithm is used to extract features, i.e., frame-corners from Err codemadness.org 70 i 3503 keyframes, i.e., intensity images. Afterward, a matching algorithm is used to Err codemadness.org 70 i 3504 extract event-corners from the stream of events. Events are solely used to Err codemadness.org 70 i 3505 perform asynchronous tracking until the next keyframe is captured. Neighboring Err codemadness.org 70 i 3506 events, within a window size of 5x5 pixels around the event-corner, are used to Err codemadness.org 70 i 3507 calculate the velocity and direction of extracted event-corners by fitting the Err codemadness.org 70 i 3508 2D planar using a randomized Hough transform algorithm. Experimental evaluation Err codemadness.org 70 i 3509 showed that our approach is able to update the location of the extracted Err codemadness.org 70 i 3510 corners up to 100 times during the blind time of traditional cameras, i.e., Err codemadness.org 70 i 3511 between two consecutive intensity images. Err codemadness.org 70 i 3512 </p> Err codemadness.org 70 i 3513 Err codemadness.org 70 i 3514 Err codemadness.org 70 i 3515 Err codemadness.org 70 i 3516 An Exact Solution Path Algorithm for SLOPE and Quasi-Spherical OSCAR. (arXiv:2010.15511v1 [stat.ME]) Err codemadness.org 70 i 3517 http://fr.arxiv.org/abs/2010.15511 Err codemadness.org 70 i 3518 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Nomura_S/0/1/0/all/0/1">Shunichi Nomura</a></p> Err codemadness.org 70 i 3519 Err codemadness.org 70 i 3520 <p>Sorted $L_1$ penalization estimator (SLOPE) is a regularization technique for Err codemadness.org 70 i 3521 sorted absolute coefficients in high-dimensional regression. By arbitrarily Err codemadness.org 70 i 3522 setting its regularization weights $\lambda$ under the monotonicity constraint, Err codemadness.org 70 i 3523 SLOPE can have various feature selection and clustering properties. On weight Err codemadness.org 70 i 3524 tuning, the selected features and their clusters are very sensitive to the Err codemadness.org 70 i 3525 tuning parameters. Moreover, the exhaustive tracking of their changes is Err codemadness.org 70 i 3526 difficult using grid search methods. This study presents a solution path Err codemadness.org 70 i 3527 algorithm that provides the complete and exact path of solutions for SLOPE in Err codemadness.org 70 i 3528 fine-tuning regularization weights. A simple optimality condition for SLOPE is Err codemadness.org 70 i 3529 derived and used to specify the next splitting point of the solution path. This Err codemadness.org 70 i 3530 study also proposes a new design of a regularization sequence $\lambda$ for Err codemadness.org 70 i 3531 feature clustering, which is called the quasi-spherical and octagonal shrinkage Err codemadness.org 70 i 3532 and clustering algorithm for regression (QS-OSCAR). QS-OSCAR is designed with a Err codemadness.org 70 i 3533 contour surface of the regularization terms most similar to a sphere. Among Err codemadness.org 70 i 3534 several regularization sequence designs, sparsity and clustering performance Err codemadness.org 70 i 3535 are compared through simulation studies. The numerical observations show that Err codemadness.org 70 i 3536 QS-OSCAR performs feature clustering more efficiently than other designs. Err codemadness.org 70 i 3537 </p> Err codemadness.org 70 i 3538 Err codemadness.org 70 i 3539 Err codemadness.org 70 i 3540 Err codemadness.org 70 i 3541 UNetGAN: A Robust Speech Enhancement Approach in Time Domain for Extremely Low Signal-to-noise Ratio Condition. (arXiv:2010.15521v1 [eess.AS]) Err codemadness.org 70 i 3542 http://fr.arxiv.org/abs/2010.15521 Err codemadness.org 70 i 3543 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1">Xiang Hao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1">Xiangdong Su</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wang_Z/0/1/0/all/0/1">Zhiyu Wang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_H/0/1/0/all/0/1">Hui Zhang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Batushiren/0/1/0/all/0/1">Batushiren</a></p> Err codemadness.org 70 i 3544 Err codemadness.org 70 i 3545 <p>Speech enhancement at extremely low signal-to-noise ratio (SNR) condition is Err codemadness.org 70 i 3546 a very challenging problem and rarely investigated in previous works. This Err codemadness.org 70 i 3547 paper proposes a robust speech enhancement approach (UNetGAN) based on U-Net Err codemadness.org 70 i 3548 and generative adversarial learning to deal with this problem. This approach Err codemadness.org 70 i 3549 consists of a generator network and a discriminator network, which operate Err codemadness.org 70 i 3550 directly in the time domain. The generator network adopts a U-Net like Err codemadness.org 70 i 3551 structure and employs dilated convolution in the bottleneck of it. We evaluate Err codemadness.org 70 i 3552 the performance of the UNetGAN at low SNR conditions (up to -20dB) on the Err codemadness.org 70 i 3553 public benchmark. The result demonstrates that it significantly improves the Err codemadness.org 70 i 3554 speech quality and substantially outperforms the representative deep learning Err codemadness.org 70 i 3555 models, including SEGAN, cGAN fo SE, Bidirectional LSTM using phase-sensitive Err codemadness.org 70 i 3556 spectrum approximation cost function (PSA-BLSTM) and Wave-U-Net regarding Err codemadness.org 70 i 3557 Short-Time Objective Intelligibility (STOI) and Perceptual evaluation of speech Err codemadness.org 70 i 3558 quality (PESQ). Err codemadness.org 70 i 3559 </p> Err codemadness.org 70 i 3560 Err codemadness.org 70 i 3561 Err codemadness.org 70 i 3562 Err codemadness.org 70 i 3563 A brief overview of swarm intelligence-based algorithms for numerical association rule mining. (arXiv:2010.15524v1 [cs.NE]) Err codemadness.org 70 i 3564 http://fr.arxiv.org/abs/2010.15524 Err codemadness.org 70 i 3565 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Fister_I/0/1/0/all/0/1">Iztok Fister Jr.</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fister_I/0/1/0/all/0/1">Iztok Fister</a></p> Err codemadness.org 70 i 3566 Err codemadness.org 70 i 3567 <p>Numerical Association Rule Mining is a popular variant of Association Rule Err codemadness.org 70 i 3568 Mining, where numerical attributes are handled without discretization. This Err codemadness.org 70 i 3569 means that the algorithms for dealing with this problem can operate directly, Err codemadness.org 70 i 3570 not only with categorical, but also with numerical attributes. Until recently, Err codemadness.org 70 i 3571 a big portion of these algorithms were based on a stochastic nature-inspired Err codemadness.org 70 i 3572 population-based paradigm. As a result, evolutionary and swarm Err codemadness.org 70 i 3573 intelligence-based algorithms showed big efficiency for dealing with the Err codemadness.org 70 i 3574 problem. In line with this, the main mission of this chapter is to make a Err codemadness.org 70 i 3575 historical overview of swarm intelligence-based algorithms for Numerical Err codemadness.org 70 i 3576 Association Rule Mining, as well as to present the main features of these Err codemadness.org 70 i 3577 algorithms for the observed problem. A taxonomy of the algorithms was proposed Err codemadness.org 70 i 3578 on the basis of the applied features found in this overview. Challenges, Err codemadness.org 70 i 3579 waiting in the future, finish this paper. Err codemadness.org 70 i 3580 </p> Err codemadness.org 70 i 3581 Err codemadness.org 70 i 3582 Err codemadness.org 70 i 3583 Err codemadness.org 70 i 3584 Self-Learning Threshold-Based Load Balancing. (arXiv:2010.15525v1 [cs.PF]) Err codemadness.org 70 i 3585 http://fr.arxiv.org/abs/2010.15525 Err codemadness.org 70 i 3586 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Goldsztajn_D/0/1/0/all/0/1">Diego Goldsztajn</a> (1), <a href="http://fr.arxiv.org/find/cs/1/au:+Borst_S/0/1/0/all/0/1">Sem C. Borst</a> (1), <a href="http://fr.arxiv.org/find/cs/1/au:+Leeuwaarden_J/0/1/0/all/0/1">Johan S. H. van Leeuwaarden</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Mukherjee_D/0/1/0/all/0/1">Debankur Mukherjee</a> (3), <a href="http://fr.arxiv.org/find/cs/1/au:+Whiting_P/0/1/0/all/0/1">Philip A. Whiting</a> (4) ((1) Eindhoven University of Technology, (2) Tilburg University, (3) Georgia Institute of Technology, (4) Macquarie University)</p> Err codemadness.org 70 i 3587 Err codemadness.org 70 i 3588 <p>We consider a large-scale service system where incoming tasks have to be Err codemadness.org 70 i 3589 instantaneously dispatched to one out of many parallel server pools. The Err codemadness.org 70 i 3590 dispatcher uses a threshold for balancing the load and keeping the maximum Err codemadness.org 70 i 3591 number of concurrent tasks across server pools low. We demonstrate that such a Err codemadness.org 70 i 3592 policy is optimal on the fluid and diffusion scales for a suitable threshold Err codemadness.org 70 i 3593 value, while only involving a small communication overhead. In order to set the Err codemadness.org 70 i 3594 threshold optimally, it is important, however, to learn the load of the system, Err codemadness.org 70 i 3595 which may be uncertain or even time-varying. For that purpose, we design a Err codemadness.org 70 i 3596 control rule for tuning the threshold in an online manner. We provide Err codemadness.org 70 i 3597 conditions which guarantee that this adaptive threshold settles at the optimal Err codemadness.org 70 i 3598 value, along with estimates for the time until this happens. Err codemadness.org 70 i 3599 </p> Err codemadness.org 70 i 3600 Err codemadness.org 70 i 3601 Err codemadness.org 70 i 3602 Err codemadness.org 70 i 3603 A comparison of automatic multi-tissue segmentation methods of the human fetal brain using the FeTA Dataset. (arXiv:2010.15526v1 [eess.IV]) Err codemadness.org 70 i 3604 http://fr.arxiv.org/abs/2010.15526 Err codemadness.org 70 i 3605 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Payette_K/0/1/0/all/0/1">Kelly Payette</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Dumast_P/0/1/0/all/0/1">Priscille de Dumast</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kebiri_H/0/1/0/all/0/1">Hamza Kebiri</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ezhov_I/0/1/0/all/0/1">Ivan Ezhov</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Paetzold_J/0/1/0/all/0/1">Johannes C. Paetzold</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Shit_S/0/1/0/all/0/1">Suprosanna Shit</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Iqbal_A/0/1/0/all/0/1">Asim Iqbal</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Khan_R/0/1/0/all/0/1">Romesa Khan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kottke_R/0/1/0/all/0/1">Raimund Kottke</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Grehten_P/0/1/0/all/0/1">Patrice Grehten</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ji_H/0/1/0/all/0/1">Hui Ji</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Lanczi_L/0/1/0/all/0/1">Levente Lanczi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Nagy_M/0/1/0/all/0/1">Marianna Nagy</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Beresova_M/0/1/0/all/0/1">Monika Beresova</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Nguyen_T/0/1/0/all/0/1">Thi Dao Nguyen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Natalucci_G/0/1/0/all/0/1">Giancarlo Natalucci</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Karayannis_T/0/1/0/all/0/1">Theofanis Karayannis</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Menze_B/0/1/0/all/0/1">Bjoern Menze</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Cuadra_M/0/1/0/all/0/1">Meritxell Bach Cuadra</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Jakab_A/0/1/0/all/0/1">Andras Jakab</a></p> Err codemadness.org 70 i 3606 Err codemadness.org 70 i 3607 <p>It is critical to quantitatively analyse the developing human fetal brain in Err codemadness.org 70 i 3608 order to fully understand neurodevelopment in both normal fetuses and those Err codemadness.org 70 i 3609 with congenital disorders. To facilitate this analysis, automatic multi-tissue Err codemadness.org 70 i 3610 fetal brain segmentation algorithms are needed, which in turn requires open Err codemadness.org 70 i 3611 databases of segmented fetal brains. Here we introduce a publicly available Err codemadness.org 70 i 3612 database of 50 manually segmented pathological and non-pathological fetal Err codemadness.org 70 i 3613 magnetic resonance brain volume reconstructions across a range of gestational Err codemadness.org 70 i 3614 ages (20 to 33 weeks) into 7 different tissue categories (external Err codemadness.org 70 i 3615 cerebrospinal fluid, grey matter, white matter, ventricles, cerebellum, deep Err codemadness.org 70 i 3616 grey matter, brainstem/spinal cord). In addition, we quantitatively evaluate Err codemadness.org 70 i 3617 the accuracy of several automatic multi-tissue segmentation algorithms of the Err codemadness.org 70 i 3618 developing human fetal brain. Four research groups participated, submitting a Err codemadness.org 70 i 3619 total of 10 algorithms, demonstrating the benefits the database for the Err codemadness.org 70 i 3620 development of automatic algorithms. Err codemadness.org 70 i 3621 </p> Err codemadness.org 70 i 3622 Err codemadness.org 70 i 3623 Err codemadness.org 70 i 3624 Err codemadness.org 70 i 3625 On the robustness of kernel-based pairwise learning. (arXiv:2010.15527v1 [stat.ML]) Err codemadness.org 70 i 3626 http://fr.arxiv.org/abs/2010.15527 Err codemadness.org 70 i 3627 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Gensler_P/0/1/0/all/0/1">Patrick Gensler</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Christmann_A/0/1/0/all/0/1">Andreas Christmann</a></p> Err codemadness.org 70 i 3628 Err codemadness.org 70 i 3629 <p>It is shown that many results on the statistical robustness of kernel-based Err codemadness.org 70 i 3630 pairwise learning can be derived under basically no assumptions on the input Err codemadness.org 70 i 3631 and output spaces. In particular neither moment conditions on the conditional Err codemadness.org 70 i 3632 distribution of Y given X = x nor the boundedness of the output space is Err codemadness.org 70 i 3633 needed. We obtain results on the existence and boundedness of the influence Err codemadness.org 70 i 3634 function and show qualitative robustness of the kernel-based estimator. The Err codemadness.org 70 i 3635 present paper generalizes results by Christmann and Zhou (2016) by allowing the Err codemadness.org 70 i 3636 prediction function to take two arguments and can thus be applied in a variety Err codemadness.org 70 i 3637 of situations such as ranking. Err codemadness.org 70 i 3638 </p> Err codemadness.org 70 i 3639 Err codemadness.org 70 i 3640 Err codemadness.org 70 i 3641 Err codemadness.org 70 i 3642 An End to End Network Architecture for Fundamental Matrix Estimation. (arXiv:2010.15528v1 [cs.CV]) Err codemadness.org 70 i 3643 http://fr.arxiv.org/abs/2010.15528 Err codemadness.org 70 i 3644 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1">Yesheng Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_X/0/1/0/all/0/1">Xu Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qian_D/0/1/0/all/0/1">Dahong Qian</a></p> Err codemadness.org 70 i 3645 Err codemadness.org 70 i 3646 <p>In this paper, we present a novel end-to-end network architecture to estimate Err codemadness.org 70 i 3647 fundamental matrix directly from stereo images. To establish a complete working Err codemadness.org 70 i 3648 pipeline, different deep neural networks in charge of finding correspondences Err codemadness.org 70 i 3649 in images, performing outlier rejection and calculating fundamental matrix, are Err codemadness.org 70 i 3650 integrated into an end-to-end network architecture. Err codemadness.org 70 i 3651 </p> Err codemadness.org 70 i 3652 <p>To well train the network and preserve geometry properties of fundamental Err codemadness.org 70 i 3653 matrix, a new loss function is introduced. To evaluate the accuracy of Err codemadness.org 70 i 3654 estimated fundamental matrix more reasonably, we design a new evaluation metric Err codemadness.org 70 i 3655 which is highly consistent with visualization result. Experiments conducted on Err codemadness.org 70 i 3656 both outdoor and indoor data-sets show that this network outperforms Err codemadness.org 70 i 3657 traditional methods as well as previous deep learning based methods on various Err codemadness.org 70 i 3658 metrics and achieves significant performance improvements. Err codemadness.org 70 i 3659 </p> Err codemadness.org 70 i 3660 Err codemadness.org 70 i 3661 Err codemadness.org 70 i 3662 Err codemadness.org 70 i 3663 Probabilistic interval predictor based on dissimilarity functions. (arXiv:2010.15530v1 [eess.SY]) Err codemadness.org 70 i 3664 http://fr.arxiv.org/abs/2010.15530 Err codemadness.org 70 i 3665 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Carnerero_A/0/1/0/all/0/1">A. Daniel Carnerero</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ramirez_D/0/1/0/all/0/1">Daniel R. Ramirez</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Alamo_T/0/1/0/all/0/1">Teodoro Alamo</a></p> Err codemadness.org 70 i 3666 Err codemadness.org 70 i 3667 <p>This work presents a new method to obtain probabilistic interval predictions Err codemadness.org 70 i 3668 of a dynamical system. The method uses stored past system measurements to Err codemadness.org 70 i 3669 estimate the future evolution of the system. The proposed method relies on the Err codemadness.org 70 i 3670 use of dissimilarity functions to estimate the conditional probability density Err codemadness.org 70 i 3671 function of the outputs. A family of empirical probability density functions, Err codemadness.org 70 i 3672 parameterized by means of two parameters, is introduced. It is shown that the Err codemadness.org 70 i 3673 the proposed family encompasses the multivariable normal probability density Err codemadness.org 70 i 3674 function as a particular case. We show that the proposed method constitutes a Err codemadness.org 70 i 3675 generalization of classical estimation methods. A cross-validation scheme is Err codemadness.org 70 i 3676 used to tune the two parameters on which the methodology relies. In order to Err codemadness.org 70 i 3677 prove the effectiveness of the methodology presented, some numerical examples Err codemadness.org 70 i 3678 and comparisons are provided. Err codemadness.org 70 i 3679 </p> Err codemadness.org 70 i 3680 Err codemadness.org 70 i 3681 Err codemadness.org 70 i 3682 Err codemadness.org 70 i 3683 Coordinated Formation Control for Intelligent and Connected Vehicles in Multiple Traffic Scenarios. (arXiv:2010.15531v1 [eess.SY]) Err codemadness.org 70 i 3684 http://fr.arxiv.org/abs/2010.15531 Err codemadness.org 70 i 3685 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Xu_Q/0/1/0/all/0/1">Qing Xu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Cai_M/0/1/0/all/0/1">Mengchi Cai</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_K/0/1/0/all/0/1">Keqiang Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Xu_B/0/1/0/all/0/1">Biao Xu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wang_J/0/1/0/all/0/1">Jianqiang Wang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wu_X/0/1/0/all/0/1">Xiangbin Wu</a></p> Err codemadness.org 70 i 3686 Err codemadness.org 70 i 3687 <p>In this paper, a unified multi-vehicle formation control framework for Err codemadness.org 70 i 3688 Intelligent and Connected Vehicles (ICVs) that can apply to multiple traffic Err codemadness.org 70 i 3689 scenarios is proposed. In the one-dimensional scenario, different formation Err codemadness.org 70 i 3690 geometries are analyzed and the interlaced structure is mathematically Err codemadness.org 70 i 3691 modelized to improve driving safety while making full use of the lane capacity. Err codemadness.org 70 i 3692 The assignment problem for vehicles and target positions is solved using Err codemadness.org 70 i 3693 Hungarian Algorithm to improve the flexibility of the method in multiple Err codemadness.org 70 i 3694 scenarios. In the two-dimensional scenario, an improved virtual platoon method Err codemadness.org 70 i 3695 is proposed to transfer the complex two-dimensional passing problem to the Err codemadness.org 70 i 3696 one-dimensional formation control problem based on the idea of rotation Err codemadness.org 70 i 3697 projection. Besides, the vehicle regrouping method is proposed to connect the Err codemadness.org 70 i 3698 two scenarios. Simulation results prove that the proposed multi-vehicle Err codemadness.org 70 i 3699 formation control framework can apply to multiple typical scenarios and have Err codemadness.org 70 i 3700 better performance than existing methods. Err codemadness.org 70 i 3701 </p> Err codemadness.org 70 i 3702 Err codemadness.org 70 i 3703 Err codemadness.org 70 i 3704 Err codemadness.org 70 i 3705 How do Offline Measures for Exploration in Reinforcement Learning behave?. (arXiv:2010.15533v1 [cs.LG]) Err codemadness.org 70 i 3706 http://fr.arxiv.org/abs/2010.15533 Err codemadness.org 70 i 3707 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hollenstein_J/0/1/0/all/0/1">Jakob J. Hollenstein</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Auddy_S/0/1/0/all/0/1">Sayantan Auddy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Saveriano_M/0/1/0/all/0/1">Matteo Saveriano</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Renaudo_E/0/1/0/all/0/1">Erwan Renaudo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Piater_J/0/1/0/all/0/1">Justus Piater</a></p> Err codemadness.org 70 i 3708 Err codemadness.org 70 i 3709 <p>Sufficient exploration is paramount for the success of a reinforcement Err codemadness.org 70 i 3710 learning agent. Yet, exploration is rarely assessed in an algorithm-independent Err codemadness.org 70 i 3711 way. We compare the behavior of three data-based, offline exploration metrics Err codemadness.org 70 i 3712 described in the literature on intuitive simple distributions and highlight Err codemadness.org 70 i 3713 problems to be aware of when using them. We propose a fourth metric,uniform Err codemadness.org 70 i 3714 relative entropy, and implement it using either a k-nearest-neighbor or a Err codemadness.org 70 i 3715 nearest-neighbor-ratio estimator, highlighting that the implementation choices Err codemadness.org 70 i 3716 have a profound impact on these measures. Err codemadness.org 70 i 3717 </p> Err codemadness.org 70 i 3718 Err codemadness.org 70 i 3719 Err codemadness.org 70 i 3720 Err codemadness.org 70 i 3721 Poster: Benchmarking Financial Data Feed Systems. (arXiv:2010.15534v1 [cs.PF]) Err codemadness.org 70 i 3722 http://fr.arxiv.org/abs/2010.15534 Err codemadness.org 70 i 3723 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Coenen_M/0/1/0/all/0/1">Manuel Coenen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wagner_C/0/1/0/all/0/1">Christoph Wagner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Echler_A/0/1/0/all/0/1">Alexander Echler</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frischbier_S/0/1/0/all/0/1">Sebastian Frischbier</a></p> Err codemadness.org 70 i 3724 Err codemadness.org 70 i 3725 <p>Data-driven solutions for the investment industry require event-based backend Err codemadness.org 70 i 3726 systems to process high-volume financial data feeds with low latency, high Err codemadness.org 70 i 3727 throughput, and guaranteed delivery modes. Err codemadness.org 70 i 3728 </p> Err codemadness.org 70 i 3729 <p>At vwd we process an average of 18 billion incoming event notifications from Err codemadness.org 70 i 3730 500+ data sources for 30 million symbols per day and peak rates of 1+ million Err codemadness.org 70 i 3731 notifications per second using custom-built platforms that keep audit logs of Err codemadness.org 70 i 3732 every event. Err codemadness.org 70 i 3733 </p> Err codemadness.org 70 i 3734 <p>We currently assess modern open source event-processing platforms such as Err codemadness.org 70 i 3735 Kafka, NATS, Redis, Flink or Storm for the use in our ticker plant to reduce Err codemadness.org 70 i 3736 the maintenance effort for cross-cutting concerns and leverage hybrid Err codemadness.org 70 i 3737 deployment models. For comparability and repeatability we benchmark candidates Err codemadness.org 70 i 3738 with a standardized workload we derived from our real data feeds. Err codemadness.org 70 i 3739 </p> Err codemadness.org 70 i 3740 <p>We have enhanced an existing light-weight open source benchmarking tool in Err codemadness.org 70 i 3741 its processing, logging, and reporting capabilities to cope with our workloads. Err codemadness.org 70 i 3742 The resulting tool wrench can simulate workloads or replay snapshots in volume Err codemadness.org 70 i 3743 and dynamics like those we process in our ticker plant. We provide the tool as Err codemadness.org 70 i 3744 open source. Err codemadness.org 70 i 3745 </p> Err codemadness.org 70 i 3746 <p>As part of ongoing work we contribute details on (a) our workload and Err codemadness.org 70 i 3747 requirements for benchmarking candidate platforms for financial feed Err codemadness.org 70 i 3748 processing; (b) the current state of the tool wrench. Err codemadness.org 70 i 3749 </p> Err codemadness.org 70 i 3750 Err codemadness.org 70 i 3751 Err codemadness.org 70 i 3752 Err codemadness.org 70 i 3753 Unbabel's Participation in the WMT20 Metrics Shared Task. (arXiv:2010.15535v1 [cs.CL]) Err codemadness.org 70 i 3754 http://fr.arxiv.org/abs/2010.15535 Err codemadness.org 70 i 3755 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rei_R/0/1/0/all/0/1">Ricardo Rei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stewart_C/0/1/0/all/0/1">Craig Stewart</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Farinha_C/0/1/0/all/0/1">Catarina Farinha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lavie_A/0/1/0/all/0/1">Alon Lavie</a></p> Err codemadness.org 70 i 3756 Err codemadness.org 70 i 3757 <p>We present the contribution of the Unbabel team to the WMT 2020 Shared Task Err codemadness.org 70 i 3758 on Metrics. We intend to participate on the segment-level, document-level and Err codemadness.org 70 i 3759 system-level tracks on all language pairs, as well as the 'QE as a Metric' Err codemadness.org 70 i 3760 track. Accordingly, we illustrate results of our models in these tracks with Err codemadness.org 70 i 3761 reference to test sets from the previous year. Our submissions build upon the Err codemadness.org 70 i 3762 recently proposed COMET framework: We train several estimator models to regress Err codemadness.org 70 i 3763 on different human-generated quality scores and a novel ranking model trained Err codemadness.org 70 i 3764 on relative ranks obtained from Direct Assessments. We also propose a simple Err codemadness.org 70 i 3765 technique for converting segment-level predictions into a document-level score. Err codemadness.org 70 i 3766 Overall, our systems achieve strong results for all language pairs on previous Err codemadness.org 70 i 3767 test sets and in many cases set a new state-of-the-art. Err codemadness.org 70 i 3768 </p> Err codemadness.org 70 i 3769 Err codemadness.org 70 i 3770 Err codemadness.org 70 i 3771 Err codemadness.org 70 i 3772 Matern Gaussian Processes on Graphs. (arXiv:2010.15538v1 [stat.ML]) Err codemadness.org 70 i 3773 http://fr.arxiv.org/abs/2010.15538 Err codemadness.org 70 i 3774 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Borovitskiy_V/0/1/0/all/0/1">Viacheslav Borovitskiy</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Azangulov_I/0/1/0/all/0/1">Iskander Azangulov</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Terenin_A/0/1/0/all/0/1">Alexander Terenin</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Mostowsky_P/0/1/0/all/0/1">Peter Mostowsky</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Deisenroth_M/0/1/0/all/0/1">Marc Peter Deisenroth</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Durrande_N/0/1/0/all/0/1">Nicolas Durrande</a></p> Err codemadness.org 70 i 3775 Err codemadness.org 70 i 3776 <p>Gaussian processes are a versatile framework for learning unknown functions Err codemadness.org 70 i 3777 in a manner that permits one to utilize prior information about their Err codemadness.org 70 i 3778 properties. Although many different Gaussian process models are readily Err codemadness.org 70 i 3779 available when the input space is Euclidean, the choice is much more limited Err codemadness.org 70 i 3780 for Gaussian processes whose input space is an undirected graph. In this work, Err codemadness.org 70 i 3781 we leverage the stochastic partial differential equation characterization of Err codemadness.org 70 i 3782 Mat\'{e}rn Gaussian processes - a widely-used model class in the Euclidean Err codemadness.org 70 i 3783 setting - to study their analog for undirected graphs. We show that the Err codemadness.org 70 i 3784 resulting Gaussian processes inherit various attractive properties of their Err codemadness.org 70 i 3785 Euclidean and Riemannian analogs and provide techniques that allow them to be Err codemadness.org 70 i 3786 trained using standard methods, such as inducing points. This enables graph Err codemadness.org 70 i 3787 Mat\'{e}rn Gaussian processes to be employed in mini-batch and non-conjugate Err codemadness.org 70 i 3788 settings, thereby making them more accessible to practitioners and easier to Err codemadness.org 70 i 3789 deploy within larger learning frameworks. Err codemadness.org 70 i 3790 </p> Err codemadness.org 70 i 3791 Err codemadness.org 70 i 3792 Err codemadness.org 70 i 3793 Err codemadness.org 70 i 3794 Micromagnetics of thin films in the presence of Dzyaloshinskii-Moriya interaction. (arXiv:2010.15541v1 [math.AP]) Err codemadness.org 70 i 3795 http://fr.arxiv.org/abs/2010.15541 Err codemadness.org 70 i 3796 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Davoli_E/0/1/0/all/0/1">Elisa Davoli</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Fratta_G/0/1/0/all/0/1">Giovanni Di Fratta</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Praetorius_D/0/1/0/all/0/1">Dirk Praetorius</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Ruggeri_M/0/1/0/all/0/1">Michele Ruggeri</a></p> Err codemadness.org 70 i 3797 Err codemadness.org 70 i 3798 <p>In this paper, we study the thin-film limit of the micromagnetic energy Err codemadness.org 70 i 3799 functional in the presence of bulk Dzyaloshinskii-Moriya interaction (DMI). Our Err codemadness.org 70 i 3800 analysis includes both a stationary $\Gamma$-convergence result for the Err codemadness.org 70 i 3801 micromagnetic energy, as well as the identification of the asymptotic behavior Err codemadness.org 70 i 3802 of the associated Landau-Lifshitz-Gilbert equation. In particular, we prove Err codemadness.org 70 i 3803 that, in the limiting model, part of the DMI term behaves like the projection Err codemadness.org 70 i 3804 of the magnetic moment onto the normal to the film, contributing this way to an Err codemadness.org 70 i 3805 increase in the shape anisotropy arising from the magnetostatic self-energy. Err codemadness.org 70 i 3806 Finally, we discuss a convergent finite element approach for the approximation Err codemadness.org 70 i 3807 of the time-dependent case and use it to numerically compare the original Err codemadness.org 70 i 3808 three-dimensional model with the two-dimensional thin-film limit. Err codemadness.org 70 i 3809 </p> Err codemadness.org 70 i 3810 Err codemadness.org 70 i 3811 Err codemadness.org 70 i 3812 Err codemadness.org 70 i 3813 Systematic literature review protocol Identification and classification of feature modeling errors. (arXiv:2010.15545v1 [cs.SE]) Err codemadness.org 70 i 3814 http://fr.arxiv.org/abs/2010.15545 Err codemadness.org 70 i 3815 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Sepulveda_S/0/1/0/all/0/1">Samuel Sep&#xfa;lveda</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Diaz_J/0/1/0/all/0/1">Jaime D&#xed;az</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Esperguel_M/0/1/0/all/0/1">Marcelo Esperguel</a></p> Err codemadness.org 70 i 3816 Err codemadness.org 70 i 3817 <p>Context: The importance of feature modeling languages for software product Err codemadness.org 70 i 3818 lines and the planning stage for a systematic literature review. Objective: A Err codemadness.org 70 i 3819 protocol for carrying out a systematic literature review about the evidence for Err codemadness.org 70 i 3820 identifying and classifying the errors in feature modeling languages. Method: Err codemadness.org 70 i 3821 The definition of a protocol to conduct a systematic literature review Err codemadness.org 70 i 3822 according to the guidelines of B. Kitchenham. Results: A validated protocol to Err codemadness.org 70 i 3823 conduct a systematic literature review. Conclusions: A proposal for the Err codemadness.org 70 i 3824 protocol definition of a systematic literature review about the identification Err codemadness.org 70 i 3825 and classification of errors in feature modeling was built. Initial results Err codemadness.org 70 i 3826 show that the effects and results for solving these errors should be carried Err codemadness.org 70 i 3827 out. Err codemadness.org 70 i 3828 </p> Err codemadness.org 70 i 3829 Err codemadness.org 70 i 3830 Err codemadness.org 70 i 3831 Err codemadness.org 70 i 3832 Multi-Constitutive Neural Network for Large Deformation Poromechanics Problem. (arXiv:2010.15549v1 [cs.LG]) Err codemadness.org 70 i 3833 http://fr.arxiv.org/abs/2010.15549 Err codemadness.org 70 i 3834 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Q/0/1/0/all/0/1">Qi Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1">Yilin Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_Z/0/1/0/all/0/1">Ziyi Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Darve_E/0/1/0/all/0/1">Eric Darve</a></p> Err codemadness.org 70 i 3835 Err codemadness.org 70 i 3836 <p>In this paper, we study the problem of large-strain consolidation in Err codemadness.org 70 i 3837 poromechanics with deep neural networks. Given different material properties Err codemadness.org 70 i 3838 and different loading conditions, the goal is to predict pore pressure and Err codemadness.org 70 i 3839 settlement. We propose a novel method "multi-constitutive neural network" Err codemadness.org 70 i 3840 (MCNN) such that one model can solve several different constitutive laws. We Err codemadness.org 70 i 3841 introduce a one-hot encoding vector as an additional input vector, which is Err codemadness.org 70 i 3842 used to label the constitutive law we wish to solve. Then we build a DNN which Err codemadness.org 70 i 3843 takes as input (X, t) along with a constitutive model label and outputs the Err codemadness.org 70 i 3844 corresponding solution. It is the first time, to our knowledge, that we can Err codemadness.org 70 i 3845 evaluate multi-constitutive laws through only one training process while still Err codemadness.org 70 i 3846 obtaining good accuracies. We found that MCNN trained to solve multiple PDEs Err codemadness.org 70 i 3847 outperforms individual neural network solvers trained with PDE. Err codemadness.org 70 i 3848 </p> Err codemadness.org 70 i 3849 Err codemadness.org 70 i 3850 Err codemadness.org 70 i 3851 Err codemadness.org 70 i 3852 ADABOOK & MULTIBOOK: Adaptive Boosting with Chance Correction. (arXiv:2010.15550v1 [cs.LG]) Err codemadness.org 70 i 3853 http://fr.arxiv.org/abs/2010.15550 Err codemadness.org 70 i 3854 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Powers_D/0/1/0/all/0/1">David M. W. Powers</a></p> Err codemadness.org 70 i 3855 Err codemadness.org 70 i 3856 <p>There has been considerable interest in boosting and bagging, including the Err codemadness.org 70 i 3857 combination of the adaptive techniques of AdaBoost with the random selection Err codemadness.org 70 i 3858 with replacement techniques of Bagging. At the same time there has been a Err codemadness.org 70 i 3859 revisiting of the way we evaluate, with chance-corrected measures like Kappa, Err codemadness.org 70 i 3860 Informedness, Correlation or ROC AUC being advocated. This leads to the Err codemadness.org 70 i 3861 question of whether learning algorithms can do better by optimizing an Err codemadness.org 70 i 3862 appropriate chance corrected measure. Indeed, it is possible for a weak learner Err codemadness.org 70 i 3863 to optimize Accuracy to the detriment of the more reaslistic chance-corrected Err codemadness.org 70 i 3864 measures, and when this happens the booster can give up too early. This Err codemadness.org 70 i 3865 phenomenon is known to occur with conventional Accuracy-based AdaBoost, and the Err codemadness.org 70 i 3866 MultiBoost algorithm has been developed to overcome such problems using restart Err codemadness.org 70 i 3867 techniques based on bagging. This paper thus complements the theoretical work Err codemadness.org 70 i 3868 showing the necessity of using chance-corrected measures for evaluation, with Err codemadness.org 70 i 3869 empirical work showing how use of a chance-corrected measure can improve Err codemadness.org 70 i 3870 boosting. We show that the early surrender problem occurs in MultiBoost too, in Err codemadness.org 70 i 3871 multiclass situations, so that chance-corrected AdaBook and Multibook can beat Err codemadness.org 70 i 3872 standard Multiboost or AdaBoost, and we further identify which chance-corrected Err codemadness.org 70 i 3873 measures to use when. Err codemadness.org 70 i 3874 </p> Err codemadness.org 70 i 3875 Err codemadness.org 70 i 3876 Err codemadness.org 70 i 3877 Err codemadness.org 70 i 3878 Investigating the Robustness of Artificial Intelligent Algorithms with Mixture Experiments. (arXiv:2010.15551v1 [stat.ML]) Err codemadness.org 70 i 3879 http://fr.arxiv.org/abs/2010.15551 Err codemadness.org 70 i 3880 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Lian_J/0/1/0/all/0/1">Jiayi Lian</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Freeman_L/0/1/0/all/0/1">Laura Freeman</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Hong_Y/0/1/0/all/0/1">Yili Hong</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Deng_X/0/1/0/all/0/1">Xinwei Deng</a></p> Err codemadness.org 70 i 3881 Err codemadness.org 70 i 3882 <p>Artificial intelligent (AI) algorithms, such as deep learning and XGboost, Err codemadness.org 70 i 3883 are used in numerous applications including computer vision, autonomous Err codemadness.org 70 i 3884 driving, and medical diagnostics. The robustness of these AI algorithms is of Err codemadness.org 70 i 3885 great interest as inaccurate prediction could result in safety concerns and Err codemadness.org 70 i 3886 limit the adoption of AI systems. In this paper, we propose a framework based Err codemadness.org 70 i 3887 on design of experiments to systematically investigate the robustness of AI Err codemadness.org 70 i 3888 classification algorithms. A robust classification algorithm is expected to Err codemadness.org 70 i 3889 have high accuracy and low variability under different application scenarios. Err codemadness.org 70 i 3890 The robustness can be affected by a wide range of factors such as the imbalance Err codemadness.org 70 i 3891 of class labels in the training dataset, the chosen prediction algorithm, the Err codemadness.org 70 i 3892 chosen dataset of the application, and a change of distribution in the training Err codemadness.org 70 i 3893 and test datasets. To investigate the robustness of AI classification Err codemadness.org 70 i 3894 algorithms, we conduct a comprehensive set of mixture experiments to collect Err codemadness.org 70 i 3895 prediction performance results. Then statistical analyses are conducted to Err codemadness.org 70 i 3896 understand how various factors affect the robustness of AI classification Err codemadness.org 70 i 3897 algorithms. We summarize our findings and provide suggestions to practitioners Err codemadness.org 70 i 3898 in AI applications. Err codemadness.org 70 i 3899 </p> Err codemadness.org 70 i 3900 Err codemadness.org 70 i 3901 Err codemadness.org 70 i 3902 Err codemadness.org 70 i 3903 Successive Halving Top-k Operator. (arXiv:2010.15552v1 [cs.LG]) Err codemadness.org 70 i 3904 http://fr.arxiv.org/abs/2010.15552 Err codemadness.org 70 i 3905 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Pietruszka_M/0/1/0/all/0/1">Micha&#x142; Pietruszka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Borchmann_L/0/1/0/all/0/1">&#x141;ukasz Borchmann</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gralinski_F/0/1/0/all/0/1">Filip Grali&#x144;ski</a></p> Err codemadness.org 70 i 3906 Err codemadness.org 70 i 3907 <p>We propose a differentiable successive halving method of relaxing the top-k Err codemadness.org 70 i 3908 operator, rendering gradient-based optimization possible. The need to perform Err codemadness.org 70 i 3909 softmax iteratively on the entire vector of scores is avoided by using a Err codemadness.org 70 i 3910 tournament-style selection. As a result, a much better approximation of top-k Err codemadness.org 70 i 3911 with lower computational cost is achieved compared to the previous approach. Err codemadness.org 70 i 3912 </p> Err codemadness.org 70 i 3913 Err codemadness.org 70 i 3914 Err codemadness.org 70 i 3915 Err codemadness.org 70 i 3916 Modulation Pattern Detection Using Complex Convolutions in Deep Learning. (arXiv:2010.15556v1 [cs.LG]) Err codemadness.org 70 i 3917 http://fr.arxiv.org/abs/2010.15556 Err codemadness.org 70 i 3918 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Krzyston_J/0/1/0/all/0/1">Jakob Krzyston</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bhattacharjea_R/0/1/0/all/0/1">Rajib Bhattacharjea</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stark_A/0/1/0/all/0/1">Andrew Stark</a></p> Err codemadness.org 70 i 3919 Err codemadness.org 70 i 3920 <p>Transceivers used for telecommunications transmit and receive specific Err codemadness.org 70 i 3921 modulation patterns that are represented as sequences of complex numbers. Err codemadness.org 70 i 3922 Classifying modulation patterns is challenging because noise and channel Err codemadness.org 70 i 3923 impairments affect the signals in complicated ways such that the received Err codemadness.org 70 i 3924 signal bears little resemblance to the transmitted signal. Although deep Err codemadness.org 70 i 3925 learning approaches have shown great promise over statistical methods in this Err codemadness.org 70 i 3926 problem space, deep learning frameworks continue to lag in support for Err codemadness.org 70 i 3927 complex-valued data. To address this gap, we study the implementation and use Err codemadness.org 70 i 3928 of complex convolutions in a series of convolutional neural network Err codemadness.org 70 i 3929 architectures. Replacement of data structure and convolution operations by Err codemadness.org 70 i 3930 their complex generalization in an architecture improves performance, with Err codemadness.org 70 i 3931 statistical significance, at recognizing modulation patterns in complex-valued Err codemadness.org 70 i 3932 signals with high SNR after being trained on low SNR signals. This suggests Err codemadness.org 70 i 3933 complex-valued convolutions enables networks to learn more meaningful Err codemadness.org 70 i 3934 representations. We investigate this hypothesis by comparing the features Err codemadness.org 70 i 3935 learned in each experiment by visualizing the inputs that results in one-hot Err codemadness.org 70 i 3936 modulation pattern classification for each network. Err codemadness.org 70 i 3937 </p> Err codemadness.org 70 i 3938 Err codemadness.org 70 i 3939 Err codemadness.org 70 i 3940 Err codemadness.org 70 i 3941 Quantum Computing: A Taxonomy, Systematic Review and Future Directions. (arXiv:2010.15559v1 [cs.ET]) Err codemadness.org 70 i 3942 http://fr.arxiv.org/abs/2010.15559 Err codemadness.org 70 i 3943 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gill_S/0/1/0/all/0/1">Sukhpal Singh Gill</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kumar_A/0/1/0/all/0/1">Adarsh Kumar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_H/0/1/0/all/0/1">Harvinder Singh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_M/0/1/0/all/0/1">Manmeet Singh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kaur_K/0/1/0/all/0/1">Kamalpreet Kaur</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Usman_M/0/1/0/all/0/1">Muhammad Usman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Buyya_R/0/1/0/all/0/1">Rajkumar Buyya</a></p> Err codemadness.org 70 i 3944 Err codemadness.org 70 i 3945 <p>Quantum computing is an emerging paradigm with the potential to offer Err codemadness.org 70 i 3946 significant computational advantage over conventional classical computing by Err codemadness.org 70 i 3947 exploiting quantum-mechanical principles such as entanglement and Err codemadness.org 70 i 3948 superposition. It is anticipated that this computational advantage of quantum Err codemadness.org 70 i 3949 computing will help to solve many complex and computationally intractable Err codemadness.org 70 i 3950 problems in several areas of research such as drug design, data science, clean Err codemadness.org 70 i 3951 energy, finance, industrial chemical development, secure communications, and Err codemadness.org 70 i 3952 quantum chemistry, among others. In recent years, tremendous progress in both Err codemadness.org 70 i 3953 quantum hardware development and quantum software/algorithm have brought Err codemadness.org 70 i 3954 quantum computing much closer to reality. As the quantum devices are expected Err codemadness.org 70 i 3955 to steadily scale up in the next few years, quantum decoherence and qubit Err codemadness.org 70 i 3956 interconnectivity are two of the major challenges to achieve quantum advantage Err codemadness.org 70 i 3957 in the NISQ era. Quantum computing is a highly topical and fast-moving field of Err codemadness.org 70 i 3958 research with significant ongoing progress in all facets. A systematic review Err codemadness.org 70 i 3959 of the existing literature on quantum computing will be invaluable to Err codemadness.org 70 i 3960 understand the current status of this emerging field and identify open Err codemadness.org 70 i 3961 challenges for the quantum computing community in the coming years. This review Err codemadness.org 70 i 3962 article presents a comprehensive review of quantum computing literature, and Err codemadness.org 70 i 3963 taxonomy of quantum computing. Further, the proposed taxonomy is used to map Err codemadness.org 70 i 3964 various related studies to identify the research gaps. A detailed overview of Err codemadness.org 70 i 3965 quantum software tools and technologies, post-quantum cryptography and quantum Err codemadness.org 70 i 3966 computer hardware development to document the current state-of-the-art in the Err codemadness.org 70 i 3967 respective areas. We finish the article by highlighting various open challenges Err codemadness.org 70 i 3968 and promising future directions for research. Err codemadness.org 70 i 3969 </p> Err codemadness.org 70 i 3970 Err codemadness.org 70 i 3971 Err codemadness.org 70 i 3972 Err codemadness.org 70 i 3973 Genetic U-Net: Automatically Designing Lightweight U-shaped CNN Architectures Using the Genetic Algorithm for Retinal Vessel Segmentation. (arXiv:2010.15560v1 [eess.IV]) Err codemadness.org 70 i 3974 http://fr.arxiv.org/abs/2010.15560 Err codemadness.org 70 i 3975 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Wei_J/0/1/0/all/0/1">Jiahong Wei</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Fan_Z/0/1/0/all/0/1">Zhun Fan</a></p> Err codemadness.org 70 i 3976 Err codemadness.org 70 i 3977 <p>Many previous works based on deep learning for retinal vessel segmentation Err codemadness.org 70 i 3978 have achieved promising performance by manually designing U-shaped Err codemadness.org 70 i 3979 convolutional neural networks (CNNs). However, the manual design of these CNNs Err codemadness.org 70 i 3980 is time-consuming and requires extensive empirical knowledge. To address this Err codemadness.org 70 i 3981 problem, we propose a novel method using genetic algorithms (GAs) to Err codemadness.org 70 i 3982 automatically design a lightweight U-shaped CNN for retinal vessel Err codemadness.org 70 i 3983 segmentation, called Genetic U-Net. Here we first design a special search space Err codemadness.org 70 i 3984 containing the structure of U-Net and its corresponding operations, and then Err codemadness.org 70 i 3985 use genetic algorithm to search for superior architectures in this search Err codemadness.org 70 i 3986 space. Experimental results show that the proposed method outperforms the Err codemadness.org 70 i 3987 existing methods on three public datasets, DRIVE, CHASE_DB1 and STARE. In Err codemadness.org 70 i 3988 addition, the architectures obtained by the proposed method are more Err codemadness.org 70 i 3989 lightweight but robust than the state-of-the-art models. Err codemadness.org 70 i 3990 </p> Err codemadness.org 70 i 3991 Err codemadness.org 70 i 3992 Err codemadness.org 70 i 3993 Err codemadness.org 70 i 3994 Federated Transfer Learning: concept and applications. (arXiv:2010.15561v1 [cs.LG]) Err codemadness.org 70 i 3995 http://fr.arxiv.org/abs/2010.15561 Err codemadness.org 70 i 3996 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Saha_S/0/1/0/all/0/1">Sudipan Saha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ahmad_T/0/1/0/all/0/1">Tahir Ahmad</a></p> Err codemadness.org 70 i 3997 Err codemadness.org 70 i 3998 <p>Development of Artificial Intelligence (AI) is inherently tied to the Err codemadness.org 70 i 3999 development of data. However, in most industries data exists in form of Err codemadness.org 70 i 4000 isolated islands, with limited scope of sharing between different Err codemadness.org 70 i 4001 organizations. This is an hindrance to the further development of AI. Federated Err codemadness.org 70 i 4002 learning has emerged as a possible solution to this problem in the last few Err codemadness.org 70 i 4003 years without compromising user privacy. Among different variants of the Err codemadness.org 70 i 4004 federated learning, noteworthy is federated transfer learning (FTL) that allows Err codemadness.org 70 i 4005 knowledge to be transferred across domains that do not have many overlapping Err codemadness.org 70 i 4006 features and users. In this work we provide a comprehensive survey of the Err codemadness.org 70 i 4007 existing works on this topic. In more details, we study the background of FTL Err codemadness.org 70 i 4008 and its different existing applications. We further analyze FTL from privacy Err codemadness.org 70 i 4009 and machine learning perspective. Err codemadness.org 70 i 4010 </p> Err codemadness.org 70 i 4011 Err codemadness.org 70 i 4012 Err codemadness.org 70 i 4013 Err codemadness.org 70 i 4014 Limitations of the recall capabilities in delay based reservoir computing systems. (arXiv:2010.15562v1 [cs.ET]) Err codemadness.org 70 i 4015 http://fr.arxiv.org/abs/2010.15562 Err codemadness.org 70 i 4016 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Koster_F/0/1/0/all/0/1">Felix K&#xf6;ster</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ehlert_D/0/1/0/all/0/1">Dominik Ehlert</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ludge_K/0/1/0/all/0/1">Kathy L&#xfc;dge</a></p> Err codemadness.org 70 i 4017 Err codemadness.org 70 i 4018 <p>We analyze the memory capacity of a delay based reservoir computer with a Err codemadness.org 70 i 4019 Hopf normal form as nonlinearity and numerically compute the linear as well as Err codemadness.org 70 i 4020 the higher order recall capabilities. A possible physical realisation could be Err codemadness.org 70 i 4021 a laser with external cavity, for which the information is fed via electrical Err codemadness.org 70 i 4022 injection. A task independent quantification of the computational capability of Err codemadness.org 70 i 4023 the reservoir system is done via a complete orthonormal set of basis functions. Err codemadness.org 70 i 4024 Our results suggest that even for constant readout dimension the total memory Err codemadness.org 70 i 4025 capacity is dependent on the ratio between the information input period, also Err codemadness.org 70 i 4026 called the clock cycle, and the time delay in the system. Optimal performance Err codemadness.org 70 i 4027 is found for a time delay about 1.6 times the clock cycle Err codemadness.org 70 i 4028 </p> Err codemadness.org 70 i 4029 Err codemadness.org 70 i 4030 Err codemadness.org 70 i 4031 Err codemadness.org 70 i 4032 Overcoming The Limitations of Neural Networks in Composite-Pattern Learning with Architopes. (arXiv:2010.15571v1 [cs.NE]) Err codemadness.org 70 i 4033 http://fr.arxiv.org/abs/2010.15571 Err codemadness.org 70 i 4034 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kratsios_A/0/1/0/all/0/1">Anastasis Kratsios</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zamanlooy_B/0/1/0/all/0/1">Behnoosh Zamanlooy</a></p> Err codemadness.org 70 i 4035 Err codemadness.org 70 i 4036 <p>The effectiveness of neural networks in solving complex problems is well Err codemadness.org 70 i 4037 recognized; however, little is known about their limitations. We demonstrate Err codemadness.org 70 i 4038 that the feed-forward architecture, for most commonly used activation Err codemadness.org 70 i 4039 functions, is incapable of approximating functions comprised of multiple Err codemadness.org 70 i 4040 sub-patterns while simultaneously respecting their composite-pattern structure. Err codemadness.org 70 i 4041 We overcome this bottleneck with a simple architecture modification that Err codemadness.org 70 i 4042 reallocates the neurons of any single feed-forward network across several Err codemadness.org 70 i 4043 smaller sub-networks, each specialized on a distinct part of the input-space. Err codemadness.org 70 i 4044 The modified architecture, called an Architope, is more expressive on two Err codemadness.org 70 i 4045 fronts. First, it is dense in an associated space of piecewise continuous Err codemadness.org 70 i 4046 functions in which the feed-forward architecture is not dense. Second, it Err codemadness.org 70 i 4047 achieves the same approximation rate as the feed-forward networks while only Err codemadness.org 70 i 4048 requiring $\mathscr{O}(N^{-1})$ fewer parameters in its hidden layers. Err codemadness.org 70 i 4049 Moreover, the architecture achieves these approximation improvements while Err codemadness.org 70 i 4050 preserving the target's composite-pattern structure. Err codemadness.org 70 i 4051 </p> Err codemadness.org 70 i 4052 Err codemadness.org 70 i 4053 Err codemadness.org 70 i 4054 Err codemadness.org 70 i 4055 Experimental Analysis of Communication Relaying Delay in Low-Energy Ad-hoc Networks. (arXiv:2010.15572v1 [cs.NI]) Err codemadness.org 70 i 4056 http://fr.arxiv.org/abs/2010.15572 Err codemadness.org 70 i 4057 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Miya_T/0/1/0/all/0/1">Taichi Miya</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ohshima_K/0/1/0/all/0/1">Kohta Ohshima</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kitaguchi_Y/0/1/0/all/0/1">Yoshiaki Kitaguchi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yamaoka_K/0/1/0/all/0/1">Katsunori Yamaoka</a></p> Err codemadness.org 70 i 4058 Err codemadness.org 70 i 4059 <p>In recent years, more and more applications use ad-hoc networks for local M2M Err codemadness.org 70 i 4060 communications, but in some cases such as when using WSNs, the software Err codemadness.org 70 i 4061 processing delay induced by packets relaying may not be negligible. In this Err codemadness.org 70 i 4062 paper, we planned and carried out a delay measurement experiment using Err codemadness.org 70 i 4063 Raspberry Pi Zero W. The results demonstrated that, in low-energy ad-hoc Err codemadness.org 70 i 4064 networks, processing delay of the application is always too large to ignore; it Err codemadness.org 70 i 4065 is at least ten times greater than the kernel routing and corresponds to 30% of Err codemadness.org 70 i 4066 the transmission delay. Furthermore, if the task is CPU-intensive, such as Err codemadness.org 70 i 4067 packet encryption, the processing delay can be greater than the transmission Err codemadness.org 70 i 4068 delay and its behavior is represented by a simple linear model. Our findings Err codemadness.org 70 i 4069 indicate that the key factor for achieving QoS in ad-hoc networks is an Err codemadness.org 70 i 4070 appropriate node-to-node load balancing that takes into account the CPU Err codemadness.org 70 i 4071 performance and the amount of traffic passing through each node. Err codemadness.org 70 i 4072 </p> Err codemadness.org 70 i 4073 Err codemadness.org 70 i 4074 Err codemadness.org 70 i 4075 Err codemadness.org 70 i 4076 Import test questions into Moodle LMS. (arXiv:2010.15577v1 [cs.CY]) Err codemadness.org 70 i 4077 http://fr.arxiv.org/abs/2010.15577 Err codemadness.org 70 i 4078 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mintii_I/0/1/0/all/0/1">Iryna S. Mintii</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shokaliuk_S/0/1/0/all/0/1">Svitlana V. Shokaliuk</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vakaliuk_T/0/1/0/all/0/1">Tetiana A. Vakaliuk</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mintii_M/0/1/0/all/0/1">Mykhailo M. Mintii</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Soloviev_V/0/1/0/all/0/1">Vladimir N. Soloviev</a></p> Err codemadness.org 70 i 4079 Err codemadness.org 70 i 4080 <p>The purpose of the study is to highlight the theoretical and methodological Err codemadness.org 70 i 4081 aspects of preparing the test questions of the most common types in the form of Err codemadness.org 70 i 4082 text files for further import into learning management system (LMS) Moodle. The Err codemadness.org 70 i 4083 subject of the research is the automated filling of the Moodle LMS test Err codemadness.org 70 i 4084 database. The objectives of the study: to analyze the import files of test Err codemadness.org 70 i 4085 questions, their advantages and disadvantages; to develop guidelines for the Err codemadness.org 70 i 4086 preparation of test questions of common types in the form of text files for Err codemadness.org 70 i 4087 further import into Moodle LMS. The action algorithms for importing questions Err codemadness.org 70 i 4088 and instructions for submitting question files in such formats as Aiken, GIFT, Err codemadness.org 70 i 4089 Moodle XML, "True/False" questions, "Multiple Choice" (one of many and many of Err codemadness.org 70 i 4090 many), "Matching", with an open answer - "Numerical" or "Short answer" and Err codemadness.org 70 i 4091 "Essay" are offered in this article. The formats for submitting questions, Err codemadness.org 70 i 4092 examples of its designing and developed questions were demonstrated in view Err codemadness.org 70 i 4093 mode in Moodle LMS. Err codemadness.org 70 i 4094 </p> Err codemadness.org 70 i 4095 Err codemadness.org 70 i 4096 Err codemadness.org 70 i 4097 Err codemadness.org 70 i 4098 Exploring the Nuances of Designing (with/for) Artificial Intelligence. (arXiv:2010.15578v1 [cs.CY]) Err codemadness.org 70 i 4099 http://fr.arxiv.org/abs/2010.15578 Err codemadness.org 70 i 4100 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Stoimenova_N/0/1/0/all/0/1">Niya Stoimenova</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Price_R/0/1/0/all/0/1">Rebecca Price</a></p> Err codemadness.org 70 i 4101 Err codemadness.org 70 i 4102 <p>Solutions relying on artificial intelligence are devised to predict data Err codemadness.org 70 i 4103 patterns and answer questions that are clearly defined, involve an enumerable Err codemadness.org 70 i 4104 set of solutions, clear rules, and inherently binary decision mechanisms. Yet, Err codemadness.org 70 i 4105 as they become exponentially implemented in our daily activities, they begin to Err codemadness.org 70 i 4106 transcend these initial boundaries and to affect the larger sociotechnical Err codemadness.org 70 i 4107 system in which they are situated. In this arrangement, a solution is under Err codemadness.org 70 i 4108 pressure to surpass true or false criteria and move to an ethical evaluation of Err codemadness.org 70 i 4109 right and wrong. Neither algorithmic solutions, nor purely humanistic ones will Err codemadness.org 70 i 4110 be enough to fully mitigate undesirable outcomes in the narrow state of AI or Err codemadness.org 70 i 4111 its future incarnations. We must take a holistic view. In this paper we explore Err codemadness.org 70 i 4112 the construct of infrastructure as a means to simultaneously address Err codemadness.org 70 i 4113 algorithmic and societal issues when designing AI. Err codemadness.org 70 i 4114 </p> Err codemadness.org 70 i 4115 Err codemadness.org 70 i 4116 Err codemadness.org 70 i 4117 Err codemadness.org 70 i 4118 Modeling biomedical breathing signals with convolutional deep probabilistic autoencoders. (arXiv:2010.15579v1 [cs.LG]) Err codemadness.org 70 i 4119 http://fr.arxiv.org/abs/2010.15579 Err codemadness.org 70 i 4120 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Pastor_Serrano_O/0/1/0/all/0/1">Oscar Pastor-Serrano</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lathouwers_D/0/1/0/all/0/1">Danny Lathouwers</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Perko_Z/0/1/0/all/0/1">Zolt&#xe1;n Perk&#xf3;</a></p> Err codemadness.org 70 i 4121 Err codemadness.org 70 i 4122 <p>One of the main problems with biomedical signals is the limited amount of Err codemadness.org 70 i 4123 patient-specific data and the significant amount of time needed to record a Err codemadness.org 70 i 4124 sufficient number of samples for diagnostic and treatment purposes. We explore Err codemadness.org 70 i 4125 the use of Variational Autoencoder (VAE) and Adversarial Autoencoder (AAE) Err codemadness.org 70 i 4126 algorithms based on one-dimensional convolutional neural networks in order to Err codemadness.org 70 i 4127 build generative models able to capture and represent the variability of a set Err codemadness.org 70 i 4128 of unlabeled quasi-periodic signals using as few as 10 parameters. Furthermore, Err codemadness.org 70 i 4129 we introduce a modified AAE architecture that allows simultaneous Err codemadness.org 70 i 4130 semi-supervised classification and generation of different types of signals. Err codemadness.org 70 i 4131 Our study is based on physical breathing signals, i.e. time series describing Err codemadness.org 70 i 4132 the position of chest markers, generally used to describe respiratory motion. Err codemadness.org 70 i 4133 The time series are discretized into a vector of periods, with each period Err codemadness.org 70 i 4134 containing 6 time and position values. These vectors can be transformed back Err codemadness.org 70 i 4135 into time series through an additional reconstruction neural network and allow Err codemadness.org 70 i 4136 to generate extended signals while simplifying the modeling task. The obtained Err codemadness.org 70 i 4137 models can be used to generate realistic breathing realizations from patient or Err codemadness.org 70 i 4138 population data and to classify new recordings. We show that by incorporating Err codemadness.org 70 i 4139 the labels from around 10-15\% of the dataset during training, the model can be Err codemadness.org 70 i 4140 guided to group data according to the patient it belongs to, or based on the Err codemadness.org 70 i 4141 presence of different types of breathing irregularities such as baseline Err codemadness.org 70 i 4142 shifts. Our specific motivation is to model breathing motion during Err codemadness.org 70 i 4143 radiotherapy lung cancer treatments, for which the developed model serves as an Err codemadness.org 70 i 4144 efficient tool to robustify plans against breathing uncertainties. However, the Err codemadness.org 70 i 4145 same methodology can in principle be applied to any other kind of Err codemadness.org 70 i 4146 quasi-periodic biomedical signal, representing a generically applicable tool. Err codemadness.org 70 i 4147 </p> Err codemadness.org 70 i 4148 Err codemadness.org 70 i 4149 Err codemadness.org 70 i 4150 Err codemadness.org 70 i 4151 The De-democratization of AI: Deep Learning and the Compute Divide in Artificial Intelligence Research. (arXiv:2010.15581v1 [cs.CY]) Err codemadness.org 70 i 4152 http://fr.arxiv.org/abs/2010.15581 Err codemadness.org 70 i 4153 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ahmed_N/0/1/0/all/0/1">Nur Ahmed</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wahed_M/0/1/0/all/0/1">Muntasir Wahed</a></p> Err codemadness.org 70 i 4154 Err codemadness.org 70 i 4155 <p>Increasingly, modern Artificial Intelligence (AI) research has become more Err codemadness.org 70 i 4156 computationally intensive. However, a growing concern is that due to unequal Err codemadness.org 70 i 4157 access to computing power, only certain firms and elite universities have Err codemadness.org 70 i 4158 advantages in modern AI research. Using a novel dataset of 171394 papers from Err codemadness.org 70 i 4159 57 prestigious computer science conferences, we document that firms, in Err codemadness.org 70 i 4160 particular, large technology firms and elite universities have increased Err codemadness.org 70 i 4161 participation in major AI conferences since deep learning's unanticipated rise Err codemadness.org 70 i 4162 in 2012. The effect is concentrated among elite universities, which are ranked Err codemadness.org 70 i 4163 1-50 in the QS World University Rankings. Further, we find two strategies Err codemadness.org 70 i 4164 through which firms increased their presence in AI research: first, they have Err codemadness.org 70 i 4165 increased firm-only publications; and second, firms are collaborating primarily Err codemadness.org 70 i 4166 with elite universities. Consequently, this increased presence of firms and Err codemadness.org 70 i 4167 elite universities in AI research has crowded out mid-tier (QS ranked 201-300) Err codemadness.org 70 i 4168 and lower-tier (QS ranked 301-500) universities. To provide causal evidence Err codemadness.org 70 i 4169 that deep learning's unanticipated rise resulted in this divergence, we Err codemadness.org 70 i 4170 leverage the generalized synthetic control method, a data-driven counterfactual Err codemadness.org 70 i 4171 estimator. Using machine learning based text analysis methods, we provide Err codemadness.org 70 i 4172 additional evidence that the divergence between these two groups - large firms Err codemadness.org 70 i 4173 and non-elite universities - is driven by access to computing power or compute, Err codemadness.org 70 i 4174 which we term as the "compute divide". This compute divide between large firms Err codemadness.org 70 i 4175 and non-elite universities increases concerns around bias and fairness within Err codemadness.org 70 i 4176 AI technology, and presents an obstacle towards "democratizing" AI. These Err codemadness.org 70 i 4177 results suggest that a lack of access to specialized equipment such as compute Err codemadness.org 70 i 4178 can de-democratize knowledge production. Err codemadness.org 70 i 4179 </p> Err codemadness.org 70 i 4180 Err codemadness.org 70 i 4181 Err codemadness.org 70 i 4182 Err codemadness.org 70 i 4183 Improving Accuracy of Federated Learning in Non-IID Settings. (arXiv:2010.15582v1 [cs.LG]) Err codemadness.org 70 i 4184 http://fr.arxiv.org/abs/2010.15582 Err codemadness.org 70 i 4185 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ozdayi_M/0/1/0/all/0/1">Mustafa Safa Ozdayi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kantarcioglu_M/0/1/0/all/0/1">Murat Kantarcioglu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Iyer_R/0/1/0/all/0/1">Rishabh Iyer</a></p> Err codemadness.org 70 i 4186 Err codemadness.org 70 i 4187 <p>Federated Learning (FL) is a decentralized machine learning protocol that Err codemadness.org 70 i 4188 allows a set of participating agents to collaboratively train a model without Err codemadness.org 70 i 4189 sharing their data. This makes FL particularly suitable for settings where data Err codemadness.org 70 i 4190 privacy is desired. However, it has been observed that the performance of FL is Err codemadness.org 70 i 4191 closely tied with the local data distributions of agents. Particularly, in Err codemadness.org 70 i 4192 settings where local data distributions vastly differ among agents, FL performs Err codemadness.org 70 i 4193 rather poorly with respect to the centralized training. To address this Err codemadness.org 70 i 4194 problem, we hypothesize the reasons behind the performance degradation, and Err codemadness.org 70 i 4195 develop some techniques to address these reasons accordingly. In this work, we Err codemadness.org 70 i 4196 identify four simple techniques that can improve the performance of trained Err codemadness.org 70 i 4197 models without incurring any additional communication overhead to FL, but Err codemadness.org 70 i 4198 rather, some light computation overhead either on the client, or the Err codemadness.org 70 i 4199 server-side. In our experimental analysis, combination of our techniques Err codemadness.org 70 i 4200 improved the validation accuracy of a model trained via FL by more than 12% Err codemadness.org 70 i 4201 with respect to our baseline. This is about 5% less than the accuracy of the Err codemadness.org 70 i 4202 model trained on centralized data. Err codemadness.org 70 i 4203 </p> Err codemadness.org 70 i 4204 Err codemadness.org 70 i 4205 Err codemadness.org 70 i 4206 Err codemadness.org 70 i 4207 Probabilistic Transformers. (arXiv:2010.15583v1 [cs.LG]) Err codemadness.org 70 i 4208 http://fr.arxiv.org/abs/2010.15583 Err codemadness.org 70 i 4209 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Movellan_J/0/1/0/all/0/1">Javier R. Movellan</a></p> Err codemadness.org 70 i 4210 Err codemadness.org 70 i 4211 <p>We show that Transformers are Maximum Posterior Probability estimators for Err codemadness.org 70 i 4212 Mixtures of Gaussian Models. This brings a probabilistic point of view to Err codemadness.org 70 i 4213 Transformers and suggests extensions to other probabilistic cases. Err codemadness.org 70 i 4214 </p> Err codemadness.org 70 i 4215 Err codemadness.org 70 i 4216 Err codemadness.org 70 i 4217 Err codemadness.org 70 i 4218 Future Directions of the Cyberinfrastructure for Sustained Scientific Innovation (CSSI) Program. (arXiv:2010.15584v1 [cs.CY]) Err codemadness.org 70 i 4219 http://fr.arxiv.org/abs/2010.15584 Err codemadness.org 70 i 4220 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Arora_R/0/1/0/all/0/1">Ritu Arora</a> (1), <a href="http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1">Xiaosong Li</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Hurwitz_B/0/1/0/all/0/1">Bonnie Hurwitz</a> (3), <a href="http://fr.arxiv.org/find/cs/1/au:+Fay_D/0/1/0/all/0/1">Daniel Fay</a> (4), <a href="http://fr.arxiv.org/find/cs/1/au:+Panda_D/0/1/0/all/0/1">Dhabaleswar K. Panda</a> (5), <a href="http://fr.arxiv.org/find/cs/1/au:+Valeev_E/0/1/0/all/0/1">Edward Valeev</a> (6), <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shaowen Wang</a> (7), <a href="http://fr.arxiv.org/find/cs/1/au:+Moore_S/0/1/0/all/0/1">Shirley Moore</a> (8), <a href="http://fr.arxiv.org/find/cs/1/au:+Chandrasekaran_S/0/1/0/all/0/1">Sunita Chandrasekaran</a> (9), <a href="http://fr.arxiv.org/find/cs/1/au:+Cao_T/0/1/0/all/0/1">Ting Cao</a> (2), <a href="http://fr.arxiv.org/find/cs/1/au:+Bik_H/0/1/0/all/0/1">Holly Bik</a> (10), <a href="http://fr.arxiv.org/find/cs/1/au:+Curry_M/0/1/0/all/0/1">Matthew Curry</a> (11), <a href="http://fr.arxiv.org/find/cs/1/au:+Islam_T/0/1/0/all/0/1">Tanzima Islam</a> (12) ((1) Texas Advanced Computing Center, (2) University of Washington, (3) University of Arizona, (4) Microsoft, (5) The Ohio State University, (6) Virginia Tech University, (7) University of Illinois, (8) Oak Ridge National Lab, (9) University of Delaware, (10) University of California, Riverside, (11) Sandia National Lab, (12) Texas State University)</p> Err codemadness.org 70 i 4221 Err codemadness.org 70 i 4222 <p>The CSSI 2019 workshop was held on October 28-29, 2019, in Austin, Texas. The Err codemadness.org 70 i 4223 main objectives of this workshop were to (1) understand the impact of the CSSI Err codemadness.org 70 i 4224 program on the community over the last 9 years, (2) engage workshop Err codemadness.org 70 i 4225 participants in identifying gaps and opportunities in the current CSSI Err codemadness.org 70 i 4226 landscape, (3) gather ideas on the cyberinfrastructure needs and expectations Err codemadness.org 70 i 4227 of the community with respect to the CSSI program, and (4) prepare a report Err codemadness.org 70 i 4228 summarizing the feedback gathered from the community that can inform the future Err codemadness.org 70 i 4229 solicitations of the CSSI program. The workshop brought together different Err codemadness.org 70 i 4230 stakeholders interested in provisioning sustainable cyberinfrastructure that Err codemadness.org 70 i 4231 can power discoveries impacting the various fields of science and technology Err codemadness.org 70 i 4232 and maintaining the nation's competitiveness in the areas such as scientific Err codemadness.org 70 i 4233 software, HPC, networking, cybersecurity, and data/information science. The Err codemadness.org 70 i 4234 workshop served as a venue for gathering the community-feedback on the current Err codemadness.org 70 i 4235 state of the CSSI program and its future directions. Err codemadness.org 70 i 4236 </p> Err codemadness.org 70 i 4237 Err codemadness.org 70 i 4238 Err codemadness.org 70 i 4239 Err codemadness.org 70 i 4240 Panel: Economic Policy and Governance during Pandemics using AI. (arXiv:2010.15585v1 [cs.CY]) Err codemadness.org 70 i 4241 http://fr.arxiv.org/abs/2010.15585 Err codemadness.org 70 i 4242 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Batarseh_F/0/1/0/all/0/1">Feras A. Batarseh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gopinath_M/0/1/0/all/0/1">Munisamy Gopinath</a></p> Err codemadness.org 70 i 4243 Err codemadness.org 70 i 4244 <p>The global food supply chain (starting at farms and ending with consumers) Err codemadness.org 70 i 4245 has been seriously disrupted by many outlier events such as trade wars, the Err codemadness.org 70 i 4246 China demand shock, natural disasters, and pandemics. Outlier events create Err codemadness.org 70 i 4247 uncertainty along the entire supply chain in addition to intervening policy Err codemadness.org 70 i 4248 responses to mitigate their adverse effects. Artificial Intelligence (AI) Err codemadness.org 70 i 4249 methods (i.e. machine/reinforcement/deep learning) provide an opportunity to Err codemadness.org 70 i 4250 better understand outcomes during outlier events by identifying regular, Err codemadness.org 70 i 4251 irregular and contextual components. Employing AI can provide guidance to Err codemadness.org 70 i 4252 decision making suppliers, farmers, processors, wholesalers, and retailers Err codemadness.org 70 i 4253 along the supply chain, and policy makers to facilitate welfare-improving Err codemadness.org 70 i 4254 outcomes. This panel discusses these issues. Err codemadness.org 70 i 4255 </p> Err codemadness.org 70 i 4256 Err codemadness.org 70 i 4257 Err codemadness.org 70 i 4258 Err codemadness.org 70 i 4259 Event-Driven Learning of Systematic Behaviours in Stock Markets. (arXiv:2010.15586v1 [q-fin.ST]) Err codemadness.org 70 i 4260 http://fr.arxiv.org/abs/2010.15586 Err codemadness.org 70 i 4261 <p>Authors: <a href="http://fr.arxiv.org/find/q-fin/1/au:+Wu_X/0/1/0/all/0/1">Xianchao Wu</a></p> Err codemadness.org 70 i 4262 Err codemadness.org 70 i 4263 <p>It is reported that financial news, especially financial events expressed in Err codemadness.org 70 i 4264 news, provide information to investors' long/short decisions and influence the Err codemadness.org 70 i 4265 movements of stock markets. Motivated by this, we leverage financial event Err codemadness.org 70 i 4266 streams to train a classification neural network that detects latent Err codemadness.org 70 i 4267 event-stock linkages and stock markets' systematic behaviours in the U.S. stock Err codemadness.org 70 i 4268 market. Our proposed pipeline includes (1) a combined event extraction method Err codemadness.org 70 i 4269 that utilizes Open Information Extraction and neural co-reference resolution, Err codemadness.org 70 i 4270 (2) a BERT/ALBERT enhanced representation of events, and (3) an extended Err codemadness.org 70 i 4271 hierarchical attention network that includes attentions on event, news and Err codemadness.org 70 i 4272 temporal levels. Our pipeline achieves significantly better accuracies and Err codemadness.org 70 i 4273 higher simulated annualized returns than state-of-the-art models when being Err codemadness.org 70 i 4274 applied to predicting Standard\&amp;Poor 500, Dow Jones, Nasdaq indices and 10 Err codemadness.org 70 i 4275 individual stocks. Err codemadness.org 70 i 4276 </p> Err codemadness.org 70 i 4277 Err codemadness.org 70 i 4278 Err codemadness.org 70 i 4279 Err codemadness.org 70 i 4280 Impact of (SARS-CoV-2) COVID 19 on the indigenous language-speaking population in Mexico. (arXiv:2010.15588v1 [cs.CY]) Err codemadness.org 70 i 4281 http://fr.arxiv.org/abs/2010.15588 Err codemadness.org 70 i 4282 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Medel_Ramirez_C/0/1/0/all/0/1">Carlos Medel-Ramirez</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Medel_Lopez_H/0/1/0/all/0/1">Hilario Medel-Lopez</a></p> Err codemadness.org 70 i 4283 Err codemadness.org 70 i 4284 <p>The importance of the working document is that it allows the analysis of the Err codemadness.org 70 i 4285 information and the status of cases associated with (SARS-CoV-2) COVID-19 as Err codemadness.org 70 i 4286 open data at the municipal, state and national level, with a daily record of Err codemadness.org 70 i 4287 patients, according to a age, sex, comorbidities, for the condition of Err codemadness.org 70 i 4288 (SARS-CoV-2) COVID-19 according to the following characteristics: a) Positive, Err codemadness.org 70 i 4289 b) Negative, c) Suspicious. Likewise, it presents information related to the Err codemadness.org 70 i 4290 identification of an outpatient and / or hospitalized patient, attending to Err codemadness.org 70 i 4291 their medical development, identifying: a) Recovered, b) Deaths and c) Active, Err codemadness.org 70 i 4292 in Phase 3 and Phase 4, in the five main population areas speaker of indigenous Err codemadness.org 70 i 4293 language in the State of Veracruz - Mexico. The data analysis is carried out Err codemadness.org 70 i 4294 through the application of a data mining algorithm, which provides the Err codemadness.org 70 i 4295 information, fast and timely, required for the estimation of Medical Care Err codemadness.org 70 i 4296 Scenarios of (SARS-CoV-2) COVID-19, as well as for know the impact on the Err codemadness.org 70 i 4297 indigenous language-speaking population in Mexico. Err codemadness.org 70 i 4298 </p> Err codemadness.org 70 i 4299 Err codemadness.org 70 i 4300 Err codemadness.org 70 i 4301 Err codemadness.org 70 i 4302 Enjeux \'ethiques de l'IA en sant\'e : une humanisation du parcours de soin par l'intelligence artificielle ?. (arXiv:2010.15590v1 [cs.CY]) Err codemadness.org 70 i 4303 http://fr.arxiv.org/abs/2010.15590 Err codemadness.org 70 i 4304 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Muhlenbach_F/0/1/0/all/0/1">Fabrice Muhlenbach</a></p> Err codemadness.org 70 i 4305 Err codemadness.org 70 i 4306 <p>Considering the use of artificial intelligence for greater personalization of Err codemadness.org 70 i 4307 patient care and better management of human and material resources may seem Err codemadness.org 70 i 4308 like an opportunity not to be missed. In order to offer a better humanization Err codemadness.org 70 i 4309 of the care pathway, artificial intelligence is a tool that decision-makers in Err codemadness.org 70 i 4310 the hospital sector must appropriate by taking care of the new ethical issues Err codemadness.org 70 i 4311 and conflicts of values that this technology generates. Err codemadness.org 70 i 4312 </p> Err codemadness.org 70 i 4313 <p>Envisager le recours \`a l'intelligence artificielle pour une plus grande Err codemadness.org 70 i 4314 personnalisation de la prise en charge du patient et une meilleure gestion des Err codemadness.org 70 i 4315 ressources humaines et mat\'erielles peut sembler une opportunit\'e \`a ne pas Err codemadness.org 70 i 4316 manquer. Afin de proposer une meilleure humanisation du parcours de soin, Err codemadness.org 70 i 4317 l'intelligence artificielle est un outil que les d\'ecideurs du milieu Err codemadness.org 70 i 4318 hospitalier doivent s'approprier en veillant aux nouveaux enjeux \'ethiques et Err codemadness.org 70 i 4319 conflits de valeurs que cette technologie engendre. Err codemadness.org 70 i 4320 </p> Err codemadness.org 70 i 4321 Err codemadness.org 70 i 4322 Err codemadness.org 70 i 4323 Err codemadness.org 70 i 4324 Shared Space Transfer Learning for analyzing multi-site fMRI data. (arXiv:2010.15594v1 [cs.LG]) Err codemadness.org 70 i 4325 http://fr.arxiv.org/abs/2010.15594 Err codemadness.org 70 i 4326 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yousefnezhad_M/0/1/0/all/0/1">Muhammad Yousefnezhad</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Selvitella_A/0/1/0/all/0/1">Alessandro Selvitella</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_D/0/1/0/all/0/1">Daoqiang Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Greenshaw_A/0/1/0/all/0/1">Andrew J. Greenshaw</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Greiner_R/0/1/0/all/0/1">Russell Greiner</a></p> Err codemadness.org 70 i 4327 Err codemadness.org 70 i 4328 <p>Multi-voxel pattern analysis (MVPA) learns predictive models from task-based Err codemadness.org 70 i 4329 functional magnetic resonance imaging (fMRI) data, for distinguishing when Err codemadness.org 70 i 4330 subjects are performing different cognitive tasks -- e.g., watching movies or Err codemadness.org 70 i 4331 making decisions. MVPA works best with a well-designed feature set and an Err codemadness.org 70 i 4332 adequate sample size. However, most fMRI datasets are noisy, high-dimensional, Err codemadness.org 70 i 4333 expensive to collect, and with small sample sizes. Further, training a robust, Err codemadness.org 70 i 4334 generalized predictive model that can analyze homogeneous cognitive tasks Err codemadness.org 70 i 4335 provided by multi-site fMRI datasets has additional challenges. This paper Err codemadness.org 70 i 4336 proposes the Shared Space Transfer Learning (SSTL) as a novel transfer learning Err codemadness.org 70 i 4337 (TL) approach that can functionally align homogeneous multi-site fMRI datasets, Err codemadness.org 70 i 4338 and so improve the prediction performance in every site. SSTL first extracts a Err codemadness.org 70 i 4339 set of common features for all subjects in each site. It then uses TL to map Err codemadness.org 70 i 4340 these site-specific features to a site-independent shared space in order to Err codemadness.org 70 i 4341 improve the performance of the MVPA. SSTL uses a scalable optimization Err codemadness.org 70 i 4342 procedure that works effectively for high-dimensional fMRI datasets. The Err codemadness.org 70 i 4343 optimization procedure extracts the common features for each site by using a Err codemadness.org 70 i 4344 single-iteration algorithm and maps these site-specific common features to the Err codemadness.org 70 i 4345 site-independent shared space. We evaluate the effectiveness of the proposed Err codemadness.org 70 i 4346 method for transferring between various cognitive tasks. Our comprehensive Err codemadness.org 70 i 4347 experiments validate that SSTL achieves superior performance to other Err codemadness.org 70 i 4348 state-of-the-art analysis techniques. Err codemadness.org 70 i 4349 </p> Err codemadness.org 70 i 4350 Err codemadness.org 70 i 4351 Err codemadness.org 70 i 4352 Err codemadness.org 70 i 4353 Verification of Patterns. (arXiv:2010.15596v1 [cs.LO]) Err codemadness.org 70 i 4354 http://fr.arxiv.org/abs/2010.15596 Err codemadness.org 70 i 4355 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yong Wang</a></p> Err codemadness.org 70 i 4356 Err codemadness.org 70 i 4357 <p>The software patterns provide building blocks to the design and Err codemadness.org 70 i 4358 implementation of a software system, and try to make the software engineering Err codemadness.org 70 i 4359 to progress from experience to science. The software patterns were made famous Err codemadness.org 70 i 4360 because of the introduction as the design patterns. After that, patterns have Err codemadness.org 70 i 4361 been researched and developed widely and rapidly. The series of books of Err codemadness.org 70 i 4362 pattern-oriented software architecture should be marked in the development of Err codemadness.org 70 i 4363 software patterns. As mentioned in these books, formalization of patterns and Err codemadness.org 70 i 4364 an intermediate pattern language are needed and should be developed in the Err codemadness.org 70 i 4365 future of patterns. So, in this book, we formalize software patterns according Err codemadness.org 70 i 4366 to the categories of the series of books of pattern-oriented software Err codemadness.org 70 i 4367 architecture, and verify the correctness of patterns based on truly concurrent Err codemadness.org 70 i 4368 process algebra. In one aspect, patterns are formalized and verified; in the Err codemadness.org 70 i 4369 other aspect, truly concurrent process algebra can play a role of an Err codemadness.org 70 i 4370 intermediate pattern language for its rigorous theory. Err codemadness.org 70 i 4371 </p> Err codemadness.org 70 i 4372 Err codemadness.org 70 i 4373 Err codemadness.org 70 i 4374 Err codemadness.org 70 i 4375 Enhancing reinforcement learning by a finite reward response filter with a case study in intelligent structural control. (arXiv:2010.15597v1 [cs.LG]) Err codemadness.org 70 i 4376 http://fr.arxiv.org/abs/2010.15597 Err codemadness.org 70 i 4377 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rahmani_H/0/1/0/all/0/1">Hamid Radmard Rahmani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Koenke_C/0/1/0/all/0/1">Carsten Koenke</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wiering_M/0/1/0/all/0/1">Marco A. Wiering</a></p> Err codemadness.org 70 i 4378 Err codemadness.org 70 i 4379 <p>In many reinforcement learning (RL) problems, it takes some time until a Err codemadness.org 70 i 4380 taken action by the agent reaches its maximum effect on the environment and Err codemadness.org 70 i 4381 consequently the agent receives the reward corresponding to that action by a Err codemadness.org 70 i 4382 delay called action-effect delay. Such delays reduce the performance of the Err codemadness.org 70 i 4383 learning algorithm and increase the computational costs, as the reinforcement Err codemadness.org 70 i 4384 learning agent values the immediate rewards more than the future reward that is Err codemadness.org 70 i 4385 more related to the taken action. This paper addresses this issue by Err codemadness.org 70 i 4386 introducing an applicable enhanced Q-learning method in which at the beginning Err codemadness.org 70 i 4387 of the learning phase, the agent takes a single action and builds a function Err codemadness.org 70 i 4388 that reflects the environments response to that action, called the reflexive Err codemadness.org 70 i 4389 $\gamma$ - function. During the training phase, the agent utilizes the created Err codemadness.org 70 i 4390 reflexive $\gamma$- function to update the Q-values. We have applied the Err codemadness.org 70 i 4391 developed method to a structural control problem in which the goal of the agent Err codemadness.org 70 i 4392 is to reduce the vibrations of a building subjected to earthquake excitations Err codemadness.org 70 i 4393 with a specified delay. Seismic control problems are considered as a complex Err codemadness.org 70 i 4394 task in structural engineering because of the stochastic and unpredictable Err codemadness.org 70 i 4395 nature of earthquakes and the complex behavior of the structure. Three Err codemadness.org 70 i 4396 scenarios are presented to study the effects of zero, medium, and long Err codemadness.org 70 i 4397 action-effect delays and the performance of the Enhanced method is compared to Err codemadness.org 70 i 4398 the standard Q-learning method. Both RL methods use neural network to learn to Err codemadness.org 70 i 4399 estimate the state-action value function that is used to control the structure. Err codemadness.org 70 i 4400 The results show that the enhanced method significantly outperforms the Err codemadness.org 70 i 4401 performance of the original method in all cases, and also improves the Err codemadness.org 70 i 4402 stability of the algorithm in dealing with action-effect delays. Err codemadness.org 70 i 4403 </p> Err codemadness.org 70 i 4404 Err codemadness.org 70 i 4405 Err codemadness.org 70 i 4406 Err codemadness.org 70 i 4407 May I Ask Who's Calling? Named Entity Recognition on Call Center Transcripts for Privacy Law Compliance. (arXiv:2010.15598v1 [cs.CL]) Err codemadness.org 70 i 4408 http://fr.arxiv.org/abs/2010.15598 Err codemadness.org 70 i 4409 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kaplan_M/0/1/0/all/0/1">Micaela Kaplan</a></p> Err codemadness.org 70 i 4410 Err codemadness.org 70 i 4411 <p>We investigate using Named Entity Recognition on a new type of user-generated Err codemadness.org 70 i 4412 text: a call center conversation. These conversations combine problems from Err codemadness.org 70 i 4413 spontaneous speech with problems novel to conversational Automated Speech Err codemadness.org 70 i 4414 Recognition, including incorrect recognition, alongside other common problems Err codemadness.org 70 i 4415 from noisy user-generated text. Using our own corpus with new annotations, Err codemadness.org 70 i 4416 training custom contextual string embeddings, and applying a BiLSTM-CRF, we Err codemadness.org 70 i 4417 match state-of-the-art results on our novel task. Err codemadness.org 70 i 4418 </p> Err codemadness.org 70 i 4419 Err codemadness.org 70 i 4420 Err codemadness.org 70 i 4421 Err codemadness.org 70 i 4422 Expert Selection in High-Dimensional Markov Decision Processes. (arXiv:2010.15599v1 [cs.LG]) Err codemadness.org 70 i 4423 http://fr.arxiv.org/abs/2010.15599 Err codemadness.org 70 i 4424 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rubies_Royo_V/0/1/0/all/0/1">Vicenc Rubies-Royo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mazumdar_E/0/1/0/all/0/1">Eric Mazumdar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dong_R/0/1/0/all/0/1">Roy Dong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tomlin_C/0/1/0/all/0/1">Claire Tomlin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sastry_S/0/1/0/all/0/1">S. Shankar Sastry</a></p> Err codemadness.org 70 i 4425 Err codemadness.org 70 i 4426 <p>In this work we present a multi-armed bandit framework for online expert Err codemadness.org 70 i 4427 selection in Markov decision processes and demonstrate its use in Err codemadness.org 70 i 4428 high-dimensional settings. Our method takes a set of candidate expert policies Err codemadness.org 70 i 4429 and switches between them to rapidly identify the best performing expert using Err codemadness.org 70 i 4430 a variant of the classical upper confidence bound algorithm, thus ensuring low Err codemadness.org 70 i 4431 regret in the overall performance of the system. This is useful in applications Err codemadness.org 70 i 4432 where several expert policies may be available, and one needs to be selected at Err codemadness.org 70 i 4433 run-time for the underlying environment. Err codemadness.org 70 i 4434 </p> Err codemadness.org 70 i 4435 Err codemadness.org 70 i 4436 Err codemadness.org 70 i 4437 Err codemadness.org 70 i 4438 Three computational models and its equivalence. (arXiv:2010.15600v1 [cs.LO]) Err codemadness.org 70 i 4439 http://fr.arxiv.org/abs/2010.15600 Err codemadness.org 70 i 4440 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lopez_C/0/1/0/all/0/1">Ciro Ivan Garcia Lopez</a></p> Err codemadness.org 70 i 4441 Err codemadness.org 70 i 4442 <p>The study of computability has its origin in Hilbert's conference of 1900, Err codemadness.org 70 i 4443 where an adjacent question, to the ones he asked, is to give a precise Err codemadness.org 70 i 4444 description of the notion of algorithm. In the search for a good definition Err codemadness.org 70 i 4445 arose three independent theories: Turing and the Turing machines, G\"odel and Err codemadness.org 70 i 4446 the recursive functions, Church and the Lambda Calculus. Err codemadness.org 70 i 4447 </p> Err codemadness.org 70 i 4448 <p>Later there were established by Kleene that the classic models of computation Err codemadness.org 70 i 4449 are equivalent. This fact is widely accepted by many textbooks and the proof is Err codemadness.org 70 i 4450 omitted since the proof is tedious and unreadable. We intend to fill this gap Err codemadness.org 70 i 4451 presenting the proof in a modern way, without forgetting the mathematical Err codemadness.org 70 i 4452 details. Err codemadness.org 70 i 4453 </p> Err codemadness.org 70 i 4454 Err codemadness.org 70 i 4455 Err codemadness.org 70 i 4456 Err codemadness.org 70 i 4457 Using a Binary Classification Model to Predict the Likelihood of Enrolment to the Undergraduate Program of a Philippine University. (arXiv:2010.15601v1 [cs.CY]) Err codemadness.org 70 i 4458 http://fr.arxiv.org/abs/2010.15601 Err codemadness.org 70 i 4459 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Esquivel_D/0/1/0/all/0/1">Dr.Joseph A. Esquivel</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Esquivel_D/0/1/0/all/0/1">Dr. James A. Esquivel</a></p> Err codemadness.org 70 i 4460 Err codemadness.org 70 i 4461 <p>With the recent implementation of the K to 12 Program, academic institutions, Err codemadness.org 70 i 4462 specifically, Colleges and Universities in the Philippines have been faced with Err codemadness.org 70 i 4463 difficulties in determining projected freshmen enrollees vis-a-vis Err codemadness.org 70 i 4464 decision-making factors for efficient resource management. Enrollment targets Err codemadness.org 70 i 4465 directly impacts success factors of Higher Education Institutions. This study Err codemadness.org 70 i 4466 covered an analysis of various characteristics of freshmen applicants affecting Err codemadness.org 70 i 4467 their admission status in a Philippine university. A predictive model was Err codemadness.org 70 i 4468 developed using Logistic Regression to evaluate the probability that an Err codemadness.org 70 i 4469 admitted student will pursue to enroll in the Institution or not. The dataset Err codemadness.org 70 i 4470 used was acquired from the University Admissions Office. The office designed an Err codemadness.org 70 i 4471 online application form to capture applicants' details. The online form was Err codemadness.org 70 i 4472 distributed to all student applicants, and most often, students, tend to Err codemadness.org 70 i 4473 provide incomplete information. Despite this fact, student characteristics, as Err codemadness.org 70 i 4474 well as geographic and demographic data based on the students' location are Err codemadness.org 70 i 4475 significant predictors of enrollment decision. The results of the study show Err codemadness.org 70 i 4476 that given limited information about prospective students, Higher Education Err codemadness.org 70 i 4477 Institutions can implement machine learning techniques to supplement management Err codemadness.org 70 i 4478 decisions and provide estimates of class sizes, in this way, it will allow the Err codemadness.org 70 i 4479 institution to optimize the allocation of resources and will have better Err codemadness.org 70 i 4480 control over net tuition revenue. Err codemadness.org 70 i 4481 </p> Err codemadness.org 70 i 4482 Err codemadness.org 70 i 4483 Err codemadness.org 70 i 4484 Err codemadness.org 70 i 4485 Designing learning experiences for online teaching and learning. (arXiv:2010.15602v1 [cs.CY]) Err codemadness.org 70 i 4486 http://fr.arxiv.org/abs/2010.15602 Err codemadness.org 70 i 4487 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Sockalingam_N/0/1/0/all/0/1">Nachamma Sockalingam</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_J/0/1/0/all/0/1">Junhua Liu</a></p> Err codemadness.org 70 i 4488 Err codemadness.org 70 i 4489 <p>Teaching is about constantly innovating strategies, ways and means to engage Err codemadness.org 70 i 4490 diverse students in active and meaningful learning. In line with this, SUTD Err codemadness.org 70 i 4491 adopts various student-centric teaching and learning teaching methods and Err codemadness.org 70 i 4492 approaches. This means that our graduate/undergraduate instructors have to be Err codemadness.org 70 i 4493 ready to teach using these student student-centric teaching and learning Err codemadness.org 70 i 4494 pedagogies. In this article, I share my experiences of redesigning this Err codemadness.org 70 i 4495 teaching course that is typically conducted face-to-face to a synchronous Err codemadness.org 70 i 4496 online course and also invite one of the participant in this course to reflect Err codemadness.org 70 i 4497 on his experience as a student. Err codemadness.org 70 i 4498 </p> Err codemadness.org 70 i 4499 Err codemadness.org 70 i 4500 Err codemadness.org 70 i 4501 Err codemadness.org 70 i 4502 Suppressing Mislabeled Data via Grouping and Self-Attention. (arXiv:2010.15603v1 [cs.CV]) Err codemadness.org 70 i 4503 http://fr.arxiv.org/abs/2010.15603 Err codemadness.org 70 i 4504 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Peng_X/0/1/0/all/0/1">Xiaojiang Peng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_K/0/1/0/all/0/1">Kai Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zeng_Z/0/1/0/all/0/1">Zhaoyang Zeng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1">Qing Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_J/0/1/0/all/0/1">Jianfei Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qiao_Y/0/1/0/all/0/1">Yu Qiao</a></p> Err codemadness.org 70 i 4505 Err codemadness.org 70 i 4506 <p>Deep networks achieve excellent results on large-scale clean data but degrade Err codemadness.org 70 i 4507 significantly when learning from noisy labels. To suppressing the impact of Err codemadness.org 70 i 4508 mislabeled data, this paper proposes a conceptually simple yet efficient Err codemadness.org 70 i 4509 training block, termed as Attentive Feature Mixup (AFM), which allows paying Err codemadness.org 70 i 4510 more attention to clean samples and less to mislabeled ones via sample Err codemadness.org 70 i 4511 interactions in small groups. Specifically, this plug-and-play AFM first Err codemadness.org 70 i 4512 leverages a \textit{group-to-attend} module to construct groups and assign Err codemadness.org 70 i 4513 attention weights for group-wise samples, and then uses a \textit{mixup} module Err codemadness.org 70 i 4514 with the attention weights to interpolate massive noisy-suppressed samples. The Err codemadness.org 70 i 4515 AFM has several appealing benefits for noise-robust deep learning. (i) It does Err codemadness.org 70 i 4516 not rely on any assumptions and extra clean subset. (ii) With massive Err codemadness.org 70 i 4517 interpolations, the ratio of useless samples is reduced dramatically compared Err codemadness.org 70 i 4518 to the original noisy ratio. (iii) \pxj{It jointly optimizes the interpolation Err codemadness.org 70 i 4519 weights with classifiers, suppressing the influence of mislabeled data via low Err codemadness.org 70 i 4520 attention weights. (iv) It partially inherits the vicinal risk minimization of Err codemadness.org 70 i 4521 mixup to alleviate over-fitting while improves it by sampling fewer Err codemadness.org 70 i 4522 feature-target vectors around mislabeled data from the mixup vicinal Err codemadness.org 70 i 4523 distribution.} Extensive experiments demonstrate that AFM yields Err codemadness.org 70 i 4524 state-of-the-art results on two challenging real-world noisy datasets: Food101N Err codemadness.org 70 i 4525 and Clothing1M. The code will be available at Err codemadness.org 70 i 4526 https://github.com/kaiwang960112/AFM. Err codemadness.org 70 i 4527 </p> Err codemadness.org 70 i 4528 Err codemadness.org 70 i 4529 Err codemadness.org 70 i 4530 Err codemadness.org 70 i 4531 Autoregressive Asymmetric Linear Gaussian Hidden Markov Models. (arXiv:2010.15604v1 [cs.LG]) Err codemadness.org 70 i 4532 http://fr.arxiv.org/abs/2010.15604 Err codemadness.org 70 i 4533 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Puerto_Santana_C/0/1/0/all/0/1">Carlos Puerto-Santana</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Larranaga_P/0/1/0/all/0/1">Pedro Larra&#xf1;aga</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bielza_C/0/1/0/all/0/1">Concha Bielza</a></p> Err codemadness.org 70 i 4534 Err codemadness.org 70 i 4535 <p>In a real life process evolving over time, the relationship between its Err codemadness.org 70 i 4536 relevant variables may change. Therefore, it is advantageous to have different Err codemadness.org 70 i 4537 inference models for each state of the process. Asymmetric hidden Markov models Err codemadness.org 70 i 4538 fulfil this dynamical requirement and provide a framework where the trend of Err codemadness.org 70 i 4539 the process can be expressed as a latent variable. In this paper, we modify Err codemadness.org 70 i 4540 these recent asymmetric hidden Markov models to have an asymmetric Err codemadness.org 70 i 4541 autoregressive component, allowing the model to choose the order of Err codemadness.org 70 i 4542 autoregression that maximizes its penalized likelihood for a given training Err codemadness.org 70 i 4543 set. Additionally, we show how inference, hidden states decoding and parameter Err codemadness.org 70 i 4544 learning must be adapted to fit the proposed model. Finally, we run experiments Err codemadness.org 70 i 4545 with synthetic and real data to show the capabilities of this new model. Err codemadness.org 70 i 4546 </p> Err codemadness.org 70 i 4547 Err codemadness.org 70 i 4548 Err codemadness.org 70 i 4549 Err codemadness.org 70 i 4550 Manifold learning-based feature extraction for structural defect reconstruction. (arXiv:2010.15605v1 [cs.CE]) Err codemadness.org 70 i 4551 http://fr.arxiv.org/abs/2010.15605 Err codemadness.org 70 i 4552 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1">Qi Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_D/0/1/0/all/0/1">Dianzi Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qian_Z/0/1/0/all/0/1">Zhenghua Qian</a></p> Err codemadness.org 70 i 4553 Err codemadness.org 70 i 4554 <p>Data-driven quantitative defect reconstructions using ultrasonic guided waves Err codemadness.org 70 i 4555 has recently demonstrated great potential in the area of non-destructive Err codemadness.org 70 i 4556 testing. In this paper, we develop an efficient deep learning-based defect Err codemadness.org 70 i 4557 reconstruction framework, called NetInv, which recasts the inverse guided wave Err codemadness.org 70 i 4558 scattering problem as a data-driven supervised learning progress that realizes Err codemadness.org 70 i 4559 a mapping between reflection coefficients in wavenumber domain and defect Err codemadness.org 70 i 4560 profiles in the spatial domain. The superiorities of the proposed NetInv over Err codemadness.org 70 i 4561 conventional reconstruction methods for defect reconstruction have been Err codemadness.org 70 i 4562 demonstrated by several examples. Results show that NetInv has the ability to Err codemadness.org 70 i 4563 achieve the higher quality of defect profiles with remarkable efficiency and Err codemadness.org 70 i 4564 provides valuable insight into the development of effective data driven Err codemadness.org 70 i 4565 structural health monitoring and defect reconstruction using machine learning. Err codemadness.org 70 i 4566 </p> Err codemadness.org 70 i 4567 Err codemadness.org 70 i 4568 Err codemadness.org 70 i 4569 Err codemadness.org 70 i 4570 Design and Evaluation of Electric Bus Systems for Metropolitan Cities. (arXiv:2010.15606v1 [cs.CY]) Err codemadness.org 70 i 4571 http://fr.arxiv.org/abs/2010.15606 Err codemadness.org 70 i 4572 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Menon_U/0/1/0/all/0/1">Unnikrishnan Menon</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Panda_D/0/1/0/all/0/1">Divyani Panda</a></p> Err codemadness.org 70 i 4573 Err codemadness.org 70 i 4574 <p>Over the past decade, most of the metropolitan cities across the world have Err codemadness.org 70 i 4575 been witnessing a degrading trend in air quality index. Exhaust emission data Err codemadness.org 70 i 4576 observations show that promotion of public transport could be a potential way Err codemadness.org 70 i 4577 out of this gridlock. Due to environmental concerns, numerous public transport Err codemadness.org 70 i 4578 authorities harbor a great interest in introducing zero emission electric Err codemadness.org 70 i 4579 buses. A shift from conventional diesel buses to electric buses comes with Err codemadness.org 70 i 4580 several benefits in terms of reduction in local pollution, noise, and fuel Err codemadness.org 70 i 4581 consumption. This paper proposes the relevant vehicle technologies, powertrain, Err codemadness.org 70 i 4582 and charging systems, which, in combination, provides a comprehensive Err codemadness.org 70 i 4583 methodology to design an Electric Bus that can be deployed in metropolitan Err codemadness.org 70 i 4584 cities to mitigate emission concerns. Err codemadness.org 70 i 4585 </p> Err codemadness.org 70 i 4586 Err codemadness.org 70 i 4587 Err codemadness.org 70 i 4588 Err codemadness.org 70 i 4589 CRICTRS: Embeddings based Statistical and Semi Supervised Cricket Team Recommendation System. (arXiv:2010.15607v1 [cs.CY]) Err codemadness.org 70 i 4590 http://fr.arxiv.org/abs/2010.15607 Err codemadness.org 70 i 4591 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chhabra_P/0/1/0/all/0/1">Prazwal Chhabra</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ali_R/0/1/0/all/0/1">Rizwan Ali</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pudi_V/0/1/0/all/0/1">Vikram Pudi</a></p> Err codemadness.org 70 i 4592 Err codemadness.org 70 i 4593 <p>Team Recommendation has always been a challenging aspect in team sports. Such Err codemadness.org 70 i 4594 systems aim to recommend a player combination best suited against the Err codemadness.org 70 i 4595 opposition players, resulting in an optimal outcome. In this paper, we propose Err codemadness.org 70 i 4596 a semi-supervised statistical approach to build a team recommendation system Err codemadness.org 70 i 4597 for cricket by modelling players into embeddings. To build these embeddings, we Err codemadness.org 70 i 4598 design a qualitative and quantitative rating system which considers the Err codemadness.org 70 i 4599 strength of opposition also for evaluating player performance. The embeddings Err codemadness.org 70 i 4600 obtained, describes the strengths and weaknesses of the players based on past Err codemadness.org 70 i 4601 performances of the player. We also embark on a critical aspect of team Err codemadness.org 70 i 4602 composition, which includes the number of batsmen and bowlers in the team. The Err codemadness.org 70 i 4603 team composition changes over time, depending on different factors which are Err codemadness.org 70 i 4604 tough to predict, so we take this input from the user and use the player Err codemadness.org 70 i 4605 embeddings to decide the best possible team combination with the given team Err codemadness.org 70 i 4606 composition. Err codemadness.org 70 i 4607 </p> Err codemadness.org 70 i 4608 Err codemadness.org 70 i 4609 Err codemadness.org 70 i 4610 Err codemadness.org 70 i 4611 An Overview Of 3D Object Detection. (arXiv:2010.15614v1 [cs.CV]) Err codemadness.org 70 i 4612 http://fr.arxiv.org/abs/2010.15614 Err codemadness.org 70 i 4613 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yilin Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ye_J/0/1/0/all/0/1">Jiayi Ye</a></p> Err codemadness.org 70 i 4614 Err codemadness.org 70 i 4615 <p>Point cloud 3D object detection has recently received major attention and Err codemadness.org 70 i 4616 becomes an active research topic in 3D computer vision community. However, Err codemadness.org 70 i 4617 recognizing 3D objects in LiDAR (Light Detection and Ranging) is still a Err codemadness.org 70 i 4618 challenge due to the complexity of point clouds. Objects such as pedestrians, Err codemadness.org 70 i 4619 cyclists, or traffic cones are usually represented by quite sparse points, Err codemadness.org 70 i 4620 which makes the detection quite complex using only point cloud. In this Err codemadness.org 70 i 4621 project, we propose a framework that uses both RGB and point cloud data to Err codemadness.org 70 i 4622 perform multiclass object recognition. We use existing 2D detection models to Err codemadness.org 70 i 4623 localize the region of interest (ROI) on the RGB image, followed by a pixel Err codemadness.org 70 i 4624 mapping strategy in the point cloud, and finally, lift the initial 2D bounding Err codemadness.org 70 i 4625 box to 3D space. We use the recently released nuScenes dataset---a large-scale Err codemadness.org 70 i 4626 dataset contains many data formats---to training and evaluate our proposed Err codemadness.org 70 i 4627 architecture. Err codemadness.org 70 i 4628 </p> Err codemadness.org 70 i 4629 Err codemadness.org 70 i 4630 Err codemadness.org 70 i 4631 Err codemadness.org 70 i 4632 Sampling and Reconstruction of Sparse Signals in Shift-Invariant Spaces: Generalized Shannon's Theorem Meets Compressive Sensing. (arXiv:2010.15618v1 [eess.SP]) Err codemadness.org 70 i 4633 http://fr.arxiv.org/abs/2010.15618 Err codemadness.org 70 i 4634 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Vlasic_T/0/1/0/all/0/1">Tin Vla&#x161;i&#x107;</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sersic_D/0/1/0/all/0/1">Damir Ser&#x161;i&#x107;</a></p> Err codemadness.org 70 i 4635 Err codemadness.org 70 i 4636 <p>This paper introduces a novel framework and corresponding methods for Err codemadness.org 70 i 4637 sampling and reconstruction of sparse signals in shift-invariant (SI) spaces. Err codemadness.org 70 i 4638 We reinterpret the random demodulator, a system that acquires sparse Err codemadness.org 70 i 4639 bandlimited signals, as a system for acquisition of linear combinations of the Err codemadness.org 70 i 4640 samples in the SI setting with the box function as the sampling kernel. The Err codemadness.org 70 i 4641 sparsity assumption is exploited by compressive sensing (CS) framework for Err codemadness.org 70 i 4642 recovery of the SI samples from a reduced set of measurements. The samples are Err codemadness.org 70 i 4643 subsequently filtered by a discrete-time correction filter in order to Err codemadness.org 70 i 4644 reconstruct expansion coefficients of an observed signal. Furthermore, we offer Err codemadness.org 70 i 4645 a generalization of the proposed framework to other sampling kernels that lie Err codemadness.org 70 i 4646 in arbitrary SI spaces. The generalized method embeds the correction filter in Err codemadness.org 70 i 4647 a CS optimization problem which directly reconstructs expansion coefficients of Err codemadness.org 70 i 4648 the signal. Both approaches recast an inherently infinite-dimensional inverse Err codemadness.org 70 i 4649 problem as a finite-dimensional CS problem in an exact way. Finally, we conduct Err codemadness.org 70 i 4650 numerical experiments on signals in B-spline spaces whose expansion Err codemadness.org 70 i 4651 coefficients are assumed to be sparse in a certain transform domain. The Err codemadness.org 70 i 4652 coefficients can be regarded as parametric models of an underlying continuous Err codemadness.org 70 i 4653 signal, obtained from a reduced set of measurements. Such continuous signal Err codemadness.org 70 i 4654 representations are particularly suitable for signal processing without Err codemadness.org 70 i 4655 converting them into samples. Err codemadness.org 70 i 4656 </p> Err codemadness.org 70 i 4657 Err codemadness.org 70 i 4658 Err codemadness.org 70 i 4659 Err codemadness.org 70 i 4660 CAFE: Coarse-to-Fine Neural Symbolic Reasoning for Explainable Recommendation. (arXiv:2010.15620v1 [cs.IR]) Err codemadness.org 70 i 4661 http://fr.arxiv.org/abs/2010.15620 Err codemadness.org 70 i 4662 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Xian_Y/0/1/0/all/0/1">Yikun Xian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fu_Z/0/1/0/all/0/1">Zuohui Fu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_H/0/1/0/all/0/1">Handong Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ge_Y/0/1/0/all/0/1">Yingqiang Ge</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_X/0/1/0/all/0/1">Xu Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Huang_Q/0/1/0/all/0/1">Qiaoying Huang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Geng_S/0/1/0/all/0/1">Shijie Geng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qin_Z/0/1/0/all/0/1">Zhou Qin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Melo_G/0/1/0/all/0/1">Gerard de Melo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Muthukrishnan_S/0/1/0/all/0/1">S. Muthukrishnan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1">Yongfeng Zhang</a></p> Err codemadness.org 70 i 4663 Err codemadness.org 70 i 4664 <p>Recent research explores incorporating knowledge graphs (KG) into e-commerce Err codemadness.org 70 i 4665 recommender systems, not only to achieve better recommendation performance, but Err codemadness.org 70 i 4666 more importantly to generate explanations of why particular decisions are made. Err codemadness.org 70 i 4667 This can be achieved by explicit KG reasoning, where a model starts from a user Err codemadness.org 70 i 4668 node, sequentially determines the next step, and walks towards an item node of Err codemadness.org 70 i 4669 potential interest to the user. However, this is challenging due to the huge Err codemadness.org 70 i 4670 search space, unknown destination, and sparse signals over the KG, so Err codemadness.org 70 i 4671 informative and effective guidance is needed to achieve a satisfactory Err codemadness.org 70 i 4672 recommendation quality. To this end, we propose a CoArse-to-FinE neural Err codemadness.org 70 i 4673 symbolic reasoning approach (CAFE). It first generates user profiles as coarse Err codemadness.org 70 i 4674 sketches of user behaviors, which subsequently guide a path-finding process to Err codemadness.org 70 i 4675 derive reasoning paths for recommendations as fine-grained predictions. User Err codemadness.org 70 i 4676 profiles can capture prominent user behaviors from the history, and provide Err codemadness.org 70 i 4677 valuable signals about which kinds of path patterns are more likely to lead to Err codemadness.org 70 i 4678 potential items of interest for the user. To better exploit the user profiles, Err codemadness.org 70 i 4679 an improved path-finding algorithm called Profile-guided Path Reasoning (PPR) Err codemadness.org 70 i 4680 is also developed, which leverages an inventory of neural symbolic reasoning Err codemadness.org 70 i 4681 modules to effectively and efficiently find a batch of paths over a large-scale Err codemadness.org 70 i 4682 KG. We extensively experiment on four real-world benchmarks and observe Err codemadness.org 70 i 4683 substantial gains in the recommendation performance compared with Err codemadness.org 70 i 4684 state-of-the-art methods. Err codemadness.org 70 i 4685 </p> Err codemadness.org 70 i 4686 Err codemadness.org 70 i 4687 Err codemadness.org 70 i 4688 Err codemadness.org 70 i 4689 Low-Variance Policy Gradient Estimation with World Models. (arXiv:2010.15622v1 [stat.ML]) Err codemadness.org 70 i 4690 http://fr.arxiv.org/abs/2010.15622 Err codemadness.org 70 i 4691 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Nauman_M/0/1/0/all/0/1">Michal Nauman</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Hengst_F/0/1/0/all/0/1">Floris Den Hengst</a></p> Err codemadness.org 70 i 4692 Err codemadness.org 70 i 4693 <p>In this paper, we propose World Model Policy Gradient (WMPG), an approach to Err codemadness.org 70 i 4694 reduce the variance of policy gradient estimates using learned world models Err codemadness.org 70 i 4695 (WM's). In WMPG, a WM is trained online and used to imagine trajectories. The Err codemadness.org 70 i 4696 imagined trajectories are used in two ways. Firstly, to calculate a Err codemadness.org 70 i 4697 without-replacement estimator of the policy gradient. Secondly, the return of Err codemadness.org 70 i 4698 the imagined trajectories is used as an informed baseline. We compare the Err codemadness.org 70 i 4699 proposed approach with AC and MAC on a set of environments of increasing Err codemadness.org 70 i 4700 complexity (CartPole, LunarLander and Pong) and find that WMPG has better Err codemadness.org 70 i 4701 sample efficiency. Based on these results, we conclude that WMPG can yield Err codemadness.org 70 i 4702 increased sample efficiency in cases where a robust latent representation of Err codemadness.org 70 i 4703 the environment can be learned. Err codemadness.org 70 i 4704 </p> Err codemadness.org 70 i 4705 Err codemadness.org 70 i 4706 Err codemadness.org 70 i 4707 Err codemadness.org 70 i 4708 Fast Minimal Presentations of Bi-graded Persistence Modules. (arXiv:2010.15623v1 [math.AT]) Err codemadness.org 70 i 4709 http://fr.arxiv.org/abs/2010.15623 Err codemadness.org 70 i 4710 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Kerber_M/0/1/0/all/0/1">Michael Kerber</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Rolle_A/0/1/0/all/0/1">Alexander Rolle</a></p> Err codemadness.org 70 i 4711 Err codemadness.org 70 i 4712 <p>Multi-parameter persistent homology is a recent branch of topological data Err codemadness.org 70 i 4713 analysis. In this area, data sets are investigated through the lens of homology Err codemadness.org 70 i 4714 with respect to two or more scale parameters. The high computational cost of Err codemadness.org 70 i 4715 many algorithms calls for a preprocessing step to reduce the input size. In Err codemadness.org 70 i 4716 general, a minimal presentation is the smallest possible representation of a Err codemadness.org 70 i 4717 persistence module. Lesnick and Wright proposed recently an algorithm (the Err codemadness.org 70 i 4718 LW-algorithm) for computing minimal presentations based on matrix reduction. In Err codemadness.org 70 i 4719 this work, we propose, implement and benchmark several improvements over the Err codemadness.org 70 i 4720 LW-algorithm. Most notably, we propose the use of priority queues to avoid Err codemadness.org 70 i 4721 extensive scanning of the matrix columns, which constitutes the computational Err codemadness.org 70 i 4722 bottleneck in the LW-algorithm, and we combine their algorithm with ideas from Err codemadness.org 70 i 4723 the multi-parameter chunk algorithm by Fugacci and Kerber. Our extensive Err codemadness.org 70 i 4724 experiments show that our algorithm outperforms the LW-algorithm and computes Err codemadness.org 70 i 4725 the minimal presentation for data sets with millions of simplices within a few Err codemadness.org 70 i 4726 seconds. Our software is publicly available. Err codemadness.org 70 i 4727 </p> Err codemadness.org 70 i 4728 Err codemadness.org 70 i 4729 Err codemadness.org 70 i 4730 Err codemadness.org 70 i 4731 Abstract Value Iteration for Hierarchical Reinforcement Learning. (arXiv:2010.15638v1 [cs.LG]) Err codemadness.org 70 i 4732 http://fr.arxiv.org/abs/2010.15638 Err codemadness.org 70 i 4733 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Jothimurugan_K/0/1/0/all/0/1">Kishor Jothimurugan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bastani_O/0/1/0/all/0/1">Osbert Bastani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Alur_R/0/1/0/all/0/1">Rajeev Alur</a></p> Err codemadness.org 70 i 4734 Err codemadness.org 70 i 4735 <p>We propose a novel hierarchical reinforcement learning framework for control Err codemadness.org 70 i 4736 with continuous state and action spaces. In our framework, the user specifies Err codemadness.org 70 i 4737 subgoal regions which are subsets of states; then, we (i) learn options that Err codemadness.org 70 i 4738 serve as transitions between these subgoal regions, and (ii) construct a Err codemadness.org 70 i 4739 high-level plan in the resulting abstract decision process (ADP). A key Err codemadness.org 70 i 4740 challenge is that the ADP may not be Markov, which we address by proposing two Err codemadness.org 70 i 4741 algorithms for planning in the ADP. Our first algorithm is conservative, Err codemadness.org 70 i 4742 allowing us to prove theoretical guarantees on its performance, which help Err codemadness.org 70 i 4743 inform the design of subgoal regions. Our second algorithm is a practical one Err codemadness.org 70 i 4744 that interweaves planning at the abstract level and learning at the concrete Err codemadness.org 70 i 4745 level. In our experiments, we demonstrate that our approach outperforms Err codemadness.org 70 i 4746 state-of-the-art hierarchical reinforcement learning algorithms on several Err codemadness.org 70 i 4747 challenging benchmarks. Err codemadness.org 70 i 4748 </p> Err codemadness.org 70 i 4749 Err codemadness.org 70 i 4750 Err codemadness.org 70 i 4751 Err codemadness.org 70 i 4752 Teaching a GAN What Not to Learn. (arXiv:2010.15639v1 [stat.ML]) Err codemadness.org 70 i 4753 http://fr.arxiv.org/abs/2010.15639 Err codemadness.org 70 i 4754 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Asokan_S/0/1/0/all/0/1">Siddarth Asokan</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Seelamantula_C/0/1/0/all/0/1">Chandra Sekhar Seelamantula</a></p> Err codemadness.org 70 i 4755 Err codemadness.org 70 i 4756 <p>Generative adversarial networks (GANs) were originally envisioned as Err codemadness.org 70 i 4757 unsupervised generative models that learn to follow a target distribution. Err codemadness.org 70 i 4758 Variants such as conditional GANs, auxiliary-classifier GANs (ACGANs) project Err codemadness.org 70 i 4759 GANs on to supervised and semi-supervised learning frameworks by providing Err codemadness.org 70 i 4760 labelled data and using multi-class discriminators. In this paper, we approach Err codemadness.org 70 i 4761 the supervised GAN problem from a different perspective, one that is motivated Err codemadness.org 70 i 4762 by the philosophy of the famous Persian poet Rumi who said, "The art of knowing Err codemadness.org 70 i 4763 is knowing what to ignore." In the GAN framework, we not only provide the GAN Err codemadness.org 70 i 4764 positive data that it must learn to model, but also present it with so-called Err codemadness.org 70 i 4765 negative samples that it must learn to avoid - we call this "The Rumi Err codemadness.org 70 i 4766 Framework." This formulation allows the discriminator to represent the Err codemadness.org 70 i 4767 underlying target distribution better by learning to penalize generated samples Err codemadness.org 70 i 4768 that are undesirable - we show that this capability accelerates the learning Err codemadness.org 70 i 4769 process of the generator. We present a reformulation of the standard GAN (SGAN) Err codemadness.org 70 i 4770 and least-squares GAN (LSGAN) within the Rumi setting. The advantage of the Err codemadness.org 70 i 4771 reformulation is demonstrated by means of experiments conducted on MNIST, Err codemadness.org 70 i 4772 Fashion MNIST, CelebA, and CIFAR-10 datasets. Finally, we consider an Err codemadness.org 70 i 4773 application of the proposed formulation to address the important problem of Err codemadness.org 70 i 4774 learning an under-represented class in an unbalanced dataset. The Rumi approach Err codemadness.org 70 i 4775 results in substantially lower FID scores than the standard GAN frameworks Err codemadness.org 70 i 4776 while possessing better generalization capability. Err codemadness.org 70 i 4777 </p> Err codemadness.org 70 i 4778 Err codemadness.org 70 i 4779 Err codemadness.org 70 i 4780 Err codemadness.org 70 i 4781 Free-Form Image Inpainting via Contrastive Attention Network. (arXiv:2010.15643v1 [cs.CV]) Err codemadness.org 70 i 4782 http://fr.arxiv.org/abs/2010.15643 Err codemadness.org 70 i 4783 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ma_X/0/1/0/all/0/1">Xin Ma</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_X/0/1/0/all/0/1">Xiaoqiang Zhou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Huang_H/0/1/0/all/0/1">Huaibo Huang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chai_Z/0/1/0/all/0/1">Zhenhua Chai</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_X/0/1/0/all/0/1">Xiaolin Wei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_R/0/1/0/all/0/1">Ran He</a></p> Err codemadness.org 70 i 4784 Err codemadness.org 70 i 4785 <p>Most deep learning based image inpainting approaches adopt autoencoder or its Err codemadness.org 70 i 4786 variants to fill missing regions in images. Encoders are usually utilized to Err codemadness.org 70 i 4787 learn powerful representational spaces, which are important for dealing with Err codemadness.org 70 i 4788 sophisticated learning tasks. Specifically, in image inpainting tasks, masks Err codemadness.org 70 i 4789 with any shapes can appear anywhere in images (i.e., free-form masks) which Err codemadness.org 70 i 4790 form complex patterns. It is difficult for encoders to capture such powerful Err codemadness.org 70 i 4791 representations under this complex situation. To tackle this problem, we Err codemadness.org 70 i 4792 propose a self-supervised Siamese inference network to improve the robustness Err codemadness.org 70 i 4793 and generalization. It can encode contextual semantics from full resolution Err codemadness.org 70 i 4794 images and obtain more discriminative representations. we further propose a Err codemadness.org 70 i 4795 multi-scale decoder with a novel dual attention fusion module (DAF), which can Err codemadness.org 70 i 4796 combine both the restored and known regions in a smooth way. This multi-scale Err codemadness.org 70 i 4797 architecture is beneficial for decoding discriminative representations learned Err codemadness.org 70 i 4798 by encoders into images layer by layer. In this way, unknown regions will be Err codemadness.org 70 i 4799 filled naturally from outside to inside. Qualitative and quantitative Err codemadness.org 70 i 4800 experiments on multiple datasets, including facial and natural datasets (i.e., Err codemadness.org 70 i 4801 Celeb-HQ, Pairs Street View, Places2 and ImageNet), demonstrate that our Err codemadness.org 70 i 4802 proposed method outperforms state-of-the-art methods in generating high-quality Err codemadness.org 70 i 4803 inpainting results. Err codemadness.org 70 i 4804 </p> Err codemadness.org 70 i 4805 Err codemadness.org 70 i 4806 Err codemadness.org 70 i 4807 Err codemadness.org 70 i 4808 Brain Tumor Segmentation Network Using Attention-based Fusion and Spatial Relationship Constraint. (arXiv:2010.15647v1 [eess.IV]) Err codemadness.org 70 i 4809 http://fr.arxiv.org/abs/2010.15647 Err codemadness.org 70 i 4810 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Liu_C/0/1/0/all/0/1">Chenyu Liu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ding_W/0/1/0/all/0/1">Wangbin Ding</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_L/0/1/0/all/0/1">Lei Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_Z/0/1/0/all/0/1">Zhen Zhang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pei_C/0/1/0/all/0/1">Chenhao Pei</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Huang_L/0/1/0/all/0/1">Liqin Huang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhuang_X/0/1/0/all/0/1">Xiahai Zhuang</a></p> Err codemadness.org 70 i 4811 Err codemadness.org 70 i 4812 <p>Delineating the brain tumor from magnetic resonance (MR) images is critical Err codemadness.org 70 i 4813 for the treatment of gliomas. However, automatic delineation is challenging due Err codemadness.org 70 i 4814 to the complex appearance and ambiguous outlines of tumors. Considering that Err codemadness.org 70 i 4815 multi-modal MR images can reflect different tumor biological properties, we Err codemadness.org 70 i 4816 develop a novel multi-modal tumor segmentation network (MMTSN) to robustly Err codemadness.org 70 i 4817 segment brain tumors based on multi-modal MR images. The MMTSN is composed of Err codemadness.org 70 i 4818 three sub-branches and a main branch. Specifically, the sub-branches are used Err codemadness.org 70 i 4819 to capture different tumor features from multi-modal images, while in the main Err codemadness.org 70 i 4820 branch, we design a spatial-channel fusion block (SCFB) to effectively Err codemadness.org 70 i 4821 aggregate multi-modal features. Additionally, inspired by the fact that the Err codemadness.org 70 i 4822 spatial relationship between sub-regions of tumor is relatively fixed, e.g., Err codemadness.org 70 i 4823 the enhancing tumor is always in the tumor core, we propose a spatial loss to Err codemadness.org 70 i 4824 constrain the relationship between different sub-regions of tumor. We evaluate Err codemadness.org 70 i 4825 our method on the test set of multi-modal brain tumor segmentation challenge Err codemadness.org 70 i 4826 2020 (BraTs2020). The method achieves 0.8764, 0.8243 and 0.773 dice score for Err codemadness.org 70 i 4827 whole tumor, tumor core and enhancing tumor, respectively. Err codemadness.org 70 i 4828 </p> Err codemadness.org 70 i 4829 Err codemadness.org 70 i 4830 Err codemadness.org 70 i 4831 Err codemadness.org 70 i 4832 Reliable Graph Neural Networks via Robust Aggregation. (arXiv:2010.15651v1 [cs.LG]) Err codemadness.org 70 i 4833 http://fr.arxiv.org/abs/2010.15651 Err codemadness.org 70 i 4834 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Geisler_S/0/1/0/all/0/1">Simon Geisler</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zugner_D/0/1/0/all/0/1">Daniel Z&#xfc;gner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gunnemann_S/0/1/0/all/0/1">Stephan G&#xfc;nnemann</a></p> Err codemadness.org 70 i 4835 Err codemadness.org 70 i 4836 <p>Perturbations targeting the graph structure have proven to be extremely Err codemadness.org 70 i 4837 effective in reducing the performance of Graph Neural Networks (GNNs), and Err codemadness.org 70 i 4838 traditional defenses such as adversarial training do not seem to be able to Err codemadness.org 70 i 4839 improve robustness. This work is motivated by the observation that Err codemadness.org 70 i 4840 adversarially injected edges effectively can be viewed as additional samples to Err codemadness.org 70 i 4841 a node's neighborhood aggregation function, which results in distorted Err codemadness.org 70 i 4842 aggregations accumulating over the layers. Conventional GNN aggregation Err codemadness.org 70 i 4843 functions, such as a sum or mean, can be distorted arbitrarily by a single Err codemadness.org 70 i 4844 outlier. We propose a robust aggregation function motivated by the field of Err codemadness.org 70 i 4845 robust statistics. Our approach exhibits the largest possible breakdown point Err codemadness.org 70 i 4846 of 0.5, which means that the bias of the aggregation is bounded as long as the Err codemadness.org 70 i 4847 fraction of adversarial edges of a node is less than 50\%. Our novel Err codemadness.org 70 i 4848 aggregation function, Soft Medoid, is a fully differentiable generalization of Err codemadness.org 70 i 4849 the Medoid and therefore lends itself well for end-to-end deep learning. Err codemadness.org 70 i 4850 Equipping a GNN with our aggregation improves the robustness with respect to Err codemadness.org 70 i 4851 structure perturbations on Cora ML by a factor of 3 (and 5.5 on Citeseer) and Err codemadness.org 70 i 4852 by a factor of 8 for low-degree nodes. Err codemadness.org 70 i 4853 </p> Err codemadness.org 70 i 4854 Err codemadness.org 70 i 4855 Err codemadness.org 70 i 4856 Err codemadness.org 70 i 4857 Semi-Supervised Speech Recognition via Graph-based Temporal Classification. (arXiv:2010.15653v1 [cs.LG]) Err codemadness.org 70 i 4858 http://fr.arxiv.org/abs/2010.15653 Err codemadness.org 70 i 4859 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Moritz_N/0/1/0/all/0/1">Niko Moritz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hori_T/0/1/0/all/0/1">Takaaki Hori</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Roux_J/0/1/0/all/0/1">Jonathan Le Roux</a></p> Err codemadness.org 70 i 4860 Err codemadness.org 70 i 4861 <p>Semi-supervised learning has demonstrated promising results in automatic Err codemadness.org 70 i 4862 speech recognition (ASR) by self-training using a seed ASR model with Err codemadness.org 70 i 4863 pseudo-labels generated for unlabeled data. The effectiveness of this approach Err codemadness.org 70 i 4864 largely relies on the pseudo-label accuracy, for which typically only the Err codemadness.org 70 i 4865 1-best ASR hypothesis is used. However, alternative ASR hypotheses of an N-best Err codemadness.org 70 i 4866 list can provide more accurate labels for an unlabeled speech utterance and Err codemadness.org 70 i 4867 also reflect uncertainties of the seed ASR model. In this paper, we propose a Err codemadness.org 70 i 4868 generalized form of the connectionist temporal classification (CTC) objective Err codemadness.org 70 i 4869 that accepts a graph representation of the training targets. The newly proposed Err codemadness.org 70 i 4870 graph-based temporal classification (GTC) objective is applied for Err codemadness.org 70 i 4871 self-training with WFST-based supervision, which is generated from an N-best Err codemadness.org 70 i 4872 list of pseudo-labels. In this setup, GTC is used to learn not only a temporal Err codemadness.org 70 i 4873 alignment, similarly to CTC, but also a label alignment to obtain the optimal Err codemadness.org 70 i 4874 pseudo-label sequence from the weighted graph. Results show that this approach Err codemadness.org 70 i 4875 can effectively exploit an N-best list of pseudo-labels with associated scores, Err codemadness.org 70 i 4876 outperforming standard pseudo-labeling by a large margin, with ASR results Err codemadness.org 70 i 4877 close to an oracle experiment in which the best hypotheses of the N-best lists Err codemadness.org 70 i 4878 are selected manually. Err codemadness.org 70 i 4879 </p> Err codemadness.org 70 i 4880 Err codemadness.org 70 i 4881 Err codemadness.org 70 i 4882 Err codemadness.org 70 i 4883 Identification of complex mixtures for Raman spectroscopy using a novel scheme based on a new multi-label deep neural network. (arXiv:2010.15654v1 [eess.SP]) Err codemadness.org 70 i 4884 http://fr.arxiv.org/abs/2010.15654 Err codemadness.org 70 i 4885 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Pan_L/0/1/0/all/0/1">Liangrui Pan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pipitsunthonsan_P/0/1/0/all/0/1">Pronthep Pipitsunthonsan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Daengngam_C/0/1/0/all/0/1">Chalongrat Daengngam</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Chongcheawchamnan_M/0/1/0/all/0/1">Mitchai Chongcheawchamnan</a></p> Err codemadness.org 70 i 4886 Err codemadness.org 70 i 4887 <p>With noisy environment caused by fluoresence and additive white noise as well Err codemadness.org 70 i 4888 as complicated spectrum fingerprints, the identification of complex mixture Err codemadness.org 70 i 4889 materials remains a major challenge in Raman spectroscopy application. In this Err codemadness.org 70 i 4890 paper, we propose a new scheme based on a constant wavelet transform (CWT) and Err codemadness.org 70 i 4891 a deep network for classifying complex mixture. The scheme first transforms the Err codemadness.org 70 i 4892 noisy Raman spectrum to a two-dimensional scale map using CWT. A multi-label Err codemadness.org 70 i 4893 deep neural network model (MDNN) is then applied for classifying material. The Err codemadness.org 70 i 4894 proposed model accelerates the feature extraction and expands the feature graph Err codemadness.org 70 i 4895 using the global averaging pooling layer. The Sigmoid function is implemented Err codemadness.org 70 i 4896 in the last layer of the model. The MDNN model was trained, validated and Err codemadness.org 70 i 4897 tested with data collected from the samples prepared from substances in palm Err codemadness.org 70 i 4898 oil. During training and validating process, data augmentation is applied to Err codemadness.org 70 i 4899 overcome the imbalance of data and enrich the diversity of Raman spectra. From Err codemadness.org 70 i 4900 the test results, it is found that the MDNN model outperforms previously Err codemadness.org 70 i 4901 proposed deep neural network models in terms of Hamming loss, one error, Err codemadness.org 70 i 4902 coverage, ranking loss, average precision, F1 macro averaging and F1 micro Err codemadness.org 70 i 4903 averaging, respectively. The average detection time obtained from our model is Err codemadness.org 70 i 4904 5.31 s, which is much faster than the detection time of the previously proposed Err codemadness.org 70 i 4905 models. Err codemadness.org 70 i 4906 </p> Err codemadness.org 70 i 4907 Err codemadness.org 70 i 4908 Err codemadness.org 70 i 4909 Err codemadness.org 70 i 4910 Generalization bounds for deep thresholding networks. (arXiv:2010.15658v1 [math.ST]) Err codemadness.org 70 i 4911 http://fr.arxiv.org/abs/2010.15658 Err codemadness.org 70 i 4912 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Behboodi_A/0/1/0/all/0/1">Arash Behboodi</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Rauhut_H/0/1/0/all/0/1">Holger Rauhut</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Schnoor_E/0/1/0/all/0/1">Ekkehard Schnoor</a></p> Err codemadness.org 70 i 4913 Err codemadness.org 70 i 4914 <p>We consider compressive sensing in the scenario where the sparsity basis Err codemadness.org 70 i 4915 (dictionary) is not known in advance, but needs to be learned from examples. Err codemadness.org 70 i 4916 Motivated by the well-known iterative soft thresholding algorithm for the Err codemadness.org 70 i 4917 reconstruction, we define deep networks parametrized by the dictionary, which Err codemadness.org 70 i 4918 we call deep thresholding networks. Based on training samples, we aim at Err codemadness.org 70 i 4919 learning the optimal sparsifying dictionary and thereby the optimal network Err codemadness.org 70 i 4920 that reconstructs signals from their low-dimensional linear measurements. The Err codemadness.org 70 i 4921 dictionary learning is performed via minimizing the empirical risk. We derive Err codemadness.org 70 i 4922 generalization bounds by analyzing the Rademacher complexity of hypothesis Err codemadness.org 70 i 4923 classes consisting of such deep networks. We obtain estimates of the sample Err codemadness.org 70 i 4924 complexity that depend only linearly on the dimensions and on the depth. Err codemadness.org 70 i 4925 </p> Err codemadness.org 70 i 4926 Err codemadness.org 70 i 4927 Err codemadness.org 70 i 4928 Err codemadness.org 70 i 4929 Independence Tests Without Ground Truth for Noisy Learners. (arXiv:2010.15662v1 [stat.ML]) Err codemadness.org 70 i 4930 http://fr.arxiv.org/abs/2010.15662 Err codemadness.org 70 i 4931 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Corrada_Emmanuel_A/0/1/0/all/0/1">Andr&#xe9;s Corrada-Emmanuel</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Pantridge_E/0/1/0/all/0/1">Edward Pantridge</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Zahrebelski_E/0/1/0/all/0/1">Eddie Zahrebelski</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Chaganti_A/0/1/0/all/0/1">Aditya Chaganti</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Simeonov_S/0/1/0/all/0/1">Simeon Simeonov</a></p> Err codemadness.org 70 i 4932 Err codemadness.org 70 i 4933 <p>Exact ground truth invariant polynomial systems can be written for Err codemadness.org 70 i 4934 arbitrarily correlated binary classifiers. Their solutions give estimates for Err codemadness.org 70 i 4935 sample statistics that require knowledge of the ground truth of the correct Err codemadness.org 70 i 4936 labels in the sample. Of these polynomial systems, only a few have been solved Err codemadness.org 70 i 4937 in closed form. Here we discuss the exact solution for independent binary Err codemadness.org 70 i 4938 classifiers - resolving an outstanding problem that has been presented at this Err codemadness.org 70 i 4939 conference and others. Its practical applicability is hampered by its sole Err codemadness.org 70 i 4940 remaining assumption - the classifiers need to be independent in their sample Err codemadness.org 70 i 4941 errors. We discuss how to use the closed form solution to create a Err codemadness.org 70 i 4942 self-consistent test that can validate the independence assumption itself Err codemadness.org 70 i 4943 absent the correct labels ground truth. It can be cast as an algebraic geometry Err codemadness.org 70 i 4944 conjecture for binary classifiers that remains unsolved. A similar conjecture Err codemadness.org 70 i 4945 for the ground truth invariant algebraic system for scalar regressors is Err codemadness.org 70 i 4946 solvable, and we present the solution here. We also discuss experiments on the Err codemadness.org 70 i 4947 Penn ML Benchmark classification tasks that provide further evidence that the Err codemadness.org 70 i 4948 conjecture may be true for the polynomial system of binary classifiers. Err codemadness.org 70 i 4949 </p> Err codemadness.org 70 i 4950 Err codemadness.org 70 i 4951 Err codemadness.org 70 i 4952 Err codemadness.org 70 i 4953 Machine Ethics and Automated Vehicles. (arXiv:2010.15665v1 [cs.CY]) Err codemadness.org 70 i 4954 http://fr.arxiv.org/abs/2010.15665 Err codemadness.org 70 i 4955 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Goodall_N/0/1/0/all/0/1">Noah J. Goodall</a></p> Err codemadness.org 70 i 4956 Err codemadness.org 70 i 4957 <p>Road vehicle travel at a reasonable speed involves some risk, even when using Err codemadness.org 70 i 4958 computer-controlled driving with failure-free hardware and perfect sensing. A Err codemadness.org 70 i 4959 fully-automated vehicle must continuously decide how to allocate this risk Err codemadness.org 70 i 4960 without a human driver's oversight. These are ethical decisions, particularly Err codemadness.org 70 i 4961 in instances where an automated vehicle cannot avoid crashing. In this chapter, Err codemadness.org 70 i 4962 I introduce the concept of moral behavior for an automated vehicle, argue the Err codemadness.org 70 i 4963 need for research in this area through responses to anticipated critiques, and Err codemadness.org 70 i 4964 discuss relevant applications from machine ethics and moral modeling research. Err codemadness.org 70 i 4965 </p> Err codemadness.org 70 i 4966 Err codemadness.org 70 i 4967 Err codemadness.org 70 i 4968 Err codemadness.org 70 i 4969 PeopleXploit -- A hybrid tool to collect public data. (arXiv:2010.15668v1 [cs.CY]) Err codemadness.org 70 i 4970 http://fr.arxiv.org/abs/2010.15668 Err codemadness.org 70 i 4971 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+V_A/0/1/0/all/0/1">Arjun Anand V</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+K_B/0/1/0/all/0/1">Buvanasri A K</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+R_M/0/1/0/all/0/1">Meenakshi R</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+S_D/0/1/0/all/0/1">Dr. Karthika S</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mohan_A/0/1/0/all/0/1">Ashok Kumar Mohan</a></p> Err codemadness.org 70 i 4972 Err codemadness.org 70 i 4973 <p>This paper introduces the concept of Open Source Intelligence (OSINT) as an Err codemadness.org 70 i 4974 important application in intelligent profiling of individuals. With a variety Err codemadness.org 70 i 4975 of tools available, significant data shall be obtained on an individual as a Err codemadness.org 70 i 4976 consequence of analyzing his/her internet presence but all of this comes at the Err codemadness.org 70 i 4977 cost of low relevance. To increase the relevance score in profiling, Err codemadness.org 70 i 4978 PeopleXploit is being introduced. PeopleXploit is a hybrid tool which helps in Err codemadness.org 70 i 4979 collecting the publicly available information that is reliable and relevant to Err codemadness.org 70 i 4980 the given input. This tool is used to track and trace the given target with Err codemadness.org 70 i 4981 their digital footprints like Name, Email, Phone Number, User IDs etc. and the Err codemadness.org 70 i 4982 tool will scan &amp; search other associated data from public available records Err codemadness.org 70 i 4983 from the internet and create a summary report against the target. PeopleXploit Err codemadness.org 70 i 4984 profiles a person using authorship analysis and finds the best matching guess. Err codemadness.org 70 i 4985 Also, the type of analysis performed (professional/matrimonial/criminal entity) Err codemadness.org 70 i 4986 varies with the requirement of the user. Err codemadness.org 70 i 4987 </p> Err codemadness.org 70 i 4988 Err codemadness.org 70 i 4989 Err codemadness.org 70 i 4990 Err codemadness.org 70 i 4991 Using Twitter to Analyze Political Polarization During National Crises. (arXiv:2010.15669v1 [cs.CY]) Err codemadness.org 70 i 4992 http://fr.arxiv.org/abs/2010.15669 Err codemadness.org 70 i 4993 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shisode_P/0/1/0/all/0/1">Parth Shisode</a></p> Err codemadness.org 70 i 4994 Err codemadness.org 70 i 4995 <p>Democrats and Republicans have seemed to grow apart in the past three Err codemadness.org 70 i 4996 decades. Since the United States as we know it today is undeniably bipartisan, Err codemadness.org 70 i 4997 this phenomenon would not appear as a surprise to most. However, there are Err codemadness.org 70 i 4998 triggers which can cause spikes in disagreements between Democrats and Err codemadness.org 70 i 4999 Republicans at a higher rate than how the two parties have been growing apart Err codemadness.org 70 i 5000 gradually over time. This study has analyzed the idea that national events Err codemadness.org 70 i 5001 which generally are detrimental to all individuals can be one of those Err codemadness.org 70 i 5002 triggers. By testing polarization before and after three events (Hurricane Err codemadness.org 70 i 5003 Sandy [2012], N. Korea Missile Test Surge [2019], COVID-19 [2020]) using Err codemadness.org 70 i 5004 Twitter data, we show that a measurable spike in polarization occurs between Err codemadness.org 70 i 5005 the Democrat and Republican party. In order to measure polarization, sentiments Err codemadness.org 70 i 5006 of Twitter users aligned to the Democrat and Republican parties are compared on Err codemadness.org 70 i 5007 identical entities (events, people, locations, etc.). Using hundreds of Err codemadness.org 70 i 5008 thousands of data samples, a 2.8% increase in polarization was measured during Err codemadness.org 70 i 5009 times of crisis compared to times where no crises were occurring. Regardless of Err codemadness.org 70 i 5010 the reasoning that the gap between political parties can increase so much Err codemadness.org 70 i 5011 during times of suffering and stress, it is definitely alarming to see that Err codemadness.org 70 i 5012 among other aspects of life, the partisan gap worsens during detrimental Err codemadness.org 70 i 5013 national events. Err codemadness.org 70 i 5014 </p> Err codemadness.org 70 i 5015 Err codemadness.org 70 i 5016 Err codemadness.org 70 i 5017 Err codemadness.org 70 i 5018 Detecting Individuals with Depressive Disorder fromPersonal Google Search and YouTube History Logs. (arXiv:2010.15670v1 [cs.CY]) Err codemadness.org 70 i 5019 http://fr.arxiv.org/abs/2010.15670 Err codemadness.org 70 i 5020 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1">Boyu Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zaman_A/0/1/0/all/0/1">Anis Zaman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Acharyya_R/0/1/0/all/0/1">Rupam Acharyya</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hoque_E/0/1/0/all/0/1">Ehsan Hoque</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Silenzio_V/0/1/0/all/0/1">Vincent Silenzio</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kautz_H/0/1/0/all/0/1">Henry Kautz</a></p> Err codemadness.org 70 i 5021 Err codemadness.org 70 i 5022 <p>Depressive disorder is one of the most prevalent mental illnesses among the Err codemadness.org 70 i 5023 global population. However, traditional screening methods require exacting Err codemadness.org 70 i 5024 in-person interviews and may fail to provide immediate interventions. In this Err codemadness.org 70 i 5025 work, we leverage ubiquitous personal longitudinal Google Search and YouTube Err codemadness.org 70 i 5026 engagement logs to detect individuals with depressive disorder. We collected Err codemadness.org 70 i 5027 Google Search and YouTube history data and clinical depression evaluation Err codemadness.org 70 i 5028 results from $212$ participants ($99$ of them suffered from moderate to severe Err codemadness.org 70 i 5029 depressions). We then propose a personalized framework for classifying Err codemadness.org 70 i 5030 individuals with and without depression symptoms based on mutual-exciting point Err codemadness.org 70 i 5031 process that captures both the temporal and semantic aspects of online Err codemadness.org 70 i 5032 activities. Our best model achieved an average F1 score of $0.77 \pm 0.04$ and Err codemadness.org 70 i 5033 an AUC ROC of $0.81 \pm 0.02$. Err codemadness.org 70 i 5034 </p> Err codemadness.org 70 i 5035 Err codemadness.org 70 i 5036 Err codemadness.org 70 i 5037 Err codemadness.org 70 i 5038 Computing Crisp Bisimulations for Fuzzy Structures. (arXiv:2010.15671v1 [cs.DS]) Err codemadness.org 70 i 5039 http://fr.arxiv.org/abs/2010.15671 Err codemadness.org 70 i 5040 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nguyen_L/0/1/0/all/0/1">Linh Anh Nguyen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tran_D/0/1/0/all/0/1">Dat Xuan Tran</a></p> Err codemadness.org 70 i 5041 Err codemadness.org 70 i 5042 <p>Fuzzy structures such as fuzzy automata, fuzzy transition systems, weighted Err codemadness.org 70 i 5043 social networks and fuzzy interpretations in fuzzy description logics have been Err codemadness.org 70 i 5044 widely studied. For such structures, bisimulation is a natural notion for Err codemadness.org 70 i 5045 characterizing indiscernibility between states or individuals. There are two Err codemadness.org 70 i 5046 kinds of bisimulations for fuzzy structures: crisp bisimulations and fuzzy Err codemadness.org 70 i 5047 bisimulations. While the latter fits to the fuzzy paradigm, the former has also Err codemadness.org 70 i 5048 attracted attention due to the application of crisp equivalence relations, for Err codemadness.org 70 i 5049 example, in minimizing structures. Bisimulations can be formulated for fuzzy Err codemadness.org 70 i 5050 labeled graphs and then adapted to other fuzzy structures. In this article, we Err codemadness.org 70 i 5051 present an efficient algorithm for computing the partition corresponding to the Err codemadness.org 70 i 5052 largest crisp bisimulation of a given finite fuzzy labeled graph. Its Err codemadness.org 70 i 5053 complexity is of order $O((m\log{l} + n)\log{n})$, where $n$, $m$ and $l$ are Err codemadness.org 70 i 5054 the number of vertices, the number of nonzero edges and the number of different Err codemadness.org 70 i 5055 fuzzy degrees of edges of the input graph, respectively. We also study a Err codemadness.org 70 i 5056 similar problem for the setting with counting successors, which corresponds to Err codemadness.org 70 i 5057 the case with qualified number restrictions in description logics and graded Err codemadness.org 70 i 5058 modalities in modal logics. In particular, we provide an efficient algorithm Err codemadness.org 70 i 5059 with the complexity $O((m\log{m} + n)\log{n})$ for the considered problem in Err codemadness.org 70 i 5060 that setting. Err codemadness.org 70 i 5061 </p> Err codemadness.org 70 i 5062 Err codemadness.org 70 i 5063 Err codemadness.org 70 i 5064 Err codemadness.org 70 i 5065 FD Cell-Free mMIMO: Analysis and Optimization. (arXiv:2010.15672v1 [eess.SP]) Err codemadness.org 70 i 5066 http://fr.arxiv.org/abs/2010.15672 Err codemadness.org 70 i 5067 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Datta_S/0/1/0/all/0/1">Soumyadeep Datta</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sharma_E/0/1/0/all/0/1">Ekant Sharma</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Amudala_D/0/1/0/all/0/1">Dheeraj Naidu Amudala</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Budhiraja_R/0/1/0/all/0/1">Rohit Budhiraja</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Panwar_S/0/1/0/all/0/1">Shivendra S. Panwar</a></p> Err codemadness.org 70 i 5068 Err codemadness.org 70 i 5069 <p>We consider a full-duplex cell-free massive multiple-input-multiple-output Err codemadness.org 70 i 5070 system with limited capacity fronthaul links. We derive its downlink/uplink Err codemadness.org 70 i 5071 closed-form spectral efficiency (SE) lower bounds with maximum-ratio Err codemadness.org 70 i 5072 transmission/maximum-ratio combining and optimal uniform quantization. To Err codemadness.org 70 i 5073 reduce carbon footprint, this paper maximizes the non-convex weighted sum Err codemadness.org 70 i 5074 energy efficiency (WSEE) via downlink and uplink power control, and successive Err codemadness.org 70 i 5075 convex approximation framework. We show that with low fronthaul capacity, the Err codemadness.org 70 i 5076 system requires a higher number of fronthaul quantization bits to achieve high Err codemadness.org 70 i 5077 SE and WSEE. For high fronthaul capacity, higher number of bits, however, Err codemadness.org 70 i 5078 achieves high SE but a reduced WSEE. Err codemadness.org 70 i 5079 </p> Err codemadness.org 70 i 5080 Err codemadness.org 70 i 5081 Err codemadness.org 70 i 5082 Err codemadness.org 70 i 5083 Machine Learning Based Demand Modelling for On-Demand Transit Services: A Case Study of Belleville, Ontario. (arXiv:2010.15673v1 [cs.CY]) Err codemadness.org 70 i 5084 http://fr.arxiv.org/abs/2010.15673 Err codemadness.org 70 i 5085 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Alsaleh_N/0/1/0/all/0/1">Nael Alsaleh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Farooq_B/0/1/0/all/0/1">Bilal Farooq</a></p> Err codemadness.org 70 i 5086 Err codemadness.org 70 i 5087 <p>The use of mobile applications apps and GPS service on smartphones for Err codemadness.org 70 i 5088 transportation management applications has enabled the new "on-demand mobility" Err codemadness.org 70 i 5089 service, where the transportation supply is following the users' schedule and Err codemadness.org 70 i 5090 routes. In September 2018, the City of Belleville in Canada and Pantonium Err codemadness.org 70 i 5091 operationalized the same idea, but for the public transit service in the city Err codemadness.org 70 i 5092 to develop an on-demand transit (ODT) service. An existing fixed route (RT 11) Err codemadness.org 70 i 5093 public transit service was converted into an on-demand service during the night Err codemadness.org 70 i 5094 as a pilot project to maintain a higher demand sensitivity and highest Err codemadness.org 70 i 5095 operation cost efficiency per trip. In this study, Random Forest (RF), Bagging, Err codemadness.org 70 i 5096 Artificial Neural Network (ANN), and Deep Neural Network (DNN) machine learning Err codemadness.org 70 i 5097 algorithms were adopted to develop a pickup demand model (trip generation) and Err codemadness.org 70 i 5098 a trip demand model (trip distribution model) for Belleville ODT service based Err codemadness.org 70 i 5099 on the dissemination areas' demographic characteristics and the existing trip Err codemadness.org 70 i 5100 characteristics. The developed models aim to explain the demand behavior, Err codemadness.org 70 i 5101 investigate the main factors affecting the trip pattern and their relative Err codemadness.org 70 i 5102 importance, and to predict the number of generated trips from any dissemination Err codemadness.org 70 i 5103 area as well as between any two dissemination areas. The results indicate that Err codemadness.org 70 i 5104 the developed models can predict 63% and 70% of the pickup and trip demand Err codemadness.org 70 i 5105 levels, respectively. Both models are most affected by the month of the year Err codemadness.org 70 i 5106 and the day of the week variables. In addition, the population density has a Err codemadness.org 70 i 5107 higher impact on the ODT service pickup demand levels than the other Err codemadness.org 70 i 5108 demographic characteristics followed by the working age percentages and median Err codemadness.org 70 i 5109 income characteristics. Whereas, the distribution of the trips depends on the Err codemadness.org 70 i 5110 demographic characteristics of the destination area more than the origin area. Err codemadness.org 70 i 5111 </p> Err codemadness.org 70 i 5112 Err codemadness.org 70 i 5113 Err codemadness.org 70 i 5114 Err codemadness.org 70 i 5115 Analyzing Societal Impact of COVID-19: A Study During the Early Days of the Pandemic. (arXiv:2010.15674v1 [cs.SI]) Err codemadness.org 70 i 5116 http://fr.arxiv.org/abs/2010.15674 Err codemadness.org 70 i 5117 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shanthakumar_S/0/1/0/all/0/1">Swaroop Gowdra Shanthakumar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Seetharam_A/0/1/0/all/0/1">Anand Seetharam</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ramesh_A/0/1/0/all/0/1">Arti Ramesh</a></p> Err codemadness.org 70 i 5118 Err codemadness.org 70 i 5119 <p>In this paper, we collect and study Twitter communications to understand the Err codemadness.org 70 i 5120 societal impact of COVID-19 in the United States during the early days of the Err codemadness.org 70 i 5121 pandemic. With infections soaring rapidly, users took to Twitter asking people Err codemadness.org 70 i 5122 to self isolate and quarantine themselves. Users also demanded closure of Err codemadness.org 70 i 5123 schools, bars, and restaurants as well as lockdown of cities and states. We Err codemadness.org 70 i 5124 methodically collect tweets by identifying and tracking trending COVID-related Err codemadness.org 70 i 5125 hashtags. We first manually group the hashtags into six main categories, Err codemadness.org 70 i 5126 namely, 1) General COVID, 2) Quarantine, 3) Panic Buying, 4) School Closures, Err codemadness.org 70 i 5127 5) Lockdowns, and 6) Frustration and Hope}, and study the temporal evolution of Err codemadness.org 70 i 5128 tweets in these hashtags. We conduct a linguistic analysis of words common to Err codemadness.org 70 i 5129 all hashtag groups and specific to each hashtag group and identify the chief Err codemadness.org 70 i 5130 concerns of people as the pandemic gripped the nation (e.g., exploring bidets Err codemadness.org 70 i 5131 as an alternative to toilet paper). We conduct sentiment analysis and our Err codemadness.org 70 i 5132 investigation reveals that people reacted positively to school closures and Err codemadness.org 70 i 5133 negatively to the lack of availability of essential goods due to panic buying. Err codemadness.org 70 i 5134 We adopt a state-of-the-art semantic role labeling approach to identify the Err codemadness.org 70 i 5135 action words and then leverage a LSTM-based dependency parsing model to analyze Err codemadness.org 70 i 5136 the context of action words (e.g., verb deal is accompanied by nouns such as Err codemadness.org 70 i 5137 anxiety, stress, and crisis). Finally, we develop a scalable seeded topic Err codemadness.org 70 i 5138 modeling approach to automatically categorize and isolate tweets into hashtag Err codemadness.org 70 i 5139 groups and experimentally validate that our topic model provides a grouping Err codemadness.org 70 i 5140 similar to our manual grouping. Our study presents a systematic way to Err codemadness.org 70 i 5141 construct an aggregated picture of peoples' response to the pandemic and lays Err codemadness.org 70 i 5142 the groundwork for future fine-grained linguistic and behavioral analysis. Err codemadness.org 70 i 5143 </p> Err codemadness.org 70 i 5144 Err codemadness.org 70 i 5145 Err codemadness.org 70 i 5146 Err codemadness.org 70 i 5147 Deep DA for Ordinal Regression of Pain Intensity Estimation Using Weakly-Labeled Videos. (arXiv:2010.15675v1 [cs.CV]) Err codemadness.org 70 i 5148 http://fr.arxiv.org/abs/2010.15675 Err codemadness.org 70 i 5149 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+R_G/0/1/0/all/0/1">Gnana Praveen R</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Granger_E/0/1/0/all/0/1">Eric Granger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cardinal_P/0/1/0/all/0/1">Patrick Cardinal</a></p> Err codemadness.org 70 i 5150 Err codemadness.org 70 i 5151 <p>Automatic estimation of pain intensity from facial expressions in videos has Err codemadness.org 70 i 5152 an immense potential in health care applications. However, domain adaptation Err codemadness.org 70 i 5153 (DA) is needed to alleviate the problem of domain shifts that typically occurs Err codemadness.org 70 i 5154 between video data captured in source and target do-mains. Given the laborious Err codemadness.org 70 i 5155 task of collecting and annotating videos, and the subjective bias due to Err codemadness.org 70 i 5156 ambiguity among adjacent intensity levels, weakly-supervised learning (WSL)is Err codemadness.org 70 i 5157 gaining attention in such applications. Yet, most state-of-the-art WSL models Err codemadness.org 70 i 5158 are typically formulated as regression problems, and do not leverage the Err codemadness.org 70 i 5159 ordinal relation between intensity levels, nor the temporal coherence of Err codemadness.org 70 i 5160 multiple consecutive frames. This paper introduces a new deep learn-ing model Err codemadness.org 70 i 5161 for weakly-supervised DA with ordinal regression(WSDA-OR), where videos in Err codemadness.org 70 i 5162 target domain have coarse la-bels provided on a periodic basis. The WSDA-OR Err codemadness.org 70 i 5163 model enforces ordinal relationships among the intensity levels as-signed to Err codemadness.org 70 i 5164 the target sequences, and associates multiple relevant frames to sequence-level Err codemadness.org 70 i 5165 labels (instead of a single frame). In particular, it learns discriminant and Err codemadness.org 70 i 5166 domain-invariant feature representations by integrating multiple in-stance Err codemadness.org 70 i 5167 learning with deep adversarial DA, where soft Gaussian labels are used to Err codemadness.org 70 i 5168 efficiently represent the weak ordinal sequence-level labels from the target Err codemadness.org 70 i 5169 domain. The proposed approach was validated on the RECOLA video dataset as Err codemadness.org 70 i 5170 fully-labeled source domain, and UNBC-McMaster video data as weakly-labeled Err codemadness.org 70 i 5171 target domain. We have also validated WSDA-OR on BIOVID and Fatigue (private) Err codemadness.org 70 i 5172 datasets for sequence level estimation. Experimental results indicate that our Err codemadness.org 70 i 5173 approach can provide a significant improvement over the state-of-the-art Err codemadness.org 70 i 5174 models, allowing to achieve a greater localization accuracy. Err codemadness.org 70 i 5175 </p> Err codemadness.org 70 i 5176 Err codemadness.org 70 i 5177 Err codemadness.org 70 i 5178 Err codemadness.org 70 i 5179 Optimization Fabrics for Behavioral Design. (arXiv:2010.15676v1 [cs.RO]) Err codemadness.org 70 i 5180 http://fr.arxiv.org/abs/2010.15676 Err codemadness.org 70 i 5181 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ratliff_N/0/1/0/all/0/1">Nathan D. Ratliff</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wyk_K/0/1/0/all/0/1">Karl Van Wyk</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xie_M/0/1/0/all/0/1">Mandy Xie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_A/0/1/0/all/0/1">Anqi Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rana_A/0/1/0/all/0/1">Asif Muhammad Rana</a></p> Err codemadness.org 70 i 5182 Err codemadness.org 70 i 5183 <p>Second-order differential equations define smooth system behavior. In Err codemadness.org 70 i 5184 general, there is no guarantee that a system will behave well when forced by a Err codemadness.org 70 i 5185 potential function, but in some cases they do and may exhibit smooth Err codemadness.org 70 i 5186 optimization properties such as convergence to a local minimum of the Err codemadness.org 70 i 5187 potential. Such a property is desirable in system design since it is inherently Err codemadness.org 70 i 5188 linked to asymptotic stability. This paper presents a comprehensive theory of Err codemadness.org 70 i 5189 optimization fabrics which are second-order differential equations that encode Err codemadness.org 70 i 5190 nominal behaviors on a space and are guaranteed to optimize when forced away Err codemadness.org 70 i 5191 from those nominal trajectories by a potential function. Optimization fabrics, Err codemadness.org 70 i 5192 or fabrics for short, can encode commonalities among optimization problems that Err codemadness.org 70 i 5193 reflect the structure of the space itself, enabling smooth optimization Err codemadness.org 70 i 5194 processes to intelligently navigate each problem even when the potential Err codemadness.org 70 i 5195 function is simple and relatively naive. Importantly, optimization over a Err codemadness.org 70 i 5196 fabric is asymptotically stable, so optimization fabrics constitute a building Err codemadness.org 70 i 5197 block for provably stable system design. Err codemadness.org 70 i 5198 </p> Err codemadness.org 70 i 5199 Err codemadness.org 70 i 5200 Err codemadness.org 70 i 5201 Err codemadness.org 70 i 5202 On the Failure of the Smart Approach of the GPT Cryptosystem. (arXiv:2010.15678v1 [cs.CR]) Err codemadness.org 70 i 5203 http://fr.arxiv.org/abs/2010.15678 Err codemadness.org 70 i 5204 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kalachi_H/0/1/0/all/0/1">Herve Tale Kalachi</a></p> Err codemadness.org 70 i 5205 Err codemadness.org 70 i 5206 <p>This paper describes a new algorithm for breaking the smart approach of the Err codemadness.org 70 i 5207 GPT cryptosystem. We show that by puncturing the public code several times on Err codemadness.org 70 i 5208 specific positions, we get a public code on which applying the Frobenius Err codemadness.org 70 i 5209 operator appropriately allows to build an alternative secret key. Err codemadness.org 70 i 5210 </p> Err codemadness.org 70 i 5211 Err codemadness.org 70 i 5212 Err codemadness.org 70 i 5213 Err codemadness.org 70 i 5214 Lie-Trotter Splitting for the Nonlinear Stochastic Manakov System. (arXiv:2010.15679v1 [math.AP]) Err codemadness.org 70 i 5215 http://fr.arxiv.org/abs/2010.15679 Err codemadness.org 70 i 5216 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Berg_A/0/1/0/all/0/1">Andr&#xe9; Berg</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Cohen_D/0/1/0/all/0/1">David Cohen</a> (Chalmers), <a href="http://fr.arxiv.org/find/math/1/au:+Dujardin_G/0/1/0/all/0/1">Guillaume Dujardin</a> (LPP)</p> Err codemadness.org 70 i 5217 Err codemadness.org 70 i 5218 <p>This article analyses the convergence of the Lie-Trotter splitting scheme for Err codemadness.org 70 i 5219 the stochastic Manakov equation, a system arising in the study of pulse Err codemadness.org 70 i 5220 propagation in randomly birefringent optical fibers. First, we prove that the Err codemadness.org 70 i 5221 strong order of the numerical approximation is 1/2 if the nonlinear term in the Err codemadness.org 70 i 5222 system is globally Lipschitz. Then, we show that the splitting scheme has Err codemadness.org 70 i 5223 convergence order 1/2 in probability and almost sure order 1/2- in the case of Err codemadness.org 70 i 5224 a cubic nonlinearity. We provide several numerical experiments illustrating the Err codemadness.org 70 i 5225 aforementioned results and the efficiency of the Lie-Trotter splitting scheme. Err codemadness.org 70 i 5226 Finally, we numerically investigate the possible blowup of solutions for some Err codemadness.org 70 i 5227 power-law nonlinearities. Err codemadness.org 70 i 5228 </p> Err codemadness.org 70 i 5229 Err codemadness.org 70 i 5230 Err codemadness.org 70 i 5231 Err codemadness.org 70 i 5232 LSTM for Model-Based Anomaly Detection in Cyber-Physical Systems. (arXiv:2010.15680v1 [cs.LG]) Err codemadness.org 70 i 5233 http://fr.arxiv.org/abs/2010.15680 Err codemadness.org 70 i 5234 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Eiteneuer_B/0/1/0/all/0/1">Benedikt Eiteneuer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Niggemann_O/0/1/0/all/0/1">Oliver Niggemann</a></p> Err codemadness.org 70 i 5235 Err codemadness.org 70 i 5236 <p>Anomaly detection is the task of detecting data which differs from the normal Err codemadness.org 70 i 5237 behaviour of a system in a given context. In order to approach this problem, Err codemadness.org 70 i 5238 data-driven models can be learned to predict current or future observations. Err codemadness.org 70 i 5239 Oftentimes, anomalous behaviour depends on the internal dynamics of the system Err codemadness.org 70 i 5240 and looks normal in a static context. To address this problem, the model should Err codemadness.org 70 i 5241 also operate depending on state. Long Short-Term Memory (LSTM) neural networks Err codemadness.org 70 i 5242 have been shown to be particularly useful to learn time sequences with varying Err codemadness.org 70 i 5243 length of temporal dependencies and are therefore an interesting general Err codemadness.org 70 i 5244 purpose approach to learn the behaviour of arbitrarily complex Cyber-Physical Err codemadness.org 70 i 5245 Systems. In order to perform anomaly detection, we slightly modify the standard Err codemadness.org 70 i 5246 norm 2 error to incorporate an estimate of model uncertainty. We analyse the Err codemadness.org 70 i 5247 approach on artificial and real data. Err codemadness.org 70 i 5248 </p> Err codemadness.org 70 i 5249 Err codemadness.org 70 i 5250 Err codemadness.org 70 i 5251 Err codemadness.org 70 i 5252 Maximum a posteriori signal recovery for optical coherence tomography angiography image generation and denoising. (arXiv:2010.15682v1 [eess.IV]) Err codemadness.org 70 i 5253 http://fr.arxiv.org/abs/2010.15682 Err codemadness.org 70 i 5254 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Husvogt_L/0/1/0/all/0/1">Lennart Husvogt</a> (1 and 2), <a href="http://fr.arxiv.org/find/eess/1/au:+Ploner_S/0/1/0/all/0/1">Stefan B. Ploner</a> (1), <a href="http://fr.arxiv.org/find/eess/1/au:+Chen_S/0/1/0/all/0/1">Siyu Chen</a> (2), <a href="http://fr.arxiv.org/find/eess/1/au:+Stromer_D/0/1/0/all/0/1">Daniel Stromer</a> (1, 2), <a href="http://fr.arxiv.org/find/eess/1/au:+Schottenhamml_J/0/1/0/all/0/1">Julia Schottenhamml</a> (1), <a href="http://fr.arxiv.org/find/eess/1/au:+Alibhai_A/0/1/0/all/0/1">A. Yasin Alibhai</a> (3), <a href="http://fr.arxiv.org/find/eess/1/au:+Moult_E/0/1/0/all/0/1">Eric Moult</a> (2), <a href="http://fr.arxiv.org/find/eess/1/au:+Waheed_N/0/1/0/all/0/1">Nadia K. Waheed</a> (3), <a href="http://fr.arxiv.org/find/eess/1/au:+Fujimoto_J/0/1/0/all/0/1">James G. Fujimoto</a> (2), <a href="http://fr.arxiv.org/find/eess/1/au:+Maier_A/0/1/0/all/0/1">Andreas Maier</a> (1) ((1) Friedrich-Alexander-Universit&#xe4;t Erlangen-N&#xfc;rnberg Germany, (2) Massachusetts Institute of Technology USA, (3) Tufts School of Medicine USA)</p> Err codemadness.org 70 i 5255 Err codemadness.org 70 i 5256 <p>Optical coherence tomography angiography (OCTA) is a novel and clinically Err codemadness.org 70 i 5257 promising imaging modality to image retinal and sub-retinal vasculature. Based Err codemadness.org 70 i 5258 on repeated optical coherence tomography (OCT) scans, intensity changes are Err codemadness.org 70 i 5259 observed over time and used to compute OCTA image data. OCTA data are prone to Err codemadness.org 70 i 5260 noise and artifacts caused by variations in flow speed and patient movement. We Err codemadness.org 70 i 5261 propose a novel iterative maximum a posteriori signal recovery algorithm in Err codemadness.org 70 i 5262 order to generate OCTA volumes with reduced noise and increased image quality. Err codemadness.org 70 i 5263 This algorithm is based on previous work on probabilistic OCTA signal models Err codemadness.org 70 i 5264 and maximum likelihood estimates. Reconstruction results using total variation Err codemadness.org 70 i 5265 minimization and wavelet shrinkage for regularization were compared against an Err codemadness.org 70 i 5266 OCTA ground truth volume, merged from six co-registered single OCTA volumes. Err codemadness.org 70 i 5267 The results show a significant improvement in peak signal-to-noise ratio and Err codemadness.org 70 i 5268 structural similarity. The presented algorithm brings together OCTA image Err codemadness.org 70 i 5269 generation and Bayesian statistics and can be developed into new OCTA image Err codemadness.org 70 i 5270 generation and denoising algorithms. Err codemadness.org 70 i 5271 </p> Err codemadness.org 70 i 5272 Err codemadness.org 70 i 5273 Err codemadness.org 70 i 5274 Err codemadness.org 70 i 5275 Resilient Energy Efficient Healthcare Monitoring Infrastructure with Server and Network Protection. (arXiv:2010.15683v1 [eess.SY]) Err codemadness.org 70 i 5276 http://fr.arxiv.org/abs/2010.15683 Err codemadness.org 70 i 5277 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Isa_I/0/1/0/all/0/1">Ida Syafiza M. Isa</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+El_Gorashi_T/0/1/0/all/0/1">Taisir E.H. El-Gorashi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Musa_M/0/1/0/all/0/1">Mohamed O.I. Musa</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Elmirghani_J/0/1/0/all/0/1">J.M.H. Elmirghani</a></p> Err codemadness.org 70 i 5278 Err codemadness.org 70 i 5279 <p>In this paper, a 1+1 server protection scheme is considered where two Err codemadness.org 70 i 5280 servers, a primary and a secondary processing server are used to serve ECG Err codemadness.org 70 i 5281 monitoring applications concurrently. The infrastructure is designed to be Err codemadness.org 70 i 5282 resilient against server failure under two scenarios related to the geographic Err codemadness.org 70 i 5283 location of primary and secondary servers and resilient against both server and Err codemadness.org 70 i 5284 network failures. A Mixed Integer Linear Programming (MILP) model is used to Err codemadness.org 70 i 5285 optimise the number and locations of both primary and secondary processing Err codemadness.org 70 i 5286 servers so that the energy consumption of the networking equipment and Err codemadness.org 70 i 5287 processing are minimised. The results show that considering a scenario for Err codemadness.org 70 i 5288 server protection without geographical constraints compared to the Err codemadness.org 70 i 5289 non-resilient scenario has resulted in both network and processing energy Err codemadness.org 70 i 5290 penalty as the traffic is doubled. The results also reveal that increasing the Err codemadness.org 70 i 5291 level of resilience to consider geographical constraints compared to case Err codemadness.org 70 i 5292 without geographical constraints resulted in higher network energy penalty when Err codemadness.org 70 i 5293 the demand is low as more nodes are utilised to place the processing servers Err codemadness.org 70 i 5294 under the geographic constraints. Also, increasing the level of resilience to Err codemadness.org 70 i 5295 consider network protection with link and node disjoint selection has resulted Err codemadness.org 70 i 5296 in a low network energy penalty at high demands due to the activation of a Err codemadness.org 70 i 5297 large part of the network in any case due to the demands. However, the results Err codemadness.org 70 i 5298 show that the network energy penalty is reduced with the increasing number of Err codemadness.org 70 i 5299 processing servers at each candidate node. Meanwhile, the same energy for Err codemadness.org 70 i 5300 processing is consumed regardless of the increasing level of resilience as the Err codemadness.org 70 i 5301 same number of processing servers are utilised. A heuristic is developed for Err codemadness.org 70 i 5302 each resilience scenario for real-time implementation where the results show Err codemadness.org 70 i 5303 that the performance of the heuristic is approaching the results of the MILP Err codemadness.org 70 i 5304 model. Err codemadness.org 70 i 5305 </p> Err codemadness.org 70 i 5306 Err codemadness.org 70 i 5307 Err codemadness.org 70 i 5308 Err codemadness.org 70 i 5309 Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems. (arXiv:2010.15684v1 [cs.SE]) Err codemadness.org 70 i 5310 http://fr.arxiv.org/abs/2010.15684 Err codemadness.org 70 i 5311 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gharib_M/0/1/0/all/0/1">Mohamad Gharib</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lollini_P/0/1/0/all/0/1">Paolo Lollini</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ceccarelli_A/0/1/0/all/0/1">Andrea Ceccarelli</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bondavalli_A/0/1/0/all/0/1">Andrea Bondavalli</a></p> Err codemadness.org 70 i 5312 Err codemadness.org 70 i 5313 <p>One of the main challenges in integrating Cyber-Physical System-of-Systems Err codemadness.org 70 i 5314 (CPSoS) to function as a single unified system is the autonomy of its Err codemadness.org 70 i 5315 Cyber-Physical Systems (CPSs), which may lead to a lack of coordination among Err codemadness.org 70 i 5316 CPSs and results in various kinds of conflicts. We advocate that to efficiently Err codemadness.org 70 i 5317 integrate CPSs within the CPSoS, we may need to adjust the autonomy of some Err codemadness.org 70 i 5318 CPSs in a way that allows them to coordinate their activities to avoid any Err codemadness.org 70 i 5319 potential conflict among one another. To achieve that, we need to incorporate Err codemadness.org 70 i 5320 the notion of governance within the design of CPSoS, which defines rules that Err codemadness.org 70 i 5321 can be used for clearly specifying who and how can adjust the autonomy of a Err codemadness.org 70 i 5322 CPS. In this paper, we try to tackle this problem by proposing a new conceptual Err codemadness.org 70 i 5323 model that can be used for performing a governance-based analysis of autonomy Err codemadness.org 70 i 5324 for CPSs within CPSoS. We illustrate the utility of the model with an example Err codemadness.org 70 i 5325 from the automotive domain. Err codemadness.org 70 i 5326 </p> Err codemadness.org 70 i 5327 Err codemadness.org 70 i 5328 Err codemadness.org 70 i 5329 Err codemadness.org 70 i 5330 Deep Autofocus for Synthetic Aperture Sonar. (arXiv:2010.15687v1 [eess.IV]) Err codemadness.org 70 i 5331 http://fr.arxiv.org/abs/2010.15687 Err codemadness.org 70 i 5332 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Gerg_I/0/1/0/all/0/1">Isaac Gerg</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Monga_V/0/1/0/all/0/1">Vishal Monga</a></p> Err codemadness.org 70 i 5333 Err codemadness.org 70 i 5334 <p>Synthetic aperture sonar (SAS) requires precise positional and environmental Err codemadness.org 70 i 5335 information to produce well-focused output during the image reconstruction Err codemadness.org 70 i 5336 step. However, errors in these measurements are commonly present resulting in Err codemadness.org 70 i 5337 defocused imagery. To overcome these issues, an \emph{autofocus} algorithm is Err codemadness.org 70 i 5338 employed as a post-processing step after image reconstruction for the purpose Err codemadness.org 70 i 5339 of improving image quality using the image content itself. These algorithms are Err codemadness.org 70 i 5340 usually iterative and metric-based in that they seek to optimize an image Err codemadness.org 70 i 5341 sharpness metric. In this letter, we demonstrate the potential of machine Err codemadness.org 70 i 5342 learning, specifically deep learning, to address the autofocus problem. We Err codemadness.org 70 i 5343 formulate the problem as a self-supervised, phase error estimation task using a Err codemadness.org 70 i 5344 deep network we call Deep Autofocus. Our formulation has the advantages of Err codemadness.org 70 i 5345 being non-iterative (and thus fast) and not requiring ground truth Err codemadness.org 70 i 5346 focused-defocused images pairs as often required by other deblurring deep Err codemadness.org 70 i 5347 learning methods. We compare our technique against a set of common sharpness Err codemadness.org 70 i 5348 metrics optimized using gradient descent over a real-world dataset. Our results Err codemadness.org 70 i 5349 demonstrate Deep Autofocus can produce imagery that is perceptually as good as Err codemadness.org 70 i 5350 benchmark iterative techniques but at a substantially lower computational cost. Err codemadness.org 70 i 5351 We conclude that our proposed Deep Autofocus can provide a more favorable Err codemadness.org 70 i 5352 cost-quality trade-off than state-of-the-art alternatives with significant Err codemadness.org 70 i 5353 potential of future research. Err codemadness.org 70 i 5354 </p> Err codemadness.org 70 i 5355 Err codemadness.org 70 i 5356 Err codemadness.org 70 i 5357 Err codemadness.org 70 i 5358 Learning Deep Interleaved Networks with Asymmetric Co-Attention for Image Restoration. (arXiv:2010.15689v1 [cs.CV]) Err codemadness.org 70 i 5359 http://fr.arxiv.org/abs/2010.15689 Err codemadness.org 70 i 5360 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_F/0/1/0/all/0/1">Feng Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cong_R/0/1/0/all/0/1">Runmin Cong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bai_H/0/1/0/all/0/1">Huihui Bai</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_Y/0/1/0/all/0/1">Yifan He</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhao_Y/0/1/0/all/0/1">Yao Zhao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhu_C/0/1/0/all/0/1">Ce Zhu</a></p> Err codemadness.org 70 i 5361 Err codemadness.org 70 i 5362 <p>Recently, convolutional neural network (CNN) has demonstrated significant Err codemadness.org 70 i 5363 success for image restoration (IR) tasks (e.g., image super-resolution, image Err codemadness.org 70 i 5364 deblurring, rain streak removal, and dehazing). However, existing CNN based Err codemadness.org 70 i 5365 models are commonly implemented as a single-path stream to enrich feature Err codemadness.org 70 i 5366 representations from low-quality (LQ) input space for final predictions, which Err codemadness.org 70 i 5367 fail to fully incorporate preceding low-level contexts into later high-level Err codemadness.org 70 i 5368 features within networks, thereby producing inferior results. In this paper, we Err codemadness.org 70 i 5369 present a deep interleaved network (DIN) that learns how information at Err codemadness.org 70 i 5370 different states should be combined for high-quality (HQ) images Err codemadness.org 70 i 5371 reconstruction. The proposed DIN follows a multi-path and multi-branch pattern Err codemadness.org 70 i 5372 allowing multiple interconnected branches to interleave and fuse at different Err codemadness.org 70 i 5373 states. In this way, the shallow information can guide deep representative Err codemadness.org 70 i 5374 features prediction to enhance the feature expression ability. Furthermore, we Err codemadness.org 70 i 5375 propose asymmetric co-attention (AsyCA) which is attached at each interleaved Err codemadness.org 70 i 5376 node to model the feature dependencies. Such AsyCA can not only adaptively Err codemadness.org 70 i 5377 emphasize the informative features from different states, but also improves the Err codemadness.org 70 i 5378 discriminative ability of networks. Our presented DIN can be trained end-to-end Err codemadness.org 70 i 5379 and applied to various IR tasks. Comprehensive evaluations on public benchmarks Err codemadness.org 70 i 5380 and real-world datasets demonstrate that the proposed DIN perform favorably Err codemadness.org 70 i 5381 against the state-of-the-art methods quantitatively and qualitatively. Err codemadness.org 70 i 5382 </p> Err codemadness.org 70 i 5383 Err codemadness.org 70 i 5384 Err codemadness.org 70 i 5385 Err codemadness.org 70 i 5386 Analyzing the tree-layer structure of Deep Forests. (arXiv:2010.15690v1 [cs.LG]) Err codemadness.org 70 i 5387 http://fr.arxiv.org/abs/2010.15690 Err codemadness.org 70 i 5388 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Arnould_L/0/1/0/all/0/1">Ludovic Arnould</a> (LPSM UMR 8001), <a href="http://fr.arxiv.org/find/cs/1/au:+Boyer_C/0/1/0/all/0/1">Claire Boyer</a> (LPSM UMR 8001), <a href="http://fr.arxiv.org/find/cs/1/au:+Scornet_E/0/1/0/all/0/1">Erwan Scornet</a> (CMAP)</p> Err codemadness.org 70 i 5389 Err codemadness.org 70 i 5390 <p>Random forests on the one hand, and neural networks on the other hand, have Err codemadness.org 70 i 5391 met great success in the machine learning community for their predictive Err codemadness.org 70 i 5392 performance. Combinations of both have been proposed in the literature, notably Err codemadness.org 70 i 5393 leading to the so-called deep forests (DF) [25]. In this paper, we investigate Err codemadness.org 70 i 5394 the mechanisms at work in DF and outline that DF architecture can generally be Err codemadness.org 70 i 5395 simplified into more simple and computationally efficient shallow forests Err codemadness.org 70 i 5396 networks. Despite some instability, the latter may outperform standard Err codemadness.org 70 i 5397 predictive tree-based methods. In order to precisely quantify the improvement Err codemadness.org 70 i 5398 achieved by these light network configurations over standard tree learners, we Err codemadness.org 70 i 5399 theoretically study the performance of a shallow tree network made of two Err codemadness.org 70 i 5400 layers, each one composed of a single centered tree. We provide tight Err codemadness.org 70 i 5401 theoretical lower and upper bounds on its excess risk. These theoretical Err codemadness.org 70 i 5402 results show the interest of tree-network architectures for well-structured Err codemadness.org 70 i 5403 data provided that the first layer, acting as a data encoder, is rich enough. Err codemadness.org 70 i 5404 </p> Err codemadness.org 70 i 5405 Err codemadness.org 70 i 5406 Err codemadness.org 70 i 5407 Err codemadness.org 70 i 5408 Unveiling process insights from refactoring practices. (arXiv:2010.15692v1 [cs.SE]) Err codemadness.org 70 i 5409 http://fr.arxiv.org/abs/2010.15692 Err codemadness.org 70 i 5410 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Caldeira_J/0/1/0/all/0/1">Jo&#xe3;o Caldeira</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Abreu_F/0/1/0/all/0/1">Fernando Brito e Abreu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cardoso_J/0/1/0/all/0/1">Jorge Cardoso</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Reis_J/0/1/0/all/0/1">Jos&#xe9; Reis</a></p> Err codemadness.org 70 i 5411 Err codemadness.org 70 i 5412 <p>Context : Software comprehension and maintenance activities, such as Err codemadness.org 70 i 5413 refactoring, are said to be negatively impacted by software complexity. The Err codemadness.org 70 i 5414 methods used to measure software product and processes complexity have been Err codemadness.org 70 i 5415 thoroughly debated in the literature. However, the discernment about the Err codemadness.org 70 i 5416 possible links between these two dimensions, particularly on the benefits of Err codemadness.org 70 i 5417 using the process perspective, has a long journey ahead. Objective: To improve Err codemadness.org 70 i 5418 the understanding of the liaison of developers' activities and software Err codemadness.org 70 i 5419 complexity within a refactoring task, namely by evaluating if process metrics Err codemadness.org 70 i 5420 gathered from the IDE, using process mining methods and tools, are suitable to Err codemadness.org 70 i 5421 accurately classify different refactoring practices and the resulting software Err codemadness.org 70 i 5422 complexity. Method: We mined source code metrics from a software product after Err codemadness.org 70 i 5423 a quality improvement task was given in parallel to (117) software developers, Err codemadness.org 70 i 5424 organized in (71) teams. Simultaneously, we collected events from their IDE Err codemadness.org 70 i 5425 work sessions (320) and used process mining to model their processes and Err codemadness.org 70 i 5426 extract the correspondent metrics. Results: Most teams using a plugin for Err codemadness.org 70 i 5427 refactoring (JDeodorant) reduced software complexity more effectively and with Err codemadness.org 70 i 5428 simpler processes than the ones that performed refactoring using only Eclipse Err codemadness.org 70 i 5429 native features. We were able to find moderate correlations (43%) between Err codemadness.org 70 i 5430 software cyclomatic complexity and process cyclomatic complexity. The best Err codemadness.org 70 i 5431 models found for the refactoring method and cyclomatic complexity level Err codemadness.org 70 i 5432 predictions, had an accuracy of 92.95% and 94.36%, respectively. Conclusions: Err codemadness.org 70 i 5433 Our approach agnostic to programming languages, geographic location, or Err codemadness.org 70 i 5434 development practices. Initial findings are encouraging, and lead us to suggest Err codemadness.org 70 i 5435 practitioners may use our method in other development tasks, such as, defect Err codemadness.org 70 i 5436 analysis and unit or integration tests. Err codemadness.org 70 i 5437 </p> Err codemadness.org 70 i 5438 Err codemadness.org 70 i 5439 Err codemadness.org 70 i 5440 Err codemadness.org 70 i 5441 Learning interaction kernels in mean-field equations of 1st-order systems of interacting particles. (arXiv:2010.15694v1 [stat.ML]) Err codemadness.org 70 i 5442 http://fr.arxiv.org/abs/2010.15694 Err codemadness.org 70 i 5443 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Lang_Q/0/1/0/all/0/1">Quanjun Lang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Lu_F/0/1/0/all/0/1">Fei Lu</a></p> Err codemadness.org 70 i 5444 Err codemadness.org 70 i 5445 <p>We introduce a nonparametric algorithm to learn interaction kernels of Err codemadness.org 70 i 5446 mean-field equations for 1st-order systems of interacting particles. The data Err codemadness.org 70 i 5447 consist of discrete space-time observations of the solution. By least squares Err codemadness.org 70 i 5448 with regularization, the algorithm learns the kernel on data-adaptive Err codemadness.org 70 i 5449 hypothesis spaces efficiently. A key ingredient is a probabilistic error Err codemadness.org 70 i 5450 functional derived from the likelihood of the mean-field equation's diffusion Err codemadness.org 70 i 5451 process. The estimator converges, in a reproducing kernel Hilbert space and an Err codemadness.org 70 i 5452 L2 space under an identifiability condition, at a rate optimal in the sense Err codemadness.org 70 i 5453 that it equals the numerical integrator's order. We demonstrate our algorithm Err codemadness.org 70 i 5454 on three typical examples: the opinion dynamics with a piecewise linear kernel, Err codemadness.org 70 i 5455 the granular media model with a quadratic kernel, and the aggregation-diffusion Err codemadness.org 70 i 5456 with a repulsive-attractive kernel. Err codemadness.org 70 i 5457 </p> Err codemadness.org 70 i 5458 Err codemadness.org 70 i 5459 Err codemadness.org 70 i 5460 Err codemadness.org 70 i 5461 Generalized Insider Attack Detection Implementation using NetFlow Data. (arXiv:2010.15697v1 [cs.CR]) Err codemadness.org 70 i 5462 http://fr.arxiv.org/abs/2010.15697 Err codemadness.org 70 i 5463 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Samtani_Y/0/1/0/all/0/1">Yash Samtani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Elwell_J/0/1/0/all/0/1">Jesse Elwell</a></p> Err codemadness.org 70 i 5464 Err codemadness.org 70 i 5465 <p>Insider Attack Detection in commercial networks is a critical problem that Err codemadness.org 70 i 5466 does not have any good solutions at this current time. The problem is Err codemadness.org 70 i 5467 challenging due to the lack of visibility into live networks and a lack of a Err codemadness.org 70 i 5468 standard feature set to distinguish between different attacks. In this paper, Err codemadness.org 70 i 5469 we study an approach centered on using network data to identify attacks. Our Err codemadness.org 70 i 5470 work builds on unsupervised machine learning techniques such as One-Class SVM Err codemadness.org 70 i 5471 and bi-clustering as weak indicators of insider network attacks. We combine Err codemadness.org 70 i 5472 these techniques to limit the number of false positives to an acceptable level Err codemadness.org 70 i 5473 required for real-world deployments by using One-Class SVM to check for Err codemadness.org 70 i 5474 anomalies detected by the proposed Bi-clustering algorithm. We present a Err codemadness.org 70 i 5475 prototype implementation in Python and associated results for two different Err codemadness.org 70 i 5476 real-world representative data sets. We show that our approach is a promising Err codemadness.org 70 i 5477 tool for insider attack detection in realistic settings. Err codemadness.org 70 i 5478 </p> Err codemadness.org 70 i 5479 Err codemadness.org 70 i 5480 Err codemadness.org 70 i 5481 Err codemadness.org 70 i 5482 Constrained Online Learning to Mitigate Distortion Effects in Pulse-Agile Cognitive Radar. (arXiv:2010.15698v1 [cs.IT]) Err codemadness.org 70 i 5483 http://fr.arxiv.org/abs/2010.15698 Err codemadness.org 70 i 5484 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Thornton_C/0/1/0/all/0/1">Charles E. Thornton</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Buehrer_R/0/1/0/all/0/1">R. Michael Buehrer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Martone_A/0/1/0/all/0/1">Anthony F. Martone</a></p> Err codemadness.org 70 i 5485 Err codemadness.org 70 i 5486 <p>Pulse-agile radar systems have demonstrated favorable performance in dynamic Err codemadness.org 70 i 5487 electromagnetic scenarios. However, the use of non-identical waveforms within a Err codemadness.org 70 i 5488 radar's coherent processing interval may lead to harmful distortion effects Err codemadness.org 70 i 5489 when pulse-Doppler processing is used. This paper presents an online learning Err codemadness.org 70 i 5490 framework to optimize detection performance while mitigating harmful sidelobe Err codemadness.org 70 i 5491 levels. The radar waveform selection process is formulated as a linear Err codemadness.org 70 i 5492 contextual bandit problem, within which waveform adaptations which exceed a Err codemadness.org 70 i 5493 tolerable level of expected distortion are eliminated. The constrained online Err codemadness.org 70 i 5494 learning approach is effective and computationally feasible, evidenced by Err codemadness.org 70 i 5495 simulations in a radar-communication coexistence scenario and in the presence Err codemadness.org 70 i 5496 of intentional adaptive jamming. This approach is applied to both stochastic Err codemadness.org 70 i 5497 and adversarial contextual bandit learning models and the detection performance Err codemadness.org 70 i 5498 in dynamic scenarios is evaluated. Err codemadness.org 70 i 5499 </p> Err codemadness.org 70 i 5500 Err codemadness.org 70 i 5501 Err codemadness.org 70 i 5502 Err codemadness.org 70 i 5503 Permute, Quantize, and Fine-tune: Efficient Compression of Neural Networks. (arXiv:2010.15703v1 [cs.CV]) Err codemadness.org 70 i 5504 http://fr.arxiv.org/abs/2010.15703 Err codemadness.org 70 i 5505 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Martinez_J/0/1/0/all/0/1">Julieta Martinez</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shewakramani_J/0/1/0/all/0/1">Jashan Shewakramani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1">Ting Wei Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Barsan_I/0/1/0/all/0/1">Ioan Andrei B&#xe2;rsan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zeng_W/0/1/0/all/0/1">Wenyuan Zeng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Urtasun_R/0/1/0/all/0/1">Raquel Urtasun</a></p> Err codemadness.org 70 i 5506 Err codemadness.org 70 i 5507 <p>Compressing large neural networks is an important step for their deployment Err codemadness.org 70 i 5508 in resource-constrained computational platforms. In this context, vector Err codemadness.org 70 i 5509 quantization is an appealing framework that expresses multiple parameters using Err codemadness.org 70 i 5510 a single code, and has recently achieved state-of-the-art network compression Err codemadness.org 70 i 5511 on a range of core vision and natural language processing tasks. Key to the Err codemadness.org 70 i 5512 success of vector quantization is deciding which parameter groups should be Err codemadness.org 70 i 5513 compressed together. Previous work has relied on heuristics that group the Err codemadness.org 70 i 5514 spatial dimension of individual convolutional filters, but a general solution Err codemadness.org 70 i 5515 remains unaddressed. This is desirable for pointwise convolutions (which Err codemadness.org 70 i 5516 dominate modern architectures), linear layers (which have no notion of spatial Err codemadness.org 70 i 5517 dimension), and convolutions (when more than one filter is compressed to the Err codemadness.org 70 i 5518 same codeword). In this paper we make the observation that the weights of two Err codemadness.org 70 i 5519 adjacent layers can be permuted while expressing the same function. We then Err codemadness.org 70 i 5520 establish a connection to rate-distortion theory and search for permutations Err codemadness.org 70 i 5521 that result in networks that are easier to compress. Finally, we rely on an Err codemadness.org 70 i 5522 annealed quantization algorithm to better compress the network and achieve Err codemadness.org 70 i 5523 higher final accuracy. We show results on image classification, object Err codemadness.org 70 i 5524 detection, and segmentation, reducing the gap with the uncompressed model by 40 Err codemadness.org 70 i 5525 to 70% with respect to the current state of the art. Err codemadness.org 70 i 5526 </p> Err codemadness.org 70 i 5527 Err codemadness.org 70 i 5528 Err codemadness.org 70 i 5529 Err codemadness.org 70 i 5530 5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations. (arXiv:2010.15711v1 [cs.CR]) Err codemadness.org 70 i 5531 http://fr.arxiv.org/abs/2010.15711 Err codemadness.org 70 i 5532 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Han_J/0/1/0/all/0/1">Jaehyeok Han</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1">Jieon Kim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_S/0/1/0/all/0/1">Sangjin Lee</a></p> Err codemadness.org 70 i 5533 Err codemadness.org 70 i 5534 <p>Digital forensic investigation is used in various areas related to digital Err codemadness.org 70 i 5535 devices including the cyber crime. This is an investigative process using many Err codemadness.org 70 i 5536 techniques, which have implemented as tools. The types of files covered by the Err codemadness.org 70 i 5537 digital forensic investigation are wide and varied, however, there is no way to Err codemadness.org 70 i 5538 express the results into a standardized format. The standardization are Err codemadness.org 70 i 5539 different by types of device, file system, or application. Different outputs Err codemadness.org 70 i 5540 make it time-consuming and difficult to share information and to implement Err codemadness.org 70 i 5541 integration. In addition, it could weaken cyber security. Thus, it is important Err codemadness.org 70 i 5542 to define normalization and to present data in the same format. In this paper, Err codemadness.org 70 i 5543 a 5W1H-based expression for information sharing for effective digital forensic Err codemadness.org 70 i 5544 investigation is proposed to analyze digital forensic information using six Err codemadness.org 70 i 5545 questions--what, who, where, when, why and how. Based on the 5W1H-based Err codemadness.org 70 i 5546 expression, digital information from different types of files is converted and Err codemadness.org 70 i 5547 represented in the same format of outputs. As the 5W1H is the basic writing Err codemadness.org 70 i 5548 principle, application of the 5W1H-based expression on the case studies shows Err codemadness.org 70 i 5549 that this expression enhances clarity and correctness for information sharing. Err codemadness.org 70 i 5550 Furthermore, in the case of security incidents, this expression has an Err codemadness.org 70 i 5551 advantage in being compatible with STIX. Err codemadness.org 70 i 5552 </p> Err codemadness.org 70 i 5553 Err codemadness.org 70 i 5554 Err codemadness.org 70 i 5555 Err codemadness.org 70 i 5556 Playing a Part: Speaker Verification at the Movies. (arXiv:2010.15716v1 [cs.SD]) Err codemadness.org 70 i 5557 http://fr.arxiv.org/abs/2010.15716 Err codemadness.org 70 i 5558 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Brown_A/0/1/0/all/0/1">Andrew Brown</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Huh_J/0/1/0/all/0/1">Jaesung Huh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nagrani_A/0/1/0/all/0/1">Arsha Nagrani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chung_J/0/1/0/all/0/1">Joon Son Chung</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zisserman_A/0/1/0/all/0/1">Andrew Zisserman</a></p> Err codemadness.org 70 i 5559 Err codemadness.org 70 i 5560 <p>The goal of this work is to investigate the performance of popular speaker Err codemadness.org 70 i 5561 recognition models on speech segments from movies, where often actors Err codemadness.org 70 i 5562 intentionally disguise their voice to play a character. We make the following Err codemadness.org 70 i 5563 three contributions: (i) We collect a novel, challenging speaker recognition Err codemadness.org 70 i 5564 dataset called VoxMovies, with speech for 856 identities from almost 4000 movie Err codemadness.org 70 i 5565 clips. VoxMovies contains utterances with varying emotion, accents and Err codemadness.org 70 i 5566 background noise, and therefore comprises an entirely different domain to the Err codemadness.org 70 i 5567 interview-style, emotionally calm utterances in current speaker recognition Err codemadness.org 70 i 5568 datasets such as VoxCeleb; (ii) We provide a number of domain adaptation Err codemadness.org 70 i 5569 evaluation sets, and benchmark the performance of state-of-the-art speaker Err codemadness.org 70 i 5570 recognition models on these evaluation pairs. We demonstrate that both speaker Err codemadness.org 70 i 5571 verification and identification performance drops steeply on this new data, Err codemadness.org 70 i 5572 showing the challenge in transferring models across domains; and finally (iii) Err codemadness.org 70 i 5573 We show that simple domain adaptation paradigms improve performance, but there Err codemadness.org 70 i 5574 is still large room for improvement. Err codemadness.org 70 i 5575 </p> Err codemadness.org 70 i 5576 Err codemadness.org 70 i 5577 Err codemadness.org 70 i 5578 Err codemadness.org 70 i 5579 What can we learn from gradients?. (arXiv:2010.15718v1 [cs.CR]) Err codemadness.org 70 i 5580 http://fr.arxiv.org/abs/2010.15718 Err codemadness.org 70 i 5581 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Qian_J/0/1/0/all/0/1">Jia Qian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hansen_L/0/1/0/all/0/1">Lars Kai Hansen</a></p> Err codemadness.org 70 i 5582 Err codemadness.org 70 i 5583 <p>Recent work (\cite{zhu2019deep}) has shown that it is possible to reconstruct Err codemadness.org 70 i 5584 the input (image) from the gradient of a neural network. In this paper, our aim Err codemadness.org 70 i 5585 is to better understand the limits to reconstruction and to speed up image Err codemadness.org 70 i 5586 reconstruction by imposing prior image information and improved initialization. Err codemadness.org 70 i 5587 Firstly, we show that for the \textbf{non-linear} neural network, Err codemadness.org 70 i 5588 gradient-based reconstruction approximates to solving a high-dimension Err codemadness.org 70 i 5589 \textbf{linear} equations for both fully-connected neural network and Err codemadness.org 70 i 5590 convolutional neural network. Exploring the theoretical limits of input Err codemadness.org 70 i 5591 reconstruction, we show that a fully-connected neural network with a Err codemadness.org 70 i 5592 \textbf{one} hidden node is enough to reconstruct a \textbf{single} input Err codemadness.org 70 i 5593 image, regardless of the number of nodes in the output layer. Then we Err codemadness.org 70 i 5594 generalize this result to a gradient averaged over mini-batches of size B. In Err codemadness.org 70 i 5595 this case, the full mini-batch can be reconstructed in a fully-connected Err codemadness.org 70 i 5596 network if the number of hidden units exceeds B. For a convolutional neural Err codemadness.org 70 i 5597 network, the required number of filters in the first convolutional layer again Err codemadness.org 70 i 5598 is decided by the batch size B, however, in this case, input width d and the Err codemadness.org 70 i 5599 width after filter $d^{'}$ also play the role $h=(\frac{d}{d^{'}})^2BC$, where Err codemadness.org 70 i 5600 C is channel number of input. Finally, we validate and underpin our theoretical Err codemadness.org 70 i 5601 analysis on bio-medical data (fMRI, ECG signals, and cell images) and on Err codemadness.org 70 i 5602 benchmark data (MNIST, CIFAR100, and face images). Err codemadness.org 70 i 5603 </p> Err codemadness.org 70 i 5604 Err codemadness.org 70 i 5605 Err codemadness.org 70 i 5606 Err codemadness.org 70 i 5607 Attentive Clustering Processes. (arXiv:2010.15727v1 [stat.ML]) Err codemadness.org 70 i 5608 http://fr.arxiv.org/abs/2010.15727 Err codemadness.org 70 i 5609 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Pakman_A/0/1/0/all/0/1">Ari Pakman</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Wang_Y/0/1/0/all/0/1">Yueqi Wang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Lee_Y/0/1/0/all/0/1">Yoonho Lee</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Basu_P/0/1/0/all/0/1">Pallab Basu</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Lee_J/0/1/0/all/0/1">Juho Lee</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Teh_Y/0/1/0/all/0/1">Yee Whye Teh</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Paninski_L/0/1/0/all/0/1">Liam Paninski</a></p> Err codemadness.org 70 i 5610 Err codemadness.org 70 i 5611 <p>Amortized approaches to clustering have recently received renewed attention Err codemadness.org 70 i 5612 thanks to novel objective functions that exploit the expressiveness of deep Err codemadness.org 70 i 5613 learning models. In this work we revisit a recent proposal for fast amortized Err codemadness.org 70 i 5614 probabilistic clustering, the Clusterwise Clustering Process (CCP), which Err codemadness.org 70 i 5615 yields samples from the posterior distribution of cluster labels for sets of Err codemadness.org 70 i 5616 arbitrary size using only O(K) forward network evaluations, where K is an Err codemadness.org 70 i 5617 arbitrary number of clusters. While adequate in simple datasets, we show that Err codemadness.org 70 i 5618 the model can severely underfit complex datasets, and hypothesize that this Err codemadness.org 70 i 5619 limitation can be traced back to the implicit assumption that the probability Err codemadness.org 70 i 5620 of a point joining a cluster is equally sensitive to all the points available Err codemadness.org 70 i 5621 to join the same cluster. We propose an improved model, the Attentive Err codemadness.org 70 i 5622 Clustering Process (ACP), that selectively pays more attention to relevant Err codemadness.org 70 i 5623 points while preserving the invariance properties of the generative model. We Err codemadness.org 70 i 5624 illustrate the advantages of the new model in applications to spike-sorting in Err codemadness.org 70 i 5625 multi-electrode arrays and community discovery in networks. The latter case Err codemadness.org 70 i 5626 combines the ACP model with graph convolutional networks, and to our knowledge Err codemadness.org 70 i 5627 is the first deep learning model that handles an arbitrary number of Err codemadness.org 70 i 5628 communities. Err codemadness.org 70 i 5629 </p> Err codemadness.org 70 i 5630 Err codemadness.org 70 i 5631 Err codemadness.org 70 i 5632 Err codemadness.org 70 i 5633 Explainable Automated Coding of Clinical Notes using Hierarchical Label-wise Attention Networks and Label Embedding Initialisation. (arXiv:2010.15728v1 [cs.CL]) Err codemadness.org 70 i 5634 http://fr.arxiv.org/abs/2010.15728 Err codemadness.org 70 i 5635 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dong_H/0/1/0/all/0/1">Hang Dong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Suarez_Paniagua_V/0/1/0/all/0/1">V&#xed;ctor Su&#xe1;rez-Paniagua</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Whiteley_W/0/1/0/all/0/1">William Whiteley</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_H/0/1/0/all/0/1">Honghan Wu</a></p> Err codemadness.org 70 i 5636 Err codemadness.org 70 i 5637 <p>Diagnostic or procedural coding of clinical notes aims to derive a coded Err codemadness.org 70 i 5638 summary of disease-related information about patients. Such coding is usually Err codemadness.org 70 i 5639 done manually in hospitals but could potentially be automated to improve the Err codemadness.org 70 i 5640 efficiency and accuracy of medical coding. Recent studies on deep learning for Err codemadness.org 70 i 5641 automated medical coding achieved promising performances. However, the Err codemadness.org 70 i 5642 explainability of these models is usually poor, preventing them to be used Err codemadness.org 70 i 5643 confidently in supporting clinical practice. Another limitation is that these Err codemadness.org 70 i 5644 models mostly assume independence among labels, ignoring the complex Err codemadness.org 70 i 5645 correlation among medical codes which can potentially be exploited to improve Err codemadness.org 70 i 5646 the performance. We propose a Hierarchical Label-wise Attention Network (HLAN), Err codemadness.org 70 i 5647 which aimed to interpret the model by quantifying importance (as attention Err codemadness.org 70 i 5648 weights) of words and sentences related to each of the labels. Secondly, we Err codemadness.org 70 i 5649 propose to enhance the major deep learning models with a label embedding (LE) Err codemadness.org 70 i 5650 initialisation approach, which learns a dense, continuous vector representation Err codemadness.org 70 i 5651 and then injects the representation into the final layers and the label-wise Err codemadness.org 70 i 5652 attention layers in the models. We evaluated the methods using three settings Err codemadness.org 70 i 5653 on the MIMIC-III discharge summaries: full codes, top-50 codes, and the UK NHS Err codemadness.org 70 i 5654 COVID-19 shielding codes. Experiments were conducted to compare HLAN and LE Err codemadness.org 70 i 5655 initialisation to the state-of-the-art neural network based methods. HLAN Err codemadness.org 70 i 5656 achieved the best Micro-level AUC and $F_1$ on the top-50 code prediction and Err codemadness.org 70 i 5657 comparable results on the NHS COVID-19 shielding code prediction to other Err codemadness.org 70 i 5658 models. By highlighting the most salient words and sentences for each label, Err codemadness.org 70 i 5659 HLAN showed more meaningful and comprehensive model interpretation compared to Err codemadness.org 70 i 5660 its downgraded baselines and the CNN-based models. LE initialisation Err codemadness.org 70 i 5661 consistently boosted most deep learning models for automated medical coding. Err codemadness.org 70 i 5662 </p> Err codemadness.org 70 i 5663 Err codemadness.org 70 i 5664 Err codemadness.org 70 i 5665 Err codemadness.org 70 i 5666 Fundamental limitations to key distillation from Gaussian states with Gaussian operations. (arXiv:2010.15729v1 [quant-ph]) Err codemadness.org 70 i 5667 http://fr.arxiv.org/abs/2010.15729 Err codemadness.org 70 i 5668 <p>Authors: <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Lami_L/0/1/0/all/0/1">Ludovico Lami</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Mista_L/0/1/0/all/0/1">Ladislav Mi&#x161;ta, Jr.</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Adesso_G/0/1/0/all/0/1">Gerardo Adesso</a></p> Err codemadness.org 70 i 5669 Err codemadness.org 70 i 5670 <p>We establish fundamental upper bounds on the amount of secret key that can be Err codemadness.org 70 i 5671 extracted from continuous variable quantum Gaussian states by using only local Err codemadness.org 70 i 5672 Gaussian operations, local classical processing, and public communication. For Err codemadness.org 70 i 5673 one-way communication, we prove that the key is bounded by the R\'enyi-$2$ Err codemadness.org 70 i 5674 Gaussian entanglement of formation $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$, Err codemadness.org 70 i 5675 with the inequality being saturated for pure Gaussian states. The same is true Err codemadness.org 70 i 5676 if two-way public communication is allowed but Alice and Bob employ protocols Err codemadness.org 70 i 5677 that start with destructive local Gaussian measurements. In the most general Err codemadness.org 70 i 5678 setting of two-way communication and arbitrary interactive protocols, we argue Err codemadness.org 70 i 5679 that $2 E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ is still a bound on the Err codemadness.org 70 i 5680 extractable key, although we conjecture that the factor of $2$ is superfluous. Err codemadness.org 70 i 5681 Finally, for a wide class of Gaussian states that includes all two-mode states, Err codemadness.org 70 i 5682 we prove a recently proposed conjecture on the equality between Err codemadness.org 70 i 5683 $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ and the Gaussian intrinsic Err codemadness.org 70 i 5684 entanglement, thus endowing both measures with a more solid operational Err codemadness.org 70 i 5685 meaning. Err codemadness.org 70 i 5686 </p> Err codemadness.org 70 i 5687 Err codemadness.org 70 i 5688 Err codemadness.org 70 i 5689 Err codemadness.org 70 i 5690 The Agile Coach Role: Coaching for Agile Performance Impact. (arXiv:2010.15738v1 [cs.SE]) Err codemadness.org 70 i 5691 http://fr.arxiv.org/abs/2010.15738 Err codemadness.org 70 i 5692 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Stray_V/0/1/0/all/0/1">Viktoria Stray</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tkalich_A/0/1/0/all/0/1">Anastasiia Tkalich</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Moe_N/0/1/0/all/0/1">Nils Brede Moe</a></p> Err codemadness.org 70 i 5693 Err codemadness.org 70 i 5694 <p>It is increasingly common to introduce agile coaches to help gain speed and Err codemadness.org 70 i 5695 advantage in agile companies. Following the success of Spotify, the role of the Err codemadness.org 70 i 5696 agile coach has branched out in terms of tasks and responsibilities, but little Err codemadness.org 70 i 5697 research has been conducted to examine how this role is practiced. This paper Err codemadness.org 70 i 5698 examines the role of the agile coach through 19 semistructured interviews with Err codemadness.org 70 i 5699 agile coaches from ten different companies. We describe the role in terms of Err codemadness.org 70 i 5700 the tasks the coach has in agile projects, valuable traits, skills, tools, and Err codemadness.org 70 i 5701 the enablers of agile coaching. Our findings indicate that agile coaches Err codemadness.org 70 i 5702 perform at the team and organizational levels. They affect effort, strategies, Err codemadness.org 70 i 5703 knowledge, and skills of the agile teams. The most essential traits of an agile Err codemadness.org 70 i 5704 coach are being emphatic, people-oriented, able to listen, diplomatic, and Err codemadness.org 70 i 5705 persistent. We suggest empirically based advice for agile coaching, for example Err codemadness.org 70 i 5706 companies giving their agile coaches the authority to implement the required Err codemadness.org 70 i 5707 organizational changes within and outside the teams. Err codemadness.org 70 i 5708 </p> Err codemadness.org 70 i 5709 Err codemadness.org 70 i 5710 Err codemadness.org 70 i 5711 Err codemadness.org 70 i 5712 Recurrent Neural Networks for video object detection. (arXiv:2010.15740v1 [cs.CV]) Err codemadness.org 70 i 5713 http://fr.arxiv.org/abs/2010.15740 Err codemadness.org 70 i 5714 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Qasim_A/0/1/0/all/0/1">Ahmad B Qasim</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pettirsch_A/0/1/0/all/0/1">Arnd Pettirsch</a></p> Err codemadness.org 70 i 5715 Err codemadness.org 70 i 5716 <p>There is lots of scientific work about object detection in images. For many Err codemadness.org 70 i 5717 applications like for example autonomous driving the actual data on which Err codemadness.org 70 i 5718 classification has to be done are videos. This work compares different methods, Err codemadness.org 70 i 5719 especially those which use Recurrent Neural Networks to detect objects in Err codemadness.org 70 i 5720 videos. We differ between feature-based methods, which feed feature maps of Err codemadness.org 70 i 5721 different frames into the recurrent units, box-level methods, which feed Err codemadness.org 70 i 5722 bounding boxes with class probabilities into the recurrent units and methods Err codemadness.org 70 i 5723 which use flow networks. This study indicates common outcomes of the compared Err codemadness.org 70 i 5724 methods like the benefit of including the temporal context into object Err codemadness.org 70 i 5725 detection and states conclusions and guidelines for video object detection Err codemadness.org 70 i 5726 networks. Err codemadness.org 70 i 5727 </p> Err codemadness.org 70 i 5728 Err codemadness.org 70 i 5729 Err codemadness.org 70 i 5730 Err codemadness.org 70 i 5731 Causal variables from reinforcement learning using generalized Bellman equations. (arXiv:2010.15745v1 [cs.LG]) Err codemadness.org 70 i 5732 http://fr.arxiv.org/abs/2010.15745 Err codemadness.org 70 i 5733 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Herlau_T/0/1/0/all/0/1">Tue Herlau</a></p> Err codemadness.org 70 i 5734 Err codemadness.org 70 i 5735 <p>Many open problems in machine learning are intrinsically related to Err codemadness.org 70 i 5736 causality, however, the use of causal analysis in machine learning is still in Err codemadness.org 70 i 5737 its early stage. Within a general reinforcement learning setting, we consider Err codemadness.org 70 i 5738 the problem of building a general reinforcement learning agent which uses Err codemadness.org 70 i 5739 experience to construct a causal graph of the environment, and use this graph Err codemadness.org 70 i 5740 to inform its policy. Our approach has three characteristics: First, we learn a Err codemadness.org 70 i 5741 simple, coarse-grained causal graph, in which the variables reflect states at Err codemadness.org 70 i 5742 many time instances, and the interventions happen at the level of policies, Err codemadness.org 70 i 5743 rather than individual actions. Secondly, we use mediation analysis to obtain Err codemadness.org 70 i 5744 an optimization target. By minimizing this target, we define the causal Err codemadness.org 70 i 5745 variables. Thirdly, our approach relies on estimating conditional expectations Err codemadness.org 70 i 5746 rather the familiar expected return from reinforcement learning, and we Err codemadness.org 70 i 5747 therefore apply a generalization of Bellman's equations. We show the method can Err codemadness.org 70 i 5748 learn a plausible causal graph in a grid-world environment, and the agent Err codemadness.org 70 i 5749 obtains an improvement in performance when using the causally informed policy. Err codemadness.org 70 i 5750 To our knowledge, this is the first attempt to apply causal analysis in a Err codemadness.org 70 i 5751 reinforcement learning setting without strict restrictions on the number of Err codemadness.org 70 i 5752 states. We have observed that mediation analysis provides a promising avenue Err codemadness.org 70 i 5753 for transforming the problem of causal acquisition into one of cost-function Err codemadness.org 70 i 5754 minimization, but importantly one which involves estimating conditional Err codemadness.org 70 i 5755 expectations. This is a new challenge, and we think that causal reinforcement Err codemadness.org 70 i 5756 learning will involve development methods suited for online estimation of such Err codemadness.org 70 i 5757 conditional expectations. Finally, a benefit of our approach is the use of very Err codemadness.org 70 i 5758 simple causal models, which are arguably a more natural model of human causal Err codemadness.org 70 i 5759 understanding. Err codemadness.org 70 i 5760 </p> Err codemadness.org 70 i 5761 Err codemadness.org 70 i 5762 Err codemadness.org 70 i 5763 Err codemadness.org 70 i 5764 Gaussian Process Bandit Optimization of theThermodynamic Variational Objective. (arXiv:2010.15750v1 [cs.LG]) Err codemadness.org 70 i 5765 http://fr.arxiv.org/abs/2010.15750 Err codemadness.org 70 i 5766 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nguyen_V/0/1/0/all/0/1">Vu Nguyen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Masrani_V/0/1/0/all/0/1">Vaden Masrani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Brekelmans_R/0/1/0/all/0/1">Rob Brekelmans</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Osborne_M/0/1/0/all/0/1">Michael A. Osborne</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wood_F/0/1/0/all/0/1">Frank Wood</a></p> Err codemadness.org 70 i 5767 Err codemadness.org 70 i 5768 <p>Achieving the full promise of the Thermodynamic Variational Objective (TVO),a Err codemadness.org 70 i 5769 recently proposed variational lower bound on the log evidence involving a Err codemadness.org 70 i 5770 one-dimensional Riemann integral approximation, requires choosing a "schedule" Err codemadness.org 70 i 5771 ofsorted discretization points. This paper introduces a bespoke Gaussian Err codemadness.org 70 i 5772 processbandit optimization method for automatically choosing these points. Our Err codemadness.org 70 i 5773 approach not only automates their one-time selection, but also dynamically Err codemadness.org 70 i 5774 adaptstheir positions over the course of optimization, leading to improved Err codemadness.org 70 i 5775 model learning and inference. We provide theoretical guarantees that our bandit Err codemadness.org 70 i 5776 optimizationconverges to the regret-minimizing choice of integration points. Err codemadness.org 70 i 5777 Empirical validation of our algorithm is provided in terms of improved learning Err codemadness.org 70 i 5778 and inference inVariational Autoencoders and Sigmoid Belief Networks. Err codemadness.org 70 i 5779 </p> Err codemadness.org 70 i 5780 Err codemadness.org 70 i 5781 Err codemadness.org 70 i 5782 Err codemadness.org 70 i 5783 A more Pragmatic Implementation of the Lock-free, Ordered, Linked List. (arXiv:2010.15755v1 [cs.DS]) Err codemadness.org 70 i 5784 http://fr.arxiv.org/abs/2010.15755 Err codemadness.org 70 i 5785 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Traff_J/0/1/0/all/0/1">Jesper Larsson Tr&#xe4;ff</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Poter_M/0/1/0/all/0/1">Manuel P&#xf6;ter</a></p> Err codemadness.org 70 i 5786 Err codemadness.org 70 i 5787 <p>The lock-free, ordered, linked list is an important, standard example of a Err codemadness.org 70 i 5788 concurrent data structure. An obvious, practical drawback of textbook Err codemadness.org 70 i 5789 implementations is that failed compare-and-swap (CAS) operations lead to Err codemadness.org 70 i 5790 retraversal of the entire list (retries), which is particularly harmful for Err codemadness.org 70 i 5791 such a linear-time data structure. We alleviate this drawback by first Err codemadness.org 70 i 5792 observing that failed CAS operations under some conditions do not require a Err codemadness.org 70 i 5793 full retry, and second by maintaining approximate backwards pointers that are Err codemadness.org 70 i 5794 used to find a closer starting position in the list for operation retry. Err codemadness.org 70 i 5795 Experiments with both a worst-case deterministic benchmark, and a standard, Err codemadness.org 70 i 5796 randomized, mixed-operation throughput benchmark on three shared-memory systems Err codemadness.org 70 i 5797 (Intel Xeon, AMD EPYC, SPARC-T5) show practical improvements ranging from Err codemadness.org 70 i 5798 significant, to dramatic, several orders of magnitude. Err codemadness.org 70 i 5799 </p> Err codemadness.org 70 i 5800 Err codemadness.org 70 i 5801 Err codemadness.org 70 i 5802 Err codemadness.org 70 i 5803 Identifying Transition States of Chemical Kinetic Systems using Network Embedding Techniques. (arXiv:2010.15760v1 [math.NA]) Err codemadness.org 70 i 5804 http://fr.arxiv.org/abs/2010.15760 Err codemadness.org 70 i 5805 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Mercurio_P/0/1/0/all/0/1">Paula Mercurio</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Liu_D/0/1/0/all/0/1">Di Liu</a></p> Err codemadness.org 70 i 5806 Err codemadness.org 70 i 5807 <p>Using random walk sampling methods for feature learning on networks, we Err codemadness.org 70 i 5808 develop a method for generating low-dimensional node embeddings for directed Err codemadness.org 70 i 5809 graphs and identifying transition states of stochastic chemical reacting Err codemadness.org 70 i 5810 systems. We modified objective functions adopted in existing random walk based Err codemadness.org 70 i 5811 network embedding methods to handle directed graphs and neighbors of different Err codemadness.org 70 i 5812 degrees. Through optimization via gradient ascent, we embed the weighted graph Err codemadness.org 70 i 5813 vertices into a low-dimensional vector space Rd while preserving the Err codemadness.org 70 i 5814 neighborhood of each node. We then demonstrate the effectiveness of the method Err codemadness.org 70 i 5815 on dimension reduction through several examples regarding identification of Err codemadness.org 70 i 5816 transition states of chemical reactions, especially for entropic systems. Err codemadness.org 70 i 5817 </p> Err codemadness.org 70 i 5818 Err codemadness.org 70 i 5819 Err codemadness.org 70 i 5820 Err codemadness.org 70 i 5821 A Helmholtz equation solver using unsupervised learning: Application to transcranial ultrasound. (arXiv:2010.15761v1 [physics.comp-ph]) Err codemadness.org 70 i 5822 http://fr.arxiv.org/abs/2010.15761 Err codemadness.org 70 i 5823 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Stanziola_A/0/1/0/all/0/1">Antonio Stanziola</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Arridge_S/0/1/0/all/0/1">Simon R. Arridge</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Cox_B/0/1/0/all/0/1">Ben T. Cox</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Treeby_B/0/1/0/all/0/1">Bradley E. Treeby</a></p> Err codemadness.org 70 i 5824 Err codemadness.org 70 i 5825 <p>Transcranial ultrasound therapy is increasingly used for the non-invasive Err codemadness.org 70 i 5826 treatment of brain disorders. However, conventional numerical wave solvers are Err codemadness.org 70 i 5827 currently too computationally expensive to be used online during treatments to Err codemadness.org 70 i 5828 predict the acoustic field passing through the skull (e.g., to account for Err codemadness.org 70 i 5829 subject-specific dose and targeting variations). As a step towards real-time Err codemadness.org 70 i 5830 predictions, in the current work, a fast iterative solver for the heterogeneous Err codemadness.org 70 i 5831 Helmholtz equation in 2D is developed using a fully-learned optimizer. The Err codemadness.org 70 i 5832 lightweight network architecture is based on a modified UNet that includes a Err codemadness.org 70 i 5833 learned hidden state. The network is trained using a physics-based loss Err codemadness.org 70 i 5834 function and a set of idealized sound speed distributions with fully Err codemadness.org 70 i 5835 unsupervised training (no knowledge of the true solution is required). The Err codemadness.org 70 i 5836 learned optimizer shows excellent performance on the test set, and is capable Err codemadness.org 70 i 5837 of generalization well outside the training examples, including to much larger Err codemadness.org 70 i 5838 computational domains, and more complex source and sound speed distributions, Err codemadness.org 70 i 5839 for example, those derived from x-ray computed tomography images of the skull. Err codemadness.org 70 i 5840 </p> Err codemadness.org 70 i 5841 Err codemadness.org 70 i 5842 Err codemadness.org 70 i 5843 Err codemadness.org 70 i 5844 Domain adaptation under structural causal models. (arXiv:2010.15764v1 [stat.ML]) Err codemadness.org 70 i 5845 http://fr.arxiv.org/abs/2010.15764 Err codemadness.org 70 i 5846 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Chen_Y/0/1/0/all/0/1">Yuansi Chen</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Buhlmann_P/0/1/0/all/0/1">Peter B&#xfc;hlmann</a></p> Err codemadness.org 70 i 5847 Err codemadness.org 70 i 5848 <p>Domain adaptation (DA) arises as an important problem in statistical machine Err codemadness.org 70 i 5849 learning when the source data used to train a model is different from the Err codemadness.org 70 i 5850 target data used to test the model. Recent advances in DA have mainly been Err codemadness.org 70 i 5851 application-driven and have largely relied on the idea of a common subspace for Err codemadness.org 70 i 5852 source and target data. To understand the empirical successes and failures of Err codemadness.org 70 i 5853 DA methods, we propose a theoretical framework via structural causal models Err codemadness.org 70 i 5854 that enables analysis and comparison of the prediction performance of DA Err codemadness.org 70 i 5855 methods. This framework also allows us to itemize the assumptions needed for Err codemadness.org 70 i 5856 the DA methods to have a low target error. Additionally, with insights from our Err codemadness.org 70 i 5857 theory, we propose a new DA method called CIRM that outperforms existing DA Err codemadness.org 70 i 5858 methods when both the covariates and label distributions are perturbed in the Err codemadness.org 70 i 5859 target data. We complement the theoretical analysis with extensive simulations Err codemadness.org 70 i 5860 to show the necessity of the devised assumptions. Reproducible synthetic and Err codemadness.org 70 i 5861 real data experiments are also provided to illustrate the strengths and Err codemadness.org 70 i 5862 weaknesses of DA methods when parts of the assumptions of our theory are Err codemadness.org 70 i 5863 violated. Err codemadness.org 70 i 5864 </p> Err codemadness.org 70 i 5865 Err codemadness.org 70 i 5866 Err codemadness.org 70 i 5867 Err codemadness.org 70 i 5868 A Single-Loop Smoothed Gradient Descent-Ascent Algorithm for Nonconvex-Concave Min-Max Problems. (arXiv:2010.15768v1 [math.OC]) Err codemadness.org 70 i 5869 http://fr.arxiv.org/abs/2010.15768 Err codemadness.org 70 i 5870 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Zhang_J/0/1/0/all/0/1">Jiawei Zhang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Xiao_P/0/1/0/all/0/1">Peijun Xiao</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Sun_R/0/1/0/all/0/1">Ruoyu Sun</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Luo_Z/0/1/0/all/0/1">Zhi-Quan Luo</a></p> Err codemadness.org 70 i 5871 Err codemadness.org 70 i 5872 <p>Nonconvex-concave min-max problem arises in many machine learning Err codemadness.org 70 i 5873 applications including minimizing a pointwise maximum of a set of nonconvex Err codemadness.org 70 i 5874 functions and robust adversarial training of neural networks. A popular Err codemadness.org 70 i 5875 approach to solve this problem is the gradient descent-ascent (GDA) algorithm Err codemadness.org 70 i 5876 which unfortunately can exhibit oscillation in case of nonconvexity. In this Err codemadness.org 70 i 5877 paper, we introduce a "smoothing" scheme which can be combined with GDA to Err codemadness.org 70 i 5878 stabilize the oscillation and ensure convergence to a stationary solution. We Err codemadness.org 70 i 5879 prove that the stabilized GDA algorithm can achieve an $O(1/\epsilon^2)$ Err codemadness.org 70 i 5880 iteration complexity for minimizing the pointwise maximum of a finite Err codemadness.org 70 i 5881 collection of nonconvex functions. Moreover, the smoothed GDA algorithm Err codemadness.org 70 i 5882 achieves an $O(1/\epsilon^4)$ iteration complexity for general Err codemadness.org 70 i 5883 nonconvex-concave problems. Extensions of this stabilized GDA algorithm to Err codemadness.org 70 i 5884 multi-block cases are presented. To the best of our knowledge, this is the Err codemadness.org 70 i 5885 first algorithm to achieve $O(1/\epsilon^2)$ for a class of nonconvex-concave Err codemadness.org 70 i 5886 problem. We illustrate the practical efficiency of the stabilized GDA algorithm Err codemadness.org 70 i 5887 on robust training. Err codemadness.org 70 i 5888 </p> Err codemadness.org 70 i 5889 Err codemadness.org 70 i 5890 Err codemadness.org 70 i 5891 Err codemadness.org 70 i 5892 Recursive Random Contraction Revisited. (arXiv:2010.15770v1 [cs.DS]) Err codemadness.org 70 i 5893 http://fr.arxiv.org/abs/2010.15770 Err codemadness.org 70 i 5894 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Karger_D/0/1/0/all/0/1">David R. Karger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Williamson_D/0/1/0/all/0/1">David P. Williamson</a></p> Err codemadness.org 70 i 5895 Err codemadness.org 70 i 5896 <p>In this note, we revisit the recursive random contraction algorithm of Karger Err codemadness.org 70 i 5897 and Stein for finding a minimum cut in a graph. Our revisit is occasioned by a Err codemadness.org 70 i 5898 paper of Fox, Panigrahi, and Zhang which gives an extension of the Karger-Stein Err codemadness.org 70 i 5899 algorithm to minimum cuts and minimum $k$-cuts in hypergraphs. When specialized Err codemadness.org 70 i 5900 to the case of graphs, the algorithm is somewhat different than the original Err codemadness.org 70 i 5901 Karger-Stein algorithm. We show that the analysis becomes particularly clean in Err codemadness.org 70 i 5902 this case: we can prove that the probability that a fixed minimum cut in an $n$ Err codemadness.org 70 i 5903 node graph is returned by the algorithm is bounded below by $1/(2H_n-2)$, where Err codemadness.org 70 i 5904 $H_n$ is the $n$th harmonic number. We also consider other similar variants of Err codemadness.org 70 i 5905 the algorithm, and show that no such algorithm can achieve an asymptotically Err codemadness.org 70 i 5906 better probability of finding a fixed minimum cut. Err codemadness.org 70 i 5907 </p> Err codemadness.org 70 i 5908 Err codemadness.org 70 i 5909 Err codemadness.org 70 i 5910 Err codemadness.org 70 i 5911 GANs & Reels: Creating Irish Music using a Generative Adversarial Network. (arXiv:2010.15772v1 [cs.SD]) Err codemadness.org 70 i 5912 http://fr.arxiv.org/abs/2010.15772 Err codemadness.org 70 i 5913 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kolokolova_A/0/1/0/all/0/1">Antonina Kolokolova</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Billard_M/0/1/0/all/0/1">Mitchell Billard</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bishop_R/0/1/0/all/0/1">Robert Bishop</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Elsisy_M/0/1/0/all/0/1">Moustafa Elsisy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Northcott_Z/0/1/0/all/0/1">Zachary Northcott</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Graves_L/0/1/0/all/0/1">Laura Graves</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nagisetty_V/0/1/0/all/0/1">Vineel Nagisetty</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Patey_H/0/1/0/all/0/1">Heather Patey</a></p> Err codemadness.org 70 i 5914 Err codemadness.org 70 i 5915 <p>In this paper we present a method for algorithmic melody generation using a Err codemadness.org 70 i 5916 generative adversarial network without recurrent components. Music generation Err codemadness.org 70 i 5917 has been successfully done using recurrent neural networks, where the model Err codemadness.org 70 i 5918 learns sequence information that can help create authentic sounding melodies. Err codemadness.org 70 i 5919 Here, we use DC-GAN architecture with dilated convolutions and towers to Err codemadness.org 70 i 5920 capture sequential information as spatial image information, and learn Err codemadness.org 70 i 5921 long-range dependencies in fixed-length melody forms such as Irish traditional Err codemadness.org 70 i 5922 reel. Err codemadness.org 70 i 5923 </p> Err codemadness.org 70 i 5924 Err codemadness.org 70 i 5925 Err codemadness.org 70 i 5926 Err codemadness.org 70 i 5927 WaveTransform: Crafting Adversarial Examples via Input Decomposition. (arXiv:2010.15773v1 [cs.CV]) Err codemadness.org 70 i 5928 http://fr.arxiv.org/abs/2010.15773 Err codemadness.org 70 i 5929 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Anshumaan_D/0/1/0/all/0/1">Divyam Anshumaan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Agarwal_A/0/1/0/all/0/1">Akshay Agarwal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vatsa_M/0/1/0/all/0/1">Mayank Vatsa</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Singh_R/0/1/0/all/0/1">Richa Singh</a></p> Err codemadness.org 70 i 5930 Err codemadness.org 70 i 5931 <p>Frequency spectrum has played a significant role in learning unique and Err codemadness.org 70 i 5932 discriminating features for object recognition. Both low and high frequency Err codemadness.org 70 i 5933 information present in images have been extracted and learnt by a host of Err codemadness.org 70 i 5934 representation learning techniques, including deep learning. Inspired by this Err codemadness.org 70 i 5935 observation, we introduce a novel class of adversarial attacks, namely Err codemadness.org 70 i 5936 `WaveTransform', that creates adversarial noise corresponding to low-frequency Err codemadness.org 70 i 5937 and high-frequency subbands, separately (or in combination). The frequency Err codemadness.org 70 i 5938 subbands are analyzed using wavelet decomposition; the subbands are corrupted Err codemadness.org 70 i 5939 and then used to construct an adversarial example. Experiments are performed Err codemadness.org 70 i 5940 using multiple databases and CNN models to establish the effectiveness of the Err codemadness.org 70 i 5941 proposed WaveTransform attack and analyze the importance of a particular Err codemadness.org 70 i 5942 frequency component. The robustness of the proposed attack is also evaluated Err codemadness.org 70 i 5943 through its transferability and resiliency against a recent adversarial defense Err codemadness.org 70 i 5944 algorithm. Experiments show that the proposed attack is effective against the Err codemadness.org 70 i 5945 defense algorithm and is also transferable across CNNs. Err codemadness.org 70 i 5946 </p> Err codemadness.org 70 i 5947 Err codemadness.org 70 i 5948 Err codemadness.org 70 i 5949 Err codemadness.org 70 i 5950 Understanding the Failure Modes of Out-of-Distribution Generalization. (arXiv:2010.15775v1 [cs.LG]) Err codemadness.org 70 i 5951 http://fr.arxiv.org/abs/2010.15775 Err codemadness.org 70 i 5952 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Nagarajan_V/0/1/0/all/0/1">Vaishnavh Nagarajan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Andreassen_A/0/1/0/all/0/1">Anders Andreassen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Neyshabur_B/0/1/0/all/0/1">Behnam Neyshabur</a></p> Err codemadness.org 70 i 5953 Err codemadness.org 70 i 5954 <p>Empirical studies suggest that machine learning models often rely on Err codemadness.org 70 i 5955 features, such as the background, that may be spuriously correlated with the Err codemadness.org 70 i 5956 label only during training time, resulting in poor accuracy during test-time. Err codemadness.org 70 i 5957 In this work, we identify the fundamental factors that give rise to this Err codemadness.org 70 i 5958 behavior, by explaining why models fail this way {\em even} in easy-to-learn Err codemadness.org 70 i 5959 tasks where one would expect these models to succeed. In particular, through a Err codemadness.org 70 i 5960 theoretical study of gradient-descent-trained linear classifiers on some Err codemadness.org 70 i 5961 easy-to-learn tasks, we uncover two complementary failure modes. These modes Err codemadness.org 70 i 5962 arise from how spurious correlations induce two kinds of skews in the data: one Err codemadness.org 70 i 5963 geometric in nature, and another, statistical in nature. Finally, we construct Err codemadness.org 70 i 5964 natural modifications of image classification datasets to understand when these Err codemadness.org 70 i 5965 failure modes can arise in practice. We also design experiments to isolate the Err codemadness.org 70 i 5966 two failure modes when training modern neural networks on these datasets. Err codemadness.org 70 i 5967 </p> Err codemadness.org 70 i 5968 Err codemadness.org 70 i 5969 Err codemadness.org 70 i 5970 Err codemadness.org 70 i 5971 Quantum advantage for differential equation analysis. (arXiv:2010.15776v1 [quant-ph]) Err codemadness.org 70 i 5972 http://fr.arxiv.org/abs/2010.15776 Err codemadness.org 70 i 5973 <p>Authors: <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Kiani_B/0/1/0/all/0/1">Bobak T. Kiani</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Palma_G/0/1/0/all/0/1">Giacomo De Palma</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Englund_D/0/1/0/all/0/1">Dirk Englund</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Kaminsky_W/0/1/0/all/0/1">William Kaminsky</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Marvian_M/0/1/0/all/0/1">Milad Marvian</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Lloyd_S/0/1/0/all/0/1">Seth Lloyd</a></p> Err codemadness.org 70 i 5974 Err codemadness.org 70 i 5975 <p>Quantum algorithms for both differential equation solving and for machine Err codemadness.org 70 i 5976 learning potentially offer an exponential speedup over all known classical Err codemadness.org 70 i 5977 algorithms. However, there also exist obstacles to obtaining this potential Err codemadness.org 70 i 5978 speedup in useful problem instances. The essential obstacle for quantum Err codemadness.org 70 i 5979 differential equation solving is that outputting useful information may require Err codemadness.org 70 i 5980 difficult post-processing, and the essential obstacle for quantum machine Err codemadness.org 70 i 5981 learning is that inputting the training set is a difficult task just by itself. Err codemadness.org 70 i 5982 In this paper, we demonstrate, when combined, these difficulties solve one Err codemadness.org 70 i 5983 another. We show how the output of quantum differential equation solving can Err codemadness.org 70 i 5984 serve as the input for quantum machine learning, allowing dynamical analysis in Err codemadness.org 70 i 5985 terms of principal components, power spectra, and wavelet decompositions. To Err codemadness.org 70 i 5986 illustrate this, we consider continuous time Markov processes on Err codemadness.org 70 i 5987 epidemiological and social networks. These quantum algorithms provide an Err codemadness.org 70 i 5988 exponential advantage over existing classical Monte Carlo methods. Err codemadness.org 70 i 5989 </p> Err codemadness.org 70 i 5990 Err codemadness.org 70 i 5991 Err codemadness.org 70 i 5992 Err codemadness.org 70 i 5993 Contextual BERT: Conditioning the Language Model Using a Global State. (arXiv:2010.15778v1 [cs.CL]) Err codemadness.org 70 i 5994 http://fr.arxiv.org/abs/2010.15778 Err codemadness.org 70 i 5995 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Denk_T/0/1/0/all/0/1">Timo I. Denk</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ramallo_A/0/1/0/all/0/1">Ana Peleteiro Ramallo</a></p> Err codemadness.org 70 i 5996 Err codemadness.org 70 i 5997 <p>BERT is a popular language model whose main pre-training task is to fill in Err codemadness.org 70 i 5998 the blank, i.e., predicting a word that was masked out of a sentence, based on Err codemadness.org 70 i 5999 the remaining words. In some applications, however, having an additional Err codemadness.org 70 i 6000 context can help the model make the right prediction, e.g., by taking the Err codemadness.org 70 i 6001 domain or the time of writing into account. This motivates us to advance the Err codemadness.org 70 i 6002 BERT architecture by adding a global state for conditioning on a fixed-sized Err codemadness.org 70 i 6003 context. We present our two novel approaches and apply them to an industry Err codemadness.org 70 i 6004 use-case, where we complete fashion outfits with missing articles, conditioned Err codemadness.org 70 i 6005 on a specific customer. An experimental comparison to other methods from the Err codemadness.org 70 i 6006 literature shows that our methods improve personalization significantly. Err codemadness.org 70 i 6007 </p> Err codemadness.org 70 i 6008 Err codemadness.org 70 i 6009 Err codemadness.org 70 i 6010 Err codemadness.org 70 i 6011 Stable and efficient Petrov-Galerkin methods for a kinetic Fokker-Planck equation. (arXiv:2010.15784v1 [math.NA]) Err codemadness.org 70 i 6012 http://fr.arxiv.org/abs/2010.15784 Err codemadness.org 70 i 6013 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Brunken_J/0/1/0/all/0/1">Julia Brunken</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Smetana_K/0/1/0/all/0/1">Kathrin Smetana</a></p> Err codemadness.org 70 i 6014 Err codemadness.org 70 i 6015 <p>We propose a stable Petrov-Galerkin discretization of a kinetic Fokker-Planck Err codemadness.org 70 i 6016 equation constructed in such a way that uniform inf-sup stability can be Err codemadness.org 70 i 6017 inferred directly from the variational formulation. Inspired by well-posedness Err codemadness.org 70 i 6018 results for parabolic equations, we derive a lower bound for the dual inf-sup Err codemadness.org 70 i 6019 constant of the Fokker-Planck bilinear form by means of stable pairs of trial Err codemadness.org 70 i 6020 and test functions. The trial function of such a pair is constructed by Err codemadness.org 70 i 6021 applying the kinetic transport operator and the inverse velocity Err codemadness.org 70 i 6022 Laplace-Beltrami operator to a given test function. For the Petrov-Galerkin Err codemadness.org 70 i 6023 projection we choose an arbitrary discrete test space and then define the Err codemadness.org 70 i 6024 discrete trial space using the same application of transport and inverse Err codemadness.org 70 i 6025 Laplace-Beltrami operator. As a result, the spaces replicate the stable pairs Err codemadness.org 70 i 6026 of the continuous level and we obtain a well-posed numerical method with a Err codemadness.org 70 i 6027 discrete inf-sup constant identical to the inf-sup constant of the continuous Err codemadness.org 70 i 6028 problem independently of the mesh size. We show how the specific basis Err codemadness.org 70 i 6029 functions can be efficiently computed by low-dimensional elliptic problems, and Err codemadness.org 70 i 6030 confirm the practicability and performance of the method for a numerical Err codemadness.org 70 i 6031 example. Err codemadness.org 70 i 6032 </p> Err codemadness.org 70 i 6033 Err codemadness.org 70 i 6034 Err codemadness.org 70 i 6035 Err codemadness.org 70 i 6036 Quickest detection of false data injection attack in remote state estimation. (arXiv:2010.15785v1 [eess.SY]) Err codemadness.org 70 i 6037 http://fr.arxiv.org/abs/2010.15785 Err codemadness.org 70 i 6038 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Gupta_A/0/1/0/all/0/1">Akanshu Gupta</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sikdar_A/0/1/0/all/0/1">Abhinava Sikdar</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Chattopadhyay_A/0/1/0/all/0/1">Arpan Chattopadhyay</a></p> Err codemadness.org 70 i 6039 Err codemadness.org 70 i 6040 <p>In this paper, quickest detection of false data injection attack on remote Err codemadness.org 70 i 6041 state estimation is considered. A set of $N$ sensors make noisy linear Err codemadness.org 70 i 6042 observations of a discrete-time linear process with Gaussian noise, and report Err codemadness.org 70 i 6043 the observations to a remote estimator. The challenge is the presence of a few Err codemadness.org 70 i 6044 potentially malicious sensors which can start strategically manipulating their Err codemadness.org 70 i 6045 observations at a random time in order to skew the estimates. The quickest Err codemadness.org 70 i 6046 attack detection problem for a known linear attack scheme is posed as a Err codemadness.org 70 i 6047 constrained Markov decision process in order to minimise the expected detection Err codemadness.org 70 i 6048 delay subject to a false alarm constraint, with the state involving the Err codemadness.org 70 i 6049 probability belief at the estimator that the system is under attack. State Err codemadness.org 70 i 6050 transition probabilities are derived in terms of system parameters, and the Err codemadness.org 70 i 6051 structure of the optimal policy is derived analytically. It turns out that the Err codemadness.org 70 i 6052 optimal policy amounts to checking whether the probability belief exceeds a Err codemadness.org 70 i 6053 threshold. Numerical results demonstrate significant performance gain under the Err codemadness.org 70 i 6054 proposed algorithm against competing algorithms. Err codemadness.org 70 i 6055 </p> Err codemadness.org 70 i 6056 Err codemadness.org 70 i 6057 Err codemadness.org 70 i 6058 Err codemadness.org 70 i 6059 Light-Weight DDoS Mitigation at Network Edge with Limited Resources. (arXiv:2010.15786v1 [cs.NI]) Err codemadness.org 70 i 6060 http://fr.arxiv.org/abs/2010.15786 Err codemadness.org 70 i 6061 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yaegashi_R/0/1/0/all/0/1">Ryo Yaegashi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hisano_D/0/1/0/all/0/1">Daisuke Hisano</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nakayama_Y/0/1/0/all/0/1">Yu Nakayama</a></p> Err codemadness.org 70 i 6062 Err codemadness.org 70 i 6063 <p>The Internet of Things (IoT) has been growing rapidly in recent years. With Err codemadness.org 70 i 6064 the appearance of 5G, it is expected to become even more indispensable to Err codemadness.org 70 i 6065 people's lives. In accordance with the increase of Distributed Err codemadness.org 70 i 6066 Denial-of-Service (DDoS) attacks from IoT devices, DDoS defense has become a Err codemadness.org 70 i 6067 hot research topic. DDoS detection mechanisms executed on routers and SDN Err codemadness.org 70 i 6068 environments have been intensely studied. However, these methods have the Err codemadness.org 70 i 6069 disadvantage of requiring the cost and performance of the devices. In addition, Err codemadness.org 70 i 6070 there is no existing DDoS mitigation algorithm on the network edge that can be Err codemadness.org 70 i 6071 performed with the low-cost and low performance equipments. Therefore, this Err codemadness.org 70 i 6072 paper proposes a light-weight DDoS mitigation scheme at the network edge using Err codemadness.org 70 i 6073 limited resources of inexpensive devices such as home gateways. The goal of the Err codemadness.org 70 i 6074 proposed scheme is to simply detect and mitigate flooding attacks. It utilizes Err codemadness.org 70 i 6075 unused queue resources to detect malicious flows by random shuffling of queue Err codemadness.org 70 i 6076 allocation and discard the packets of the detected flows. The performance of Err codemadness.org 70 i 6077 the proposed scheme was confirmed via theoretical analysis and computer Err codemadness.org 70 i 6078 simulation. The simulation results match the theoretical results and the Err codemadness.org 70 i 6079 proposed algorithm can efficiently detect malicious flows using limited Err codemadness.org 70 i 6080 resources. Err codemadness.org 70 i 6081 </p> Err codemadness.org 70 i 6082 Err codemadness.org 70 i 6083 Err codemadness.org 70 i 6084 Err codemadness.org 70 i 6085 A Framework for Learning Predator-prey Agents from Simulation to Real World. (arXiv:2010.15792v1 [cs.RO]) Err codemadness.org 70 i 6086 http://fr.arxiv.org/abs/2010.15792 Err codemadness.org 70 i 6087 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1">Jiunhan Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gao_Z/0/1/0/all/0/1">Zhenyu Gao</a></p> Err codemadness.org 70 i 6088 Err codemadness.org 70 i 6089 <p>In this paper, we propose an evolutionary predatorprey robot system which can Err codemadness.org 70 i 6090 be generally implemented from simulation to the real world. We design the Err codemadness.org 70 i 6091 closed-loop robot system with camera and infrared sensors as inputs of Err codemadness.org 70 i 6092 controller. Both the predators and prey are co-evolved by NeuroEvolution of Err codemadness.org 70 i 6093 Augmenting Topologies (NEAT) to learn the expected behaviours. We design a Err codemadness.org 70 i 6094 framework that integrate Gym of OpenAI, Robot Operating System (ROS), Gazebo. Err codemadness.org 70 i 6095 In such a framework, users only need to focus on algorithms without being Err codemadness.org 70 i 6096 worried about the detail of manipulating robots in both simulation and the real Err codemadness.org 70 i 6097 world. Combining simulations, real-world evolution, and robustness analysis, it Err codemadness.org 70 i 6098 can be applied to develop the solutions for the predator-prey tasks. For the Err codemadness.org 70 i 6099 convenience of users, the source code and videos of the simulated and real Err codemadness.org 70 i 6100 world are published on Github. Err codemadness.org 70 i 6101 </p> Err codemadness.org 70 i 6102 Err codemadness.org 70 i 6103 Err codemadness.org 70 i 6104 Err codemadness.org 70 i 6105 A computational periporomechanics model for localized failure in unsaturated porous media. (arXiv:2010.15793v1 [math.NA]) Err codemadness.org 70 i 6106 http://fr.arxiv.org/abs/2010.15793 Err codemadness.org 70 i 6107 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Menon_S/0/1/0/all/0/1">Shashank Menon</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Song_X/0/1/0/all/0/1">Xiaoyu Song</a></p> Err codemadness.org 70 i 6108 Err codemadness.org 70 i 6109 <p>We implement a computational periporomechanics model for simulating localized Err codemadness.org 70 i 6110 failure in unsaturated porous media. The coupled periporomechanics model is Err codemadness.org 70 i 6111 based on the peridynamic state concept and the effective force state concept. Err codemadness.org 70 i 6112 The coupled governing equations are integral-differential equations without Err codemadness.org 70 i 6113 assuming the continuity of solid displacement and fluid pressures. The fluid Err codemadness.org 70 i 6114 flow and effective force states are determined by nonlocal fluid pressure and Err codemadness.org 70 i 6115 deformation gradients through the recently formulated multiphase constitutive Err codemadness.org 70 i 6116 correspondence principle. The coupled peri-poromechanics is implemented Err codemadness.org 70 i 6117 numerically for high-performance computing by an implicit multiphase meshfree Err codemadness.org 70 i 6118 method utilizing the message passing interface. The numerical implementation is Err codemadness.org 70 i 6119 validated by simulating classical poromechanics problems and comparing the Err codemadness.org 70 i 6120 numerical results with analytical solutions and experimental data. Numerical Err codemadness.org 70 i 6121 examples are presented to demonstrate the robustness of the fully coupled Err codemadness.org 70 i 6122 peri-poromechanics in modeling localized failures in unsaturated porous media. Err codemadness.org 70 i 6123 </p> Err codemadness.org 70 i 6124 Err codemadness.org 70 i 6125 Err codemadness.org 70 i 6126 Err codemadness.org 70 i 6127 Eccentricity queries and beyond using Hub Labels. (arXiv:2010.15794v1 [cs.DS]) Err codemadness.org 70 i 6128 http://fr.arxiv.org/abs/2010.15794 Err codemadness.org 70 i 6129 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1">Guillaume Ducoffe</a></p> Err codemadness.org 70 i 6130 Err codemadness.org 70 i 6131 <p>Hub labeling schemes are popular methods for computing distances on road Err codemadness.org 70 i 6132 networks and other large complex networks, often answering to a query within a Err codemadness.org 70 i 6133 few microseconds for graphs with millions of edges. In this work, we study Err codemadness.org 70 i 6134 their algorithmic applications beyond distance queries. We focus on Err codemadness.org 70 i 6135 eccentricity queries and distance-sum queries, for several versions of these Err codemadness.org 70 i 6136 problems on directed weighted graphs, that is in part motivated by their Err codemadness.org 70 i 6137 importance in facility location problems. On the negative side, we show Err codemadness.org 70 i 6138 conditional lower bounds for these above problems on unweighted undirected Err codemadness.org 70 i 6139 sparse graphs, via standard constructions from "Fine-grained" complexity. Err codemadness.org 70 i 6140 However, things take a different turn when the hub labels have a sublogarithmic Err codemadness.org 70 i 6141 size. Indeed, given a hub labeling of maximum label size $\leq k$, after Err codemadness.org 70 i 6142 pre-processing the labels in total $2^{{O}(k)} \cdot |V|^{1+o(1)}$ time, we can Err codemadness.org 70 i 6143 compute both the eccentricity and the distance-sum of any vertex in $2^{{O}(k)} Err codemadness.org 70 i 6144 \cdot |V|^{o(1)}$ time. It can also be applied to the fast global computation Err codemadness.org 70 i 6145 of some topological indices. Finally, as a by-product of our approach, on any Err codemadness.org 70 i 6146 fixed class of unweighted graphs with bounded expansion, we can decide whether Err codemadness.org 70 i 6147 the diameter of an $n$-vertex graph in the class is at most $k$ in $f(k) \cdot Err codemadness.org 70 i 6148 n^{1+o(1)}$ time, for some "explicit" function $f$. Err codemadness.org 70 i 6149 </p> Err codemadness.org 70 i 6150 Err codemadness.org 70 i 6151 Err codemadness.org 70 i 6152 Err codemadness.org 70 i 6153 Ray-marching Thurston geometries. (arXiv:2010.15801v1 [math.GT]) Err codemadness.org 70 i 6154 http://fr.arxiv.org/abs/2010.15801 Err codemadness.org 70 i 6155 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Coulon_R/0/1/0/all/0/1">R&#xe9;mi Coulon</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Matsumoto_E/0/1/0/all/0/1">Elisabetta A. Matsumoto</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Segerman_H/0/1/0/all/0/1">Henry Segerman</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Trettel_S/0/1/0/all/0/1">Steve J. Trettel</a></p> Err codemadness.org 70 i 6156 Err codemadness.org 70 i 6157 <p>We describe algorithms that produce accurate real-time interactive in-space Err codemadness.org 70 i 6158 views of the eight Thurston geometries using ray-marching. We give a Err codemadness.org 70 i 6159 theoretical framework for our algorithms, independent of the geometry involved. Err codemadness.org 70 i 6160 In addition to scenes within a geometry $X$, we also consider scenes within Err codemadness.org 70 i 6161 quotient manifolds and orbifolds $X / \Gamma$. We adapt the Phong lighting Err codemadness.org 70 i 6162 model to non-euclidean geometries. The most difficult part of this is the Err codemadness.org 70 i 6163 calculation of light intensity, which relates to the area density of geodesic Err codemadness.org 70 i 6164 spheres. We also give extensive practical details for each geometry. Err codemadness.org 70 i 6165 </p> Err codemadness.org 70 i 6166 Err codemadness.org 70 i 6167 Err codemadness.org 70 i 6168 Err codemadness.org 70 i 6169 Isometric embeddings in trees and their use in the diameter problem. (arXiv:2010.15803v1 [cs.DS]) Err codemadness.org 70 i 6170 http://fr.arxiv.org/abs/2010.15803 Err codemadness.org 70 i 6171 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1">Guillaume Ducoffe</a></p> Err codemadness.org 70 i 6172 Err codemadness.org 70 i 6173 <p>We prove that given a discrete space with $n$ points which is either embedded Err codemadness.org 70 i 6174 in a system of $k$ trees, or the Cartesian product of $k$ trees, we can compute Err codemadness.org 70 i 6175 all eccentricities in ${\cal O}(2^{{\cal O}(k\log{k})}(N+n)^{1+o(1)})$ time, Err codemadness.org 70 i 6176 where $N$ is the cumulative total order over all these $k$ trees. This is near Err codemadness.org 70 i 6177 optimal under the Strong Exponential-Time Hypothesis, even in the very special Err codemadness.org 70 i 6178 case of an $n$-vertex graph embedded in a system of $\omega(\log{n})$ spanning Err codemadness.org 70 i 6179 trees. However, given such an embedding in the strong product of $k$ trees, Err codemadness.org 70 i 6180 there is a much faster ${\cal O}(N + kn)$-time algorithm for this problem. All Err codemadness.org 70 i 6181 our positive results can be turned into approximation algorithms for the graphs Err codemadness.org 70 i 6182 and finite spaces with a quasi isometric embedding in trees, if such embedding Err codemadness.org 70 i 6183 is given as input, where the approximation factor (resp., the approximation Err codemadness.org 70 i 6184 constant) depends on the distortion of the embedding (resp., of its stretch). Err codemadness.org 70 i 6185 The existence of embeddings in the Cartesian product of finitely many trees has Err codemadness.org 70 i 6186 been thoroughly investigated for cube-free median graphs. We give the Err codemadness.org 70 i 6187 first-known quasi linear-time algorithm for computing the diameter within this Err codemadness.org 70 i 6188 graph class. It does not require an embedding in a product of trees to be given Err codemadness.org 70 i 6189 as part of the input. On our way, being given an $n$-node tree $T$, we propose Err codemadness.org 70 i 6190 a data structure with ${\cal O}(n\log{n})$ pre-processing time in order to Err codemadness.org 70 i 6191 compute in ${\cal O}(k\log^2{n})$ time the eccentricity of any subset of $k$ Err codemadness.org 70 i 6192 nodes. We combine the latter technical contribution, of independent interest, Err codemadness.org 70 i 6193 with a recent distance-labeling scheme that was designed for cube-free median Err codemadness.org 70 i 6194 graphs. Err codemadness.org 70 i 6195 </p> Err codemadness.org 70 i 6196 Err codemadness.org 70 i 6197 Err codemadness.org 70 i 6198 Err codemadness.org 70 i 6199 A Local Search Framework for Experimental Design. (arXiv:2010.15805v1 [cs.DS]) Err codemadness.org 70 i 6200 http://fr.arxiv.org/abs/2010.15805 Err codemadness.org 70 i 6201 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lau_L/0/1/0/all/0/1">Lap Chi Lau</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_H/0/1/0/all/0/1">Hong Zhou</a></p> Err codemadness.org 70 i 6202 Err codemadness.org 70 i 6203 <p>We present a local search framework to design and analyze both combinatorial Err codemadness.org 70 i 6204 algorithms and rounding algorithms for experimental design problems. This Err codemadness.org 70 i 6205 framework provides a unifying approach to match and improve all known results Err codemadness.org 70 i 6206 in D/A/E-design and to obtain new results in previously unknown settings. Err codemadness.org 70 i 6207 </p> Err codemadness.org 70 i 6208 <p>For combinatorial algorithms, we provide a new analysis of the classical Err codemadness.org 70 i 6209 Fedorov's exchange method. We prove that this simple local search algorithm Err codemadness.org 70 i 6210 works well as long as there exists an almost optimal solution with good Err codemadness.org 70 i 6211 condition number. Moreover, we design a new combinatorial local search Err codemadness.org 70 i 6212 algorithm for E-design using the regret minimization framework. Err codemadness.org 70 i 6213 </p> Err codemadness.org 70 i 6214 <p>For rounding algorithms, we provide a unified randomized exchange algorithm Err codemadness.org 70 i 6215 to match and improve previous results for D/A/E-design. Furthermore, the Err codemadness.org 70 i 6216 algorithm works in the more general setting to approximately satisfy multiple Err codemadness.org 70 i 6217 knapsack constraints, which can be used for weighted experimental design and Err codemadness.org 70 i 6218 for incorporating fairness constraints into experimental design. Err codemadness.org 70 i 6219 </p> Err codemadness.org 70 i 6220 Err codemadness.org 70 i 6221 Err codemadness.org 70 i 6222 Err codemadness.org 70 i 6223 The ins and outs of speaker recognition: lessons from VoxSRC 2020. (arXiv:2010.15809v1 [cs.SD]) Err codemadness.org 70 i 6224 http://fr.arxiv.org/abs/2010.15809 Err codemadness.org 70 i 6225 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kwon_Y/0/1/0/all/0/1">Yoohwan Kwon</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heo_H/0/1/0/all/0/1">Hee-Soo Heo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_B/0/1/0/all/0/1">Bong-Jin Lee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chung_J/0/1/0/all/0/1">Joon Son Chung</a></p> Err codemadness.org 70 i 6226 Err codemadness.org 70 i 6227 <p>The VoxCeleb Speaker Recognition Challenge (VoxSRC) at Interspeech 2020 Err codemadness.org 70 i 6228 offers a challenging evaluation for speaker recognition systems, which includes Err codemadness.org 70 i 6229 celebrities playing different parts in movies. The goal of this work is robust Err codemadness.org 70 i 6230 speaker recognition of utterances recorded in these challenging environments. Err codemadness.org 70 i 6231 We utilise variants of the popular ResNet architecture for speaker recognition Err codemadness.org 70 i 6232 and perform extensive experiments using a range of loss functions and training Err codemadness.org 70 i 6233 parameters. To this end, we optimise an efficient training framework that Err codemadness.org 70 i 6234 allows powerful models to be trained with limited time and resources. Our Err codemadness.org 70 i 6235 trained models demonstrate improvements over most existing works with lighter Err codemadness.org 70 i 6236 models and a simple pipeline. The paper shares the lessons learned from our Err codemadness.org 70 i 6237 participation in the challenge. Err codemadness.org 70 i 6238 </p> Err codemadness.org 70 i 6239 Err codemadness.org 70 i 6240 Err codemadness.org 70 i 6241 Err codemadness.org 70 i 6242 Algorithmic pure states for the negative spherical perceptron. (arXiv:2010.15811v1 [math.PR]) Err codemadness.org 70 i 6243 http://fr.arxiv.org/abs/2010.15811 Err codemadness.org 70 i 6244 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Alaoui_A/0/1/0/all/0/1">Ahmed El Alaoui</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Sellke_M/0/1/0/all/0/1">Mark Sellke</a></p> Err codemadness.org 70 i 6245 Err codemadness.org 70 i 6246 <p>We consider the spherical perceptron with Gaussian disorder. This is the set Err codemadness.org 70 i 6247 $S$ of points $\sigma \in \mathbb{R}^N$ on the sphere of radius $\sqrt{N}$ Err codemadness.org 70 i 6248 satisfying $\langle g_a , \sigma \rangle \ge \kappa\sqrt{N}\,$ for all $1 \le a Err codemadness.org 70 i 6249 \le M$, where $(g_a)_{a=1}^M$ are independent standard gaussian vectors and Err codemadness.org 70 i 6250 $\kappa \in \mathbb{R}$ is fixed. Various characteristics of $S$ such as its Err codemadness.org 70 i 6251 surface measure and the largest $M$ for which it is non-empty, were computed Err codemadness.org 70 i 6252 heuristically in statistical physics in the asymptotic regime $N \to \infty$, Err codemadness.org 70 i 6253 $M/N \to \alpha$. The case $\kappa&lt;0$ is of special interest as $S$ is Err codemadness.org 70 i 6254 conjectured to exhibit a hierarchical tree-like geometry known as "full Err codemadness.org 70 i 6255 replica-symmetry breaking" (FRSB) close to the satisfiability threshold Err codemadness.org 70 i 6256 $\alpha_{\text{SAT}}(\kappa)$, and whose characteristics are captured by a Err codemadness.org 70 i 6257 Parisi variational principle akin to the one appearing in the Err codemadness.org 70 i 6258 Sherrington-Kirkpatrick model. In this paper we design an efficient algorithm Err codemadness.org 70 i 6259 which, given oracle access to the solution of the Parisi variational principle, Err codemadness.org 70 i 6260 exploits this conjectured FRSB structure for $\kappa&lt;0$ and outputs a vector Err codemadness.org 70 i 6261 $\hat{\sigma}$ satisfying $\langle g_a , \hat{\sigma}\rangle \ge \kappa Err codemadness.org 70 i 6262 \sqrt{N}$ for all $1\le a \le M$ and lying on a sphere of non-trivial radius Err codemadness.org 70 i 6263 $\sqrt{\bar{q} N}$, where $\bar{q} \in (0,1)$ is the right-end of the support Err codemadness.org 70 i 6264 of the associated Parisi measure. We expect $\hat{\sigma}$ to be approximately Err codemadness.org 70 i 6265 the barycenter of a pure state of the spherical perceptron. Moreover we expect Err codemadness.org 70 i 6266 that $\bar{q} \to 1$ as $\alpha \to \alpha_{\text{SAT}}(\kappa)$, so that Err codemadness.org 70 i 6267 $\big\langle g_a,\hat{\sigma}/|\hat{\sigma}|\big\rangle \geq Err codemadness.org 70 i 6268 (\kappa-o(1))\sqrt{N}$ near criticality. Err codemadness.org 70 i 6269 </p> Err codemadness.org 70 i 6270 Err codemadness.org 70 i 6271 Err codemadness.org 70 i 6272 Err codemadness.org 70 i 6273 Around the diameter of AT-free graphs. (arXiv:2010.15814v1 [cs.DS]) Err codemadness.org 70 i 6274 http://fr.arxiv.org/abs/2010.15814 Err codemadness.org 70 i 6275 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1">Guillaume Ducoffe</a></p> Err codemadness.org 70 i 6276 Err codemadness.org 70 i 6277 <p>A graph algorithm is truly subquadratic if it runs in ${\cal O}(m^b)$ time on Err codemadness.org 70 i 6278 connected $m$-edge graphs, for some positive $b &lt; 2$. Roditty and Vassilevska Err codemadness.org 70 i 6279 Williams (STOC'13) proved that under plausible complexity assumptions, there is Err codemadness.org 70 i 6280 no truly subquadratic algorithm for computing the diameter of general graphs. Err codemadness.org 70 i 6281 In this work, we present positive and negative results on the existence of such Err codemadness.org 70 i 6282 algorithms for computing the diameter on some special graph classes. Err codemadness.org 70 i 6283 Specifically, three vertices in a graph form an asteroidal triple (AT) if Err codemadness.org 70 i 6284 between any two of them there exists a path that avoids the closed Err codemadness.org 70 i 6285 neighbourhood of the third one. We call a graph AT-free if it does not contain Err codemadness.org 70 i 6286 an AT. We first prove that for all $m$-edge AT-free graphs, one can compute all Err codemadness.org 70 i 6287 the eccentricities in truly subquadratic ${\cal O}(m^{3/2})$ time. Then, we Err codemadness.org 70 i 6288 extend our study to several subclasses of chordal graphs -- all of them Err codemadness.org 70 i 6289 generalizing interval graphs in various ways --, as an attempt to understand Err codemadness.org 70 i 6290 which of the properties of AT-free graphs, or natural generalizations of the Err codemadness.org 70 i 6291 latter, can help in the design of fast algorithms for the diameter problem on Err codemadness.org 70 i 6292 broader graph classes. For instance, for all chordal graphs with a dominating Err codemadness.org 70 i 6293 shortest path, there is a linear-time algorithm for computing a diametral pair Err codemadness.org 70 i 6294 if the diameter is at least four. However, already for split graphs with a Err codemadness.org 70 i 6295 dominating edge, under plausible complexity assumptions, there is no truly Err codemadness.org 70 i 6296 subquadratic algorithm for deciding whether the diameter is either $2$ or $3$. Err codemadness.org 70 i 6297 </p> Err codemadness.org 70 i 6298 Err codemadness.org 70 i 6299 Err codemadness.org 70 i 6300 Err codemadness.org 70 i 6301 Tensor Completion via Tensor Networks with a Tucker Wrapper. (arXiv:2010.15819v1 [stat.ML]) Err codemadness.org 70 i 6302 http://fr.arxiv.org/abs/2010.15819 Err codemadness.org 70 i 6303 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Cai_Y/0/1/0/all/0/1">Yunfeng Cai</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Li_P/0/1/0/all/0/1">Ping Li</a></p> Err codemadness.org 70 i 6304 Err codemadness.org 70 i 6305 <p>In recent years, low-rank tensor completion (LRTC) has received considerable Err codemadness.org 70 i 6306 attention due to its applications in image/video inpainting, hyperspectral data Err codemadness.org 70 i 6307 recovery, etc. With different notions of tensor rank (e.g., CP, Tucker, tensor Err codemadness.org 70 i 6308 train/ring, etc.), various optimization based numerical methods are proposed to Err codemadness.org 70 i 6309 LRTC. However, tensor network based methods have not been proposed yet. In this Err codemadness.org 70 i 6310 paper, we propose to solve LRTC via tensor networks with a Tucker wrapper. Here Err codemadness.org 70 i 6311 by "Tucker wrapper" we mean that the outermost factor matrices of the tensor Err codemadness.org 70 i 6312 network are all orthonormal. We formulate LRTC as a problem of solving a system Err codemadness.org 70 i 6313 of nonlinear equations, rather than a constrained optimization problem. A Err codemadness.org 70 i 6314 two-level alternative least square method is then employed to update the Err codemadness.org 70 i 6315 unknown factors. The computation of the method is dominated by tensor matrix Err codemadness.org 70 i 6316 multiplications and can be efficiently performed. Also, under proper Err codemadness.org 70 i 6317 assumptions, it is shown that with high probability, the method converges to Err codemadness.org 70 i 6318 the exact solution at a linear rate. Numerical simulations show that the Err codemadness.org 70 i 6319 proposed algorithm is comparable with state-of-the-art methods. Err codemadness.org 70 i 6320 </p> Err codemadness.org 70 i 6321 Err codemadness.org 70 i 6322 Err codemadness.org 70 i 6323 Err codemadness.org 70 i 6324 Down the bot hole: actionable insights from a 1-year analysis of bots activity on Twitter. (arXiv:2010.15820v1 [cs.SI]) Err codemadness.org 70 i 6325 http://fr.arxiv.org/abs/2010.15820 Err codemadness.org 70 i 6326 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Luceri_L/0/1/0/all/0/1">Luca Luceri</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cardoso_F/0/1/0/all/0/1">Felipe Cardoso</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Giordano_S/0/1/0/all/0/1">Silvia Giordano</a></p> Err codemadness.org 70 i 6327 Err codemadness.org 70 i 6328 <p>Nowadays, social media represent persuasive tools that have been Err codemadness.org 70 i 6329 progressively weaponized to affect people's beliefs, spread manipulative Err codemadness.org 70 i 6330 narratives, and sow conflicts along divergent factions. Software-controlled Err codemadness.org 70 i 6331 accounts (i.e., bots) are one of the main actors associated with manipulation Err codemadness.org 70 i 6332 campaigns, especially in the political context. Uncovering the strategies Err codemadness.org 70 i 6333 behind bots' activities is of paramount importance to detect and curb such Err codemadness.org 70 i 6334 campaigns. In this paper, we present a long term (one year) analysis of bots Err codemadness.org 70 i 6335 activity on Twitter in the run-up to the 2018 U.S. Midterm Elections. We Err codemadness.org 70 i 6336 identify different classes of accounts based on their nature (bot vs. human) Err codemadness.org 70 i 6337 and engagement within the online discussion and we observe that hyperactive Err codemadness.org 70 i 6338 bots played a pivotal role in the dissemination of conspiratorial narratives, Err codemadness.org 70 i 6339 while dominating the political debate since the year before the election. Our Err codemadness.org 70 i 6340 analysis, on the horizon of the upcoming U.S. 2020 Presidential Election, Err codemadness.org 70 i 6341 reveals both alarming findings of humans' susceptibility to bots and actionable Err codemadness.org 70 i 6342 insights that can contribute to curbing coordinated campaigns. Err codemadness.org 70 i 6343 </p> Err codemadness.org 70 i 6344 Err codemadness.org 70 i 6345 Err codemadness.org 70 i 6346 Err codemadness.org 70 i 6347 Cream of the Crop: Distilling Prioritized Paths For One-Shot Neural Architecture Search. (arXiv:2010.15821v1 [cs.CV]) Err codemadness.org 70 i 6348 http://fr.arxiv.org/abs/2010.15821 Err codemadness.org 70 i 6349 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Peng_H/0/1/0/all/0/1">Houwen Peng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Du_H/0/1/0/all/0/1">Hao Du</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yu_H/0/1/0/all/0/1">Hongyuan Yu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1">Qi Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liao_J/0/1/0/all/0/1">Jing Liao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fu_J/0/1/0/all/0/1">Jianlong Fu</a></p> Err codemadness.org 70 i 6350 Err codemadness.org 70 i 6351 <p>One-shot weight sharing methods have recently drawn great attention in neural Err codemadness.org 70 i 6352 architecture search due to high efficiency and competitive performance. Err codemadness.org 70 i 6353 However, weight sharing across models has an inherent deficiency, i.e., Err codemadness.org 70 i 6354 insufficient training of subnetworks in the hypernetwork. To alleviate this Err codemadness.org 70 i 6355 problem, we present a simple yet effective architecture distillation method. Err codemadness.org 70 i 6356 The central idea is that subnetworks can learn collaboratively and teach each Err codemadness.org 70 i 6357 other throughout the training process, aiming to boost the convergence of Err codemadness.org 70 i 6358 individual models. We introduce the concept of prioritized path, which refers Err codemadness.org 70 i 6359 to the architecture candidates exhibiting superior performance during training. Err codemadness.org 70 i 6360 Distilling knowledge from the prioritized paths is able to boost the training Err codemadness.org 70 i 6361 of subnetworks. Since the prioritized paths are changed on the fly depending on Err codemadness.org 70 i 6362 their performance and complexity, the final obtained paths are the cream of the Err codemadness.org 70 i 6363 crop. We directly select the most promising one from the prioritized paths as Err codemadness.org 70 i 6364 the final architecture, without using other complex search methods, such as Err codemadness.org 70 i 6365 reinforcement learning or evolution algorithms. The experiments on ImageNet Err codemadness.org 70 i 6366 verify such path distillation method can improve the convergence ratio and Err codemadness.org 70 i 6367 performance of the hypernetwork, as well as boosting the training of Err codemadness.org 70 i 6368 subnetworks. The discovered architectures achieve superior performance compared Err codemadness.org 70 i 6369 to the recent MobileNetV3 and EfficientNet families under aligned settings. Err codemadness.org 70 i 6370 Moreover, the experiments on object detection and more challenging search space Err codemadness.org 70 i 6371 show the generality and robustness of the proposed method. Code and models are Err codemadness.org 70 i 6372 available at https://github.com/microsoft/cream.git. Err codemadness.org 70 i 6373 </p> Err codemadness.org 70 i 6374 Err codemadness.org 70 i 6375 Err codemadness.org 70 i 6376 Err codemadness.org 70 i 6377 Black-Box Optimization of Object Detector Scales. (arXiv:2010.15823v1 [cs.CV]) Err codemadness.org 70 i 6378 http://fr.arxiv.org/abs/2010.15823 Err codemadness.org 70 i 6379 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Muthuraja_M/0/1/0/all/0/1">Mohandass Muthuraja</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Arriaga_O/0/1/0/all/0/1">Octavio Arriaga</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ploger_P/0/1/0/all/0/1">Paul Pl&#xf6;ger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kirchner_F/0/1/0/all/0/1">Frank Kirchner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Valdenegro_Toro_M/0/1/0/all/0/1">Matias Valdenegro-Toro</a></p> Err codemadness.org 70 i 6380 Err codemadness.org 70 i 6381 <p>Object detectors have improved considerably in the last years by using Err codemadness.org 70 i 6382 advanced CNN architectures. However, many detector hyper-parameters are Err codemadness.org 70 i 6383 generally manually tuned, or they are used with values set by the detector Err codemadness.org 70 i 6384 authors. Automatic Hyper-parameter optimization has not been explored in Err codemadness.org 70 i 6385 improving CNN-based object detectors hyper-parameters. In this work, we propose Err codemadness.org 70 i 6386 the use of Black-box optimization methods to tune the prior/default box scales Err codemadness.org 70 i 6387 in Faster R-CNN and SSD, using Bayesian Optimization, SMAC, and CMA-ES. We show Err codemadness.org 70 i 6388 that by tuning the input image size and prior box anchor scale on Faster R-CNN Err codemadness.org 70 i 6389 mAP increases by 2% on PASCAL VOC 2007, and by 3% with SSD. On the COCO dataset Err codemadness.org 70 i 6390 with SSD there are mAP improvement in the medium and large objects, but mAP Err codemadness.org 70 i 6391 decreases by 1% in small objects. We also perform a regression analysis to find Err codemadness.org 70 i 6392 the significant hyper-parameters to tune. Err codemadness.org 70 i 6393 </p> Err codemadness.org 70 i 6394 Err codemadness.org 70 i 6395 Err codemadness.org 70 i 6396 Err codemadness.org 70 i 6397 Passport-aware Normalization for Deep Model Protection. (arXiv:2010.15824v1 [cs.CV]) Err codemadness.org 70 i 6398 http://fr.arxiv.org/abs/2010.15824 Err codemadness.org 70 i 6399 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jie Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_D/0/1/0/all/0/1">Dongdong Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liao_J/0/1/0/all/0/1">Jing Liao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_W/0/1/0/all/0/1">Weiming Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hua_G/0/1/0/all/0/1">Gang Hua</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yu_N/0/1/0/all/0/1">Nenghai Yu</a></p> Err codemadness.org 70 i 6400 Err codemadness.org 70 i 6401 <p>Despite tremendous success in many application scenarios, deep learning faces Err codemadness.org 70 i 6402 serious intellectual property (IP) infringement threats. Considering the cost Err codemadness.org 70 i 6403 of designing and training a good model, infringements will significantly Err codemadness.org 70 i 6404 infringe the interests of the original model owner. Recently, many impressive Err codemadness.org 70 i 6405 works have emerged for deep model IP protection. However, they either are Err codemadness.org 70 i 6406 vulnerable to ambiguity attacks, or require changes in the target network Err codemadness.org 70 i 6407 structure by replacing its original normalization layers and hence cause Err codemadness.org 70 i 6408 significant performance drops. To this end, we propose a new passport-aware Err codemadness.org 70 i 6409 normalization formulation, which is generally applicable to most existing Err codemadness.org 70 i 6410 normalization layers and only needs to add another passport-aware branch for IP Err codemadness.org 70 i 6411 protection. This new branch is jointly trained with the target model but Err codemadness.org 70 i 6412 discarded in the inference stage. Therefore it causes no structure change in Err codemadness.org 70 i 6413 the target model. Only when the model IP is suspected to be stolen by someone, Err codemadness.org 70 i 6414 the private passport-aware branch is added back for ownership verification. Err codemadness.org 70 i 6415 Through extensive experiments, we verify its effectiveness in both image and 3D Err codemadness.org 70 i 6416 point recognition models. It is demonstrated to be robust not only to common Err codemadness.org 70 i 6417 attack techniques like fine-tuning and model compression, but also to ambiguity Err codemadness.org 70 i 6418 attacks. By further combining it with trigger-set based methods, both black-box Err codemadness.org 70 i 6419 and white-box verification can be achieved for enhanced security of deep Err codemadness.org 70 i 6420 learning models deployed in real systems. Code can be found at Err codemadness.org 70 i 6421 https://github.com/ZJZAC/Passport-aware-Normalization. Err codemadness.org 70 i 6422 </p> Err codemadness.org 70 i 6423 Err codemadness.org 70 i 6424 Err codemadness.org 70 i 6425 Err codemadness.org 70 i 6426 RelationNet++: Bridging Visual Representations for Object Detection via Transformer Decoder. (arXiv:2010.15831v1 [cs.CV]) Err codemadness.org 70 i 6427 http://fr.arxiv.org/abs/2010.15831 Err codemadness.org 70 i 6428 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chi_C/0/1/0/all/0/1">Cheng Chi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_F/0/1/0/all/0/1">Fangyun Wei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hu_H/0/1/0/all/0/1">Han Hu</a></p> Err codemadness.org 70 i 6429 Err codemadness.org 70 i 6430 <p>Existing object detection frameworks are usually built on a single format of Err codemadness.org 70 i 6431 object/part representation, i.e., anchor/proposal rectangle boxes in RetinaNet Err codemadness.org 70 i 6432 and Faster R-CNN, center points in FCOS and RepPoints, and corner points in Err codemadness.org 70 i 6433 CornerNet. While these different representations usually drive the frameworks Err codemadness.org 70 i 6434 to perform well in different aspects, e.g., better classification or finer Err codemadness.org 70 i 6435 localization, it is in general difficult to combine these representations in a Err codemadness.org 70 i 6436 single framework to make good use of each strength, due to the heterogeneous or Err codemadness.org 70 i 6437 non-grid feature extraction by different representations. This paper presents Err codemadness.org 70 i 6438 an attention-based decoder module similar as that in Err codemadness.org 70 i 6439 Transformer~\cite{vaswani2017attention} to bridge other representations into a Err codemadness.org 70 i 6440 typical object detector built on a single representation format, in an Err codemadness.org 70 i 6441 end-to-end fashion. The other representations act as a set of \emph{key} Err codemadness.org 70 i 6442 instances to strengthen the main \emph{query} representation features in the Err codemadness.org 70 i 6443 vanilla detectors. Novel techniques are proposed towards efficient computation Err codemadness.org 70 i 6444 of the decoder module, including a \emph{key sampling} approach and a Err codemadness.org 70 i 6445 \emph{shared location embedding} approach. The proposed module is named Err codemadness.org 70 i 6446 \emph{bridging visual representations} (BVR). It can perform in-place and we Err codemadness.org 70 i 6447 demonstrate its broad effectiveness in bridging other representations into Err codemadness.org 70 i 6448 prevalent object detection frameworks, including RetinaNet, Faster R-CNN, FCOS Err codemadness.org 70 i 6449 and ATSS, where about $1.5\sim3.0$ AP improvements are achieved. In particular, Err codemadness.org 70 i 6450 we improve a state-of-the-art framework with a strong backbone by about $2.0$ Err codemadness.org 70 i 6451 AP, reaching $52.7$ AP on COCO test-dev. The resulting network is named Err codemadness.org 70 i 6452 RelationNet++. The code will be available at Err codemadness.org 70 i 6453 https://github.com/microsoft/RelationNet2. Err codemadness.org 70 i 6454 </p> Err codemadness.org 70 i 6455 Err codemadness.org 70 i 6456 Err codemadness.org 70 i 6457 Err codemadness.org 70 i 6458 Proceedings 9th International Workshop on Theorem Proving Components for Educational Software. (arXiv:2010.15832v1 [cs.AI]) Err codemadness.org 70 i 6459 http://fr.arxiv.org/abs/2010.15832 Err codemadness.org 70 i 6460 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Quaresma_P/0/1/0/all/0/1">Pedro Quaresma</a> (University of Coimbra, Portugal), <a href="http://fr.arxiv.org/find/cs/1/au:+Neuper_W/0/1/0/all/0/1">Walther Neuper</a> (JKU Johannes Kepler University, Linz, Austria), <a href="http://fr.arxiv.org/find/cs/1/au:+Marcos_J/0/1/0/all/0/1">Jo&#xe3;o Marcos</a> (UFRN, Brazil)</p> Err codemadness.org 70 i 6461 Err codemadness.org 70 i 6462 <p>The 9th International Workshop on Theorem-Proving Components for Educational Err codemadness.org 70 i 6463 Software (ThEdu'20) was scheduled to happen on June 29 as a satellite of the Err codemadness.org 70 i 6464 IJCAR-FSCD 2020 joint meeting, in Paris. The COVID-19 pandemic came by Err codemadness.org 70 i 6465 surprise, though, and the main conference was virtualised. Fearing that an Err codemadness.org 70 i 6466 online meeting would not allow our community to fully reproduce the usual Err codemadness.org 70 i 6467 face-to-face networking opportunities of the ThEdu initiative, the Steering Err codemadness.org 70 i 6468 Committee of ThEdu decided to cancel our workshop. Given that many of us had Err codemadness.org 70 i 6469 already planned and worked for that moment, we decided that ThEdu'20 could Err codemadness.org 70 i 6470 still live in the form of an EPTCS volume. The EPTCS concurred with us, Err codemadness.org 70 i 6471 recognising this very singular situation, and accepted our proposal of Err codemadness.org 70 i 6472 organising a special issue with papers submitted to ThEdu'20. An open call for Err codemadness.org 70 i 6473 papers was then issued, and attracted five submissions, all of which have been Err codemadness.org 70 i 6474 accepted by our reviewers, who produced three careful reports on each of the Err codemadness.org 70 i 6475 contributions. The resulting revised papers are collected in the present Err codemadness.org 70 i 6476 volume. We, the volume editors, hope that this collection of papers will help Err codemadness.org 70 i 6477 further promoting the development of theorem-proving-based software, and that Err codemadness.org 70 i 6478 it will collaborate to improve the mutual understanding between computer Err codemadness.org 70 i 6479 mathematicians and stakeholders in education. With some luck, we would actually Err codemadness.org 70 i 6480 expect that the very special circumstances set up by the worst sanitary crisis Err codemadness.org 70 i 6481 in a century will happen to reinforce the need for the application of certified Err codemadness.org 70 i 6482 components and of verification methods for the production of educational Err codemadness.org 70 i 6483 software that would be available even when the traditional on-site learning Err codemadness.org 70 i 6484 experiences turn out not to be recommendable. Err codemadness.org 70 i 6485 </p> Err codemadness.org 70 i 6486 Err codemadness.org 70 i 6487 Err codemadness.org 70 i 6488 Err codemadness.org 70 i 6489 Property Checking Without Invariant Generation. (arXiv:1602.05829v3 [cs.LO] UPDATED) Err codemadness.org 70 i 6490 http://fr.arxiv.org/abs/1602.05829 Err codemadness.org 70 i 6491 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Goldberg_E/0/1/0/all/0/1">Eugene Goldberg</a></p> Err codemadness.org 70 i 6492 Err codemadness.org 70 i 6493 <p>We introduce a procedure for proving safety properties. This procedure is Err codemadness.org 70 i 6494 based on a technique called Partial Quantifier Elimination (PQE). In contrast Err codemadness.org 70 i 6495 to complete quantifier elimination, in PQE, only a part of the formula is taken Err codemadness.org 70 i 6496 out of the scope of quantifiers. So, PQE can be dramatically more efficient Err codemadness.org 70 i 6497 than complete quantifier elimination. The appeal of our procedure is twofold. Err codemadness.org 70 i 6498 First, it can prove a property without generating an inductive invariant. Err codemadness.org 70 i 6499 Second, it employs depth-first search and so can be used to find deep bugs. Err codemadness.org 70 i 6500 </p> Err codemadness.org 70 i 6501 Err codemadness.org 70 i 6502 Err codemadness.org 70 i 6503 Err codemadness.org 70 i 6504 Minimax Rate-Optimal Estimation of Divergences between Discrete Distributions. (arXiv:1605.09124v4 [cs.IT] UPDATED) Err codemadness.org 70 i 6505 http://fr.arxiv.org/abs/1605.09124 Err codemadness.org 70 i 6506 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Han_Y/0/1/0/all/0/1">Yanjun Han</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jiao_J/0/1/0/all/0/1">Jiantao Jiao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Weissman_T/0/1/0/all/0/1">Tsachy Weissman</a></p> Err codemadness.org 70 i 6507 Err codemadness.org 70 i 6508 <p>We study the minimax estimation of $\alpha$-divergences between discrete Err codemadness.org 70 i 6509 distributions for integer $\alpha\ge 1$, which include the Kullback--Leibler Err codemadness.org 70 i 6510 divergence and the $\chi^2$-divergences as special examples. Dropping the usual Err codemadness.org 70 i 6511 theoretical tricks to acquire independence, we construct the first minimax Err codemadness.org 70 i 6512 rate-optimal estimator which does not require any Poissonization, sample Err codemadness.org 70 i 6513 splitting, or explicit construction of approximating polynomials. The estimator Err codemadness.org 70 i 6514 uses a hybrid approach which solves a problem-independent linear program based Err codemadness.org 70 i 6515 on moment matching in the non-smooth regime, and applies a problem-dependent Err codemadness.org 70 i 6516 bias-corrected plug-in estimator in the smooth regime, with a soft decision Err codemadness.org 70 i 6517 boundary between these regimes. Err codemadness.org 70 i 6518 </p> Err codemadness.org 70 i 6519 Err codemadness.org 70 i 6520 Err codemadness.org 70 i 6521 Err codemadness.org 70 i 6522 Sequence Graph Transform (SGT): A Feature Embedding Function for Sequence Data Mining. (arXiv:1608.03533v13 [stat.ML] UPDATED) Err codemadness.org 70 i 6523 http://fr.arxiv.org/abs/1608.03533 Err codemadness.org 70 i 6524 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Ranjan_C/0/1/0/all/0/1">Chitta Ranjan</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Ebrahimi_S/0/1/0/all/0/1">Samaneh Ebrahimi</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Paynabar_K/0/1/0/all/0/1">Kamran Paynabar</a></p> Err codemadness.org 70 i 6525 Err codemadness.org 70 i 6526 <p>Sequence feature embedding is a challenging task due to un-structuredness of Err codemadness.org 70 i 6527 sequences -- arbitrary strings of arbitrary length. Existing methods are Err codemadness.org 70 i 6528 efficient in extracting short-term dependencies but typically suffer from Err codemadness.org 70 i 6529 computation issues for the long-term. Sequence Graph Transform (SGT), a feature Err codemadness.org 70 i 6530 embedding function, that can extract any amount of short- to long- term Err codemadness.org 70 i 6531 dependencies without increasing the computation -- proved theoretically -- is Err codemadness.org 70 i 6532 proposed. SGT features yield significantly superior results in sequence Err codemadness.org 70 i 6533 clustering and classification with higher accuracy and lower computation as Err codemadness.org 70 i 6534 compared to the existing methods, including the state-of-the-art Err codemadness.org 70 i 6535 sequence/string Kernels and LSTM. Err codemadness.org 70 i 6536 </p> Err codemadness.org 70 i 6537 Err codemadness.org 70 i 6538 Err codemadness.org 70 i 6539 Err codemadness.org 70 i 6540 Time-Space Trade-Offs for Computing Euclidean Minimum Spanning Trees. (arXiv:1712.06431v3 [cs.CG] UPDATED) Err codemadness.org 70 i 6541 http://fr.arxiv.org/abs/1712.06431 Err codemadness.org 70 i 6542 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Banyassady_B/0/1/0/all/0/1">Bahareh Banyassady</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Barba_L/0/1/0/all/0/1">Luis Barba</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mulzer_W/0/1/0/all/0/1">Wolfgang Mulzer</a></p> Err codemadness.org 70 i 6543 Err codemadness.org 70 i 6544 <p>We present time-space trade-offs for computing the Euclidean minimum spanning Err codemadness.org 70 i 6545 tree of a set $S$ of $n$ point-sites in the plane. More precisely, we assume Err codemadness.org 70 i 6546 that $S$ resides in a random-access memory that can only be read. The edges of Err codemadness.org 70 i 6547 the Euclidean minimum spanning tree $\text{EMST}(S)$ have to be reported Err codemadness.org 70 i 6548 sequentially, and they cannot be accessed or modified afterwards. There is a Err codemadness.org 70 i 6549 parameter $s \in \{1, \dots, n\}$ so that the algorithm may use $O(s)$ cells of Err codemadness.org 70 i 6550 read-write memory (called the workspace) for its computations. Our goal is to Err codemadness.org 70 i 6551 find an algorithm that has the best possible running time for any given $s$ Err codemadness.org 70 i 6552 between $1$ and $n$. Err codemadness.org 70 i 6553 </p> Err codemadness.org 70 i 6554 <p>We show how to compute $\text{EMST}(S)$ in $O\big((n^3/s^2)\log s \big)$ time Err codemadness.org 70 i 6555 with $O(s)$ cells of workspace, giving a smooth trade-off between the two best Err codemadness.org 70 i 6556 known bounds $O(n^3)$ for $s = 1$ and $O(n \log n)$ for $s = n$. For this, we Err codemadness.org 70 i 6557 run Kruskal's algorithm on the relative neighborhood graph (RNG) of $S$. It is Err codemadness.org 70 i 6558 a classic fact that the minimum spanning tree of $\text{RNG}(S)$ is exactly Err codemadness.org 70 i 6559 $\text{EMST}(S)$. To implement Kruskal's algorithm with $O(s)$ cells of Err codemadness.org 70 i 6560 workspace, we define $s$-nets, a compact representation of planar graphs. This Err codemadness.org 70 i 6561 allows us to efficiently maintain and update the components of the current Err codemadness.org 70 i 6562 minimum spanning forest as the edges are being inserted. Err codemadness.org 70 i 6563 </p> Err codemadness.org 70 i 6564 Err codemadness.org 70 i 6565 Err codemadness.org 70 i 6566 Err codemadness.org 70 i 6567 Type-two polynomial-time and restricted lookahead. (arXiv:1801.07485v2 [cs.CC] UPDATED) Err codemadness.org 70 i 6568 http://fr.arxiv.org/abs/1801.07485 Err codemadness.org 70 i 6569 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kapron_B/0/1/0/all/0/1">Bruce M. Kapron</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Steinberg_F/0/1/0/all/0/1">Florian Steinberg</a></p> Err codemadness.org 70 i 6570 Err codemadness.org 70 i 6571 <p>This paper provides an alternate characterization of type-two polynomial-time Err codemadness.org 70 i 6572 computability, with the goal of making second-order complexity theory more Err codemadness.org 70 i 6573 approachable. We rely on the usual oracle machines to model programs with Err codemadness.org 70 i 6574 subroutine calls. In contrast to previous results, the use of higher-order Err codemadness.org 70 i 6575 objects as running times is avoided, either explicitly or implicitly. Instead, Err codemadness.org 70 i 6576 regular polynomials are used. This is achieved by refining the notion of Err codemadness.org 70 i 6577 oracle-polynomial-time introduced by Cook. We impose a further restriction on Err codemadness.org 70 i 6578 the oracle interactions to force feasibility. Both the restriction as well as Err codemadness.org 70 i 6579 its purpose are very simple: it is well-known that Cook's model allows Err codemadness.org 70 i 6580 polynomial depth iteration of functional inputs with no restrictions on size, Err codemadness.org 70 i 6581 and thus does not guarantee that polynomial-time computability is preserved. To Err codemadness.org 70 i 6582 mend this we restrict the number of lookahead revisions, that is the number of Err codemadness.org 70 i 6583 times a query can be asked that is bigger than any of the previous queries. We Err codemadness.org 70 i 6584 prove that this leads to a class of feasible functionals and that all feasible Err codemadness.org 70 i 6585 problems can be solved within this class if one is allowed to separate a task Err codemadness.org 70 i 6586 into efficiently solvable subtasks. Formally put: the closure of our class Err codemadness.org 70 i 6587 under lambda-abstraction and application includes all feasible operations. We Err codemadness.org 70 i 6588 also revisit the very similar class of strongly polynomial-time computable Err codemadness.org 70 i 6589 operators previously introduced by Kawamura and Steinberg. We prove it to be Err codemadness.org 70 i 6590 strictly included in our class and, somewhat surprisingly, to have the same Err codemadness.org 70 i 6591 closure property. This can be attributed to properties of the limited recursion Err codemadness.org 70 i 6592 operator: It is not strongly polynomial-time computable but decomposes into two Err codemadness.org 70 i 6593 such operations and lies in our class. Err codemadness.org 70 i 6594 </p> Err codemadness.org 70 i 6595 Err codemadness.org 70 i 6596 Err codemadness.org 70 i 6597 Err codemadness.org 70 i 6598 Comparing Type Systems for Deadlock Freedom. (arXiv:1810.00635v3 [cs.LO] UPDATED) Err codemadness.org 70 i 6599 http://fr.arxiv.org/abs/1810.00635 Err codemadness.org 70 i 6600 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dardha_O/0/1/0/all/0/1">Ornela Dardha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Perez_J/0/1/0/all/0/1">Jorge A. P&#xe9;rez</a></p> Err codemadness.org 70 i 6601 Err codemadness.org 70 i 6602 <p>Message-passing software systems exhibit non-trivial forms of concurrency and Err codemadness.org 70 i 6603 distribution; they are expected to follow intended protocols among Err codemadness.org 70 i 6604 communicating services, but also to never "get stuck". This intuitive Err codemadness.org 70 i 6605 requirement has been expressed by liveness properties such as progress or Err codemadness.org 70 i 6606 (dead)lock freedom and various type systems ensure these properties for Err codemadness.org 70 i 6607 concurrent processes. Unfortunately, very little is known about the precise Err codemadness.org 70 i 6608 relationship between these type systems and the classes of typed processes they Err codemadness.org 70 i 6609 induce. Err codemadness.org 70 i 6610 </p> Err codemadness.org 70 i 6611 <p>This paper puts forward the first comparative study of different type systems Err codemadness.org 70 i 6612 for message-passing processes that guarantee deadlock freedom. We compare two Err codemadness.org 70 i 6613 classes of deadlock-free typed processes, here denoted L and K. The class L Err codemadness.org 70 i 6614 stands out for its canonicity: it results from Curry-Howard interpretations of Err codemadness.org 70 i 6615 linear logic propositions as session types. The class K, obtained by encoding Err codemadness.org 70 i 6616 session types into Kobayashi's linear types with usages, includes processes not Err codemadness.org 70 i 6617 typable in other type systems. We show that L is strictly included in K, and Err codemadness.org 70 i 6618 identify the precise conditions under which they coincide. We also provide two Err codemadness.org 70 i 6619 type-preserving translations of processes in K into processes in L. Err codemadness.org 70 i 6620 </p> Err codemadness.org 70 i 6621 Err codemadness.org 70 i 6622 Err codemadness.org 70 i 6623 Err codemadness.org 70 i 6624 AADS: Augmented Autonomous Driving Simulation using Data-driven Algorithms. (arXiv:1901.07849v3 [cs.CV] UPDATED) Err codemadness.org 70 i 6625 http://fr.arxiv.org/abs/1901.07849 Err codemadness.org 70 i 6626 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1">Wei Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pan_C/0/1/0/all/0/1">Chengwei Pan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_R/0/1/0/all/0/1">Rong Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ren_J/0/1/0/all/0/1">Jiaping Ren</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ma_Y/0/1/0/all/0/1">Yuexin Ma</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fang_J/0/1/0/all/0/1">Jin Fang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yan_F/0/1/0/all/0/1">Feilong Yan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Geng_Q/0/1/0/all/0/1">Qichuan Geng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Huang_X/0/1/0/all/0/1">Xinyu Huang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gong_H/0/1/0/all/0/1">Huajun Gong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xu_W/0/1/0/all/0/1">Weiwei Xu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_G/0/1/0/all/0/1">Guoping Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Manocha_D/0/1/0/all/0/1">Dinesh Manocha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_R/0/1/0/all/0/1">Ruigang Yang</a></p> Err codemadness.org 70 i 6627 Err codemadness.org 70 i 6628 <p>Simulation systems have become an essential component in the development and Err codemadness.org 70 i 6629 validation of autonomous driving technologies. The prevailing state-of-the-art Err codemadness.org 70 i 6630 approach for simulation is to use game engines or high-fidelity computer Err codemadness.org 70 i 6631 graphics (CG) models to create driving scenarios. However, creating CG models Err codemadness.org 70 i 6632 and vehicle movements (e.g., the assets for simulation) remains a manual task Err codemadness.org 70 i 6633 that can be costly and time-consuming. In addition, the fidelity of CG images Err codemadness.org 70 i 6634 still lacks the richness and authenticity of real-world images and using these Err codemadness.org 70 i 6635 images for training leads to degraded performance. Err codemadness.org 70 i 6636 </p> Err codemadness.org 70 i 6637 <p>In this paper we present a novel approach to address these issues: Augmented Err codemadness.org 70 i 6638 Autonomous Driving Simulation (AADS). Our formulation augments real-world Err codemadness.org 70 i 6639 pictures with a simulated traffic flow to create photo-realistic simulation Err codemadness.org 70 i 6640 images and renderings. More specifically, we use LiDAR and cameras to scan Err codemadness.org 70 i 6641 street scenes. From the acquired trajectory data, we generate highly plausible Err codemadness.org 70 i 6642 traffic flows for cars and pedestrians and compose them into the background. Err codemadness.org 70 i 6643 The composite images can be re-synthesized with different viewpoints and sensor Err codemadness.org 70 i 6644 models. The resulting images are photo-realistic, fully annotated, and ready Err codemadness.org 70 i 6645 for end-to-end training and testing of autonomous driving systems from Err codemadness.org 70 i 6646 perception to planning. We explain our system design and validate our Err codemadness.org 70 i 6647 algorithms with a number of autonomous driving tasks from detection to Err codemadness.org 70 i 6648 segmentation and predictions. Err codemadness.org 70 i 6649 </p> Err codemadness.org 70 i 6650 <p>Compared to traditional approaches, our method offers unmatched scalability Err codemadness.org 70 i 6651 and realism. Scalability is particularly important for AD simulation and we Err codemadness.org 70 i 6652 believe the complexity and diversity of the real world cannot be realistically Err codemadness.org 70 i 6653 captured in a virtual environment. Our augmented approach combines the Err codemadness.org 70 i 6654 flexibility in a virtual environment (e.g., vehicle movements) with the Err codemadness.org 70 i 6655 richness of the real world to allow effective simulation of anywhere on earth. Err codemadness.org 70 i 6656 </p> Err codemadness.org 70 i 6657 Err codemadness.org 70 i 6658 Err codemadness.org 70 i 6659 Err codemadness.org 70 i 6660 Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. (arXiv:1902.06626v5 [cs.CR] UPDATED) Err codemadness.org 70 i 6661 http://fr.arxiv.org/abs/1902.06626 Err codemadness.org 70 i 6662 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rahman_M/0/1/0/all/0/1">Mohammad Saidur Rahman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Imani_M/0/1/0/all/0/1">Mohsen Imani</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mathews_N/0/1/0/all/0/1">Nate Mathews</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wright_M/0/1/0/all/0/1">Matthew Wright</a></p> Err codemadness.org 70 i 6663 Err codemadness.org 70 i 6664 <p>Website Fingerprinting (WF) is a type of traffic analysis attack that enables Err codemadness.org 70 i 6665 a local passive eavesdropper to infer the victim's activity, even when the Err codemadness.org 70 i 6666 traffic is protected by a VPN or an anonymity system like Tor. Leveraging a Err codemadness.org 70 i 6667 deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor Err codemadness.org 70 i 6668 traffic. In this paper, we explore a novel defense, Mockingbird, based on the Err codemadness.org 70 i 6669 idea of adversarial examples that have been shown to undermine machine-learning Err codemadness.org 70 i 6670 classifiers in other domains. Since the attacker gets to design and train his Err codemadness.org 70 i 6671 attack classifier based on the defense, we first demonstrate that at a Err codemadness.org 70 i 6672 straightforward technique for generating adversarial-example based traces fails Err codemadness.org 70 i 6673 to protect against an attacker using adversarial training for robust Err codemadness.org 70 i 6674 classification. We then propose Mockingbird, a technique for generating traces Err codemadness.org 70 i 6675 that resists adversarial training by moving randomly in the space of viable Err codemadness.org 70 i 6676 traces and not following more predictable gradients. The technique drops the Err codemadness.org 70 i 6677 accuracy of the state-of-the-art attack hardened with adversarial training from Err codemadness.org 70 i 6678 98% to 42-58% while incurring only 58% bandwidth overhead. The attack accuracy Err codemadness.org 70 i 6679 is generally lower than state-of-the-art defenses, and much lower when Err codemadness.org 70 i 6680 considering Top-2 accuracy, while incurring lower bandwidth overheads. Err codemadness.org 70 i 6681 </p> Err codemadness.org 70 i 6682 Err codemadness.org 70 i 6683 Err codemadness.org 70 i 6684 Err codemadness.org 70 i 6685 Global Optimality Guarantees For Policy Gradient Methods. (arXiv:1906.01786v2 [cs.LG] UPDATED) Err codemadness.org 70 i 6686 http://fr.arxiv.org/abs/1906.01786 Err codemadness.org 70 i 6687 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bhandari_J/0/1/0/all/0/1">Jalaj Bhandari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Russo_D/0/1/0/all/0/1">Daniel Russo</a></p> Err codemadness.org 70 i 6688 Err codemadness.org 70 i 6689 <p>Policy gradients methods apply to complex, poorly understood, control Err codemadness.org 70 i 6690 problems by performing stochastic gradient descent over a parameterized class Err codemadness.org 70 i 6691 of polices. Unfortunately, even for simple control problems solvable by Err codemadness.org 70 i 6692 standard dynamic programming techniques, policy gradient algorithms face Err codemadness.org 70 i 6693 non-convex optimization problems and are widely understood to converge only to Err codemadness.org 70 i 6694 a stationary point. This work identifies structural properties -- shared by Err codemadness.org 70 i 6695 several classic control problems -- that ensure the policy gradient objective Err codemadness.org 70 i 6696 function has no suboptimal stationary points despite being non-convex. When Err codemadness.org 70 i 6697 these conditions are strengthened, this objective satisfies a Err codemadness.org 70 i 6698 Polyak-lojasiewicz (gradient dominance) condition that yields convergence Err codemadness.org 70 i 6699 rates. We also provide bounds on the optimality gap of any stationary point Err codemadness.org 70 i 6700 when some of these conditions are relaxed. Err codemadness.org 70 i 6701 </p> Err codemadness.org 70 i 6702 Err codemadness.org 70 i 6703 Err codemadness.org 70 i 6704 Err codemadness.org 70 i 6705 ATRW: A Benchmark for Amur Tiger Re-identification in the Wild. (arXiv:1906.05586v4 [cs.CV] UPDATED) Err codemadness.org 70 i 6706 http://fr.arxiv.org/abs/1906.05586 Err codemadness.org 70 i 6707 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1">Shuyuan Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1">Jianguo Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tang_H/0/1/0/all/0/1">Hanlin Tang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Qian_R/0/1/0/all/0/1">Rui Qian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1">Weiyao Lin</a></p> Err codemadness.org 70 i 6708 Err codemadness.org 70 i 6709 <p>Monitoring the population and movements of endangered species is an important Err codemadness.org 70 i 6710 task to wildlife conversation. Traditional tagging methods do not scale to Err codemadness.org 70 i 6711 large populations, while applying computer vision methods to camera sensor data Err codemadness.org 70 i 6712 requires re-identification (re-ID) algorithms to obtain accurate counts and Err codemadness.org 70 i 6713 moving trajectory of wildlife. However, existing re-ID methods are largely Err codemadness.org 70 i 6714 targeted at persons and cars, which have limited pose variations and Err codemadness.org 70 i 6715 constrained capture environments. This paper tries to fill the gap by Err codemadness.org 70 i 6716 introducing a novel large-scale dataset, the Amur Tiger Re-identification in Err codemadness.org 70 i 6717 the Wild (ATRW) dataset. ATRW contains over 8,000 video clips from 92 Amur Err codemadness.org 70 i 6718 tigers, with bounding box, pose keypoint, and tiger identity annotations. In Err codemadness.org 70 i 6719 contrast to typical re-ID datasets, the tigers are captured in a diverse set of Err codemadness.org 70 i 6720 unconstrained poses and lighting conditions. We demonstrate with a set of Err codemadness.org 70 i 6721 baseline algorithms that ATRW is a challenging dataset for re-ID. Lastly, we Err codemadness.org 70 i 6722 propose a novel method for tiger re-identification, which introduces precise Err codemadness.org 70 i 6723 pose parts modeling in deep neural networks to handle large pose variation of Err codemadness.org 70 i 6724 tigers, and reaches notable performance improvement over existing re-ID Err codemadness.org 70 i 6725 methods. The dataset is public available at https://cvwc2019.github.io/ . Err codemadness.org 70 i 6726 </p> Err codemadness.org 70 i 6727 Err codemadness.org 70 i 6728 Err codemadness.org 70 i 6729 Err codemadness.org 70 i 6730 A Simple Local Minimal Intensity Prior and An Improved Algorithm for Blind Image Deblurring. (arXiv:1906.06642v5 [eess.IV] UPDATED) Err codemadness.org 70 i 6731 http://fr.arxiv.org/abs/1906.06642 Err codemadness.org 70 i 6732 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Wen_F/0/1/0/all/0/1">Fei Wen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ying_R/0/1/0/all/0/1">Rendong Ying</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Liu_Y/0/1/0/all/0/1">Yipeng Liu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Liu_P/0/1/0/all/0/1">Peilin Liu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Truong_T/0/1/0/all/0/1">Trieu-Kien Truong</a></p> Err codemadness.org 70 i 6733 Err codemadness.org 70 i 6734 <p>Blind image deblurring is a long standing challenging problem in image Err codemadness.org 70 i 6735 processing and low-level vision. Recently, sophisticated priors such as dark Err codemadness.org 70 i 6736 channel prior, extreme channel prior, and local maximum gradient prior, have Err codemadness.org 70 i 6737 shown promising effectiveness. However, these methods are computationally Err codemadness.org 70 i 6738 expensive. Meanwhile, since these priors involved subproblems cannot be solved Err codemadness.org 70 i 6739 explicitly, approximate solution is commonly used, which limits the best Err codemadness.org 70 i 6740 exploitation of their capability. To address these problems, this work firstly Err codemadness.org 70 i 6741 proposes a simplified sparsity prior of local minimal pixels, namely patch-wise Err codemadness.org 70 i 6742 minimal pixels (PMP). The PMP of clear images is much more sparse than that of Err codemadness.org 70 i 6743 blurred ones, and hence is very effective in discriminating between clear and Err codemadness.org 70 i 6744 blurred images. Then, a novel algorithm is designed to efficiently exploit the Err codemadness.org 70 i 6745 sparsity of PMP in deblurring. The new algorithm flexibly imposes sparsity Err codemadness.org 70 i 6746 inducing on the PMP under the MAP framework rather than directly uses the half Err codemadness.org 70 i 6747 quadratic splitting algorithm. By this, it avoids non-rigorous approximation Err codemadness.org 70 i 6748 solution in existing algorithms, while being much more computationally Err codemadness.org 70 i 6749 efficient. Extensive experiments demonstrate that the proposed algorithm can Err codemadness.org 70 i 6750 achieve better practical stability compared with state-of-the-arts. In terms of Err codemadness.org 70 i 6751 deblurring quality, robustness and computational efficiency, the new algorithm Err codemadness.org 70 i 6752 is superior to state-of-the-arts. Code for reproducing the results of the new Err codemadness.org 70 i 6753 method is available at https://github.com/FWen/deblur-pmp.git. Err codemadness.org 70 i 6754 </p> Err codemadness.org 70 i 6755 Err codemadness.org 70 i 6756 Err codemadness.org 70 i 6757 Err codemadness.org 70 i 6758 Multi-type Resource Allocation with Partial Preferences. (arXiv:1906.06836v3 [cs.AI] UPDATED) Err codemadness.org 70 i 6759 http://fr.arxiv.org/abs/1906.06836 Err codemadness.org 70 i 6760 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1">Haibin Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sikdar_S/0/1/0/all/0/1">Sujoy Sikdar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Guo_X/0/1/0/all/0/1">Xiaoxi Guo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xia_L/0/1/0/all/0/1">Lirong Xia</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cao_Y/0/1/0/all/0/1">Yongzhi Cao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1">Hanpin Wang</a></p> Err codemadness.org 70 i 6761 Err codemadness.org 70 i 6762 <p>We propose multi-type probabilistic serial (MPS) and multi-type random Err codemadness.org 70 i 6763 priority (MRP) as extensions of the well known PS and RP mechanisms to the Err codemadness.org 70 i 6764 multi-type resource allocation problem (MTRA) with partial preferences. In our Err codemadness.org 70 i 6765 setting, there are multiple types of divisible items, and a group of agents who Err codemadness.org 70 i 6766 have partial order preferences over bundles consisting of one item of each Err codemadness.org 70 i 6767 type. We show that for the unrestricted domain of partial order preferences, no Err codemadness.org 70 i 6768 mechanism satisfies both sd-efficiency and sd-envy-freeness. Notwithstanding Err codemadness.org 70 i 6769 this impossibility result, our main message is positive: When agents' Err codemadness.org 70 i 6770 preferences are represented by acyclic CP-nets, MPS satisfies sd-efficiency, Err codemadness.org 70 i 6771 sd-envy-freeness, ordinal fairness, and upper invariance, while MRP satisfies Err codemadness.org 70 i 6772 ex-post-efficiency, sd-strategy-proofness, and upper invariance, recovering the Err codemadness.org 70 i 6773 properties of PS and RP. Err codemadness.org 70 i 6774 </p> Err codemadness.org 70 i 6775 Err codemadness.org 70 i 6776 Err codemadness.org 70 i 6777 Err codemadness.org 70 i 6778 Dimensional Reweighting Graph Convolutional Networks. (arXiv:1907.02237v3 [cs.LG] UPDATED) Err codemadness.org 70 i 6779 http://fr.arxiv.org/abs/1907.02237 Err codemadness.org 70 i 6780 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zou_X/0/1/0/all/0/1">Xu Zou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jia_Q/0/1/0/all/0/1">Qiuye Jia</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jianwei Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_C/0/1/0/all/0/1">Chang Zhou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_H/0/1/0/all/0/1">Hongxia Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tang_J/0/1/0/all/0/1">Jie Tang</a></p> Err codemadness.org 70 i 6781 Err codemadness.org 70 i 6782 <p>Graph Convolution Networks (GCNs) are becoming more and more popular for Err codemadness.org 70 i 6783 learning node representations on graphs. Though there exist various Err codemadness.org 70 i 6784 developments on sampling and aggregation to accelerate the training process and Err codemadness.org 70 i 6785 improve the performances, limited works focus on dealing with the dimensional Err codemadness.org 70 i 6786 information imbalance of node representations. To bridge the gap, we propose a Err codemadness.org 70 i 6787 method named Dimensional reweighting Graph Convolution Network (DrGCN). We Err codemadness.org 70 i 6788 theoretically prove that our DrGCN can guarantee to improve the stability of Err codemadness.org 70 i 6789 GCNs via mean field theory. Our dimensional reweighting method is very flexible Err codemadness.org 70 i 6790 and can be easily combined with most sampling and aggregation techniques for Err codemadness.org 70 i 6791 GCNs. Experimental results demonstrate its superior performances on several Err codemadness.org 70 i 6792 challenging transductive and inductive node classification benchmark datasets. Err codemadness.org 70 i 6793 Our DrGCN also outperforms existing models on an industrial-sized Alibaba Err codemadness.org 70 i 6794 recommendation dataset. Err codemadness.org 70 i 6795 </p> Err codemadness.org 70 i 6796 Err codemadness.org 70 i 6797 Err codemadness.org 70 i 6798 Err codemadness.org 70 i 6799 Lexical Simplification with Pretrained Encoders. (arXiv:1907.06226v5 [cs.CL] UPDATED) Err codemadness.org 70 i 6800 http://fr.arxiv.org/abs/1907.06226 Err codemadness.org 70 i 6801 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Qiang_J/0/1/0/all/0/1">Jipeng Qiang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1">Yun Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhu_Y/0/1/0/all/0/1">Yi Zhu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yuan_Y/0/1/0/all/0/1">Yunhao Yuan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_X/0/1/0/all/0/1">Xindong Wu</a></p> Err codemadness.org 70 i 6802 Err codemadness.org 70 i 6803 <p>Lexical simplification (LS) aims to replace complex words in a given sentence Err codemadness.org 70 i 6804 with their simpler alternatives of equivalent meaning. Recently unsupervised Err codemadness.org 70 i 6805 lexical simplification approaches only rely on the complex word itself Err codemadness.org 70 i 6806 regardless of the given sentence to generate candidate substitutions, which Err codemadness.org 70 i 6807 will inevitably produce a large number of spurious candidates. We present a Err codemadness.org 70 i 6808 simple LS approach that makes use of the Bidirectional Encoder Representations Err codemadness.org 70 i 6809 from Transformers (BERT) which can consider both the given sentence and the Err codemadness.org 70 i 6810 complex word during generating candidate substitutions for the complex word. Err codemadness.org 70 i 6811 Specifically, we mask the complex word of the original sentence for feeding Err codemadness.org 70 i 6812 into the BERT to predict the masked token. The predicted results will be used Err codemadness.org 70 i 6813 as candidate substitutions. Despite being entirely unsupervised, experimental Err codemadness.org 70 i 6814 results show that our approach obtains obvious improvement compared with these Err codemadness.org 70 i 6815 baselines leveraging linguistic databases and parallel corpus, outperforming Err codemadness.org 70 i 6816 the state-of-the-art by more than 12 Accuracy points on three well-known Err codemadness.org 70 i 6817 benchmarks. Err codemadness.org 70 i 6818 </p> Err codemadness.org 70 i 6819 Err codemadness.org 70 i 6820 Err codemadness.org 70 i 6821 Err codemadness.org 70 i 6822 Cover and variable degeneracy. (arXiv:1907.06630v3 [math.CO] UPDATED) Err codemadness.org 70 i 6823 http://fr.arxiv.org/abs/1907.06630 Err codemadness.org 70 i 6824 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Lu_F/0/1/0/all/0/1">Fangyao Lu</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Wang_Q/0/1/0/all/0/1">Qianqian Wang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Wang_T/0/1/0/all/0/1">Tao Wang</a></p> Err codemadness.org 70 i 6825 Err codemadness.org 70 i 6826 <p>Let $f$ be a nonnegative integer valued function on the vertex set of a Err codemadness.org 70 i 6827 graph. A graph is {\bf strictly $f$-degenerate} if each nonempty subgraph Err codemadness.org 70 i 6828 $\Gamma$ has a vertex $v$ such that $\mathrm{deg}_{\Gamma}(v) &lt; f(v)$. In this Err codemadness.org 70 i 6829 paper, we define a new concept, strictly $f$-degenerate transversal, which Err codemadness.org 70 i 6830 generalizes list coloring, signed coloring, DP-coloring, $L$-forested-coloring, Err codemadness.org 70 i 6831 and $(f_{1}, f_{2}, \dots, f_{s})$-partition. A {\bf cover} of a graph $G$ is a Err codemadness.org 70 i 6832 graph $H$ with vertex set $V(H) = \bigcup_{v \in V(G)} X_{v}$, where $X_{v} = Err codemadness.org 70 i 6833 \{(v, 1), (v, 2), \dots, (v, s)\}$; the edge set $\mathscr{M} = \bigcup_{uv \in Err codemadness.org 70 i 6834 E(G)}\mathscr{M}_{uv}$, where $\mathscr{M}_{uv}$ is a matching between $X_{u}$ Err codemadness.org 70 i 6835 and $X_{v}$. A vertex set $R \subseteq V(H)$ is a {\bf transversal} of $H$ if Err codemadness.org 70 i 6836 $|R \cap X_{v}| = 1$ for each $v \in V(G)$. A transversal $R$ is a {\bf Err codemadness.org 70 i 6837 strictly $f$-degenerate transversal} if $H[R]$ is strictly $f$-degenerate. The Err codemadness.org 70 i 6838 main result of this paper is a degree type result, which generalizes Brooks' Err codemadness.org 70 i 6839 theorem, Gallai's theorem, degree-choosable result, signed degree-colorable Err codemadness.org 70 i 6840 result, and DP-degree-colorable result. Similar to Borodin, Kostochka and Err codemadness.org 70 i 6841 Toft's variable degeneracy, this degree type result is also self-strengthening. Err codemadness.org 70 i 6842 We also give some structural results on critical graphs with respect to Err codemadness.org 70 i 6843 strictly $f$-degenerate transversal. Using these results, we can uniformly Err codemadness.org 70 i 6844 prove many new and known results. In the final section, we pose some open Err codemadness.org 70 i 6845 problems. Err codemadness.org 70 i 6846 </p> Err codemadness.org 70 i 6847 Err codemadness.org 70 i 6848 Err codemadness.org 70 i 6849 Err codemadness.org 70 i 6850 An Iterative Vertex Enumeration Method for Objective Space Based Vector Optimization Algorithms. (arXiv:1907.08813v2 [math.OC] UPDATED) Err codemadness.org 70 i 6851 http://fr.arxiv.org/abs/1907.08813 Err codemadness.org 70 i 6852 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Kaya_I/0/1/0/all/0/1">Irfan Caner Kaya</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Ulus_F/0/1/0/all/0/1">Firdevs Ulus</a></p> Err codemadness.org 70 i 6853 Err codemadness.org 70 i 6854 <p>An application area of vertex enumeration problem (VEP) is the usage within Err codemadness.org 70 i 6855 objective space based linear/convex {vector} optimization algorithms whose aim Err codemadness.org 70 i 6856 is to generate (an approximation of) the Pareto frontier. In such algorithms, Err codemadness.org 70 i 6857 VEP, which is defined in the objective space, is solved in each iteration and Err codemadness.org 70 i 6858 it has a special structure. Namely, the recession cone of the polyhedron to be Err codemadness.org 70 i 6859 generated is the {ordering} cone. We {consider and give a detailed description Err codemadness.org 70 i 6860 of} a vertex enumeration procedure, which iterates by calling a modified Err codemadness.org 70 i 6861 `double description (DD) method' that works for such unbounded polyhedrons. We Err codemadness.org 70 i 6862 employ this procedure as a function of an existing objective space based Err codemadness.org 70 i 6863 {vector} optimization algorithm (Algorithm 1); and test the performance of it Err codemadness.org 70 i 6864 for randomly generated linear multiobjective optimization problems. We compare Err codemadness.org 70 i 6865 the efficiency of this procedure with another existing DD method as well as Err codemadness.org 70 i 6866 with the current vertex enumeration subroutine of Algorithm 1. We observe that Err codemadness.org 70 i 6867 the modified procedure excels the others especially as the dimension of the Err codemadness.org 70 i 6868 vertex enumeration problem (the number of objectives of the corresponding Err codemadness.org 70 i 6869 multiobjective problem) increases. Err codemadness.org 70 i 6870 </p> Err codemadness.org 70 i 6871 Err codemadness.org 70 i 6872 Err codemadness.org 70 i 6873 Err codemadness.org 70 i 6874 Developing an Unsupervised Real-time Anomaly Detection Scheme for Time Series with Multi-seasonality. (arXiv:1908.01146v2 [cs.LG] UPDATED) Err codemadness.org 70 i 6875 http://fr.arxiv.org/abs/1908.01146 Err codemadness.org 70 i 6876 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_W/0/1/0/all/0/1">Wentai Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_L/0/1/0/all/0/1">Ligang He</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1">Weiwei Lin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Su_Y/0/1/0/all/0/1">Yi Su</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cui_Y/0/1/0/all/0/1">Yuhua Cui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Maple_C/0/1/0/all/0/1">Carsten Maple</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jarvis_S/0/1/0/all/0/1">Stephen Jarvis</a></p> Err codemadness.org 70 i 6877 Err codemadness.org 70 i 6878 <p>On-line detection of anomalies in time series is a key technique used in Err codemadness.org 70 i 6879 various event-sensitive scenarios such as robotic system monitoring, smart Err codemadness.org 70 i 6880 sensor networks and data center security. However, the increasing diversity of Err codemadness.org 70 i 6881 data sources and the variety of demands make this task more challenging than Err codemadness.org 70 i 6882 ever. Firstly, the rapid increase in unlabeled data means supervised learning Err codemadness.org 70 i 6883 is becoming less suitable in many cases. Secondly, a large portion of time Err codemadness.org 70 i 6884 series data have complex seasonality features. Thirdly, on-line anomaly Err codemadness.org 70 i 6885 detection needs to be fast and reliable. In light of this, we have developed a Err codemadness.org 70 i 6886 prediction-driven, unsupervised anomaly detection scheme, which adopts a Err codemadness.org 70 i 6887 backbone model combining the decomposition and the inference of time series Err codemadness.org 70 i 6888 data. Further, we propose a novel metric, Local Trend Inconsistency (LTI), and Err codemadness.org 70 i 6889 an efficient detection algorithm that computes LTI in a real-time manner and Err codemadness.org 70 i 6890 scores each data point robustly in terms of its probability of being anomalous. Err codemadness.org 70 i 6891 We have conducted extensive experimentation to evaluate our algorithm with Err codemadness.org 70 i 6892 several datasets from both public repositories and production environments. The Err codemadness.org 70 i 6893 experimental results show that our scheme outperforms existing representative Err codemadness.org 70 i 6894 anomaly detection algorithms in terms of the commonly used metric, Area Under Err codemadness.org 70 i 6895 Curve (AUC), while achieving the desired efficiency. Err codemadness.org 70 i 6896 </p> Err codemadness.org 70 i 6897 Err codemadness.org 70 i 6898 Err codemadness.org 70 i 6899 Err codemadness.org 70 i 6900 Cluster-based Distributed Augmented Lagrangian Algorithm for a Class of Constrained Convex Optimization Problems. (arXiv:1908.06634v3 [cs.MA] UPDATED) Err codemadness.org 70 i 6901 http://fr.arxiv.org/abs/1908.06634 Err codemadness.org 70 i 6902 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Moradian_H/0/1/0/all/0/1">Hossein Moradian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kia_S/0/1/0/all/0/1">Solmaz S. Kia</a></p> Err codemadness.org 70 i 6903 Err codemadness.org 70 i 6904 <p>We propose a distributed solution for a constrained convex optimization Err codemadness.org 70 i 6905 problem over a network of clustered agents each consisted of a set of Err codemadness.org 70 i 6906 subagents. The communication range of the clustered agents is such that they Err codemadness.org 70 i 6907 can form a connected undirected graph topology. The total cost in this Err codemadness.org 70 i 6908 optimization problem is the sum of the local convex costs of the subagents of Err codemadness.org 70 i 6909 each cluster. We seek a minimizer of this cost subject to a set of affine Err codemadness.org 70 i 6910 equality constraints, and a set of affine inequality constraints specifying the Err codemadness.org 70 i 6911 bounds on the decision variables if such bounds exist. We design our Err codemadness.org 70 i 6912 distributed algorithm in a cluster-based framework which results in a Err codemadness.org 70 i 6913 significant reduction in communication and computation costs. Our proposed Err codemadness.org 70 i 6914 distributed solution is a novel continuous-time algorithm that is linked to the Err codemadness.org 70 i 6915 augmented Lagrangian approach. It converges asymptotically when the local cost Err codemadness.org 70 i 6916 functions are convex and exponentially when they are strongly convex and have Err codemadness.org 70 i 6917 Lipschitz gradients. Moreover, we use an $\epsilon$-exact penalty function to Err codemadness.org 70 i 6918 address the inequality constraints and derive an explicit lower bound on the Err codemadness.org 70 i 6919 penalty function weight to guarantee convergence to $\epsilon$-neighborhood of Err codemadness.org 70 i 6920 the global minimum value of the cost. A numerical example demonstrates our Err codemadness.org 70 i 6921 results. Err codemadness.org 70 i 6922 </p> Err codemadness.org 70 i 6923 Err codemadness.org 70 i 6924 Err codemadness.org 70 i 6925 Err codemadness.org 70 i 6926 Optimal Machine Intelligence at the Edge of Chaos. (arXiv:1909.05176v2 [cs.LG] UPDATED) Err codemadness.org 70 i 6927 http://fr.arxiv.org/abs/1909.05176 Err codemadness.org 70 i 6928 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Feng_L/0/1/0/all/0/1">Ling Feng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_L/0/1/0/all/0/1">Lin Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lai_C/0/1/0/all/0/1">Choy Heng Lai</a></p> Err codemadness.org 70 i 6929 Err codemadness.org 70 i 6930 <p>It has long been suggested that the biological brain operates at some Err codemadness.org 70 i 6931 critical point between two different phases, possibly order and chaos. Despite Err codemadness.org 70 i 6932 many indirect empirical evidence from the brain and analytical indication on Err codemadness.org 70 i 6933 simple neural networks, the foundation of this hypothesis on generic non-linear Err codemadness.org 70 i 6934 systems remains unclear. Here we develop a general theory that reveals the Err codemadness.org 70 i 6935 exact edge of chaos is the boundary between the chaotic phase and the Err codemadness.org 70 i 6936 (pseudo)periodic phase arising from Neimark-Sacker bifurcation. This edge is Err codemadness.org 70 i 6937 analytically determined by the asymptotic Jacobian norm values of the Err codemadness.org 70 i 6938 non-linear operator and influenced by the dimensionality of the system. The Err codemadness.org 70 i 6939 optimality at the edge of chaos is associated with the highest information Err codemadness.org 70 i 6940 transfer between input and output at this point similar to that of the logistic Err codemadness.org 70 i 6941 map. As empirical validations, our experiments on the various deep learning Err codemadness.org 70 i 6942 models in computer vision demonstrate the optimality of the models near the Err codemadness.org 70 i 6943 edge of chaos, and we observe that the state-of-art training algorithms push Err codemadness.org 70 i 6944 the models towards such edge as they become more accurate. We further Err codemadness.org 70 i 6945 establishes the theoretical understanding of deep learning model generalization Err codemadness.org 70 i 6946 through asymptotic stability. Err codemadness.org 70 i 6947 </p> Err codemadness.org 70 i 6948 Err codemadness.org 70 i 6949 Err codemadness.org 70 i 6950 Err codemadness.org 70 i 6951 Inverse Kinematics for Serial Kinematic Chains via Sum of Squares Optimization. (arXiv:1909.09318v3 [cs.RO] UPDATED) Err codemadness.org 70 i 6952 http://fr.arxiv.org/abs/1909.09318 Err codemadness.org 70 i 6953 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Maric_F/0/1/0/all/0/1">Filip Maric</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Giamou_M/0/1/0/all/0/1">Matthew Giamou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Khoubyarian_S/0/1/0/all/0/1">Soroush Khoubyarian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Petrovic_I/0/1/0/all/0/1">Ivan Petrovic</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kelly_J/0/1/0/all/0/1">Jonathan Kelly</a></p> Err codemadness.org 70 i 6954 Err codemadness.org 70 i 6955 <p>Inverse kinematics is a fundamental problem for articulated robots: fast and Err codemadness.org 70 i 6956 accurate algorithms are needed for translating task-related workspace Err codemadness.org 70 i 6957 constraints and goals into feasible joint configurations. In general, inverse Err codemadness.org 70 i 6958 kinematics for serial kinematic chains is a difficult nonlinear problem, for Err codemadness.org 70 i 6959 which closed form solutions cannot be easily obtained. Therefore, Err codemadness.org 70 i 6960 computationally efficient numerical methods that can be adapted to a general Err codemadness.org 70 i 6961 class of manipulators are of great importance. % to motion planning and Err codemadness.org 70 i 6962 workspace generation tasks. In this paper, we use convex optimization Err codemadness.org 70 i 6963 techniques to solve the inverse kinematics problem with joint limit constraints Err codemadness.org 70 i 6964 for highly redundant serial kinematic chains with spherical joints in two and Err codemadness.org 70 i 6965 three dimensions. This is accomplished through a novel formulation of inverse Err codemadness.org 70 i 6966 kinematics as a nearest point problem, and with a fast sum of squares solver Err codemadness.org 70 i 6967 that exploits the sparsity of kinematic constraints for serial manipulators. Err codemadness.org 70 i 6968 Our method has the advantages of post-hoc certification of global optimality Err codemadness.org 70 i 6969 and a runtime that scales polynomialy with the number of degrees of freedom. Err codemadness.org 70 i 6970 Additionally, we prove that our convex relaxation leads to a globally optimal Err codemadness.org 70 i 6971 solution when certain conditions are met, and demonstrate empirically that Err codemadness.org 70 i 6972 these conditions are common and represent many practical instances. Finally, we Err codemadness.org 70 i 6973 provide an open source implementation of our algorithm. Err codemadness.org 70 i 6974 </p> Err codemadness.org 70 i 6975 Err codemadness.org 70 i 6976 Err codemadness.org 70 i 6977 Err codemadness.org 70 i 6978 Noisy Batch Active Learning with Deterministic Annealing. (arXiv:1909.12473v2 [cs.LG] UPDATED) Err codemadness.org 70 i 6979 http://fr.arxiv.org/abs/1909.12473 Err codemadness.org 70 i 6980 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gupta_G/0/1/0/all/0/1">Gaurav Gupta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sahu_A/0/1/0/all/0/1">Anit Kumar Sahu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1">Wan-Yi Lin</a></p> Err codemadness.org 70 i 6981 Err codemadness.org 70 i 6982 <p>We study the problem of training machine learning models incrementally with Err codemadness.org 70 i 6983 batches of samples annotated with noisy oracles. We select each batch of Err codemadness.org 70 i 6984 samples that are important and also diverse via clustering and importance Err codemadness.org 70 i 6985 sampling. More importantly, we incorporate model uncertainty into the sampling Err codemadness.org 70 i 6986 probability to compensate for poor estimation of the importance scores when the Err codemadness.org 70 i 6987 training data is too small to build a meaningful model. Experiments on Err codemadness.org 70 i 6988 benchmark image classification datasets (MNIST, SVHN, CIFAR10, and EMNIST) show Err codemadness.org 70 i 6989 improvement over existing active learning strategies. We introduce an extra Err codemadness.org 70 i 6990 denoising layer to deep networks to make active learning robust to label noises Err codemadness.org 70 i 6991 and show significant improvements. Err codemadness.org 70 i 6992 </p> Err codemadness.org 70 i 6993 Err codemadness.org 70 i 6994 Err codemadness.org 70 i 6995 Err codemadness.org 70 i 6996 Subspace Estimation from Unbalanced and Incomplete Data Matrices: $\ell_{2,\infty}$ Statistical Guarantees. (arXiv:1910.04267v4 [math.ST] UPDATED) Err codemadness.org 70 i 6997 http://fr.arxiv.org/abs/1910.04267 Err codemadness.org 70 i 6998 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Cai_C/0/1/0/all/0/1">Changxiao Cai</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Li_G/0/1/0/all/0/1">Gen Li</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Chi_Y/0/1/0/all/0/1">Yuejie Chi</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Poor_H/0/1/0/all/0/1">H. Vincent Poor</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Chen_Y/0/1/0/all/0/1">Yuxin Chen</a></p> Err codemadness.org 70 i 6999 Err codemadness.org 70 i 7000 <p>This paper is concerned with estimating the column space of an unknown Err codemadness.org 70 i 7001 low-rank matrix $\boldsymbol{A}^{\star}\in\mathbb{R}^{d_{1}\times d_{2}}$, Err codemadness.org 70 i 7002 given noisy and partial observations of its entries. There is no shortage of Err codemadness.org 70 i 7003 scenarios where the observations -- while being too noisy to support faithful Err codemadness.org 70 i 7004 recovery of the entire matrix -- still convey sufficient information to enable Err codemadness.org 70 i 7005 reliable estimation of the column space of interest. This is particularly Err codemadness.org 70 i 7006 evident and crucial for the highly unbalanced case where the column dimension Err codemadness.org 70 i 7007 $d_{2}$ far exceeds the row dimension $d_{1}$, which is the focal point of the Err codemadness.org 70 i 7008 current paper. We investigate an efficient spectral method, which operates upon Err codemadness.org 70 i 7009 the sample Gram matrix with diagonal deletion. While this algorithmic idea has Err codemadness.org 70 i 7010 been studied before, we establish new statistical guarantees for this method in Err codemadness.org 70 i 7011 terms of both $\ell_{2}$ and $\ell_{2,\infty}$ estimation accuracy, which Err codemadness.org 70 i 7012 improve upon prior results if $d_{2}$ is substantially larger than $d_{1}$. To Err codemadness.org 70 i 7013 illustrate the effectiveness of our findings, we derive matching minimax lower Err codemadness.org 70 i 7014 bounds with respect to the noise levels, and develop consequences of our Err codemadness.org 70 i 7015 general theory for three applications of practical importance: (1) tensor Err codemadness.org 70 i 7016 completion from noisy data, (2) covariance estimation / principal component Err codemadness.org 70 i 7017 analysis with missing data, and (3) community recovery in bipartite graphs. Our Err codemadness.org 70 i 7018 theory leads to improved performance guarantees for all three cases. Err codemadness.org 70 i 7019 </p> Err codemadness.org 70 i 7020 Err codemadness.org 70 i 7021 Err codemadness.org 70 i 7022 Err codemadness.org 70 i 7023 ProxIQA: A Proxy Approach to Perceptual Optimization of Learned Image Compression. (arXiv:1910.08845v2 [eess.IV] UPDATED) Err codemadness.org 70 i 7024 http://fr.arxiv.org/abs/1910.08845 Err codemadness.org 70 i 7025 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Chen_L/0/1/0/all/0/1">Li-Heng Chen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Bampis_C/0/1/0/all/0/1">Christos G. Bampis</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_Z/0/1/0/all/0/1">Zhi Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Norkin_A/0/1/0/all/0/1">Andrey Norkin</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Bovik_A/0/1/0/all/0/1">Alan C. Bovik</a></p> Err codemadness.org 70 i 7026 Err codemadness.org 70 i 7027 <p>The use of $\ell_p$ $(p=1,2)$ norms has largely dominated the measurement of Err codemadness.org 70 i 7028 loss in neural networks due to their simplicity and analytical properties. Err codemadness.org 70 i 7029 However, when used to assess the loss of visual information, these simple norms Err codemadness.org 70 i 7030 are not very consistent with human perception. Here, we describe a different Err codemadness.org 70 i 7031 "proximal" approach to optimize image analysis networks against quantitative Err codemadness.org 70 i 7032 perceptual models. Specifically, we construct a proxy network, broadly termed Err codemadness.org 70 i 7033 ProxIQA, which mimics the perceptual model while serving as a loss layer of the Err codemadness.org 70 i 7034 network. We experimentally demonstrate how this optimization framework can be Err codemadness.org 70 i 7035 applied to train an end-to-end optimized image compression network. By building Err codemadness.org 70 i 7036 on top of an existing deep image compression model, we are able to demonstrate Err codemadness.org 70 i 7037 a bitrate reduction of as much as $31\%$ over MSE optimization, given a Err codemadness.org 70 i 7038 specified perceptual quality (VMAF) level. Err codemadness.org 70 i 7039 </p> Err codemadness.org 70 i 7040 Err codemadness.org 70 i 7041 Err codemadness.org 70 i 7042 Err codemadness.org 70 i 7043 Federated Learning over Wireless Networks: Convergence Analysis and Resource Allocation. (arXiv:1910.13067v4 [cs.LG] UPDATED) Err codemadness.org 70 i 7044 http://fr.arxiv.org/abs/1910.13067 Err codemadness.org 70 i 7045 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dinh_C/0/1/0/all/0/1">Canh T. Dinh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tran_N/0/1/0/all/0/1">Nguyen H. Tran</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nguyen_M/0/1/0/all/0/1">Minh N. H. Nguyen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hong_C/0/1/0/all/0/1">Choong Seon Hong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bao_W/0/1/0/all/0/1">Wei Bao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zomaya_A/0/1/0/all/0/1">Albert Y. Zomaya</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gramoli_V/0/1/0/all/0/1">Vincent Gramoli</a></p> Err codemadness.org 70 i 7046 Err codemadness.org 70 i 7047 <p>There is an increasing interest in a fast-growing machine learning technique Err codemadness.org 70 i 7048 called Federated Learning, in which the model training is distributed over Err codemadness.org 70 i 7049 mobile user equipments (UEs), exploiting UEs' local computation and training Err codemadness.org 70 i 7050 data. Despite its advantages in data privacy-preserving, Federated Learning Err codemadness.org 70 i 7051 (FL) still has challenges in heterogeneity across UEs' data and physical Err codemadness.org 70 i 7052 resources. We first propose a FL algorithm which can handle the heterogeneous Err codemadness.org 70 i 7053 UEs' data challenge without further assumptions except strongly convex and Err codemadness.org 70 i 7054 smooth loss functions. We provide the convergence rate characterizing the Err codemadness.org 70 i 7055 trade-off between local computation rounds of UE to update its local model and Err codemadness.org 70 i 7056 global communication rounds to update the FL global model. We then employ the Err codemadness.org 70 i 7057 proposed FL algorithm in wireless networks as a resource allocation Err codemadness.org 70 i 7058 optimization problem that captures the trade-off between the FL convergence Err codemadness.org 70 i 7059 wall clock time and energy consumption of UEs with heterogeneous computing and Err codemadness.org 70 i 7060 power resources. Even though the wireless resource allocation problem of FL is Err codemadness.org 70 i 7061 non-convex, we exploit this problem's structure to decompose it into three Err codemadness.org 70 i 7062 sub-problems and analyze their closed-form solutions as well as insights to Err codemadness.org 70 i 7063 problem design. Finally, we illustrate the theoretical analysis for the new Err codemadness.org 70 i 7064 algorithm with Tensorflow experiments and extensive numerical results for the Err codemadness.org 70 i 7065 wireless resource allocation sub-problems. The experiment results not only Err codemadness.org 70 i 7066 verify the theoretical convergence but also show that our proposed algorithm Err codemadness.org 70 i 7067 outperforms the vanilla FedAvg algorithm in terms of convergence rate and Err codemadness.org 70 i 7068 testing accuracy. Err codemadness.org 70 i 7069 </p> Err codemadness.org 70 i 7070 Err codemadness.org 70 i 7071 Err codemadness.org 70 i 7072 Err codemadness.org 70 i 7073 Making the Best Use of Review Summary for Sentiment Analysis. (arXiv:1911.02711v2 [cs.CL] UPDATED) Err codemadness.org 70 i 7074 http://fr.arxiv.org/abs/1911.02711 Err codemadness.org 70 i 7075 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_S/0/1/0/all/0/1">Sen Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cui_L/0/1/0/all/0/1">Leyang Cui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xie_J/0/1/0/all/0/1">Jun Xie</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1">Yue Zhang</a></p> Err codemadness.org 70 i 7076 Err codemadness.org 70 i 7077 <p>Sentiment analysis provides a useful overview of customer review contents. Err codemadness.org 70 i 7078 Many review websites allow a user to enter a summary in addition to a full Err codemadness.org 70 i 7079 review. Intuitively, summary information may give additional benefit for review Err codemadness.org 70 i 7080 sentiment analysis. In this paper, we conduct a study to exploit methods for Err codemadness.org 70 i 7081 better use of summary information. We start by finding out that the sentimental Err codemadness.org 70 i 7082 signal distribution of a review and that of its corresponding summary are in Err codemadness.org 70 i 7083 fact complementary to each other. We thus explore various architectures to Err codemadness.org 70 i 7084 better guide the interactions between the two and propose a Err codemadness.org 70 i 7085 hierarchically-refined review-centric attention model. Empirical results show Err codemadness.org 70 i 7086 that our review-centric model can make better use of user-written summaries for Err codemadness.org 70 i 7087 review sentiment analysis, and is also more effective compared to existing Err codemadness.org 70 i 7088 methods when the user summary is replaced with summary generated by an Err codemadness.org 70 i 7089 automatic summarization system. Err codemadness.org 70 i 7090 </p> Err codemadness.org 70 i 7091 Err codemadness.org 70 i 7092 Err codemadness.org 70 i 7093 Err codemadness.org 70 i 7094 Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy. (arXiv:1911.03849v5 [cs.LG] UPDATED) Err codemadness.org 70 i 7095 http://fr.arxiv.org/abs/1911.03849 Err codemadness.org 70 i 7096 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Qu_X/0/1/0/all/0/1">Xinghua Qu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sun_Z/0/1/0/all/0/1">Zhu Sun</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ong_Y/0/1/0/all/0/1">Yew-Soon Ong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gupta_A/0/1/0/all/0/1">Abhishek Gupta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_P/0/1/0/all/0/1">Pengfei Wei</a></p> Err codemadness.org 70 i 7097 Err codemadness.org 70 i 7098 <p>Recent studies have revealed that neural network-based policies can be easily Err codemadness.org 70 i 7099 fooled by adversarial examples. However, while most prior works analyze the Err codemadness.org 70 i 7100 effects of perturbing every pixel of every frame assuming white-box policy Err codemadness.org 70 i 7101 access, in this paper we take a more restrictive view towards adversary Err codemadness.org 70 i 7102 generation - with the goal of unveiling the limits of a model's vulnerability. Err codemadness.org 70 i 7103 In particular, we explore minimalistic attacks by defining three key settings: Err codemadness.org 70 i 7104 (1) black-box policy access: where the attacker only has access to the input Err codemadness.org 70 i 7105 (state) and output (action probability) of an RL policy; (2) fractional-state Err codemadness.org 70 i 7106 adversary: where only several pixels are perturbed, with the extreme case being Err codemadness.org 70 i 7107 a single-pixel adversary; and (3) tactically-chanced attack: where only Err codemadness.org 70 i 7108 significant frames are tactically chosen to be attacked. We formulate the Err codemadness.org 70 i 7109 adversarial attack by accommodating the three key settings and explore their Err codemadness.org 70 i 7110 potency on six Atari games by examining four fully trained state-of-the-art Err codemadness.org 70 i 7111 policies. In Breakout, for example, we surprisingly find that: (i) all policies Err codemadness.org 70 i 7112 showcase significant performance degradation by merely modifying 0.01% of the Err codemadness.org 70 i 7113 input state, and (ii) the policy trained by DQN is totally deceived by Err codemadness.org 70 i 7114 perturbation to only 1% frames. Err codemadness.org 70 i 7115 </p> Err codemadness.org 70 i 7116 Err codemadness.org 70 i 7117 Err codemadness.org 70 i 7118 Err codemadness.org 70 i 7119 Rethinking Self-Attention: Towards Interpretability in Neural Parsing. (arXiv:1911.03875v3 [cs.CL] UPDATED) Err codemadness.org 70 i 7120 http://fr.arxiv.org/abs/1911.03875 Err codemadness.org 70 i 7121 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mrini_K/0/1/0/all/0/1">Khalil Mrini</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dernoncourt_F/0/1/0/all/0/1">Franck Dernoncourt</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tran_Q/0/1/0/all/0/1">Quan Tran</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bui_T/0/1/0/all/0/1">Trung Bui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chang_W/0/1/0/all/0/1">Walter Chang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nakashole_N/0/1/0/all/0/1">Ndapa Nakashole</a></p> Err codemadness.org 70 i 7122 Err codemadness.org 70 i 7123 <p>Attention mechanisms have improved the performance of NLP tasks while Err codemadness.org 70 i 7124 allowing models to remain explainable. Self-attention is currently widely used, Err codemadness.org 70 i 7125 however interpretability is difficult due to the numerous attention Err codemadness.org 70 i 7126 distributions. Recent work has shown that model representations can benefit Err codemadness.org 70 i 7127 from label-specific information, while facilitating interpretation of Err codemadness.org 70 i 7128 predictions. We introduce the Label Attention Layer: a new form of Err codemadness.org 70 i 7129 self-attention where attention heads represent labels. We test our novel layer Err codemadness.org 70 i 7130 by running constituency and dependency parsing experiments and show our new Err codemadness.org 70 i 7131 model obtains new state-of-the-art results for both tasks on both the Penn Err codemadness.org 70 i 7132 Treebank (PTB) and Chinese Treebank. Additionally, our model requires fewer Err codemadness.org 70 i 7133 self-attention layers compared to existing work. Finally, we find that the Err codemadness.org 70 i 7134 Label Attention heads learn relations between syntactic categories and show Err codemadness.org 70 i 7135 pathways to analyze errors. Err codemadness.org 70 i 7136 </p> Err codemadness.org 70 i 7137 Err codemadness.org 70 i 7138 Err codemadness.org 70 i 7139 Err codemadness.org 70 i 7140 Privacy-Preserving Gradient Boosting Decision Trees. (arXiv:1911.04209v3 [cs.LG] UPDATED) Err codemadness.org 70 i 7141 http://fr.arxiv.org/abs/1911.04209 Err codemadness.org 70 i 7142 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1">Qinbin Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_Z/0/1/0/all/0/1">Zhaomin Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wen_Z/0/1/0/all/0/1">Zeyi Wen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_B/0/1/0/all/0/1">Bingsheng He</a></p> Err codemadness.org 70 i 7143 Err codemadness.org 70 i 7144 <p>The Gradient Boosting Decision Tree (GBDT) is a popular machine learning Err codemadness.org 70 i 7145 model for various tasks in recent years. In this paper, we study how to improve Err codemadness.org 70 i 7146 model accuracy of GBDT while preserving the strong guarantee of differential Err codemadness.org 70 i 7147 privacy. Sensitivity and privacy budget are two key design aspects for the Err codemadness.org 70 i 7148 effectiveness of differential private models. Existing solutions for GBDT with Err codemadness.org 70 i 7149 differential privacy suffer from the significant accuracy loss due to too loose Err codemadness.org 70 i 7150 sensitivity bounds and ineffective privacy budget allocations (especially Err codemadness.org 70 i 7151 across different trees in the GBDT model). Loose sensitivity bounds lead to Err codemadness.org 70 i 7152 more noise to obtain a fixed privacy level. Ineffective privacy budget Err codemadness.org 70 i 7153 allocations worsen the accuracy loss especially when the number of trees is Err codemadness.org 70 i 7154 large. Therefore, we propose a new GBDT training algorithm that achieves Err codemadness.org 70 i 7155 tighter sensitivity bounds and more effective noise allocations. Specifically, Err codemadness.org 70 i 7156 by investigating the property of gradient and the contribution of each tree in Err codemadness.org 70 i 7157 GBDTs, we propose to adaptively control the gradients of training data for each Err codemadness.org 70 i 7158 iteration and leaf node clipping in order to tighten the sensitivity bounds. Err codemadness.org 70 i 7159 Furthermore, we design a novel boosting framework to allocate the privacy Err codemadness.org 70 i 7160 budget between trees so that the accuracy loss can be further reduced. Our Err codemadness.org 70 i 7161 experiments show that our approach can achieve much better model accuracy than Err codemadness.org 70 i 7162 other baselines. Err codemadness.org 70 i 7163 </p> Err codemadness.org 70 i 7164 Err codemadness.org 70 i 7165 Err codemadness.org 70 i 7166 Err codemadness.org 70 i 7167 A Continuous Teleoperation Subspace with Empirical and Algorithmic Mapping Algorithms for Non-Anthropomorphic Hands. (arXiv:1911.09565v5 [cs.RO] UPDATED) Err codemadness.org 70 i 7168 http://fr.arxiv.org/abs/1911.09565 Err codemadness.org 70 i 7169 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Meeker_C/0/1/0/all/0/1">Cassie Meeker</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Haas_Heger_M/0/1/0/all/0/1">Maximilian Haas-Heger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ciocarlie_M/0/1/0/all/0/1">Matei Ciocarlie</a></p> Err codemadness.org 70 i 7170 Err codemadness.org 70 i 7171 <p>Teleoperation is a valuable tool for robotic manipulators in highly Err codemadness.org 70 i 7172 unstructured environments. However, finding an intuitive mapping between a Err codemadness.org 70 i 7173 human hand and a non-anthropomorphic robot hand can be difficult, due to the Err codemadness.org 70 i 7174 hands' dissimilar kinematics. In this paper, we seek to create a mapping Err codemadness.org 70 i 7175 between the human hand and a fully actuated, non-anthropomorphic robot hand Err codemadness.org 70 i 7176 that is intuitive enough to enable effective real-time teleoperation, even for Err codemadness.org 70 i 7177 novice users. To accomplish this, we propose a low-dimensional teleoperation Err codemadness.org 70 i 7178 subspace which can be used as an intermediary for mapping between hand pose Err codemadness.org 70 i 7179 spaces. We present two different methods to define the teleoperation subspace: Err codemadness.org 70 i 7180 an empirical definition, which requires a person to define hand motions in an Err codemadness.org 70 i 7181 intuitive, hand-specific way, and an algorithmic definition, which is Err codemadness.org 70 i 7182 kinematically independent, and uses objects to define the subspace. We use each Err codemadness.org 70 i 7183 of these definitions to create a teleoperation mapping for different hands. One Err codemadness.org 70 i 7184 of the main contributions of this paper is the validation of both the empirical Err codemadness.org 70 i 7185 and algorithmic mappings with teleoperation experiments controlled by ten Err codemadness.org 70 i 7186 novices and performed on two kinematically distinct hands. The experiments show Err codemadness.org 70 i 7187 that the proposed subspace is relevant to teleoperation, intuitive enough to Err codemadness.org 70 i 7188 enable control by novices, and can generalize to non-anthropomorphic hands with Err codemadness.org 70 i 7189 different kinematics. Err codemadness.org 70 i 7190 </p> Err codemadness.org 70 i 7191 Err codemadness.org 70 i 7192 Err codemadness.org 70 i 7193 Err codemadness.org 70 i 7194 QoS-Aware Joint Power Allocation and Task Offloading in a MEC/NFV-enabled C-RAN Network. (arXiv:1912.00187v2 [cs.NI] UPDATED) Err codemadness.org 70 i 7195 http://fr.arxiv.org/abs/1912.00187 Err codemadness.org 70 i 7196 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tajallifar_M/0/1/0/all/0/1">Mohsen Tajallifar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ebrahimi_S/0/1/0/all/0/1">Sina Ebrahimi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Javan_M/0/1/0/all/0/1">Mohammad Reza Javan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mokari_N/0/1/0/all/0/1">Nader Mokari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chiaraviglio_L/0/1/0/all/0/1">Luca Chiaraviglio</a></p> Err codemadness.org 70 i 7197 Err codemadness.org 70 i 7198 <p>In this paper, we propose a novel resource management scheme that jointly Err codemadness.org 70 i 7199 allocates the transmission power and computational resources in a centralized Err codemadness.org 70 i 7200 radio access network architecture. The network comprises a set of computing Err codemadness.org 70 i 7201 nodes to which the requested tasks of different users are offloaded. The Err codemadness.org 70 i 7202 optimization problem takes the transmission, execution, and propagation delays Err codemadness.org 70 i 7203 of each task into account, with the aim to allocate the transmission power and Err codemadness.org 70 i 7204 computational resources such that the user's maximum tolerable latency is Err codemadness.org 70 i 7205 satisfied. Since the optimization problem is highly non-convex, we adopt the Err codemadness.org 70 i 7206 alternate search method (ASM) to divide it into smaller subproblems. A Err codemadness.org 70 i 7207 heuristic algorithm is proposed to jointly manage the allocated computational Err codemadness.org 70 i 7208 resources and placement of the tasks derived by ASM. We also propose an Err codemadness.org 70 i 7209 admission control mechanism for finding the set of tasks that can be served by Err codemadness.org 70 i 7210 the available resources. Furthermore, a disjoint method that separately Err codemadness.org 70 i 7211 allocates the transmission power and the computational resources is proposed as Err codemadness.org 70 i 7212 the baseline of comparison. The optimal solution of the optimization problem is Err codemadness.org 70 i 7213 also derived based on exhaustive search over offloading decisions and utilizing Err codemadness.org 70 i 7214 Karush-Kuhn-Tucker optimality conditions. The simulation results show that the Err codemadness.org 70 i 7215 joint method outperforms the disjoint task offloading and power allocation. Err codemadness.org 70 i 7216 Moreover, simulations show that the performance of the proposed method is Err codemadness.org 70 i 7217 almost equal to that of the optimal solution. Err codemadness.org 70 i 7218 </p> Err codemadness.org 70 i 7219 Err codemadness.org 70 i 7220 Err codemadness.org 70 i 7221 Err codemadness.org 70 i 7222 Hierarchical Indian Buffet Neural Networks for Bayesian Continual Learning. (arXiv:1912.02290v4 [stat.ML] UPDATED) Err codemadness.org 70 i 7223 http://fr.arxiv.org/abs/1912.02290 Err codemadness.org 70 i 7224 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Kessler_S/0/1/0/all/0/1">Samuel Kessler</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Nguyen_V/0/1/0/all/0/1">Vu Nguyen</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Zohren_S/0/1/0/all/0/1">Stefan Zohren</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Roberts_S/0/1/0/all/0/1">Stephen Roberts</a></p> Err codemadness.org 70 i 7225 Err codemadness.org 70 i 7226 <p>We place an Indian Buffet process (IBP) prior over the structure of a Err codemadness.org 70 i 7227 Bayesian Neural Network (BNN), thus allowing the complexity of the BNN to Err codemadness.org 70 i 7228 increase and decrease automatically. We further extend this model such that the Err codemadness.org 70 i 7229 prior on the structure of each hidden layer is shared globally across all Err codemadness.org 70 i 7230 layers, using a Hierarchical-IBP (H-IBP). We apply this model to the problem of Err codemadness.org 70 i 7231 resource allocation in Continual Learning (CL) where new tasks occur and the Err codemadness.org 70 i 7232 network requires extra resources. Our model uses online variational inference Err codemadness.org 70 i 7233 with reparameterisation of the Bernoulli and Beta distributions, which Err codemadness.org 70 i 7234 constitute the IBP and H-IBP priors. As we automatically learn the number of Err codemadness.org 70 i 7235 weights in each layer of the BNN, overfitting and underfitting problems are Err codemadness.org 70 i 7236 largely overcome. We show empirically that our approach offers a competitive Err codemadness.org 70 i 7237 edge over existing methods in CL. Err codemadness.org 70 i 7238 </p> Err codemadness.org 70 i 7239 Err codemadness.org 70 i 7240 Err codemadness.org 70 i 7241 Err codemadness.org 70 i 7242 CoSimLex: A Resource for Evaluating Graded Word Similarity in Context. (arXiv:1912.05320v3 [cs.CL] UPDATED) Err codemadness.org 70 i 7243 http://fr.arxiv.org/abs/1912.05320 Err codemadness.org 70 i 7244 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Armendariz_C/0/1/0/all/0/1">Carlos Santos Armendariz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Purver_M/0/1/0/all/0/1">Matthew Purver</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ulcar_M/0/1/0/all/0/1">Matej Ul&#x10d;ar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pollak_S/0/1/0/all/0/1">Senja Pollak</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ljubesic_N/0/1/0/all/0/1">Nikola Ljube&#x161;i&#x107;</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Robnik_Sikonja_M/0/1/0/all/0/1">Marko Robnik-&#x160;ikonja</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Granroth_Wilding_M/0/1/0/all/0/1">Mark Granroth-Wilding</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vaik_K/0/1/0/all/0/1">Kristiina Vaik</a></p> Err codemadness.org 70 i 7245 Err codemadness.org 70 i 7246 <p>State of the art natural language processing tools are built on Err codemadness.org 70 i 7247 context-dependent word embeddings, but no direct method for evaluating these Err codemadness.org 70 i 7248 representations currently exists. Standard tasks and datasets for intrinsic Err codemadness.org 70 i 7249 evaluation of embeddings are based on judgements of similarity, but ignore Err codemadness.org 70 i 7250 context; standard tasks for word sense disambiguation take account of context Err codemadness.org 70 i 7251 but do not provide continuous measures of meaning similarity. This paper Err codemadness.org 70 i 7252 describes an effort to build a new dataset, CoSimLex, intended to fill this Err codemadness.org 70 i 7253 gap. Building on the standard pairwise similarity task of SimLex-999, it Err codemadness.org 70 i 7254 provides context-dependent similarity measures; covers not only discrete Err codemadness.org 70 i 7255 differences in word sense but more subtle, graded changes in meaning; and Err codemadness.org 70 i 7256 covers not only a well-resourced language (English) but a number of Err codemadness.org 70 i 7257 less-resourced languages. We define the task and evaluation metrics, outline Err codemadness.org 70 i 7258 the dataset collection methodology, and describe the status of the dataset so Err codemadness.org 70 i 7259 far. Err codemadness.org 70 i 7260 </p> Err codemadness.org 70 i 7261 Err codemadness.org 70 i 7262 Err codemadness.org 70 i 7263 Err codemadness.org 70 i 7264 What it Thinks is Important is Important: Robustness Transfers through Input Gradients. (arXiv:1912.05699v3 [cs.LG] UPDATED) Err codemadness.org 70 i 7265 http://fr.arxiv.org/abs/1912.05699 Err codemadness.org 70 i 7266 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chan_A/0/1/0/all/0/1">Alvin Chan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tay_Y/0/1/0/all/0/1">Yi Tay</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ong_Y/0/1/0/all/0/1">Yew-Soon Ong</a></p> Err codemadness.org 70 i 7267 Err codemadness.org 70 i 7268 <p>Adversarial perturbations are imperceptible changes to input pixels that can Err codemadness.org 70 i 7269 change the prediction of deep learning models. Learned weights of models robust Err codemadness.org 70 i 7270 to such perturbations are previously found to be transferable across different Err codemadness.org 70 i 7271 tasks but this applies only if the model architecture for the source and target Err codemadness.org 70 i 7272 tasks is the same. Input gradients characterize how small changes at each input Err codemadness.org 70 i 7273 pixel affect the model output. Using only natural images, we show here that Err codemadness.org 70 i 7274 training a student model's input gradients to match those of a robust teacher Err codemadness.org 70 i 7275 model can gain robustness close to a strong baseline that is robustly trained Err codemadness.org 70 i 7276 from scratch. Through experiments in MNIST, CIFAR-10, CIFAR-100 and Err codemadness.org 70 i 7277 Tiny-ImageNet, we show that our proposed method, input gradient adversarial Err codemadness.org 70 i 7278 matching, can transfer robustness across different tasks and even across Err codemadness.org 70 i 7279 different model architectures. This demonstrates that directly targeting the Err codemadness.org 70 i 7280 semantics of input gradients is a feasible way towards adversarial robustness. Err codemadness.org 70 i 7281 </p> Err codemadness.org 70 i 7282 Err codemadness.org 70 i 7283 Err codemadness.org 70 i 7284 Err codemadness.org 70 i 7285 ORCA: a Benchmark for Data Web Crawlers. (arXiv:1912.08026v2 [cs.DB] UPDATED) Err codemadness.org 70 i 7286 http://fr.arxiv.org/abs/1912.08026 Err codemadness.org 70 i 7287 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Roder_M/0/1/0/all/0/1">Michael R&#xf6;der</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Souza_G/0/1/0/all/0/1">Geraldo de Souza</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kuchelev_D/0/1/0/all/0/1">Denis Kuchelev</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Desouki_A/0/1/0/all/0/1">Abdelmoneim Amer Desouki</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ngomo_A/0/1/0/all/0/1">Axel-Cyrille Ngonga Ngomo</a></p> Err codemadness.org 70 i 7288 Err codemadness.org 70 i 7289 <p>The number of RDF knowledge graphs available on the Web grows constantly. Err codemadness.org 70 i 7290 Gathering these graphs at large scale for downstream applications hence Err codemadness.org 70 i 7291 requires the use of crawlers. Although Data Web crawlers exist, and general Web Err codemadness.org 70 i 7292 crawlers could be adapted to focus on the Data Web, there is currently no Err codemadness.org 70 i 7293 benchmark to fairly evaluate their performance. Our work closes this gap by Err codemadness.org 70 i 7294 presenting the Orca benchmark. Orca generates a synthetic Data Web, which is Err codemadness.org 70 i 7295 decoupled from the original Web and enables a fair and repeatable comparison of Err codemadness.org 70 i 7296 Data Web crawlers. Our evaluations show that Orca can be used to reveal the Err codemadness.org 70 i 7297 different advantages and disadvantages of existing crawlers. The benchmark is Err codemadness.org 70 i 7298 open-source and available at https://github.com/dice-group/orca. Err codemadness.org 70 i 7299 </p> Err codemadness.org 70 i 7300 Err codemadness.org 70 i 7301 Err codemadness.org 70 i 7302 Err codemadness.org 70 i 7303 Deep Automodulators. (arXiv:1912.10321v4 [cs.LG] UPDATED) Err codemadness.org 70 i 7304 http://fr.arxiv.org/abs/1912.10321 Err codemadness.org 70 i 7305 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Heljakka_A/0/1/0/all/0/1">Ari Heljakka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hou_Y/0/1/0/all/0/1">Yuxin Hou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kannala_J/0/1/0/all/0/1">Juho Kannala</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Solin_A/0/1/0/all/0/1">Arno Solin</a></p> Err codemadness.org 70 i 7306 Err codemadness.org 70 i 7307 <p>We introduce a new category of generative autoencoders called automodulators. Err codemadness.org 70 i 7308 These networks can faithfully reproduce individual real-world input images like Err codemadness.org 70 i 7309 regular autoencoders, but also generate a fused sample from an arbitrary Err codemadness.org 70 i 7310 combination of several such images, allowing instantaneous 'style-mixing' and Err codemadness.org 70 i 7311 other new applications. An automodulator decouples the data flow of decoder Err codemadness.org 70 i 7312 operations from statistical properties thereof and uses the latent vector to Err codemadness.org 70 i 7313 modulate the former by the latter, with a principled approach for mutual Err codemadness.org 70 i 7314 disentanglement of decoder layers. Prior work has explored similar decoder Err codemadness.org 70 i 7315 architecture with GANs, but their focus has been on random sampling. A Err codemadness.org 70 i 7316 corresponding autoencoder could operate on real input images. For the first Err codemadness.org 70 i 7317 time, we show how to train such a general-purpose model with sharp outputs in Err codemadness.org 70 i 7318 high resolution, using novel training techniques, demonstrated on four image Err codemadness.org 70 i 7319 data sets. Besides style-mixing, we show state-of-the-art results in Err codemadness.org 70 i 7320 autoencoder comparison, and visual image quality nearly indistinguishable from Err codemadness.org 70 i 7321 state-of-the-art GANs. We expect the automodulator variants to become a useful Err codemadness.org 70 i 7322 building block for image applications and other data domains. Err codemadness.org 70 i 7323 </p> Err codemadness.org 70 i 7324 Err codemadness.org 70 i 7325 Err codemadness.org 70 i 7326 Err codemadness.org 70 i 7327 Statistical Limits of Supervised Quantum Learning. (arXiv:2001.10477v3 [quant-ph] UPDATED) Err codemadness.org 70 i 7328 http://fr.arxiv.org/abs/2001.10477 Err codemadness.org 70 i 7329 <p>Authors: <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Ciliberto_C/0/1/0/all/0/1">Carlo Ciliberto</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Rocchetto_A/0/1/0/all/0/1">Andrea Rocchetto</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Rudi_A/0/1/0/all/0/1">Alessandro Rudi</a>, <a href="http://fr.arxiv.org/find/quant-ph/1/au:+Wossnig_L/0/1/0/all/0/1">Leonard Wossnig</a></p> Err codemadness.org 70 i 7330 Err codemadness.org 70 i 7331 <p>Within the framework of statistical learning theory it is possible to bound Err codemadness.org 70 i 7332 the minimum number of samples required by a learner to reach a target accuracy. Err codemadness.org 70 i 7333 We show that if the bound on the accuracy is taken into account, quantum Err codemadness.org 70 i 7334 machine learning algorithms for supervised learning---for which statistical Err codemadness.org 70 i 7335 guarantees are available---cannot achieve polylogarithmic runtimes in the input Err codemadness.org 70 i 7336 dimension. We conclude that, when no further assumptions on the problem are Err codemadness.org 70 i 7337 made, quantum machine learning algorithms for supervised learning can have at Err codemadness.org 70 i 7338 most polynomial speedups over efficient classical algorithms, even in cases Err codemadness.org 70 i 7339 where quantum access to the data is naturally available. Err codemadness.org 70 i 7340 </p> Err codemadness.org 70 i 7341 Err codemadness.org 70 i 7342 Err codemadness.org 70 i 7343 Err codemadness.org 70 i 7344 Can Graph Neural Networks Count Substructures?. (arXiv:2002.04025v4 [cs.LG] UPDATED) Err codemadness.org 70 i 7345 http://fr.arxiv.org/abs/2002.04025 Err codemadness.org 70 i 7346 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Z/0/1/0/all/0/1">Zhengdao Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_L/0/1/0/all/0/1">Lei Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Villar_S/0/1/0/all/0/1">Soledad Villar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bruna_J/0/1/0/all/0/1">Joan Bruna</a></p> Err codemadness.org 70 i 7347 Err codemadness.org 70 i 7348 <p>The ability to detect and count certain substructures in graphs is important Err codemadness.org 70 i 7349 for solving many tasks on graph-structured data, especially in the contexts of Err codemadness.org 70 i 7350 computational chemistry and biology as well as social network analysis. Err codemadness.org 70 i 7351 Inspired by this, we propose to study the expressive power of graph neural Err codemadness.org 70 i 7352 networks (GNNs) via their ability to count attributed graph substructures, Err codemadness.org 70 i 7353 extending recent works that examine their power in graph isomorphism testing Err codemadness.org 70 i 7354 and function approximation. We distinguish between two types of substructure Err codemadness.org 70 i 7355 counting: induced-subgraph-count and subgraph-count, and establish both Err codemadness.org 70 i 7356 positive and negative answers for popular GNN architectures. Specifically, we Err codemadness.org 70 i 7357 prove that Message Passing Neural Networks (MPNNs), 2-Weisfeiler-Lehman (2-WL) Err codemadness.org 70 i 7358 and 2-Invariant Graph Networks (2-IGNs) cannot perform induced-subgraph-count Err codemadness.org 70 i 7359 of substructures consisting of 3 or more nodes, while they can perform Err codemadness.org 70 i 7360 subgraph-count of star-shaped substructures. As an intermediary step, we prove Err codemadness.org 70 i 7361 that 2-WL and 2-IGNs are equivalent in distinguishing non-isomorphic graphs, Err codemadness.org 70 i 7362 partly answering an open problem raised in Maron et al. (2019). We also prove Err codemadness.org 70 i 7363 positive results for k-WL and k-IGNs as well as negative results for k-WL with Err codemadness.org 70 i 7364 a finite number of iterations. We then conduct experiments that support the Err codemadness.org 70 i 7365 theoretical results for MPNNs and 2-IGNs. Moreover, motivated by substructure Err codemadness.org 70 i 7366 counting and inspired by Murphy et al. (2019), we propose the Local Relational Err codemadness.org 70 i 7367 Pooling model and demonstrate that it is not only effective for substructure Err codemadness.org 70 i 7368 counting but also able to achieve competitive performance on molecular Err codemadness.org 70 i 7369 prediction tasks. Err codemadness.org 70 i 7370 </p> Err codemadness.org 70 i 7371 Err codemadness.org 70 i 7372 Err codemadness.org 70 i 7373 Err codemadness.org 70 i 7374 An implicit function learning approach for parametric modal regression. (arXiv:2002.06195v2 [stat.ML] UPDATED) Err codemadness.org 70 i 7375 http://fr.arxiv.org/abs/2002.06195 Err codemadness.org 70 i 7376 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Pan_Y/0/1/0/all/0/1">Yangchen Pan</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Imani_E/0/1/0/all/0/1">Ehsan Imani</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+White_M/0/1/0/all/0/1">Martha White</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Farahmand_A/0/1/0/all/0/1">Amir-massoud Farahmand</a></p> Err codemadness.org 70 i 7377 Err codemadness.org 70 i 7378 <p>For multi-valued functions---such as when the conditional distribution on Err codemadness.org 70 i 7379 targets given the inputs is multi-modal---standard regression approaches are Err codemadness.org 70 i 7380 not always desirable because they provide the conditional mean. Modal Err codemadness.org 70 i 7381 regression algorithms address this issue by instead finding the conditional Err codemadness.org 70 i 7382 mode(s). Most, however, are nonparametric approaches and so can be difficult to Err codemadness.org 70 i 7383 scale. Further, parametric approximators, like neural networks, facilitate Err codemadness.org 70 i 7384 learning complex relationships between inputs and targets. In this work, we Err codemadness.org 70 i 7385 propose a parametric modal regression algorithm. We use the implicit function Err codemadness.org 70 i 7386 theorem to develop an objective, for learning a joint function over inputs and Err codemadness.org 70 i 7387 targets. We empirically demonstrate on several synthetic problems that our Err codemadness.org 70 i 7388 method (i) can learn multi-valued functions and produce the conditional modes, Err codemadness.org 70 i 7389 (ii) scales well to high-dimensional inputs, and (iii) can even be more Err codemadness.org 70 i 7390 effective for certain uni-modal problems, particularly for high-frequency Err codemadness.org 70 i 7391 functions. We demonstrate that our method is competitive in a real-world modal Err codemadness.org 70 i 7392 regression problem and two regular regression datasets. Err codemadness.org 70 i 7393 </p> Err codemadness.org 70 i 7394 Err codemadness.org 70 i 7395 Err codemadness.org 70 i 7396 Err codemadness.org 70 i 7397 Learning Global Transparent Models Consistent with Local Contrastive Explanations. (arXiv:2002.08247v4 [cs.LG] UPDATED) Err codemadness.org 70 i 7398 http://fr.arxiv.org/abs/2002.08247 Err codemadness.org 70 i 7399 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Pedapati_T/0/1/0/all/0/1">Tejaswini Pedapati</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Balakrishnan_A/0/1/0/all/0/1">Avinash Balakrishnan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shanmugam_K/0/1/0/all/0/1">Karthikeyan Shanmugam</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dhurandhar_A/0/1/0/all/0/1">Amit Dhurandhar</a></p> Err codemadness.org 70 i 7400 Err codemadness.org 70 i 7401 <p>There is a rich and growing literature on producing local Err codemadness.org 70 i 7402 contrastive/counterfactual explanations for black-box models (e.g. neural Err codemadness.org 70 i 7403 networks). Err codemadness.org 70 i 7404 </p> Err codemadness.org 70 i 7405 <p>In these methods, for an input, an explanation is in the form of a contrast Err codemadness.org 70 i 7406 point differing in very few features from the original input and lying in a Err codemadness.org 70 i 7407 different class. Other works try to build globally interpretable models like Err codemadness.org 70 i 7408 decision trees and rule lists based on the data using actual labels or based on Err codemadness.org 70 i 7409 the black-box models predictions. Although these interpretable global models Err codemadness.org 70 i 7410 can be useful, they may not be consistent with local explanations from a Err codemadness.org 70 i 7411 specific black-box of choice. In this work, we explore the question: Can we Err codemadness.org 70 i 7412 produce a transparent global model that is simultaneously accurate and Err codemadness.org 70 i 7413 consistent with the local (contrastive) explanations of the black-box model? We Err codemadness.org 70 i 7414 introduce a natural local consistency metric that quantifies if the local Err codemadness.org 70 i 7415 explanations and predictions of the black-box model are also consistent with Err codemadness.org 70 i 7416 the proxy global transparent model. Based on a key insight we propose a novel Err codemadness.org 70 i 7417 method where we create custom boolean features from sparse local contrastive Err codemadness.org 70 i 7418 explanations of the black-box model and then train a globally transparent model Err codemadness.org 70 i 7419 on just these, and showcase empirically that such models have higher local Err codemadness.org 70 i 7420 consistency compared with other known strategies, while still being close in Err codemadness.org 70 i 7421 performance to models that are trained with access to the original data. Err codemadness.org 70 i 7422 </p> Err codemadness.org 70 i 7423 Err codemadness.org 70 i 7424 Err codemadness.org 70 i 7425 Err codemadness.org 70 i 7426 A two-stage data-analysis method for total-reflection high-energy positron diffraction (TRHEPD). (arXiv:2002.12165v2 [cond-mat.mtrl-sci] UPDATED) Err codemadness.org 70 i 7427 http://fr.arxiv.org/abs/2002.12165 Err codemadness.org 70 i 7428 <p>Authors: <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Tanaka_K/0/1/0/all/0/1">Kazuyuki Tanaka</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Mochizuki_I/0/1/0/all/0/1">Izumi Mochizuki</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Hanada_T/0/1/0/all/0/1">Takashi Hanada</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Ichimiya_A/0/1/0/all/0/1">Ayahiko Ichimiya</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Hyodo_T/0/1/0/all/0/1">Toshio Hyodo</a>, <a href="http://fr.arxiv.org/find/cond-mat/1/au:+Hoshi_T/0/1/0/all/0/1">Takeo Hoshi</a></p> Err codemadness.org 70 i 7429 Err codemadness.org 70 i 7430 <p>Total-reflection high-energy positron diffraction (TRHEPD) is a novel Err codemadness.org 70 i 7431 experimental method for the determination of surface structure, which has been Err codemadness.org 70 i 7432 extensively developed at the Slow Positron Facility, Institute of Materials Err codemadness.org 70 i 7433 Structure Science, High Energy Accelerator Research Organization (KEK). In this Err codemadness.org 70 i 7434 paper, a two-stage data-analysis method is proposed. The data analysis is based Err codemadness.org 70 i 7435 on an inverse problem in which the atomic positions of a surface structure are Err codemadness.org 70 i 7436 determined from the experimental diffraction data (rocking curves). The Err codemadness.org 70 i 7437 relevant forward problem is solved by the numerical solution of the partial Err codemadness.org 70 i 7438 differential equation for quantum scattering of the positron. In the present Err codemadness.org 70 i 7439 two-stage method, the first stage is a grid-based global search and the second Err codemadness.org 70 i 7440 stage is a local search for the unique candidate for the atomic arrangement. Err codemadness.org 70 i 7441 The numerical problem is solved on a supercomputer Err codemadness.org 70 i 7442 </p> Err codemadness.org 70 i 7443 Err codemadness.org 70 i 7444 Err codemadness.org 70 i 7445 Err codemadness.org 70 i 7446 Curriculum By Smoothing. (arXiv:2003.01367v3 [cs.LG] UPDATED) Err codemadness.org 70 i 7447 http://fr.arxiv.org/abs/2003.01367 Err codemadness.org 70 i 7448 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Sinha_S/0/1/0/all/0/1">Samarth Sinha</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Garg_A/0/1/0/all/0/1">Animesh Garg</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Larochelle_H/0/1/0/all/0/1">Hugo Larochelle</a></p> Err codemadness.org 70 i 7449 Err codemadness.org 70 i 7450 <p>Convolutional Neural Networks (CNNs) have shown impressive performance in Err codemadness.org 70 i 7451 computer vision tasks such as image classification, detection, and Err codemadness.org 70 i 7452 segmentation. Moreover, recent work in Generative Adversarial Networks (GANs) Err codemadness.org 70 i 7453 has highlighted the importance of learning by progressively increasing the Err codemadness.org 70 i 7454 difficulty of a learning task [26]. When learning a network from scratch, the Err codemadness.org 70 i 7455 information propagated within the network during the earlier stages of training Err codemadness.org 70 i 7456 can contain distortion artifacts due to noise which can be detrimental to Err codemadness.org 70 i 7457 training. In this paper, we propose an elegant curriculum based scheme that Err codemadness.org 70 i 7458 smoothes the feature embedding of a CNN using anti-aliasing or low-pass Err codemadness.org 70 i 7459 filters. We propose to augment the train-ing of CNNs by controlling the amount Err codemadness.org 70 i 7460 of high frequency information propagated within the CNNs as training Err codemadness.org 70 i 7461 progresses, by convolving the output of a CNN feature map of each layer with a Err codemadness.org 70 i 7462 Gaussian kernel. By decreasing the variance of the Gaussian kernel, we Err codemadness.org 70 i 7463 gradually increase the amount of high-frequency information available within Err codemadness.org 70 i 7464 the network for inference. As the amount of information in the feature maps Err codemadness.org 70 i 7465 increases during training, the network is able to progressively learn better Err codemadness.org 70 i 7466 representations of the data. Our proposed augmented training scheme Err codemadness.org 70 i 7467 significantly improves the performance of CNNs on various vision tasks without Err codemadness.org 70 i 7468 either adding additional trainable parameters or an auxiliary regularization Err codemadness.org 70 i 7469 objective. The generality of our method is demonstrated through empirical Err codemadness.org 70 i 7470 performance gains in CNN architectures across four different tasks: transfer Err codemadness.org 70 i 7471 learning, cross-task transfer learning, and generative models. Err codemadness.org 70 i 7472 </p> Err codemadness.org 70 i 7473 Err codemadness.org 70 i 7474 Err codemadness.org 70 i 7475 Err codemadness.org 70 i 7476 Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations. (arXiv:2003.02960v3 [cs.LG] UPDATED) Err codemadness.org 70 i 7477 http://fr.arxiv.org/abs/2003.02960 Err codemadness.org 70 i 7478 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Golatkar_A/0/1/0/all/0/1">Aditya Golatkar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Achille_A/0/1/0/all/0/1">Alessandro Achille</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Soatto_S/0/1/0/all/0/1">Stefano Soatto</a></p> Err codemadness.org 70 i 7479 Err codemadness.org 70 i 7480 <p>We describe a procedure for removing dependency on a cohort of training data Err codemadness.org 70 i 7481 from a trained deep network that improves upon and generalizes previous methods Err codemadness.org 70 i 7482 to different readout functions and can be extended to ensure forgetting in the Err codemadness.org 70 i 7483 activations of the network. We introduce a new bound on how much information Err codemadness.org 70 i 7484 can be extracted per query about the forgotten cohort from a black-box network Err codemadness.org 70 i 7485 for which only the input-output behavior is observed. The proposed forgetting Err codemadness.org 70 i 7486 procedure has a deterministic part derived from the differential equations of a Err codemadness.org 70 i 7487 linearized version of the model, and a stochastic part that ensures information Err codemadness.org 70 i 7488 destruction by adding noise tailored to the geometry of the loss landscape. We Err codemadness.org 70 i 7489 exploit the connections between the activation and weight dynamics of a DNN Err codemadness.org 70 i 7490 inspired by Neural Tangent Kernels to compute the information in the Err codemadness.org 70 i 7491 activations. Err codemadness.org 70 i 7492 </p> Err codemadness.org 70 i 7493 Err codemadness.org 70 i 7494 Err codemadness.org 70 i 7495 Err codemadness.org 70 i 7496 No Surprises: Training Robust Lung Nodule Detection for Low-Dose CT Scans by Augmenting with Adversarial Attacks. (arXiv:2003.03824v2 [eess.IV] UPDATED) Err codemadness.org 70 i 7497 http://fr.arxiv.org/abs/2003.03824 Err codemadness.org 70 i 7498 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Liu_S/0/1/0/all/0/1">Siqi Liu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Setio_A/0/1/0/all/0/1">Arnaud Arindra Adiyoso Setio</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ghesu_F/0/1/0/all/0/1">Florin C. Ghesu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Gibson_E/0/1/0/all/0/1">Eli Gibson</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Grbic_S/0/1/0/all/0/1">Sasa Grbic</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Georgescu_B/0/1/0/all/0/1">Bogdan Georgescu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Comaniciu_D/0/1/0/all/0/1">Dorin Comaniciu</a></p> Err codemadness.org 70 i 7499 Err codemadness.org 70 i 7500 <p>Detecting malignant pulmonary nodules at an early stage can allow medical Err codemadness.org 70 i 7501 interventions which may increase the survival rate of lung cancer patients. Err codemadness.org 70 i 7502 Using computer vision techniques to detect nodules can improve the sensitivity Err codemadness.org 70 i 7503 and the speed of interpreting chest CT for lung cancer screening. Many studies Err codemadness.org 70 i 7504 have used CNNs to detect nodule candidates. Though such approaches have been Err codemadness.org 70 i 7505 shown to outperform the conventional image processing based methods regarding Err codemadness.org 70 i 7506 the detection accuracy, CNNs are also known to be limited to generalize on Err codemadness.org 70 i 7507 under-represented samples in the training set and prone to imperceptible noise Err codemadness.org 70 i 7508 perturbations. Such limitations can not be easily addressed by scaling up the Err codemadness.org 70 i 7509 dataset or the models. In this work, we propose to add adversarial synthetic Err codemadness.org 70 i 7510 nodules and adversarial attack samples to the training data to improve the Err codemadness.org 70 i 7511 generalization and the robustness of the lung nodule detection systems. To Err codemadness.org 70 i 7512 generate hard examples of nodules from a differentiable nodule synthesizer, we Err codemadness.org 70 i 7513 use projected gradient descent (PGD) to search the latent code within a bounded Err codemadness.org 70 i 7514 neighbourhood that would generate nodules to decrease the detector response. To Err codemadness.org 70 i 7515 make the network more robust to unanticipated noise perturbations, we use PGD Err codemadness.org 70 i 7516 to search for noise patterns that can trigger the network to give Err codemadness.org 70 i 7517 over-confident mistakes. By evaluating on two different benchmark datasets Err codemadness.org 70 i 7518 containing consensus annotations from three radiologists, we show that the Err codemadness.org 70 i 7519 proposed techniques can improve the detection performance on real CT data. To Err codemadness.org 70 i 7520 understand the limitations of both the conventional networks and the proposed Err codemadness.org 70 i 7521 augmented networks, we also perform stress-tests on the false positive Err codemadness.org 70 i 7522 reduction networks by feeding different types of artificially produced patches. Err codemadness.org 70 i 7523 We show that the augmented networks are more robust to both under-represented Err codemadness.org 70 i 7524 nodules as well as resistant to noise perturbations. Err codemadness.org 70 i 7525 </p> Err codemadness.org 70 i 7526 Err codemadness.org 70 i 7527 Err codemadness.org 70 i 7528 Err codemadness.org 70 i 7529 Wide-minima Density Hypothesis and the Explore-Exploit Learning Rate Schedule. (arXiv:2003.03977v4 [cs.LG] UPDATED) Err codemadness.org 70 i 7530 http://fr.arxiv.org/abs/2003.03977 Err codemadness.org 70 i 7531 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Iyer_N/0/1/0/all/0/1">Nikhil Iyer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Thejas_V/0/1/0/all/0/1">V Thejas</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kwatra_N/0/1/0/all/0/1">Nipun Kwatra</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ramjee_R/0/1/0/all/0/1">Ramachandran Ramjee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sivathanu_M/0/1/0/all/0/1">Muthian Sivathanu</a></p> Err codemadness.org 70 i 7532 Err codemadness.org 70 i 7533 <p>Several papers argue that wide minima generalize better than narrow minima. Err codemadness.org 70 i 7534 In this paper, through detailed experiments that not only corroborate the Err codemadness.org 70 i 7535 generalization properties of wide minima, we also provide empirical evidence Err codemadness.org 70 i 7536 for a new hypothesis that the density of wide minima is likely lower than the Err codemadness.org 70 i 7537 density of narrow minima. Further, motivated by this hypothesis, we design a Err codemadness.org 70 i 7538 novel explore-exploit learning rate schedule. On a variety of image and natural Err codemadness.org 70 i 7539 language datasets, compared to their original hand-tuned learning rate Err codemadness.org 70 i 7540 baselines, we show that our explore-exploit schedule can result in either up to Err codemadness.org 70 i 7541 0.84% higher absolute accuracy using the original training budget or up to 57% Err codemadness.org 70 i 7542 reduced training time while achieving the original reported accuracy. For Err codemadness.org 70 i 7543 example, we achieve state-of-the-art (SOTA) accuracy for IWSLT'14 (DE-EN) and Err codemadness.org 70 i 7544 WMT'14 (DE-EN) datasets by just modifying the learning rate schedule of a high Err codemadness.org 70 i 7545 performing model. Err codemadness.org 70 i 7546 </p> Err codemadness.org 70 i 7547 Err codemadness.org 70 i 7548 Err codemadness.org 70 i 7549 Err codemadness.org 70 i 7550 Compressive Isogeometric Analysis. (arXiv:2003.06475v2 [math.NA] UPDATED) Err codemadness.org 70 i 7551 http://fr.arxiv.org/abs/2003.06475 Err codemadness.org 70 i 7552 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Brugiapaglia_S/0/1/0/all/0/1">Simone Brugiapaglia</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Tamellini_L/0/1/0/all/0/1">Lorenzo Tamellini</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Tani_M/0/1/0/all/0/1">Mattia Tani</a></p> Err codemadness.org 70 i 7553 Err codemadness.org 70 i 7554 <p>This work is motivated by the difficulty in assembling the Galerkin matrix Err codemadness.org 70 i 7555 when solving Partial Differential Equations (PDEs) with Isogeometric Analysis Err codemadness.org 70 i 7556 (IGA) using B-splines of moderate-to-high polynomial degree. To mitigate this Err codemadness.org 70 i 7557 problem, we propose a novel methodology named CossIGA (COmpreSSive IsoGeometric Err codemadness.org 70 i 7558 Analysis), which combines the IGA principle with CORSING, a recently introduced Err codemadness.org 70 i 7559 sparse recovery approach for PDEs based on compressive sensing. CossIGA Err codemadness.org 70 i 7560 assembles only a small portion of a suitable IGA Petrov-Galerkin discretization Err codemadness.org 70 i 7561 and is effective whenever the PDE solution is sufficiently sparse or Err codemadness.org 70 i 7562 compressible, i.e., when most of its coefficients are zero or negligible. The Err codemadness.org 70 i 7563 sparsity of the solution is promoted by employing a multilevel dictionary of Err codemadness.org 70 i 7564 B-splines as opposed to a basis. Thanks to sparsity and the fact that only a Err codemadness.org 70 i 7565 fraction of the full discretization matrix is assembled, the proposed technique Err codemadness.org 70 i 7566 has the potential to lead to significant computational savings. We show the Err codemadness.org 70 i 7567 effectiveness of CossIGA for the solution of the 2D and 3D Poisson equation Err codemadness.org 70 i 7568 over nontrivial geometries by means of an extensive numerical investigation. Err codemadness.org 70 i 7569 </p> Err codemadness.org 70 i 7570 Err codemadness.org 70 i 7571 Err codemadness.org 70 i 7572 Err codemadness.org 70 i 7573 Thermodynamic Cost of Edge Detection in Artificial Neural Network(ANN)-Based Processors. (arXiv:2003.08196v2 [eess.IV] UPDATED) Err codemadness.org 70 i 7574 http://fr.arxiv.org/abs/2003.08196 Err codemadness.org 70 i 7575 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Barisik_S/0/1/0/all/0/1">Se&#xe7;kin Bar&#x131;&#x15f;&#x131;k</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ercan_I/0/1/0/all/0/1">&#x130;lke Ercan</a></p> Err codemadness.org 70 i 7576 Err codemadness.org 70 i 7577 <p>Architecture-based heat dissipation analyses allow us to reveal fundamental Err codemadness.org 70 i 7578 sources of inefficiency in a given processor and thereby provide us with Err codemadness.org 70 i 7579 road-maps to design less dissipative computing schemes independent of Err codemadness.org 70 i 7580 technology-base used to implement them. In this work, we study Err codemadness.org 70 i 7581 architectural-level contributions to energy dissipation in an Artificial Neural Err codemadness.org 70 i 7582 Network (ANN)-based processor that is trained to perform edge-detection task. Err codemadness.org 70 i 7583 We compare the training and information processing cost of ANN to that of Err codemadness.org 70 i 7584 conventional architectures and algorithms using 64-pixel binary image. Our Err codemadness.org 70 i 7585 results reveal the inherent efficiency advantages of an ANN network trained for Err codemadness.org 70 i 7586 specific tasks over general-purpose processors based on von Neumann Err codemadness.org 70 i 7587 architecture. We also compare the proposed performance improvements to that of Err codemadness.org 70 i 7588 Cellular Array Processors (CAPs) and illustrate the reduction in dissipation Err codemadness.org 70 i 7589 for special purpose processors. Lastly, we calculate the change in dissipation Err codemadness.org 70 i 7590 as a result of input data structure and show the effect of randomness on Err codemadness.org 70 i 7591 energetic cost of information processing. The results we obtained provide a Err codemadness.org 70 i 7592 basis for comparison for task-based fundamental energy efficiency analyses for Err codemadness.org 70 i 7593 a range of processors and therefore contribute to the study of Err codemadness.org 70 i 7594 architecture-level descriptions of processors and thermodynamic cost Err codemadness.org 70 i 7595 calculations based on physics of computation. Err codemadness.org 70 i 7596 </p> Err codemadness.org 70 i 7597 Err codemadness.org 70 i 7598 Err codemadness.org 70 i 7599 Err codemadness.org 70 i 7600 On Calibration of Mixup Training for Deep Neural Networks. (arXiv:2003.09946v3 [cs.LG] UPDATED) Err codemadness.org 70 i 7601 http://fr.arxiv.org/abs/2003.09946 Err codemadness.org 70 i 7602 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Maronas_J/0/1/0/all/0/1">Juan Maro&#xf1;as</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ramos_D/0/1/0/all/0/1">Daniel Ramos</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Paredes_R/0/1/0/all/0/1">Roberto Paredes</a></p> Err codemadness.org 70 i 7603 Err codemadness.org 70 i 7604 <p>Deep Neural Networks (DNN) represent the state of the art in many tasks. Err codemadness.org 70 i 7605 However, due to their overparameterization, their generalization capabilities Err codemadness.org 70 i 7606 are in doubt and still a field under study. Consequently, DNN can overfit and Err codemadness.org 70 i 7607 assign overconfident predictions -- effects that have been shown to affect the Err codemadness.org 70 i 7608 calibration of the confidences assigned to unseen data. Data Augmentation (DA) Err codemadness.org 70 i 7609 strategies have been proposed to regularize these models, being Mixup one of Err codemadness.org 70 i 7610 the most popular due to its ability to improve the accuracy, the uncertainty Err codemadness.org 70 i 7611 quantification and the calibration of DNN. In this work however we argue and Err codemadness.org 70 i 7612 provide empirical evidence that, due to its fundamentals, Mixup does not Err codemadness.org 70 i 7613 necessarily improve calibration. Based on our observations we propose a new Err codemadness.org 70 i 7614 loss function that improves the calibration, and also sometimes the accuracy, Err codemadness.org 70 i 7615 of DNN trained with this DA technique. Our loss is inspired by Bayes decision Err codemadness.org 70 i 7616 theory and introduces a new training framework for designing losses for Err codemadness.org 70 i 7617 probabilistic modelling. We provide state-of-the-art accuracy with consistent Err codemadness.org 70 i 7618 improvements in calibration performance. Appendix and code are provided here: Err codemadness.org 70 i 7619 https://github.com/jmaronas/calibration_MixupDNN_ARCLoss.pytorch.git Err codemadness.org 70 i 7620 </p> Err codemadness.org 70 i 7621 Err codemadness.org 70 i 7622 Err codemadness.org 70 i 7623 Err codemadness.org 70 i 7624 Unique Chinese Linguistic Phenomena. (arXiv:2004.00499v3 [cs.CL] UPDATED) Err codemadness.org 70 i 7625 http://fr.arxiv.org/abs/2004.00499 Err codemadness.org 70 i 7626 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Jia_S/0/1/0/all/0/1">Shengbin Jia</a></p> Err codemadness.org 70 i 7627 Err codemadness.org 70 i 7628 <p>Linguistics holds unique characteristics of generality, stability, and Err codemadness.org 70 i 7629 nationality, which will affect the formulation of extraction strategies and Err codemadness.org 70 i 7630 should be incorporated into the relation extraction. Chinese open relation Err codemadness.org 70 i 7631 extraction is not well-established, because of the complexity of Chinese Err codemadness.org 70 i 7632 linguistics makes it harder to operate, and the methods for English are not Err codemadness.org 70 i 7633 compatible with that for Chinese. The diversities between Chinese and English Err codemadness.org 70 i 7634 linguistics are mainly reflected in morphology and syntax. Err codemadness.org 70 i 7635 </p> Err codemadness.org 70 i 7636 Err codemadness.org 70 i 7637 Err codemadness.org 70 i 7638 Err codemadness.org 70 i 7639 Is Graph Structure Necessary for Multi-hop Question Answering?. (arXiv:2004.03096v2 [cs.CL] UPDATED) Err codemadness.org 70 i 7640 http://fr.arxiv.org/abs/2004.03096 Err codemadness.org 70 i 7641 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shao_N/0/1/0/all/0/1">Nan Shao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cui_Y/0/1/0/all/0/1">Yiming Cui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1">Ting Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shijin Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hu_G/0/1/0/all/0/1">Guoping Hu</a></p> Err codemadness.org 70 i 7642 Err codemadness.org 70 i 7643 <p>Recently, attempting to model texts as graph structure and introducing graph Err codemadness.org 70 i 7644 neural networks to deal with it has become a trend in many NLP research areas. Err codemadness.org 70 i 7645 In this paper, we investigate whether the graph structure is necessary for Err codemadness.org 70 i 7646 multi-hop question answering. Our analysis is centered on HotpotQA. We Err codemadness.org 70 i 7647 construct a strong baseline model to establish that, with the proper use of Err codemadness.org 70 i 7648 pre-trained models, graph structure may not be necessary for multi-hop question Err codemadness.org 70 i 7649 answering. We point out that both graph structure and adjacency matrix are Err codemadness.org 70 i 7650 task-related prior knowledge, and graph-attention can be considered as a Err codemadness.org 70 i 7651 special case of self-attention. Experiments and visualized analysis demonstrate Err codemadness.org 70 i 7652 that graph-attention or the entire graph structure can be replaced by Err codemadness.org 70 i 7653 self-attention or Transformers. Err codemadness.org 70 i 7654 </p> Err codemadness.org 70 i 7655 Err codemadness.org 70 i 7656 Err codemadness.org 70 i 7657 Err codemadness.org 70 i 7658 Risk-Constrained Linear-Quadratic Regulators. (arXiv:2004.04685v2 [eess.SY] UPDATED) Err codemadness.org 70 i 7659 http://fr.arxiv.org/abs/2004.04685 Err codemadness.org 70 i 7660 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Tsiamis_A/0/1/0/all/0/1">Anastasios Tsiamis</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kalogerias_D/0/1/0/all/0/1">Dionysios S. Kalogerias</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Chamon_L/0/1/0/all/0/1">Luiz F. O. Chamon</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ribeiro_A/0/1/0/all/0/1">Alejandro Ribeiro</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pappas_G/0/1/0/all/0/1">George J. Pappas</a></p> Err codemadness.org 70 i 7661 Err codemadness.org 70 i 7662 <p>We propose a new risk-constrained reformulation of the standard Linear Err codemadness.org 70 i 7663 Quadratic Regulator (LQR) problem. Our framework is motivated by the fact that Err codemadness.org 70 i 7664 the classical (risk-neutral) LQR controller, although optimal in expectation, Err codemadness.org 70 i 7665 might be ineffective under relatively infrequent, yet statistically significant Err codemadness.org 70 i 7666 (risky) events. To effectively trade between average and extreme event Err codemadness.org 70 i 7667 performance, we introduce a new risk constraint, which explicitly restricts the Err codemadness.org 70 i 7668 total expected predictive variance of the state penalty by a user-prescribed Err codemadness.org 70 i 7669 level. We show that, under rather minimal conditions on the process noise Err codemadness.org 70 i 7670 (i.e., finite fourth-order moments), the optimal risk-aware controller can be Err codemadness.org 70 i 7671 evaluated explicitly and in closed form. In fact, it is affine relative to the Err codemadness.org 70 i 7672 state, and is always internally stable regardless of parameter tuning. Our new Err codemadness.org 70 i 7673 risk-aware controller: i) pushes the state away from directions where the noise Err codemadness.org 70 i 7674 exhibits heavy tails, by exploiting the third-order moment (skewness) of the Err codemadness.org 70 i 7675 noise; ii) inflates the state penalty in riskier directions, where both the Err codemadness.org 70 i 7676 noise covariance and the state penalty are simultaneously large. The properties Err codemadness.org 70 i 7677 of the proposed risk-aware LQR framework are also illustrated via indicative Err codemadness.org 70 i 7678 numerical examples. Err codemadness.org 70 i 7679 </p> Err codemadness.org 70 i 7680 Err codemadness.org 70 i 7681 Err codemadness.org 70 i 7682 Err codemadness.org 70 i 7683 Supervised Contrastive Learning. (arXiv:2004.11362v2 [cs.LG] UPDATED) Err codemadness.org 70 i 7684 http://fr.arxiv.org/abs/2004.11362 Err codemadness.org 70 i 7685 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Khosla_P/0/1/0/all/0/1">Prannay Khosla</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Teterwak_P/0/1/0/all/0/1">Piotr Teterwak</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_C/0/1/0/all/0/1">Chen Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sarna_A/0/1/0/all/0/1">Aaron Sarna</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1">Yonglong Tian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Isola_P/0/1/0/all/0/1">Phillip Isola</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Maschinot_A/0/1/0/all/0/1">Aaron Maschinot</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_C/0/1/0/all/0/1">Ce Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Krishnan_D/0/1/0/all/0/1">Dilip Krishnan</a></p> Err codemadness.org 70 i 7686 Err codemadness.org 70 i 7687 <p>Contrastive learning applied to self-supervised representation learning has Err codemadness.org 70 i 7688 seen a resurgence in recent years, leading to state of the art performance in Err codemadness.org 70 i 7689 the unsupervised training of deep image models. Modern batch contrastive Err codemadness.org 70 i 7690 approaches subsume or significantly outperform traditional contrastive losses Err codemadness.org 70 i 7691 such as triplet, max-margin and the N-pairs loss. In this work, we extend the Err codemadness.org 70 i 7692 self-supervised batch contrastive approach to the fully-supervised setting, Err codemadness.org 70 i 7693 allowing us to effectively leverage label information. Clusters of points Err codemadness.org 70 i 7694 belonging to the same class are pulled together in embedding space, while Err codemadness.org 70 i 7695 simultaneously pushing apart clusters of samples from different classes. We Err codemadness.org 70 i 7696 analyze two possible versions of the supervised contrastive (SupCon) loss, Err codemadness.org 70 i 7697 identifying the best-performing formulation of the loss. On ResNet-200, we Err codemadness.org 70 i 7698 achieve top-1 accuracy of 81.4% on the ImageNet dataset, which is 0.8% above Err codemadness.org 70 i 7699 the best number reported for this architecture. We show consistent Err codemadness.org 70 i 7700 outperformance over cross-entropy on other datasets and two ResNet variants. Err codemadness.org 70 i 7701 The loss shows benefits for robustness to natural corruptions and is more Err codemadness.org 70 i 7702 stable to hyperparameter settings such as optimizers and data augmentations. In Err codemadness.org 70 i 7703 reduced data settings, it outperforms cross-entropy significantly. Our loss Err codemadness.org 70 i 7704 function is simple to implement, and reference TensorFlow code is released at Err codemadness.org 70 i 7705 https://t.ly/supcon. Err codemadness.org 70 i 7706 </p> Err codemadness.org 70 i 7707 Err codemadness.org 70 i 7708 Err codemadness.org 70 i 7709 Err codemadness.org 70 i 7710 An Epidemiological Modelling Approach for Covid19 via Data Assimilation. (arXiv:2004.12130v3 [stat.AP] UPDATED) Err codemadness.org 70 i 7711 http://fr.arxiv.org/abs/2004.12130 Err codemadness.org 70 i 7712 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Nadler_P/0/1/0/all/0/1">Philip Nadler</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Wang_S/0/1/0/all/0/1">Shuo Wang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Arcucci_R/0/1/0/all/0/1">Rossella Arcucci</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Yang_X/0/1/0/all/0/1">Xian Yang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Guo_Y/0/1/0/all/0/1">Yike Guo</a></p> Err codemadness.org 70 i 7713 Err codemadness.org 70 i 7714 <p>The global pandemic of the 2019-nCov requires the evaluation of policy Err codemadness.org 70 i 7715 interventions to mitigate future social and economic costs of quarantine Err codemadness.org 70 i 7716 measures worldwide. We propose an epidemiological model for forecasting and Err codemadness.org 70 i 7717 policy evaluation which incorporates new data in real-time through variational Err codemadness.org 70 i 7718 data assimilation. We analyze and discuss infection rates in China, the US and Err codemadness.org 70 i 7719 Italy. In particular, we develop a custom compartmental SIR model fit to Err codemadness.org 70 i 7720 variables related to the epidemic in Chinese cities, named SITR model. We Err codemadness.org 70 i 7721 compare and discuss model results which conducts updates as new observations Err codemadness.org 70 i 7722 become available. A hybrid data assimilation approach is applied to make Err codemadness.org 70 i 7723 results robust to initial conditions. We use the model to do inference on Err codemadness.org 70 i 7724 infection numbers as well as parameters such as the disease transmissibility Err codemadness.org 70 i 7725 rate or the rate of recovery. The parameterisation of the model is parsimonious Err codemadness.org 70 i 7726 and extendable, allowing for the incorporation of additional data and Err codemadness.org 70 i 7727 parameters of interest. This allows for scalability and the extension of the Err codemadness.org 70 i 7728 model to other locations or the adaption of novel data sources. Err codemadness.org 70 i 7729 </p> Err codemadness.org 70 i 7730 Err codemadness.org 70 i 7731 Err codemadness.org 70 i 7732 Err codemadness.org 70 i 7733 Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes. (arXiv:2004.13363v3 [eess.SY] UPDATED) Err codemadness.org 70 i 7734 http://fr.arxiv.org/abs/2004.13363 Err codemadness.org 70 i 7735 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Kement_C/0/1/0/all/0/1">Cihan Emre Kement</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Tavli_B/0/1/0/all/0/1">Bulent Tavli</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Gultekin_H/0/1/0/all/0/1">Hakan Gultekin</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Yanikomeroglu_H/0/1/0/all/0/1">Halim Yanikomeroglu</a></p> Err codemadness.org 70 i 7736 Err codemadness.org 70 i 7737 <p>In smart electricity grids, high time granularity (HTG) power consumption Err codemadness.org 70 i 7738 data can be decomposed into individual appliance load signatures via Err codemadness.org 70 i 7739 Nonintrusive Appliance Load Monitoring techniques to expose appliance usage Err codemadness.org 70 i 7740 profiles. Various methods ranging from load shaping to noise addition and data Err codemadness.org 70 i 7741 aggregation have been proposed to mitigate this problem. However, with the Err codemadness.org 70 i 7742 growing scarcity of natural resources, utilities other than electricity (such Err codemadness.org 70 i 7743 as water and natural gas) have also begun to be subject to HTG metering, which Err codemadness.org 70 i 7744 creates privacy issues similar to that of electricity. Therefore, employing Err codemadness.org 70 i 7745 privacy protection countermeasures for only electricity usage is ineffective Err codemadness.org 70 i 7746 for appliances that utilize additional/other metered resources. As such, Err codemadness.org 70 i 7747 existing privacy countermeasures and metrics need to be reevaluated to address Err codemadness.org 70 i 7748 not only electricity, but also any other resource that is metered. Furthermore, Err codemadness.org 70 i 7749 a holistic privacy protection approach for all metered resources must be Err codemadness.org 70 i 7750 adopted as the information leak from any of the resources has a potential to Err codemadness.org 70 i 7751 render the privacy preserving countermeasures for all the other resources Err codemadness.org 70 i 7752 futile. This paper introduces the privacy preservation problem for multiple HTG Err codemadness.org 70 i 7753 metered resources and explores potential solutions for its mitigation. Err codemadness.org 70 i 7754 </p> Err codemadness.org 70 i 7755 Err codemadness.org 70 i 7756 Err codemadness.org 70 i 7757 Err codemadness.org 70 i 7758 Geometric group testing. (arXiv:2004.14632v3 [cs.CG] UPDATED) Err codemadness.org 70 i 7759 http://fr.arxiv.org/abs/2004.14632 Err codemadness.org 70 i 7760 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Berendsohn_B/0/1/0/all/0/1">Benjamin Aram Berendsohn</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kozma_L/0/1/0/all/0/1">L&#xe1;szl&#xf3; Kozma</a></p> Err codemadness.org 70 i 7761 Err codemadness.org 70 i 7762 <p>Group testing is concerned with identifying $t$ defective items in a set of Err codemadness.org 70 i 7763 $m$ items, where each test reports whether a specific subset of items contains Err codemadness.org 70 i 7764 at least one defective. In non-adaptive group testing, the subsets to be tested Err codemadness.org 70 i 7765 are fixed in advance. By testing multiple items at once, the required number of Err codemadness.org 70 i 7766 tests can be made much smaller than $m$. In fact, for $t \in \mathcal{O}(1)$, Err codemadness.org 70 i 7767 the optimal number of (non-adaptive) tests is known to be $\Theta(\log{m})$. Err codemadness.org 70 i 7768 </p> Err codemadness.org 70 i 7769 <p>In this paper, we consider the problem of non-adaptive group testing in a Err codemadness.org 70 i 7770 geometric setting, where the items are points in $d$-dimensional Euclidean Err codemadness.org 70 i 7771 space and the tests are axis-parallel boxes (hyperrectangles). We present upper Err codemadness.org 70 i 7772 and lower bounds on the required number of tests under this geometric Err codemadness.org 70 i 7773 constraint. In contrast to the general, combinatorial case, the bounds in our Err codemadness.org 70 i 7774 geometric setting are polynomial in $m$. For instance, our results imply that Err codemadness.org 70 i 7775 identifying a defective pair in a set of $m$ points in the plane always Err codemadness.org 70 i 7776 requires $\Omega(m^{3/5})$ tests, and there exist configurations of $m$ points Err codemadness.org 70 i 7777 for which $\mathcal{O}(m^{2/3})$ tests are sufficient, whereas to identify a Err codemadness.org 70 i 7778 single defective point in the plane, $\Theta(m^{1/2})$ tests are always Err codemadness.org 70 i 7779 necessary and sometimes sufficient. Err codemadness.org 70 i 7780 </p> Err codemadness.org 70 i 7781 Err codemadness.org 70 i 7782 Err codemadness.org 70 i 7783 Err codemadness.org 70 i 7784 Minimum Cuts in Geometric Intersection Graphs. (arXiv:2005.00858v2 [cs.CG] UPDATED) Err codemadness.org 70 i 7785 http://fr.arxiv.org/abs/2005.00858 Err codemadness.org 70 i 7786 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Cabello_S/0/1/0/all/0/1">Sergio Cabello</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mulzer_W/0/1/0/all/0/1">Wolfgang Mulzer</a></p> Err codemadness.org 70 i 7787 Err codemadness.org 70 i 7788 <p>Let $\mathcal{D}$ be a set of $n$ disks in the plane. The disk graph Err codemadness.org 70 i 7789 $G_\mathcal{D}$ for $\mathcal{D}$ is the undirected graph with vertex set Err codemadness.org 70 i 7790 $\mathcal{D}$ in which two disks are joined by an edge if and only if they Err codemadness.org 70 i 7791 intersect. The directed transmission graph $G^{\rightarrow}_\mathcal{D}$ for Err codemadness.org 70 i 7792 $\mathcal{D}$ is the directed graph with vertex set $\mathcal{D}$ in which Err codemadness.org 70 i 7793 there is an edge from a disk $D_1 \in \mathcal{D}$ to a disk $D_2 \in Err codemadness.org 70 i 7794 \mathcal{D}$ if and only if $D_1$ contains the center of $D_2$. Err codemadness.org 70 i 7795 </p> Err codemadness.org 70 i 7796 <p>Given $\mathcal{D}$ and two non-intersecting disks $s, t \in \mathcal{D}$, we Err codemadness.org 70 i 7797 show that a minimum $s$-$t$ vertex cut in $G_\mathcal{D}$ or in Err codemadness.org 70 i 7798 $G^{\rightarrow}_\mathcal{D}$ can be found in $O(n^{3/2}\text{polylog} n)$ Err codemadness.org 70 i 7799 expected time. To obtain our result, we combine an algorithm for the maximum Err codemadness.org 70 i 7800 flow problem in general graphs with dynamic geometric data structures to Err codemadness.org 70 i 7801 manipulate the disks. Err codemadness.org 70 i 7802 </p> Err codemadness.org 70 i 7803 <p>As an application, we consider the barrier resilience problem in a Err codemadness.org 70 i 7804 rectangular domain. In this problem, we have a vertical strip $S$ bounded by Err codemadness.org 70 i 7805 two vertical lines, $L_\ell$ and $L_r$, and a collection $\mathcal{D}$ of Err codemadness.org 70 i 7806 disks. Let $a$ be a point in $S$ above all disks of $\mathcal{D}$, and let $b$ Err codemadness.org 70 i 7807 a point in $S$ below all disks of $\mathcal{D}$. The task is to find a curve Err codemadness.org 70 i 7808 from $a$ to $b$ that lies in $S$ and that intersects as few disks of Err codemadness.org 70 i 7809 $\mathcal{D}$ as possible. Using our improved algorithm for minimum cuts in Err codemadness.org 70 i 7810 disk graphs, we can solve the barrier resilience problem in Err codemadness.org 70 i 7811 $O(n^{3/2}\text{polylog} n)$ expected time. Err codemadness.org 70 i 7812 </p> Err codemadness.org 70 i 7813 Err codemadness.org 70 i 7814 Err codemadness.org 70 i 7815 Err codemadness.org 70 i 7816 Model Creation and Equivalence Proofs of Cellular Automata and Artificial Neural Networks. (arXiv:2005.01192v3 [cs.NE] UPDATED) Err codemadness.org 70 i 7817 http://fr.arxiv.org/abs/2005.01192 Err codemadness.org 70 i 7818 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Christen_P/0/1/0/all/0/1">Patrik Christen</a></p> Err codemadness.org 70 i 7819 Err codemadness.org 70 i 7820 <p>Computational methods and mathematical models have invaded arguably every Err codemadness.org 70 i 7821 scientific discipline forming its own field of research called computational Err codemadness.org 70 i 7822 science. Mathematical models are the theoretical foundation of computational Err codemadness.org 70 i 7823 science. Since Newton's time, differential equations in mathematical models Err codemadness.org 70 i 7824 have been widely and successfully used to describe the macroscopic or global Err codemadness.org 70 i 7825 behaviour of systems. With spatially inhomogeneous, time-varying, local Err codemadness.org 70 i 7826 element-specific, and often non-linear interactions, the dynamics of complex Err codemadness.org 70 i 7827 systems is in contrast more efficiently described by local rules and thus in an Err codemadness.org 70 i 7828 algorithmic and local or microscopic manner. The theory of mathematical Err codemadness.org 70 i 7829 modelling taking into account these characteristics of complex systems has to Err codemadness.org 70 i 7830 be established still. We recently presented a so-called allagmatic method Err codemadness.org 70 i 7831 including a system metamodel to provide a framework for describing, modelling, Err codemadness.org 70 i 7832 simulating, and interpreting complex systems. Implementations of cellular Err codemadness.org 70 i 7833 automata and artificial neural networks were described and created with that Err codemadness.org 70 i 7834 method. Guidance from philosophy were helpful in these first studies focusing Err codemadness.org 70 i 7835 on programming and feasibility. A rigorous mathematical formalism, however, is Err codemadness.org 70 i 7836 still missing. This would not only more precisely describe and define the Err codemadness.org 70 i 7837 system metamodel, it would also further generalise it and with that extend its Err codemadness.org 70 i 7838 reach to formal treatment in applied mathematics and theoretical aspects of Err codemadness.org 70 i 7839 computational science as well as extend its applicability to other mathematical Err codemadness.org 70 i 7840 and computational models such as agent-based models. Here, a mathematical Err codemadness.org 70 i 7841 definition of the system metamodel is provided. Based on the presented Err codemadness.org 70 i 7842 formalism, model creation and equivalence of cellular automata and artificial Err codemadness.org 70 i 7843 neural networks are proved. It thus provides a formal approach for studying the Err codemadness.org 70 i 7844 creation of mathematical models as well as their structural and operational Err codemadness.org 70 i 7845 comparison. Err codemadness.org 70 i 7846 </p> Err codemadness.org 70 i 7847 Err codemadness.org 70 i 7848 Err codemadness.org 70 i 7849 Err codemadness.org 70 i 7850 Analysis of the Symmetric Join the Shortest Orbit Queue. (arXiv:2005.02683v2 [math.PR] UPDATED) Err codemadness.org 70 i 7851 http://fr.arxiv.org/abs/2005.02683 Err codemadness.org 70 i 7852 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Dimitriou_I/0/1/0/all/0/1">Ioannis Dimitriou</a></p> Err codemadness.org 70 i 7853 Err codemadness.org 70 i 7854 <p>This work introduces the join the shortest queue policy in the retrial Err codemadness.org 70 i 7855 setting. We consider a Markovian single server retrial system with two infinite Err codemadness.org 70 i 7856 capacity orbits. An arriving job finding the server busy, it is forwarded to Err codemadness.org 70 i 7857 the least loaded orbit. Otherwise, it is forwarded to an orbit randomly. Err codemadness.org 70 i 7858 Orbiting jobs of either type retry to access the server independently. We Err codemadness.org 70 i 7859 investigate the stability condition, the stationary tail decay rate, and obtain Err codemadness.org 70 i 7860 the equilibrium distribution by using the compensation method. Err codemadness.org 70 i 7861 </p> Err codemadness.org 70 i 7862 Err codemadness.org 70 i 7863 Err codemadness.org 70 i 7864 Err codemadness.org 70 i 7865 Anonymized GCN: A Novel Robust Graph Embedding Method via Hiding Node Position in Noise. (arXiv:2005.03482v2 [cs.LG] UPDATED) Err codemadness.org 70 i 7866 http://fr.arxiv.org/abs/2005.03482 Err codemadness.org 70 i 7867 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_A/0/1/0/all/0/1">Ao Liu</a></p> Err codemadness.org 70 i 7868 Err codemadness.org 70 i 7869 <p>Graph convolution network (GCN) have achieved state-of-the-art performance in Err codemadness.org 70 i 7870 the task of node prediction in the graph structure. However, with the gradual Err codemadness.org 70 i 7871 various of graph attack methods, there are lack of research on the robustness Err codemadness.org 70 i 7872 of GCN. In this paper, we prove the reason why GCN is vulnerable to attack: Err codemadness.org 70 i 7873 only training another GCN model can find the vulnerability of the target GCN Err codemadness.org 70 i 7874 model. To solve that, we propose a GCN model which is robust to attacks. By Err codemadness.org 70 i 7875 hiding the node's position in the Gaussian noise, the attacker will not be able Err codemadness.org 70 i 7876 to modify the connection information of the graph node, thus immune to the Err codemadness.org 70 i 7877 attack. Considering attackers usually modify the connection to interfere the Err codemadness.org 70 i 7878 prediction results of the target node, so, by hiding the connection of the Err codemadness.org 70 i 7879 graph in the noise through adversarial training, accurate node prediction can Err codemadness.org 70 i 7880 be completed only by the node number rather than its specific position in the Err codemadness.org 70 i 7881 graph, thus let the nodes in the graph are no longer related to the graph Err codemadness.org 70 i 7882 itself, that is to say, make the node anonymous. Specifically, we first Err codemadness.org 70 i 7883 demonstrated the key to determine the embedding of a specific node: the row Err codemadness.org 70 i 7884 corresponding to the node of the eigenmatrix of the Laplace matrix, by target Err codemadness.org 70 i 7885 it as the output of the generator, we take the corresponding noise as input. Err codemadness.org 70 i 7886 The generator will try to find the correct position of the node in the graph. Err codemadness.org 70 i 7887 Then the encoder and decoder are spliced both in discriminator, so that after Err codemadness.org 70 i 7888 adversarial training, the generator and discriminator can cooperate to complete Err codemadness.org 70 i 7889 the node prediction. Finally, All node positions can generated by noise at the Err codemadness.org 70 i 7890 same time, that is to say, the generator will hides all the connection Err codemadness.org 70 i 7891 information of the graph structure. The evaluation shows that we only need to Err codemadness.org 70 i 7892 obtain the initial features and node numbers of the nodes to complete the node Err codemadness.org 70 i 7893 prediction, and the accuracy did not decrease, but increased by 0.0293. Err codemadness.org 70 i 7894 </p> Err codemadness.org 70 i 7895 Err codemadness.org 70 i 7896 Err codemadness.org 70 i 7897 Err codemadness.org 70 i 7898 InterFaceGAN: Interpreting the Disentangled Face Representation Learned by GANs. (arXiv:2005.09635v2 [cs.CV] UPDATED) Err codemadness.org 70 i 7899 http://fr.arxiv.org/abs/2005.09635 Err codemadness.org 70 i 7900 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1">Yujun Shen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_C/0/1/0/all/0/1">Ceyuan Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tang_X/0/1/0/all/0/1">Xiaoou Tang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhou_B/0/1/0/all/0/1">Bolei Zhou</a></p> Err codemadness.org 70 i 7901 Err codemadness.org 70 i 7902 <p>Although Generative Adversarial Networks (GANs) have made significant Err codemadness.org 70 i 7903 progress in face synthesis, there lacks enough understanding of what GANs have Err codemadness.org 70 i 7904 learned in the latent representation to map a random code to a photo-realistic Err codemadness.org 70 i 7905 image. In this work, we propose a framework called InterFaceGAN to interpret Err codemadness.org 70 i 7906 the disentangled face representation learned by the state-of-the-art GAN models Err codemadness.org 70 i 7907 and study the properties of the facial semantics encoded in the latent space. Err codemadness.org 70 i 7908 We first find that GANs learn various semantics in some linear subspaces of the Err codemadness.org 70 i 7909 latent space. After identifying these subspaces, we can realistically Err codemadness.org 70 i 7910 manipulate the corresponding facial attributes without retraining the model. We Err codemadness.org 70 i 7911 then conduct a detailed study on the correlation between different semantics Err codemadness.org 70 i 7912 and manage to better disentangle them via subspace projection, resulting in Err codemadness.org 70 i 7913 more precise control of the attribute manipulation. Besides manipulating the Err codemadness.org 70 i 7914 gender, age, expression, and presence of eyeglasses, we can even alter the face Err codemadness.org 70 i 7915 pose and fix the artifacts accidentally made by GANs. Furthermore, we perform Err codemadness.org 70 i 7916 an in-depth face identity analysis and a layer-wise analysis to evaluate the Err codemadness.org 70 i 7917 editing results quantitatively. Finally, we apply our approach to real face Err codemadness.org 70 i 7918 editing by employing GAN inversion approaches and explicitly training Err codemadness.org 70 i 7919 feed-forward models based on the synthetic data established by InterFaceGAN. Err codemadness.org 70 i 7920 Extensive experimental results suggest that learning to synthesize faces Err codemadness.org 70 i 7921 spontaneously brings a disentangled and controllable face representation. Err codemadness.org 70 i 7922 </p> Err codemadness.org 70 i 7923 Err codemadness.org 70 i 7924 Err codemadness.org 70 i 7925 Err codemadness.org 70 i 7926 Stochastic control liasons: Richard Sinkhorn meets Gaspard Monge on a Schroedinger bridge. (arXiv:2005.10963v2 [math.OC] UPDATED) Err codemadness.org 70 i 7927 http://fr.arxiv.org/abs/2005.10963 Err codemadness.org 70 i 7928 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Chen_Y/0/1/0/all/0/1">Yongxin Chen</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Georgiou_T/0/1/0/all/0/1">Tryphon T. Georgiou</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Pavon_M/0/1/0/all/0/1">Michele Pavon</a></p> Err codemadness.org 70 i 7929 Err codemadness.org 70 i 7930 <p>In 1931/32, Schroedinger studied a hot gas Gedankenexperiment, an instance of Err codemadness.org 70 i 7931 large deviations of the empirical distribution and an early example of the Err codemadness.org 70 i 7932 so-called maximum entropy inference method. This so-called Schroedinger bridge Err codemadness.org 70 i 7933 problem (SBP) was recently recognized as a regularization of the Err codemadness.org 70 i 7934 Monge-Kantorovich Optimal Mass Transport (OMT), leading to effective Err codemadness.org 70 i 7935 computation of the latter. Specifically, OMT with quadratic cost may be viewed Err codemadness.org 70 i 7936 as a zero-temperature limit of SBP, which amounts to minimization of the Err codemadness.org 70 i 7937 Helmholtz's free energy over probability distributions constrained to possess Err codemadness.org 70 i 7938 given marginals. The problem features a delicate compromise, mediated by a Err codemadness.org 70 i 7939 temperature parameter, between minimizing the internal energy and maximizing Err codemadness.org 70 i 7940 the entropy. These concepts are central to a rapidly expanding area of modern Err codemadness.org 70 i 7941 science dealing with the so-called {\em Sinkhorn algorithm} which appears as a Err codemadness.org 70 i 7942 special case of an algorithm first studied by the French analyst Robert Fortet Err codemadness.org 70 i 7943 in 1938/40 specifically for Schroedinger bridges. Due to the constraint on Err codemadness.org 70 i 7944 end-point distributions, dynamic programming is not a suitable tool to attack Err codemadness.org 70 i 7945 these problems. Instead, Fortet's iterative algorithm and its discrete Err codemadness.org 70 i 7946 counterpart, the Sinkhorn iteration, permit computation by iteratively solving Err codemadness.org 70 i 7947 the so-called {\em Schroedinger system}. In both the continuous as well as the Err codemadness.org 70 i 7948 discrete-time and space settings, {\em stochastic control} provides a Err codemadness.org 70 i 7949 reformulation and dynamic versions of these problems. The formalism behind Err codemadness.org 70 i 7950 these control problems have attracted attention as they lead to a variety of Err codemadness.org 70 i 7951 new applications in spacecraft guidance, control of robot or biological swarms, Err codemadness.org 70 i 7952 sensing, active cooling, network routing as well as in computer and data Err codemadness.org 70 i 7953 science. This multifacet and versatile framework, intertwining SBP and OMT, Err codemadness.org 70 i 7954 provides the substrate for a historical and technical overview of the field Err codemadness.org 70 i 7955 taken up in this paper. Err codemadness.org 70 i 7956 </p> Err codemadness.org 70 i 7957 Err codemadness.org 70 i 7958 Err codemadness.org 70 i 7959 Err codemadness.org 70 i 7960 Multivariate Quasi-tight Framelets with High Balancing Orders Derived from Any Compactly Supported Refinable Vector Functions. (arXiv:2005.12451v2 [math.FA] UPDATED) Err codemadness.org 70 i 7961 http://fr.arxiv.org/abs/2005.12451 Err codemadness.org 70 i 7962 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Han_B/0/1/0/all/0/1">Bin Han</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Lu_R/0/1/0/all/0/1">Ran Lu</a></p> Err codemadness.org 70 i 7963 Err codemadness.org 70 i 7964 <p>Generalizing wavelets by adding desired redundancy and flexibility,framelets Err codemadness.org 70 i 7965 are of interest and importance in many applications such as image processing Err codemadness.org 70 i 7966 and numerical algorithms. Several key properties of framelets are high Err codemadness.org 70 i 7967 vanishing moments for sparse multiscale representation, fast framelet Err codemadness.org 70 i 7968 transforms for numerical efficiency, and redundancy for robustness. However, it Err codemadness.org 70 i 7969 is a challenging problem to study and construct multivariate nonseparable Err codemadness.org 70 i 7970 framelets, mainly due to their intrinsic connections to factorization and Err codemadness.org 70 i 7971 syzygy modules of multivariate polynomial matrices. In this paper, we Err codemadness.org 70 i 7972 circumvent the above difficulties through the approach of quasi-tight Err codemadness.org 70 i 7973 framelets, which behave almost identically to tight framelets. Employing the Err codemadness.org 70 i 7974 popular oblique extension principle (OEP), from an arbitrary compactly Err codemadness.org 70 i 7975 supported $\dm$-refinable vector function $\phi$ with multiplicity greater than Err codemadness.org 70 i 7976 one, we prove that we can always derive from $\phi$ a compactly supported Err codemadness.org 70 i 7977 multivariate quasi-tight framelet such that (i) all the framelet generators Err codemadness.org 70 i 7978 have the highest possible order of vanishing moments;(ii) its associated fast Err codemadness.org 70 i 7979 framelet transform is compact with the highest balancing order.For a refinable Err codemadness.org 70 i 7980 scalar function $\phi$, the above item (ii) often cannot be achieved Err codemadness.org 70 i 7981 intrinsically but we show that we can always construct a compactly supported Err codemadness.org 70 i 7982 OEP-based multivariate quasi-tight framelet derived from $\phi$ satisfying item Err codemadness.org 70 i 7983 (i).This paper provides a comprehensive investigation on OEP-based multivariate Err codemadness.org 70 i 7984 quasi-tight multiframelets and their associated framelet transforms with high Err codemadness.org 70 i 7985 balancing orders. This deepens our theoretical understanding of multivariate Err codemadness.org 70 i 7986 quasi-tight multiframelets and their associated fast multiframelet transforms. Err codemadness.org 70 i 7987 </p> Err codemadness.org 70 i 7988 Err codemadness.org 70 i 7989 Err codemadness.org 70 i 7990 Err codemadness.org 70 i 7991 Refining Implicit Argument Annotation for UCCA. (arXiv:2005.12889v2 [cs.CL] UPDATED) Err codemadness.org 70 i 7992 http://fr.arxiv.org/abs/2005.12889 Err codemadness.org 70 i 7993 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Cui_R/0/1/0/all/0/1">Ruixiang Cui</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hershcovich_D/0/1/0/all/0/1">Daniel Hershcovich</a></p> Err codemadness.org 70 i 7994 Err codemadness.org 70 i 7995 <p>Predicate-argument structure analysis is a central component in meaning Err codemadness.org 70 i 7996 representations of text. The fact that some arguments are not explicitly Err codemadness.org 70 i 7997 mentioned in a sentence gives rise to ambiguity in language understanding, and Err codemadness.org 70 i 7998 renders it difficult for machines to interpret text correctly. However, only Err codemadness.org 70 i 7999 few resources represent implicit roles for NLU, and existing studies in NLP Err codemadness.org 70 i 8000 only make coarse distinctions between categories of arguments omitted from Err codemadness.org 70 i 8001 linguistic form. This paper proposes a typology for fine-grained implicit Err codemadness.org 70 i 8002 argument annotation on top of Universal Conceptual Cognitive Annotation's Err codemadness.org 70 i 8003 foundational layer. The proposed implicit argument categorisation is driven by Err codemadness.org 70 i 8004 theories of implicit role interpretation and consists of six types: Deictic, Err codemadness.org 70 i 8005 Generic, Genre-based, Type-identifiable, Non-specific, and Iterated-set. We Err codemadness.org 70 i 8006 exemplify our design by revisiting part of the UCCA EWT corpus, providing a new Err codemadness.org 70 i 8007 dataset annotated with the refinement layer, and making a comparative analysis Err codemadness.org 70 i 8008 with other schemes. Err codemadness.org 70 i 8009 </p> Err codemadness.org 70 i 8010 Err codemadness.org 70 i 8011 Err codemadness.org 70 i 8012 Err codemadness.org 70 i 8013 An Empirical Study of Bots in Software Development -- Characteristics and Challenges from a Practitioner's Perspective. (arXiv:2005.13969v2 [cs.SE] UPDATED) Err codemadness.org 70 i 8014 http://fr.arxiv.org/abs/2005.13969 Err codemadness.org 70 i 8015 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Erlenhov_L/0/1/0/all/0/1">Linda Erlenhov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Neto_F/0/1/0/all/0/1">Francisco Gomes de Oliveira Neto</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Leitner_P/0/1/0/all/0/1">Philipp Leitner</a></p> Err codemadness.org 70 i 8016 Err codemadness.org 70 i 8017 <p>Software engineering bots - automated tools that handle tedious tasks - are Err codemadness.org 70 i 8018 increasingly used by industrial and open source projects to improve developer Err codemadness.org 70 i 8019 productivity. Current research in this area is held back by a lack of consensus Err codemadness.org 70 i 8020 of what software engineering bots (DevBots) actually are, what characteristics Err codemadness.org 70 i 8021 distinguish them from other tools, and what benefits and challenges are Err codemadness.org 70 i 8022 associated with DevBot usage. In this paper we report on a mixed-method Err codemadness.org 70 i 8023 empirical study of DevBot usage in industrial practice. We report on findings Err codemadness.org 70 i 8024 from interviewing 21 and surveying a total of 111 developers. We identify three Err codemadness.org 70 i 8025 different personas among DevBot users (focusing on autonomy, chat interfaces, Err codemadness.org 70 i 8026 and "smartness"), each with different definitions of what a DevBot is, why Err codemadness.org 70 i 8027 developers use them, and what they struggle with. We conclude that future Err codemadness.org 70 i 8028 DevBot research should situate their work within our framework, to clearly Err codemadness.org 70 i 8029 identify what type of bot the work targets, and what advantages practitioners Err codemadness.org 70 i 8030 can expect. Further, we find that there currently is a lack of general purpose Err codemadness.org 70 i 8031 "smart" bots that go beyond simple automation tools or chat interfaces. This is Err codemadness.org 70 i 8032 problematic, as we have seen that such bots, if available, can have a Err codemadness.org 70 i 8033 transformative effect on the projects that use them. Err codemadness.org 70 i 8034 </p> Err codemadness.org 70 i 8035 Err codemadness.org 70 i 8036 Err codemadness.org 70 i 8037 Err codemadness.org 70 i 8038 Sub-Band Knowledge Distillation Framework for Speech Enhancement. (arXiv:2005.14435v2 [eess.AS] UPDATED) Err codemadness.org 70 i 8039 http://fr.arxiv.org/abs/2005.14435 Err codemadness.org 70 i 8040 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1">Xiang Hao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wen_S/0/1/0/all/0/1">Shixue Wen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1">Xiangdong Su</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Liu_Y/0/1/0/all/0/1">Yun Liu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Gao_G/0/1/0/all/0/1">Guanglai Gao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_X/0/1/0/all/0/1">Xiaofei Li</a></p> Err codemadness.org 70 i 8041 Err codemadness.org 70 i 8042 <p>In single-channel speech enhancement, methods based on full-band spectral Err codemadness.org 70 i 8043 features have been widely studied. However, only a few methods pay attention to Err codemadness.org 70 i 8044 non-full-band spectral features. In this paper, we explore a knowledge Err codemadness.org 70 i 8045 distillation framework based on sub-band spectral mapping for single-channel Err codemadness.org 70 i 8046 speech enhancement. Specifically, we divide the full frequency band into Err codemadness.org 70 i 8047 multiple sub-bands and pre-train an elite-level sub-band enhancement model Err codemadness.org 70 i 8048 (teacher model) for each sub-band. These teacher models are dedicated to Err codemadness.org 70 i 8049 processing their own sub-bands. Next, under the teacher models' guidance, we Err codemadness.org 70 i 8050 train a general sub-band enhancement model (student model) that works for all Err codemadness.org 70 i 8051 sub-bands. Without increasing the number of model parameters and computational Err codemadness.org 70 i 8052 complexity, the student model's performance is further improved. To evaluate Err codemadness.org 70 i 8053 our proposed method, we conducted a large number of experiments on an Err codemadness.org 70 i 8054 open-source data set. The final experimental results show that the guidance Err codemadness.org 70 i 8055 from the elite-level teacher models dramatically improves the student model's Err codemadness.org 70 i 8056 performance, which exceeds the full-band model by employing fewer parameters. Err codemadness.org 70 i 8057 </p> Err codemadness.org 70 i 8058 Err codemadness.org 70 i 8059 Err codemadness.org 70 i 8060 Err codemadness.org 70 i 8061 SNR-Based Teachers-Student Technique for Speech Enhancement. (arXiv:2005.14441v2 [eess.AS] UPDATED) Err codemadness.org 70 i 8062 http://fr.arxiv.org/abs/2005.14441 Err codemadness.org 70 i 8063 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1">Xiang Hao</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1">Xiangdong Su</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wang_Z/0/1/0/all/0/1">Zhiyu Wang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_Q/0/1/0/all/0/1">Qiang Zhang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Xu_H/0/1/0/all/0/1">Huali Xu</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Gao_G/0/1/0/all/0/1">Guanglai Gao</a></p> Err codemadness.org 70 i 8064 Err codemadness.org 70 i 8065 <p>It is very challenging for speech enhancement methods to achieves robust Err codemadness.org 70 i 8066 performance under both high signal-to-noise ratio (SNR) and low SNR Err codemadness.org 70 i 8067 simultaneously. In this paper, we propose a method that integrates an SNR-based Err codemadness.org 70 i 8068 teachers-student technique and time-domain U-Net to deal with this problem. Err codemadness.org 70 i 8069 Specifically, this method consists of multiple teacher models and a student Err codemadness.org 70 i 8070 model. We first train the teacher models under multiple small-range SNRs that Err codemadness.org 70 i 8071 do not coincide with each other so that they can perform speech enhancement Err codemadness.org 70 i 8072 well within the specific SNR range. Then, we choose different teacher models to Err codemadness.org 70 i 8073 supervise the training of the student model according to the SNR of the Err codemadness.org 70 i 8074 training data. Eventually, the student model can perform speech enhancement Err codemadness.org 70 i 8075 under both high SNR and low SNR. To evaluate the proposed method, we Err codemadness.org 70 i 8076 constructed a dataset with an SNR ranging from -20dB to 20dB based on the Err codemadness.org 70 i 8077 public dataset. We experimentally analyzed the effectiveness of the SNR-based Err codemadness.org 70 i 8078 teachers-student technique and compared the proposed method with several Err codemadness.org 70 i 8079 state-of-the-art methods. Err codemadness.org 70 i 8080 </p> Err codemadness.org 70 i 8081 Err codemadness.org 70 i 8082 Err codemadness.org 70 i 8083 Err codemadness.org 70 i 8084 A mathematical model for automatic differentiation in machine learning. (arXiv:2006.02080v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8085 http://fr.arxiv.org/abs/2006.02080 Err codemadness.org 70 i 8086 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bolte_J/0/1/0/all/0/1">Jerome Bolte</a> (TSE), <a href="http://fr.arxiv.org/find/cs/1/au:+Pauwels_E/0/1/0/all/0/1">Edouard Pauwels</a> (IRIT-ADRIA)</p> Err codemadness.org 70 i 8087 Err codemadness.org 70 i 8088 <p>Automatic differentiation, as implemented today, does not have a simple Err codemadness.org 70 i 8089 mathematical model adapted to the needs of modern machine learning. In this Err codemadness.org 70 i 8090 work we articulate the relationships between differentiation of programs as Err codemadness.org 70 i 8091 implemented in practice and differentiation of nonsmooth functions. To this end Err codemadness.org 70 i 8092 we provide a simple class of functions, a nonsmooth calculus, and show how they Err codemadness.org 70 i 8093 apply to stochastic approximation methods. We also evidence the issue of Err codemadness.org 70 i 8094 artificial critical points created by algorithmic differentiation and show how Err codemadness.org 70 i 8095 usual methods avoid these points with probability one. Err codemadness.org 70 i 8096 </p> Err codemadness.org 70 i 8097 Err codemadness.org 70 i 8098 Err codemadness.org 70 i 8099 Err codemadness.org 70 i 8100 Convolutional Neural Networks for Global Human Settlements Mapping from Sentinel-2 Satellite Imagery. (arXiv:2006.03267v2 [eess.IV] UPDATED) Err codemadness.org 70 i 8101 http://fr.arxiv.org/abs/2006.03267 Err codemadness.org 70 i 8102 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Corbane_C/0/1/0/all/0/1">Christina Corbane</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Syrris_V/0/1/0/all/0/1">Vasileios Syrris</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sabo_F/0/1/0/all/0/1">Filip Sabo</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Politis_P/0/1/0/all/0/1">Panagiotis Politis</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Melchiorri_M/0/1/0/all/0/1">Michele Melchiorri</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Pesaresi_M/0/1/0/all/0/1">Martino Pesaresi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Soille_P/0/1/0/all/0/1">Pierre Soille</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kemper_T/0/1/0/all/0/1">Thomas Kemper</a></p> Err codemadness.org 70 i 8103 Err codemadness.org 70 i 8104 <p>Spatially consistent and up-to-date maps of human settlements are crucial for Err codemadness.org 70 i 8105 addressing policies related to urbanization and sustainability, especially in Err codemadness.org 70 i 8106 the era of an increasingly urbanized world.The availability of open and free Err codemadness.org 70 i 8107 Sentinel-2 data of the Copernicus Earth Observation program offers a new Err codemadness.org 70 i 8108 opportunity for wall-to-wall mapping of human settlements at a global Err codemadness.org 70 i 8109 scale.This paper presents a deep-learning-based framework for a fully automated Err codemadness.org 70 i 8110 extraction of built-up areas at a spatial resolution of 10 m from a global Err codemadness.org 70 i 8111 composite of Sentinel-2 imagery.A multi-neuro modeling methodology building on Err codemadness.org 70 i 8112 a simple Convolution Neural Networks architecture for pixel-wise image Err codemadness.org 70 i 8113 classification of built-up areas is developed.The core features of the proposed Err codemadness.org 70 i 8114 model are the image patch of size 5 x 5 pixels adequate for describing built-up Err codemadness.org 70 i 8115 areas from Sentinel-2 imagery and the lightweight topology with a total number Err codemadness.org 70 i 8116 of 1,448,578 trainable parameters and 4 2D convolutional layers and 2 flattened Err codemadness.org 70 i 8117 layers.The deployment of the model on the global Sentinel-2 image composite Err codemadness.org 70 i 8118 provides the most detailed and complete map reporting about built-up areas for Err codemadness.org 70 i 8119 reference year 2018. The validation of the results with an independent Err codemadness.org 70 i 8120 reference data-set of building footprints covering 277 sites across the world Err codemadness.org 70 i 8121 establishes the reliability of the built-up layer produced by the proposed Err codemadness.org 70 i 8122 framework and the model robustness. Err codemadness.org 70 i 8123 </p> Err codemadness.org 70 i 8124 Err codemadness.org 70 i 8125 Err codemadness.org 70 i 8126 Err codemadness.org 70 i 8127 3D Self-Supervised Methods for Medical Imaging. (arXiv:2006.03829v2 [cs.CV] UPDATED) Err codemadness.org 70 i 8128 http://fr.arxiv.org/abs/2006.03829 Err codemadness.org 70 i 8129 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Taleb_A/0/1/0/all/0/1">Aiham Taleb</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Loetzsch_W/0/1/0/all/0/1">Winfried Loetzsch</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Danz_N/0/1/0/all/0/1">Noel Danz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Severin_J/0/1/0/all/0/1">Julius Severin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gaertner_T/0/1/0/all/0/1">Thomas Gaertner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bergner_B/0/1/0/all/0/1">Benjamin Bergner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lippert_C/0/1/0/all/0/1">Christoph Lippert</a></p> Err codemadness.org 70 i 8130 Err codemadness.org 70 i 8131 <p>Self-supervised learning methods have witnessed a recent surge of interest Err codemadness.org 70 i 8132 after proving successful in multiple application fields. In this work, we Err codemadness.org 70 i 8133 leverage these techniques, and we propose 3D versions for five different Err codemadness.org 70 i 8134 self-supervised methods, in the form of proxy tasks. Our methods facilitate Err codemadness.org 70 i 8135 neural network feature learning from unlabeled 3D images, aiming to reduce the Err codemadness.org 70 i 8136 required cost for expert annotation. The developed algorithms are 3D Err codemadness.org 70 i 8137 Contrastive Predictive Coding, 3D Rotation prediction, 3D Jigsaw puzzles, Err codemadness.org 70 i 8138 Relative 3D patch location, and 3D Exemplar networks. Our experiments show that Err codemadness.org 70 i 8139 pretraining models with our 3D tasks yields more powerful semantic Err codemadness.org 70 i 8140 representations, and enables solving downstream tasks more accurately and Err codemadness.org 70 i 8141 efficiently, compared to training the models from scratch and to pretraining Err codemadness.org 70 i 8142 them on 2D slices. We demonstrate the effectiveness of our methods on three Err codemadness.org 70 i 8143 downstream tasks from the medical imaging domain: i) Brain Tumor Segmentation Err codemadness.org 70 i 8144 from 3D MRI, ii) Pancreas Tumor Segmentation from 3D CT, and iii) Diabetic Err codemadness.org 70 i 8145 Retinopathy Detection from 2D Fundus images. In each task, we assess the gains Err codemadness.org 70 i 8146 in data-efficiency, performance, and speed of convergence. Interestingly, we Err codemadness.org 70 i 8147 also find gains when transferring the learned representations, by our methods, Err codemadness.org 70 i 8148 from a large unlabeled 3D corpus to a small downstream-specific dataset. We Err codemadness.org 70 i 8149 achieve results competitive to state-of-the-art solutions at a fraction of the Err codemadness.org 70 i 8150 computational expense. We publish our implementations for the developed Err codemadness.org 70 i 8151 algorithms (both 3D and 2D versions) as an open-source library, in an effort to Err codemadness.org 70 i 8152 allow other researchers to apply and extend our methods on their datasets. Err codemadness.org 70 i 8153 </p> Err codemadness.org 70 i 8154 Err codemadness.org 70 i 8155 Err codemadness.org 70 i 8156 Err codemadness.org 70 i 8157 Truthful Data Acquisition via Peer Prediction. (arXiv:2006.03992v2 [cs.GT] UPDATED) Err codemadness.org 70 i 8158 http://fr.arxiv.org/abs/2006.03992 Err codemadness.org 70 i 8159 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1">Yiling Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1">Yiheng Shen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zheng_S/0/1/0/all/0/1">Shuran Zheng</a></p> Err codemadness.org 70 i 8160 Err codemadness.org 70 i 8161 <p>We consider the problem of purchasing data for machine learning or Err codemadness.org 70 i 8162 statistical estimation. The data analyst has a budget to purchase datasets from Err codemadness.org 70 i 8163 multiple data providers. She does not have any test data that can be used to Err codemadness.org 70 i 8164 evaluate the collected data and can assign payments to data providers solely Err codemadness.org 70 i 8165 based on the collected datasets. We consider the problem in the standard Err codemadness.org 70 i 8166 Bayesian paradigm and in two settings: (1) data are only collected once; (2) Err codemadness.org 70 i 8167 data are collected repeatedly and each day's data are drawn independently from Err codemadness.org 70 i 8168 the same distribution. For both settings, our mechanisms guarantee that Err codemadness.org 70 i 8169 truthfully reporting one's dataset is always an equilibrium by adopting Err codemadness.org 70 i 8170 techniques from peer prediction: pay each provider the mutual information Err codemadness.org 70 i 8171 between his reported data and other providers' reported data. Depending on the Err codemadness.org 70 i 8172 data distribution, the mechanisms can also discourage misreports that would Err codemadness.org 70 i 8173 lead to inaccurate predictions. Our mechanisms also guarantee individual Err codemadness.org 70 i 8174 rationality and budget feasibility for certain underlying distributions in the Err codemadness.org 70 i 8175 first setting and for all distributions in the second setting. Err codemadness.org 70 i 8176 </p> Err codemadness.org 70 i 8177 Err codemadness.org 70 i 8178 Err codemadness.org 70 i 8179 Err codemadness.org 70 i 8180 Self-consumption for energy communities in Spain: a regional analysis under the new legal framework. (arXiv:2006.06459v3 [eess.SY] UPDATED) Err codemadness.org 70 i 8181 http://fr.arxiv.org/abs/2006.06459 Err codemadness.org 70 i 8182 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Gallego_Castillo_C/0/1/0/all/0/1">Cristobal Gallego-Castillo</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Heleno_M/0/1/0/all/0/1">Miguel Heleno</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Victoria_M/0/1/0/all/0/1">Marta Victoria</a></p> Err codemadness.org 70 i 8183 Err codemadness.org 70 i 8184 <p>European climate polices acknowledge the role that energy communities can Err codemadness.org 70 i 8185 play in the energy transition. Self-consumption installations shared among Err codemadness.org 70 i 8186 those living in the same building are a good example of such energy Err codemadness.org 70 i 8187 communities. In this work, we perform a regional analysis of optimal Err codemadness.org 70 i 8188 self-consumption installations under the new legal framework recently passed in Err codemadness.org 70 i 8189 Spain. Results show that the optimal sizing of the installation leads to Err codemadness.org 70 i 8190 economic savings for self-consumers in all the territory, for both options with Err codemadness.org 70 i 8191 and without remuneration for energy surplus. A sensitivity analysis on Err codemadness.org 70 i 8192 technology costs revealed that batteries still require noticeably cost Err codemadness.org 70 i 8193 reductions to be cost-effective in a behind the meter self-consumption Err codemadness.org 70 i 8194 environment. In addition, solar compensation mechanisms make batteries less Err codemadness.org 70 i 8195 attractive in a scenario of low PV costs, since feeding PV surplus into the Err codemadness.org 70 i 8196 grid, yet less efficient, becomes more cost-effective. An improvement for the Err codemadness.org 70 i 8197 current energy surplus remuneration policy was proposed and analysed. It Err codemadness.org 70 i 8198 consists in the inclusion of the economic value of the avoided power losses in Err codemadness.org 70 i 8199 the remuneration. Err codemadness.org 70 i 8200 </p> Err codemadness.org 70 i 8201 Err codemadness.org 70 i 8202 Err codemadness.org 70 i 8203 Err codemadness.org 70 i 8204 Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Prediction. (arXiv:2006.06648v3 [cs.LG] UPDATED) Err codemadness.org 70 i 8205 http://fr.arxiv.org/abs/2006.06648 Err codemadness.org 70 i 8206 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Baek_J/0/1/0/all/0/1">Jinheon Baek</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_D/0/1/0/all/0/1">Dong Bok Lee</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hwang_S/0/1/0/all/0/1">Sung Ju Hwang</a></p> Err codemadness.org 70 i 8207 Err codemadness.org 70 i 8208 <p>Many practical graph problems, such as knowledge graph construction and Err codemadness.org 70 i 8209 drug-drug interaction prediction, require to handle multi-relational graphs. Err codemadness.org 70 i 8210 However, handling real-world multi-relational graphs with Graph Neural Networks Err codemadness.org 70 i 8211 (GNNs) is often challenging due to their evolving nature, as new entities Err codemadness.org 70 i 8212 (nodes) can emerge over time. Moreover, newly emerged entities often have few Err codemadness.org 70 i 8213 links, which makes the learning even more difficult. Motivated by this Err codemadness.org 70 i 8214 challenge, we introduce a realistic problem of few-shot out-of-graph link Err codemadness.org 70 i 8215 prediction, where we not only predict the links between the seen and unseen Err codemadness.org 70 i 8216 nodes as in a conventional out-of-knowledge link prediction task but also Err codemadness.org 70 i 8217 between the unseen nodes, with only few edges per node. We tackle this problem Err codemadness.org 70 i 8218 with a novel transductive meta-learning framework which we refer to as Graph Err codemadness.org 70 i 8219 Extrapolation Networks (GEN). GEN meta-learns both the node embedding network Err codemadness.org 70 i 8220 for inductive inference (seen-to-unseen) and the link prediction network for Err codemadness.org 70 i 8221 transductive inference (unseen-to-unseen). For transductive link prediction, we Err codemadness.org 70 i 8222 further propose a stochastic embedding layer to model uncertainty in the link Err codemadness.org 70 i 8223 prediction between unseen entities. We validate our model on multiple benchmark Err codemadness.org 70 i 8224 datasets for knowledge graph completion and drug-drug interaction prediction. Err codemadness.org 70 i 8225 The results show that our model significantly outperforms relevant baselines Err codemadness.org 70 i 8226 for out-of-graph link prediction tasks. Err codemadness.org 70 i 8227 </p> Err codemadness.org 70 i 8228 Err codemadness.org 70 i 8229 Err codemadness.org 70 i 8230 Err codemadness.org 70 i 8231 Frontiers in Mortar Methods for Isogeometric Analysis. (arXiv:2006.06677v3 [cs.CE] UPDATED) Err codemadness.org 70 i 8232 http://fr.arxiv.org/abs/2006.06677 Err codemadness.org 70 i 8233 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hesch_C/0/1/0/all/0/1">Christian Hesch</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Khristenko_U/0/1/0/all/0/1">Ustim Khristenko</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Krause_R/0/1/0/all/0/1">Rolf Krause</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Popp_A/0/1/0/all/0/1">Alexander Popp</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Seitz_A/0/1/0/all/0/1">Alexander Seitz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wall_W/0/1/0/all/0/1">Wolfgang Wall</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wohlmuth_B/0/1/0/all/0/1">Barbara Wohlmuth</a></p> Err codemadness.org 70 i 8234 Err codemadness.org 70 i 8235 <p>Complex geometries as common in industrial applications consist of multiple Err codemadness.org 70 i 8236 patches, if spline based parametrizations are used. The requirements for the Err codemadness.org 70 i 8237 generation of analysis-suitable models are increasing dramatically since Err codemadness.org 70 i 8238 isogeometric analysis is directly based on the spline parametrization and Err codemadness.org 70 i 8239 nowadays used for the calculation of higher-order partial differential Err codemadness.org 70 i 8240 equations. The computational, or more general, the engineering analysis Err codemadness.org 70 i 8241 necessitates suitable coupling techniques between the different patches. Mortar Err codemadness.org 70 i 8242 methods have been successfully applied for coupling of patches and for contact Err codemadness.org 70 i 8243 mechanics in recent years to resolve the arising issues within the interface. Err codemadness.org 70 i 8244 We present here current achievements in the design of mortar technologies in Err codemadness.org 70 i 8245 isogeometric analysis within the Priority Program SPP 1748, Reliable Simulation Err codemadness.org 70 i 8246 Techniques in Solid Mechanics. Development of Non-standard Discretisation Err codemadness.org 70 i 8247 Methods, Mechanical and Mathematical Analysis. Err codemadness.org 70 i 8248 </p> Err codemadness.org 70 i 8249 Err codemadness.org 70 i 8250 Err codemadness.org 70 i 8251 Err codemadness.org 70 i 8252 Sparse and Continuous Attention Mechanisms. (arXiv:2006.07214v3 [cs.LG] UPDATED) Err codemadness.org 70 i 8253 http://fr.arxiv.org/abs/2006.07214 Err codemadness.org 70 i 8254 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Martins_A/0/1/0/all/0/1">Andr&#xe9; F. T. Martins</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Farinhas_A/0/1/0/all/0/1">Ant&#xf3;nio Farinhas</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Treviso_M/0/1/0/all/0/1">Marcos Treviso</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Niculae_V/0/1/0/all/0/1">Vlad Niculae</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Aguiar_P/0/1/0/all/0/1">Pedro M. Q. Aguiar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Figueiredo_M/0/1/0/all/0/1">M&#xe1;rio A. T. Figueiredo</a></p> Err codemadness.org 70 i 8255 Err codemadness.org 70 i 8256 <p>Exponential families are widely used in machine learning; they include many Err codemadness.org 70 i 8257 distributions in continuous and discrete domains (e.g., Gaussian, Dirichlet, Err codemadness.org 70 i 8258 Poisson, and categorical distributions via the softmax transformation). Err codemadness.org 70 i 8259 Distributions in each of these families have fixed support. In contrast, for Err codemadness.org 70 i 8260 finite domains, there has been recent work on sparse alternatives to softmax Err codemadness.org 70 i 8261 (e.g. sparsemax and alpha-entmax), which have varying support, being able to Err codemadness.org 70 i 8262 assign zero probability to irrelevant categories. This paper expands that work Err codemadness.org 70 i 8263 in two directions: first, we extend alpha-entmax to continuous domains, Err codemadness.org 70 i 8264 revealing a link with Tsallis statistics and deformed exponential families. Err codemadness.org 70 i 8265 Second, we introduce continuous-domain attention mechanisms, deriving efficient Err codemadness.org 70 i 8266 gradient backpropagation algorithms for alpha in {1,2}. Experiments on Err codemadness.org 70 i 8267 attention-based text classification, machine translation, and visual question Err codemadness.org 70 i 8268 answering illustrate the use of continuous attention in 1D and 2D, showing that Err codemadness.org 70 i 8269 it allows attending to time intervals and compact regions. Err codemadness.org 70 i 8270 </p> Err codemadness.org 70 i 8271 Err codemadness.org 70 i 8272 Err codemadness.org 70 i 8273 Err codemadness.org 70 i 8274 Neural Estimators for Conditional Mutual Information Using Nearest Neighbors Sampling. (arXiv:2006.07225v2 [cs.IT] UPDATED) Err codemadness.org 70 i 8275 http://fr.arxiv.org/abs/2006.07225 Err codemadness.org 70 i 8276 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Molavipour_S/0/1/0/all/0/1">Sina Molavipour</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bassi_G/0/1/0/all/0/1">Germ&#xe1;n Bassi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Skoglund_M/0/1/0/all/0/1">Mikael Skoglund</a></p> Err codemadness.org 70 i 8277 Err codemadness.org 70 i 8278 <p>The estimation of mutual information (MI) or conditional mutual information Err codemadness.org 70 i 8279 (CMI) from a set of samples is a long-standing problem. A recent line of work Err codemadness.org 70 i 8280 in this area has leveraged the approximation power of artificial neural Err codemadness.org 70 i 8281 networks and has shown improvements over conventional methods. One important Err codemadness.org 70 i 8282 challenge in this new approach is the need to obtain, given the original Err codemadness.org 70 i 8283 dataset, a different set where the samples are distributed according to a Err codemadness.org 70 i 8284 specific product density function. This is particularly challenging when Err codemadness.org 70 i 8285 estimating CMI. Err codemadness.org 70 i 8286 </p> Err codemadness.org 70 i 8287 <p>In this paper, we introduce a new technique, based on k nearest neighbors Err codemadness.org 70 i 8288 (k-NN), to perform the resampling and derive high-confidence concentration Err codemadness.org 70 i 8289 bounds for the sample average. Then the technique is employed to train a neural Err codemadness.org 70 i 8290 network classifier and the CMI is estimated accordingly. We propose three Err codemadness.org 70 i 8291 estimators using this technique and prove their consistency, make a comparison Err codemadness.org 70 i 8292 between them and similar approaches in the literature, and experimentally show Err codemadness.org 70 i 8293 improvements in estimating the CMI in terms of accuracy and variance of the Err codemadness.org 70 i 8294 estimators. Err codemadness.org 70 i 8295 </p> Err codemadness.org 70 i 8296 Err codemadness.org 70 i 8297 Err codemadness.org 70 i 8298 Err codemadness.org 70 i 8299 Learning Latent Space Energy-Based Prior Model. (arXiv:2006.08205v2 [stat.ML] UPDATED) Err codemadness.org 70 i 8300 http://fr.arxiv.org/abs/2006.08205 Err codemadness.org 70 i 8301 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Pang_B/0/1/0/all/0/1">Bo Pang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Han_T/0/1/0/all/0/1">Tian Han</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Nijkamp_E/0/1/0/all/0/1">Erik Nijkamp</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Zhu_S/0/1/0/all/0/1">Song-Chun Zhu</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Wu_Y/0/1/0/all/0/1">Ying Nian Wu</a></p> Err codemadness.org 70 i 8302 Err codemadness.org 70 i 8303 <p>We propose to learn energy-based model (EBM) in the latent space of a Err codemadness.org 70 i 8304 generator model, so that the EBM serves as a prior model that stands on the Err codemadness.org 70 i 8305 top-down network of the generator model. Both the latent space EBM and the Err codemadness.org 70 i 8306 top-down network can be learned jointly by maximum likelihood, which involves Err codemadness.org 70 i 8307 short-run MCMC sampling from both the prior and posterior distributions of the Err codemadness.org 70 i 8308 latent vector. Due to the low dimensionality of the latent space and the Err codemadness.org 70 i 8309 expressiveness of the top-down network, a simple EBM in latent space can Err codemadness.org 70 i 8310 capture regularities in the data effectively, and MCMC sampling in latent space Err codemadness.org 70 i 8311 is efficient and mixes well. We show that the learned model exhibits strong Err codemadness.org 70 i 8312 performances in terms of image and text generation and anomaly detection. The Err codemadness.org 70 i 8313 one-page code can be found in supplementary materials. Err codemadness.org 70 i 8314 </p> Err codemadness.org 70 i 8315 Err codemadness.org 70 i 8316 Err codemadness.org 70 i 8317 Err codemadness.org 70 i 8318 Iterative regularization for convex regularizers. (arXiv:2006.09859v2 [stat.ML] UPDATED) Err codemadness.org 70 i 8319 http://fr.arxiv.org/abs/2006.09859 Err codemadness.org 70 i 8320 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Molinari_C/0/1/0/all/0/1">Cesare Molinari</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Massias_M/0/1/0/all/0/1">Mathurin Massias</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Rosasco_L/0/1/0/all/0/1">Lorenzo Rosasco</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Villa_S/0/1/0/all/0/1">Silvia Villa</a></p> Err codemadness.org 70 i 8321 Err codemadness.org 70 i 8322 <p>We study iterative regularization for linear models, when the bias is convex Err codemadness.org 70 i 8323 but not necessarily strongly convex. We characterize the stability properties Err codemadness.org 70 i 8324 of a primal-dual gradient based approach, analyzing its convergence in the Err codemadness.org 70 i 8325 presence of worst case deterministic noise. As a main example, we specialize Err codemadness.org 70 i 8326 and illustrate the results for the problem of robust sparse recovery. Key to Err codemadness.org 70 i 8327 our analysis is a combination of ideas from regularization theory and Err codemadness.org 70 i 8328 optimization in the presence of errors. Theoretical results are complemented by Err codemadness.org 70 i 8329 experiments showing that state-of-the-art performances can be achieved with Err codemadness.org 70 i 8330 considerable computational speed-ups. Err codemadness.org 70 i 8331 </p> Err codemadness.org 70 i 8332 Err codemadness.org 70 i 8333 Err codemadness.org 70 i 8334 Err codemadness.org 70 i 8335 Socially Fair k-Means Clustering. (arXiv:2006.10085v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8336 http://fr.arxiv.org/abs/2006.10085 Err codemadness.org 70 i 8337 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ghadiri_M/0/1/0/all/0/1">Mehrdad Ghadiri</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Samadi_S/0/1/0/all/0/1">Samira Samadi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vempala_S/0/1/0/all/0/1">Santosh Vempala</a></p> Err codemadness.org 70 i 8338 Err codemadness.org 70 i 8339 <p>We show that the popular k-means clustering algorithm (Lloyd's heuristic), Err codemadness.org 70 i 8340 used for a variety of scientific data, can result in outcomes that are Err codemadness.org 70 i 8341 unfavorable to subgroups of data (e.g., demographic groups). Such biased Err codemadness.org 70 i 8342 clusterings can have deleterious implications for human-centric applications Err codemadness.org 70 i 8343 such as resource allocation. We present a fair k-means objective and algorithm Err codemadness.org 70 i 8344 to choose cluster centers that provide equitable costs for different groups. Err codemadness.org 70 i 8345 The algorithm, Fair-Lloyd, is a modification of Lloyd's heuristic for k-means, Err codemadness.org 70 i 8346 inheriting its simplicity, efficiency, and stability. In comparison with Err codemadness.org 70 i 8347 standard Lloyd's, we find that on benchmark datasets, Fair-Lloyd exhibits Err codemadness.org 70 i 8348 unbiased performance by ensuring that all groups have equal costs in the output Err codemadness.org 70 i 8349 k-clustering, while incurring a negligible increase in running time, thus Err codemadness.org 70 i 8350 making it a viable fair option wherever k-means is currently used. Err codemadness.org 70 i 8351 </p> Err codemadness.org 70 i 8352 Err codemadness.org 70 i 8353 Err codemadness.org 70 i 8354 Err codemadness.org 70 i 8355 Neutralizing Self-Selection Bias in Sampling for Sortition. (arXiv:2006.10498v2 [cs.GT] UPDATED) Err codemadness.org 70 i 8356 http://fr.arxiv.org/abs/2006.10498 Err codemadness.org 70 i 8357 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Flanigan_B/0/1/0/all/0/1">Bailey Flanigan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Golz_P/0/1/0/all/0/1">Paul G&#xf6;lz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Gupta_A/0/1/0/all/0/1">Anupam Gupta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Procaccia_A/0/1/0/all/0/1">Ariel Procaccia</a></p> Err codemadness.org 70 i 8358 Err codemadness.org 70 i 8359 <p>Sortition is a political system in which decisions are made by panels of Err codemadness.org 70 i 8360 randomly selected citizens. The process for selecting a sortition panel is Err codemadness.org 70 i 8361 traditionally thought of as uniform sampling without replacement, which has Err codemadness.org 70 i 8362 strong fairness properties. In practice, however, sampling without replacement Err codemadness.org 70 i 8363 is not possible since only a fraction of agents is willing to participate in a Err codemadness.org 70 i 8364 panel when invited, and different demographic groups participate at different Err codemadness.org 70 i 8365 rates. In order to still produce panels whose composition resembles that of the Err codemadness.org 70 i 8366 population, we develop a sampling algorithm that restores close-to-equal Err codemadness.org 70 i 8367 representation probabilities for all agents while satisfying meaningful Err codemadness.org 70 i 8368 demographic quotas. As part of its input, our algorithm requires probabilities Err codemadness.org 70 i 8369 indicating how likely each volunteer in the pool was to participate. Since Err codemadness.org 70 i 8370 these participation probabilities are not directly observable, we show how to Err codemadness.org 70 i 8371 learn them, and demonstrate our approach using data on a real sortition panel Err codemadness.org 70 i 8372 combined with information on the general population in the form of publicly Err codemadness.org 70 i 8373 available survey data. Err codemadness.org 70 i 8374 </p> Err codemadness.org 70 i 8375 Err codemadness.org 70 i 8376 Err codemadness.org 70 i 8377 Err codemadness.org 70 i 8378 ContraGAN: Contrastive Learning for Conditional Image Generation. (arXiv:2006.12681v2 [cs.CV] UPDATED) Err codemadness.org 70 i 8379 http://fr.arxiv.org/abs/2006.12681 Err codemadness.org 70 i 8380 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kang_M/0/1/0/all/0/1">Minguk Kang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Park_J/0/1/0/all/0/1">Jaesik Park</a></p> Err codemadness.org 70 i 8381 Err codemadness.org 70 i 8382 <p>Conditional image generation is the task of generating diverse images using Err codemadness.org 70 i 8383 class label information. Although many conditional Generative Adversarial Err codemadness.org 70 i 8384 Networks (GAN) have shown realistic results, such methods consider pairwise Err codemadness.org 70 i 8385 relations between the embedding of an image and the embedding of the Err codemadness.org 70 i 8386 corresponding label (data-to-class relations) as the conditioning losses. In Err codemadness.org 70 i 8387 this paper, we propose ContraGAN that considers relations between multiple Err codemadness.org 70 i 8388 image embeddings in the same batch (data-to-data relations) as well as the Err codemadness.org 70 i 8389 data-to-class relations by using a conditional contrastive loss. The Err codemadness.org 70 i 8390 discriminator of ContraGAN discriminates the authenticity of given samples and Err codemadness.org 70 i 8391 minimizes a contrastive objective to learn the relations between training Err codemadness.org 70 i 8392 images. Simultaneously, the generator tries to generate realistic images that Err codemadness.org 70 i 8393 deceive the authenticity and have a low contrastive loss. The experimental Err codemadness.org 70 i 8394 results show that ContraGAN outperforms state-of-the-art-models by 7.3% and Err codemadness.org 70 i 8395 7.7% on Tiny ImageNet and ImageNet datasets, respectively. Besides, we Err codemadness.org 70 i 8396 experimentally demonstrate that ContraGAN helps to relieve the overfitting of Err codemadness.org 70 i 8397 the discriminator. For a fair comparison, we re-implement twelve Err codemadness.org 70 i 8398 state-of-the-art GANs using the PyTorch library. The software package is Err codemadness.org 70 i 8399 available at https://github.com/POSTECH-CVLab/PyTorch-StudioGAN. Err codemadness.org 70 i 8400 </p> Err codemadness.org 70 i 8401 Err codemadness.org 70 i 8402 Err codemadness.org 70 i 8403 Err codemadness.org 70 i 8404 Adversarial Soft Advantage Fitting: Imitation Learning without Policy Optimization. (arXiv:2006.13258v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8405 http://fr.arxiv.org/abs/2006.13258 Err codemadness.org 70 i 8406 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Barde_P/0/1/0/all/0/1">Paul Barde</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Roy_J/0/1/0/all/0/1">Julien Roy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jeon_W/0/1/0/all/0/1">Wonseok Jeon</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pineau_J/0/1/0/all/0/1">Joelle Pineau</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pal_C/0/1/0/all/0/1">Christopher Pal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nowrouzezahrai_D/0/1/0/all/0/1">Derek Nowrouzezahrai</a></p> Err codemadness.org 70 i 8407 Err codemadness.org 70 i 8408 <p>Adversarial Imitation Learning alternates between learning a discriminator -- Err codemadness.org 70 i 8409 which tells apart expert's demonstrations from generated ones -- and a Err codemadness.org 70 i 8410 generator's policy to produce trajectories that can fool this discriminator. Err codemadness.org 70 i 8411 This alternated optimization is known to be delicate in practice since it Err codemadness.org 70 i 8412 compounds unstable adversarial training with brittle and sample-inefficient Err codemadness.org 70 i 8413 reinforcement learning. We propose to remove the burden of the policy Err codemadness.org 70 i 8414 optimization steps by leveraging a novel discriminator formulation. Err codemadness.org 70 i 8415 Specifically, our discriminator is explicitly conditioned on two policies: the Err codemadness.org 70 i 8416 one from the previous generator's iteration and a learnable policy. When Err codemadness.org 70 i 8417 optimized, this discriminator directly learns the optimal generator's policy. Err codemadness.org 70 i 8418 Consequently, our discriminator's update solves the generator's optimization Err codemadness.org 70 i 8419 problem for free: learning a policy that imitates the expert does not require Err codemadness.org 70 i 8420 an additional optimization loop. This formulation effectively cuts by half the Err codemadness.org 70 i 8421 implementation and computational burden of Adversarial Imitation Learning Err codemadness.org 70 i 8422 algorithms by removing the Reinforcement Learning phase altogether. We show on Err codemadness.org 70 i 8423 a variety of tasks that our simpler approach is competitive to prevalent Err codemadness.org 70 i 8424 Imitation Learning methods. Err codemadness.org 70 i 8425 </p> Err codemadness.org 70 i 8426 Err codemadness.org 70 i 8427 Err codemadness.org 70 i 8428 Err codemadness.org 70 i 8429 Relative Deviation Margin Bounds. (arXiv:2006.14950v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8430 http://fr.arxiv.org/abs/2006.14950 Err codemadness.org 70 i 8431 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Cortes_C/0/1/0/all/0/1">Corinna Cortes</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mohri_M/0/1/0/all/0/1">Mehryar Mohri</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Suresh_A/0/1/0/all/0/1">Ananda Theertha Suresh</a></p> Err codemadness.org 70 i 8432 Err codemadness.org 70 i 8433 <p>We present a series of new and more favorable margin-based learning Err codemadness.org 70 i 8434 guarantees that depend on the empirical margin loss of a predictor. We give two Err codemadness.org 70 i 8435 types of learning bounds, both distribution-dependent and valid for general Err codemadness.org 70 i 8436 families, in terms of the Rademacher complexity or the empirical $\ell_\infty$ Err codemadness.org 70 i 8437 covering number of the hypothesis set used. Furthermore, using our relative Err codemadness.org 70 i 8438 deviation margin bounds, we derive distribution-dependent generalization bounds Err codemadness.org 70 i 8439 for unbounded loss functions under the assumption of a finite moment. We also Err codemadness.org 70 i 8440 briefly highlight several applications of these bounds and discuss their Err codemadness.org 70 i 8441 connection with existing results. Err codemadness.org 70 i 8442 </p> Err codemadness.org 70 i 8443 Err codemadness.org 70 i 8444 Err codemadness.org 70 i 8445 Err codemadness.org 70 i 8446 Weighted hypersoft configuration model. (arXiv:2007.00124v2 [physics.soc-ph] UPDATED) Err codemadness.org 70 i 8447 http://fr.arxiv.org/abs/2007.00124 Err codemadness.org 70 i 8448 <p>Authors: <a href="http://fr.arxiv.org/find/physics/1/au:+Voitalov_I/0/1/0/all/0/1">Ivan Voitalov</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Hoorn_P/0/1/0/all/0/1">Pim van der Hoorn</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Kitsak_M/0/1/0/all/0/1">Maksim Kitsak</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Papadopoulos_F/0/1/0/all/0/1">Fragkiskos Papadopoulos</a>, <a href="http://fr.arxiv.org/find/physics/1/au:+Krioukov_D/0/1/0/all/0/1">Dmitri Krioukov</a></p> Err codemadness.org 70 i 8449 Err codemadness.org 70 i 8450 <p>Maximum entropy null models of networks come in different flavors that depend Err codemadness.org 70 i 8451 on the type of constraints under which entropy is maximized. If the constraints Err codemadness.org 70 i 8452 are on degree sequences or distributions, we are dealing with configuration Err codemadness.org 70 i 8453 models. If the degree sequence is constrained exactly, the corresponding Err codemadness.org 70 i 8454 microcanonical ensemble of random graphs with a given degree sequence is the Err codemadness.org 70 i 8455 configuration model per se. If the degree sequence is constrained only on Err codemadness.org 70 i 8456 average, the corresponding grand-canonical ensemble of random graphs with a Err codemadness.org 70 i 8457 given expected degree sequence is the soft configuration model. If the degree Err codemadness.org 70 i 8458 sequence is not fixed at all but randomly drawn from a fixed distribution, the Err codemadness.org 70 i 8459 corresponding hypercanonical ensemble of random graphs with a given degree Err codemadness.org 70 i 8460 distribution is the hypersoft configuration model, a more adequate description Err codemadness.org 70 i 8461 of dynamic real-world networks in which degree sequences are never fixed but Err codemadness.org 70 i 8462 degree distributions often stay stable. Here, we introduce the hypersoft Err codemadness.org 70 i 8463 configuration model of weighted networks. The main contribution is a particular Err codemadness.org 70 i 8464 version of the model with power-law degree and strength distributions, and Err codemadness.org 70 i 8465 superlinear scaling of strengths with degrees, mimicking the properties of some Err codemadness.org 70 i 8466 real-world networks. As a byproduct, we generalize the notions of sparse Err codemadness.org 70 i 8467 graphons and their entropy to weighted networks. Err codemadness.org 70 i 8468 </p> Err codemadness.org 70 i 8469 Err codemadness.org 70 i 8470 Err codemadness.org 70 i 8471 Err codemadness.org 70 i 8472 Robustness against Relational Adversary. (arXiv:2007.00772v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8473 http://fr.arxiv.org/abs/2007.00772 Err codemadness.org 70 i 8474 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yizhen Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Meng_X/0/1/0/all/0/1">Xiaozhu Meng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_K/0/1/0/all/0/1">Ke Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Christodorescu_M/0/1/0/all/0/1">Mihai Christodorescu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jha_S/0/1/0/all/0/1">Somesh Jha</a></p> Err codemadness.org 70 i 8475 Err codemadness.org 70 i 8476 <p>Test-time adversarial attacks have posed serious challenges to the robustness Err codemadness.org 70 i 8477 of machine-learning models, and in many settings the adversarial perturbation Err codemadness.org 70 i 8478 need not be bounded by small $\ell_p$-norms. Motivated by the Err codemadness.org 70 i 8479 semantics-preserving attacks in vision and security domain, we investigate Err codemadness.org 70 i 8480 $\textit{relational adversaries}$, a broad class of attackers who create Err codemadness.org 70 i 8481 adversarial examples that are in a reflexive-transitive closure of a logical Err codemadness.org 70 i 8482 relation. We analyze the conditions for robustness and propose Err codemadness.org 70 i 8483 $\textit{normalize-and-predict}$ -- a learning framework with provable Err codemadness.org 70 i 8484 robustness guarantee. We compare our approach with adversarial training and Err codemadness.org 70 i 8485 derive an unified framework that provides benefits of both approaches. Guided Err codemadness.org 70 i 8486 by our theoretical findings, we apply our framework to image classification and Err codemadness.org 70 i 8487 malware detection. Results of both tasks show that attacks using relational Err codemadness.org 70 i 8488 adversaries frequently fool existing models, but our unified framework can Err codemadness.org 70 i 8489 significantly enhance their robustness. Err codemadness.org 70 i 8490 </p> Err codemadness.org 70 i 8491 Err codemadness.org 70 i 8492 Err codemadness.org 70 i 8493 Err codemadness.org 70 i 8494 Information Theoretic Lower Bounds for Feed-Forward Fully-Connected Deep Networks. (arXiv:2007.00796v2 [stat.ML] UPDATED) Err codemadness.org 70 i 8495 http://fr.arxiv.org/abs/2007.00796 Err codemadness.org 70 i 8496 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Yang_X/0/1/0/all/0/1">Xiaochen Yang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Honorio_J/0/1/0/all/0/1">Jean Honorio</a></p> Err codemadness.org 70 i 8497 Err codemadness.org 70 i 8498 <p>In this paper, we study the sample complexity lower bounds for the exact Err codemadness.org 70 i 8499 recovery of parameters and for a positive excess risk of a feed-forward, Err codemadness.org 70 i 8500 fully-connected neural network for binary classification, using Err codemadness.org 70 i 8501 information-theoretic tools. We prove these lower bounds by the existence of a Err codemadness.org 70 i 8502 generative network characterized by a backwards data generating process, where Err codemadness.org 70 i 8503 the input is generated based on the binary output, and the network is Err codemadness.org 70 i 8504 parametrized by weight parameters for the hidden layers. The sample complexity Err codemadness.org 70 i 8505 lower bound for the exact recovery of parameters is $\Omega(d r \log(r) + p )$ Err codemadness.org 70 i 8506 and for a positive excess risk is $\Omega(r \log(r) + p )$, where $p$ is the Err codemadness.org 70 i 8507 dimension of the input, $r$ reflects the rank of the weight matrices and $d$ is Err codemadness.org 70 i 8508 the number of hidden layers. To the best of our knowledge, our results are the Err codemadness.org 70 i 8509 first information theoretic lower bounds. Err codemadness.org 70 i 8510 </p> Err codemadness.org 70 i 8511 Err codemadness.org 70 i 8512 Err codemadness.org 70 i 8513 Err codemadness.org 70 i 8514 Not All Unlabeled Data are Equal: Learning to Weight Data in Semi-supervised Learning. (arXiv:2007.01293v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8515 http://fr.arxiv.org/abs/2007.01293 Err codemadness.org 70 i 8516 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ren_Z/0/1/0/all/0/1">Zhongzheng Ren</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yeh_R/0/1/0/all/0/1">Raymond A. Yeh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Schwing_A/0/1/0/all/0/1">Alexander G. Schwing</a></p> Err codemadness.org 70 i 8517 Err codemadness.org 70 i 8518 <p>Existing semi-supervised learning (SSL) algorithms use a single weight to Err codemadness.org 70 i 8519 balance the loss of labeled and unlabeled examples, i.e., all unlabeled Err codemadness.org 70 i 8520 examples are equally weighted. But not all unlabeled data are equal. In this Err codemadness.org 70 i 8521 paper we study how to use a different weight for every unlabeled example. Err codemadness.org 70 i 8522 Manual tuning of all those weights -- as done in prior work -- is no longer Err codemadness.org 70 i 8523 possible. Instead, we adjust those weights via an algorithm based on the Err codemadness.org 70 i 8524 influence function, a measure of a model's dependency on one training example. Err codemadness.org 70 i 8525 To make the approach efficient, we propose a fast and effective approximation Err codemadness.org 70 i 8526 of the influence function. We demonstrate that this technique outperforms Err codemadness.org 70 i 8527 state-of-the-art methods on semi-supervised image and language classification Err codemadness.org 70 i 8528 tasks. Err codemadness.org 70 i 8529 </p> Err codemadness.org 70 i 8530 Err codemadness.org 70 i 8531 Err codemadness.org 70 i 8532 Err codemadness.org 70 i 8533 A Framework for Modelling, Verification and Transformation of Concurrent Imperative Programs. (arXiv:2007.02261v2 [cs.LO] UPDATED) Err codemadness.org 70 i 8534 http://fr.arxiv.org/abs/2007.02261 Err codemadness.org 70 i 8535 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bortin_M/0/1/0/all/0/1">Maksym Bortin</a></p> Err codemadness.org 70 i 8536 Err codemadness.org 70 i 8537 <p>The paper gives a comprehensive presentation of a framework, embedded into Err codemadness.org 70 i 8538 the simply typed higher-order logic, and aimed at providing a sound assistance Err codemadness.org 70 i 8539 in formal reasoning about models of imperative programs with interleaved Err codemadness.org 70 i 8540 computations. As a case study, a model of the Peterson's mutual exclusion Err codemadness.org 70 i 8541 algorithm will be scrutinised in the course of the paper illustrating Err codemadness.org 70 i 8542 applicability of the framework. Err codemadness.org 70 i 8543 </p> Err codemadness.org 70 i 8544 Err codemadness.org 70 i 8545 Err codemadness.org 70 i 8546 Err codemadness.org 70 i 8547 Self-Supervised Graph Transformer on Large-Scale Molecular Data. (arXiv:2007.02835v2 [q-bio.BM] UPDATED) Err codemadness.org 70 i 8548 http://fr.arxiv.org/abs/2007.02835 Err codemadness.org 70 i 8549 <p>Authors: <a href="http://fr.arxiv.org/find/q-bio/1/au:+Rong_Y/0/1/0/all/0/1">Yu Rong</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Bian_Y/0/1/0/all/0/1">Yatao Bian</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Xu_T/0/1/0/all/0/1">Tingyang Xu</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Xie_W/0/1/0/all/0/1">Weiyang Xie</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Wei_Y/0/1/0/all/0/1">Ying Wei</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Huang_W/0/1/0/all/0/1">Wenbing Huang</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Huang_J/0/1/0/all/0/1">Junzhou Huang</a></p> Err codemadness.org 70 i 8550 Err codemadness.org 70 i 8551 <p>How to obtain informative representations of molecules is a crucial Err codemadness.org 70 i 8552 prerequisite in AI-driven drug design and discovery. Recent researches abstract Err codemadness.org 70 i 8553 molecules as graphs and employ Graph Neural Networks (GNNs) for molecular Err codemadness.org 70 i 8554 representation learning. Nevertheless, two issues impede the usage of GNNs in Err codemadness.org 70 i 8555 real scenarios: (1) insufficient labeled molecules for supervised training; (2) Err codemadness.org 70 i 8556 poor generalization capability to new-synthesized molecules. To address them Err codemadness.org 70 i 8557 both, we propose a novel framework, GROVER, which stands for Graph Err codemadness.org 70 i 8558 Representation frOm self-superVised mEssage passing tRansformer. With carefully Err codemadness.org 70 i 8559 designed self-supervised tasks in node-, edge- and graph-level, GROVER can Err codemadness.org 70 i 8560 learn rich structural and semantic information of molecules from enormous Err codemadness.org 70 i 8561 unlabelled molecular data. Rather, to encode such complex information, GROVER Err codemadness.org 70 i 8562 integrates Message Passing Networks into the Transformer-style architecture to Err codemadness.org 70 i 8563 deliver a class of more expressive encoders of molecules. The flexibility of Err codemadness.org 70 i 8564 GROVER allows it to be trained efficiently on large-scale molecular dataset Err codemadness.org 70 i 8565 without requiring any supervision, thus being immunized to the two issues Err codemadness.org 70 i 8566 mentioned above. We pre-train GROVER with 100 million parameters on 10 million Err codemadness.org 70 i 8567 unlabelled molecules -- the biggest GNN and the largest training dataset in Err codemadness.org 70 i 8568 molecular representation learning. We then leverage the pre-trained GROVER for Err codemadness.org 70 i 8569 molecular property prediction followed by task-specific fine-tuning, where we Err codemadness.org 70 i 8570 observe a huge improvement (more than 6% on average) from current Err codemadness.org 70 i 8571 state-of-the-art methods on 11 challenging benchmarks. The insights we gained Err codemadness.org 70 i 8572 are that well-designed self-supervision losses and largely-expressive Err codemadness.org 70 i 8573 pre-trained models enjoy the significant potential on performance boosting. Err codemadness.org 70 i 8574 </p> Err codemadness.org 70 i 8575 Err codemadness.org 70 i 8576 Err codemadness.org 70 i 8577 Err codemadness.org 70 i 8578 BoxE: A Box Embedding Model for Knowledge Base Completion. (arXiv:2007.06267v2 [cs.AI] UPDATED) Err codemadness.org 70 i 8579 http://fr.arxiv.org/abs/2007.06267 Err codemadness.org 70 i 8580 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Abboud_R/0/1/0/all/0/1">Ralph Abboud</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ceylan_I/0/1/0/all/0/1">&#x130;smail &#x130;lkan Ceylan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lukasiewicz_T/0/1/0/all/0/1">Thomas Lukasiewicz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Salvatori_T/0/1/0/all/0/1">Tommaso Salvatori</a></p> Err codemadness.org 70 i 8581 Err codemadness.org 70 i 8582 <p>Knowledge base completion (KBC) aims to automatically infer missing facts by Err codemadness.org 70 i 8583 exploiting information already present in a knowledge base (KB). A promising Err codemadness.org 70 i 8584 approach for KBC is to embed knowledge into latent spaces and make predictions Err codemadness.org 70 i 8585 from learned embeddings. However, existing embedding models are subject to at Err codemadness.org 70 i 8586 least one of the following limitations: (1) theoretical inexpressivity, (2) Err codemadness.org 70 i 8587 lack of support for prominent inference patterns (e.g., hierarchies), (3) lack Err codemadness.org 70 i 8588 of support for KBC over higher-arity relations, and (4) lack of support for Err codemadness.org 70 i 8589 incorporating logical rules. Here, we propose a spatio-translational embedding Err codemadness.org 70 i 8590 model, called BoxE, that simultaneously addresses all these limitations. BoxE Err codemadness.org 70 i 8591 embeds entities as points, and relations as a set of hyper-rectangles (or Err codemadness.org 70 i 8592 boxes), which spatially characterize basic logical properties. This seemingly Err codemadness.org 70 i 8593 simple abstraction yields a fully expressive model offering a natural encoding Err codemadness.org 70 i 8594 for many desired logical properties. BoxE can both capture and inject rules Err codemadness.org 70 i 8595 from rich classes of rule languages, going well beyond individual inference Err codemadness.org 70 i 8596 patterns. By design, BoxE naturally applies to higher-arity KBs. We conduct a Err codemadness.org 70 i 8597 detailed experimental analysis, and show that BoxE achieves state-of-the-art Err codemadness.org 70 i 8598 performance, both on benchmark knowledge graphs and on more general KBs, and we Err codemadness.org 70 i 8599 empirically show the power of integrating logical rules. Err codemadness.org 70 i 8600 </p> Err codemadness.org 70 i 8601 Err codemadness.org 70 i 8602 Err codemadness.org 70 i 8603 Err codemadness.org 70 i 8604 RATT: Recurrent Attention to Transient Tasks for Continual Image Captioning. (arXiv:2007.06271v2 [cs.CV] UPDATED) Err codemadness.org 70 i 8605 http://fr.arxiv.org/abs/2007.06271 Err codemadness.org 70 i 8606 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chiaro_R/0/1/0/all/0/1">Riccardo Del Chiaro</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Twardowski_B/0/1/0/all/0/1">Bart&#x142;omiej Twardowski</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bagdanov_A/0/1/0/all/0/1">Andrew D. Bagdanov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Weijer_J/0/1/0/all/0/1">Joost van de Weijer</a></p> Err codemadness.org 70 i 8607 Err codemadness.org 70 i 8608 <p>Research on continual learning has led to a variety of approaches to Err codemadness.org 70 i 8609 mitigating catastrophic forgetting in feed-forward classification networks. Err codemadness.org 70 i 8610 Until now surprisingly little attention has been focused on continual learning Err codemadness.org 70 i 8611 of recurrent models applied to problems like image captioning. In this paper we Err codemadness.org 70 i 8612 take a systematic look at continual learning of LSTM-based models for image Err codemadness.org 70 i 8613 captioning. We propose an attention-based approach that explicitly accommodates Err codemadness.org 70 i 8614 the transient nature of vocabularies in continual image captioning tasks -- Err codemadness.org 70 i 8615 i.e. that task vocabularies are not disjoint. We call our method Recurrent Err codemadness.org 70 i 8616 Attention to Transient Tasks (RATT), and also show how to adapt continual Err codemadness.org 70 i 8617 learning approaches based on weight egularization and knowledge distillation to Err codemadness.org 70 i 8618 recurrent continual learning problems. We apply our approaches to incremental Err codemadness.org 70 i 8619 image captioning problem on two new continual learning benchmarks we define Err codemadness.org 70 i 8620 using the MS-COCO and Flickr30 datasets. Our results demonstrate that RATT is Err codemadness.org 70 i 8621 able to sequentially learn five captioning tasks while incurring no forgetting Err codemadness.org 70 i 8622 of previously learned ones. Err codemadness.org 70 i 8623 </p> Err codemadness.org 70 i 8624 Err codemadness.org 70 i 8625 Err codemadness.org 70 i 8626 Err codemadness.org 70 i 8627 Graph Neural Networks for Scalable Radio Resource Management: Architecture Design and Theoretical Analysis. (arXiv:2007.07632v2 [cs.IT] UPDATED) Err codemadness.org 70 i 8628 http://fr.arxiv.org/abs/2007.07632 Err codemadness.org 70 i 8629 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1">Yifei Shen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Shi_Y/0/1/0/all/0/1">Yuanming Shi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jun Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Letaief_K/0/1/0/all/0/1">Khaled B. Letaief</a></p> Err codemadness.org 70 i 8630 Err codemadness.org 70 i 8631 <p>Deep learning has recently emerged as a disruptive technology to solve Err codemadness.org 70 i 8632 challenging radio resource management problems in wireless networks. However, Err codemadness.org 70 i 8633 the neural network architectures adopted by existing works suffer from poor Err codemadness.org 70 i 8634 scalability, generalization, and lack of interpretability. A long-standing Err codemadness.org 70 i 8635 approach to improve scalability and generalization is to incorporate the Err codemadness.org 70 i 8636 structures of the target task into the neural network architecture. In this Err codemadness.org 70 i 8637 paper, we propose to apply graph neural networks (GNNs) to solve large-scale Err codemadness.org 70 i 8638 radio resource management problems, supported by effective neural network Err codemadness.org 70 i 8639 architecture design and theoretical analysis. Specifically, we first Err codemadness.org 70 i 8640 demonstrate that radio resource management problems can be formulated as graph Err codemadness.org 70 i 8641 optimization problems that enjoy a universal permutation equivariance property. Err codemadness.org 70 i 8642 We then identify a class of neural networks, named \emph{message passing graph Err codemadness.org 70 i 8643 neural networks} (MPGNNs). It is demonstrated that they not only satisfy the Err codemadness.org 70 i 8644 permutation equivariance property, but also can generalize to large-scale Err codemadness.org 70 i 8645 problems while enjoying a high computational efficiency. For interpretablity Err codemadness.org 70 i 8646 and theoretical guarantees, we prove the equivalence between MPGNNs and a class Err codemadness.org 70 i 8647 of distributed optimization algorithms, which is then used to analyze the Err codemadness.org 70 i 8648 performance and generalization of MPGNN-based methods. Extensive simulations, Err codemadness.org 70 i 8649 with power control and beamforming as two examples, will demonstrate that the Err codemadness.org 70 i 8650 proposed method, trained in an unsupervised manner with unlabeled samples, Err codemadness.org 70 i 8651 matches or even outperforms classic optimization-based algorithms without Err codemadness.org 70 i 8652 domain-specific knowledge. Remarkably, the proposed method is highly scalable Err codemadness.org 70 i 8653 and can solve the beamforming problem in an interference channel with $1000$ Err codemadness.org 70 i 8654 transceiver pairs within $6$ milliseconds on a single GPU. Err codemadness.org 70 i 8655 </p> Err codemadness.org 70 i 8656 Err codemadness.org 70 i 8657 Err codemadness.org 70 i 8658 Err codemadness.org 70 i 8659 Temporal Pointwise Convolutional Networks for Length of Stay Prediction in the Intensive Care Unit. (arXiv:2007.09483v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8660 http://fr.arxiv.org/abs/2007.09483 Err codemadness.org 70 i 8661 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rocheteau_E/0/1/0/all/0/1">Emma Rocheteau</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lio_P/0/1/0/all/0/1">Pietro Li&#xf2;</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hyland_S/0/1/0/all/0/1">Stephanie Hyland</a></p> Err codemadness.org 70 i 8662 Err codemadness.org 70 i 8663 <p>The pressure of ever-increasing patient demand and budget restrictions make Err codemadness.org 70 i 8664 hospital bed management a daily challenge for clinical staff. Most critical is Err codemadness.org 70 i 8665 the efficient allocation of resource-heavy Intensive Care Unit (ICU) beds to Err codemadness.org 70 i 8666 the patients who need life support. Central to solving this problem is knowing Err codemadness.org 70 i 8667 for how long the current set of ICU patients are likely to stay in the unit. In Err codemadness.org 70 i 8668 this work, we propose a new deep learning model based on the combination of Err codemadness.org 70 i 8669 temporal convolution and pointwise (1x1) convolution, to solve the length of Err codemadness.org 70 i 8670 stay prediction task on the eICU critical care dataset. The model - which we Err codemadness.org 70 i 8671 refer to as Temporal Pointwise Convolution (TPC) - is specifically designed to Err codemadness.org 70 i 8672 mitigate for common challenges with Electronic Health Records, such as Err codemadness.org 70 i 8673 skewness, irregular sampling and missing data. In doing so, we have achieved Err codemadness.org 70 i 8674 significant performance benefits of 18-51% (metric dependent) over the commonly Err codemadness.org 70 i 8675 used Long-Short Term Memory (LSTM) network, and the multi-head self-attention Err codemadness.org 70 i 8676 network known as the Transformer. Err codemadness.org 70 i 8677 </p> Err codemadness.org 70 i 8678 Err codemadness.org 70 i 8679 Err codemadness.org 70 i 8680 Err codemadness.org 70 i 8681 CovidDeep: SARS-CoV-2/COVID-19 Test Based on Wearable Medical Sensors and Efficient Neural Networks. (arXiv:2007.10497v3 [cs.HC] UPDATED) Err codemadness.org 70 i 8682 http://fr.arxiv.org/abs/2007.10497 Err codemadness.org 70 i 8683 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hassantabar_S/0/1/0/all/0/1">Shayan Hassantabar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stefano_N/0/1/0/all/0/1">Novati Stefano</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ghanakota_V/0/1/0/all/0/1">Vishweshwar Ghanakota</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ferrari_A/0/1/0/all/0/1">Alessandra Ferrari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Nicola_G/0/1/0/all/0/1">Gregory N. Nicola</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bruno_R/0/1/0/all/0/1">Raffaele Bruno</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Marino_I/0/1/0/all/0/1">Ignazio R. Marino</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hamidouche_K/0/1/0/all/0/1">Kenza Hamidouche</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jha_N/0/1/0/all/0/1">Niraj K. Jha</a></p> Err codemadness.org 70 i 8684 Err codemadness.org 70 i 8685 <p>The novel coronavirus (SARS-CoV-2) has led to a pandemic. The current testing Err codemadness.org 70 i 8686 regime based on Reverse Transcription-Polymerase Chain Reaction for SARS-CoV-2 Err codemadness.org 70 i 8687 has been unable to keep up with testing demands, and also suffers from a Err codemadness.org 70 i 8688 relatively low positive detection rate in the early stages of the resultant Err codemadness.org 70 i 8689 COVID-19 disease. Hence, there is a need for an alternative approach for Err codemadness.org 70 i 8690 repeated large-scale testing of SARS-CoV-2/COVID-19. We propose a framework Err codemadness.org 70 i 8691 called CovidDeep that combines efficient DNNs with commercially available WMSs Err codemadness.org 70 i 8692 for pervasive testing of the virus. We collected data from 87 individuals, Err codemadness.org 70 i 8693 spanning three cohorts including healthy, asymptomatic, and symptomatic Err codemadness.org 70 i 8694 patients. We trained DNNs on various subsets of the features automatically Err codemadness.org 70 i 8695 extracted from six WMS and questionnaire categories to perform ablation studies Err codemadness.org 70 i 8696 to determine which subsets are most efficacious in terms of test accuracy for a Err codemadness.org 70 i 8697 three-way classification. The highest test accuracy obtained was 98.1%. We also Err codemadness.org 70 i 8698 augmented the real training dataset with a synthetic training dataset drawn Err codemadness.org 70 i 8699 from the same probability distribution to impose a prior on DNN weights and Err codemadness.org 70 i 8700 leveraged a grow-and-prune synthesis paradigm to learn both DNN architecture Err codemadness.org 70 i 8701 and weights. This boosted the accuracy of the various DNNs further and Err codemadness.org 70 i 8702 simultaneously reduced their size and floating-point operations. Err codemadness.org 70 i 8703 </p> Err codemadness.org 70 i 8704 Err codemadness.org 70 i 8705 Err codemadness.org 70 i 8706 Err codemadness.org 70 i 8707 The Complete Lasso Tradeoff Diagram. (arXiv:2007.11078v4 [math.ST] UPDATED) Err codemadness.org 70 i 8708 http://fr.arxiv.org/abs/2007.11078 Err codemadness.org 70 i 8709 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Wang_H/0/1/0/all/0/1">Hua Wang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Yang_Y/0/1/0/all/0/1">Yachong Yang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Bu_Z/0/1/0/all/0/1">Zhiqi Bu</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Su_W/0/1/0/all/0/1">Weijie J. Su</a></p> Err codemadness.org 70 i 8710 Err codemadness.org 70 i 8711 <p>A fundamental problem in the high-dimensional regression is to understand the Err codemadness.org 70 i 8712 tradeoff between type I and type II errors or, equivalently, false discovery Err codemadness.org 70 i 8713 rate (FDR) and power in variable selection. To address this important problem, Err codemadness.org 70 i 8714 we offer the first complete tradeoff diagram that distinguishes all pairs of Err codemadness.org 70 i 8715 FDR and power that can be asymptotically realized by the Lasso with some choice Err codemadness.org 70 i 8716 of its penalty parameter from the remaining pairs, in a regime of linear Err codemadness.org 70 i 8717 sparsity under random designs. The tradeoff between the FDR and power Err codemadness.org 70 i 8718 characterized by our diagram holds no matter how strong the signals are. In Err codemadness.org 70 i 8719 particular, our results improve on the earlier Lasso tradeoff diagram of Err codemadness.org 70 i 8720 <a href="/abs/1511.01957">arXiv:1511.01957</a> by recognizing two simple but fundamental constraints on the Err codemadness.org 70 i 8721 pairs of FDR and power. The improvement is more substantial when the regression Err codemadness.org 70 i 8722 problem is above the Donoho--Tanner phase transition. Finally, we present Err codemadness.org 70 i 8723 extensive simulation studies to confirm the sharpness of the complete Lasso Err codemadness.org 70 i 8724 tradeoff diagram. Err codemadness.org 70 i 8725 </p> Err codemadness.org 70 i 8726 Err codemadness.org 70 i 8727 Err codemadness.org 70 i 8728 Err codemadness.org 70 i 8729 Sifting Convolution on the Sphere. (arXiv:2007.12153v2 [cs.IT] UPDATED) Err codemadness.org 70 i 8730 http://fr.arxiv.org/abs/2007.12153 Err codemadness.org 70 i 8731 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Roddy_P/0/1/0/all/0/1">Patrick J. Roddy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+McEwen_J/0/1/0/all/0/1">Jason D. McEwen</a></p> Err codemadness.org 70 i 8732 Err codemadness.org 70 i 8733 <p>A novel spherical convolution is defined through the sifting property of the Err codemadness.org 70 i 8734 Dirac delta on the sphere. The so-called sifting convolution is defined by the Err codemadness.org 70 i 8735 inner product of one function with a translated version of another, but with Err codemadness.org 70 i 8736 the adoption of an alternative translation operator on the sphere. This Err codemadness.org 70 i 8737 translation operator follows by analogy with the Euclidean translation when Err codemadness.org 70 i 8738 viewed in harmonic space. The sifting convolution satisfies a variety of Err codemadness.org 70 i 8739 desirable properties that are lacking in alternate definitions, namely: it Err codemadness.org 70 i 8740 supports directional kernels; it has an output which remains on the sphere; and Err codemadness.org 70 i 8741 is efficient to compute. An illustration of the sifting convolution on a Err codemadness.org 70 i 8742 topographic map of the Earth demonstrates that it supports directional kernels Err codemadness.org 70 i 8743 to perform anisotropic filtering, while its output remains on the sphere. Err codemadness.org 70 i 8744 </p> Err codemadness.org 70 i 8745 Err codemadness.org 70 i 8746 Err codemadness.org 70 i 8747 Err codemadness.org 70 i 8748 Revisiting Locality in Binary-Integer Representations. (arXiv:2007.12159v2 [cs.NE] UPDATED) Err codemadness.org 70 i 8749 http://fr.arxiv.org/abs/2007.12159 Err codemadness.org 70 i 8750 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shastri_H/0/1/0/all/0/1">Hrishee Shastri</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Frachtenberg_E/0/1/0/all/0/1">Eitan Frachtenberg</a></p> Err codemadness.org 70 i 8751 Err codemadness.org 70 i 8752 <p>Mutation and recombination operators play a key role in determining the speed Err codemadness.org 70 i 8753 and quality of Genetic and Evolutionary Algorithms (GEAs). Prior work has Err codemadness.org 70 i 8754 analyzed the effects of these operators on genotypic variation, often using Err codemadness.org 70 i 8755 locality metrics that measure the sensitivity and stability of Err codemadness.org 70 i 8756 genotype-phenotype representations to these operators. Err codemadness.org 70 i 8757 </p> Err codemadness.org 70 i 8758 <p>In this paper, we focus on an important subset of representations, namely Err codemadness.org 70 i 8759 nonredundant bitstring-to-integer representations, and analyze them through the Err codemadness.org 70 i 8760 lens of Rothlauf's widely used locality metrics. We first define locality Err codemadness.org 70 i 8761 metrics equivalent to Rothlauf's that are tailored to our domain: the Err codemadness.org 70 i 8762 \textit{point locality} for single-bit mutation and \textit{general locality} Err codemadness.org 70 i 8763 for recombination. With these definitions, we derive tight bounds and a closed Err codemadness.org 70 i 8764 form expected value for point locality. For general locality we show that it is Err codemadness.org 70 i 8765 asymptotically equivalent across all representations and operators. We also Err codemadness.org 70 i 8766 recreate three established GEA experiments to understand the predictive power Err codemadness.org 70 i 8767 of point locality on GEA performance, focusing on two popular and often Err codemadness.org 70 i 8768 juxtaposed representations: standard binary and binary reflected Gray. Err codemadness.org 70 i 8769 </p> Err codemadness.org 70 i 8770 <p>We show that standard binary has provably no worse locality than any Gray Err codemadness.org 70 i 8771 encoding, including binary reflected Gray. We discuss this result in the Err codemadness.org 70 i 8772 context of previous studies that found binary reflected Gray to outperform Err codemadness.org 70 i 8773 standard binary, and we argue that locality cannot be the explanation for Err codemadness.org 70 i 8774 strong performance. Finally, we provide empirical evidence that weak point Err codemadness.org 70 i 8775 locality representations can be beneficial to performance in the exploration Err codemadness.org 70 i 8776 phase of the GEA, while strong point locality representations are more Err codemadness.org 70 i 8777 beneficial in the exploitation phase. Err codemadness.org 70 i 8778 </p> Err codemadness.org 70 i 8779 Err codemadness.org 70 i 8780 Err codemadness.org 70 i 8781 Err codemadness.org 70 i 8782 YOLOpeds: Efficient Real-Time Single-Shot Pedestrian Detection for Smart Camera Applications. (arXiv:2007.13404v2 [cs.CV] UPDATED) Err codemadness.org 70 i 8783 http://fr.arxiv.org/abs/2007.13404 Err codemadness.org 70 i 8784 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kyrkou_C/0/1/0/all/0/1">Christos Kyrkou</a></p> Err codemadness.org 70 i 8785 Err codemadness.org 70 i 8786 <p>Deep Learning-based object detectors can enhance the capabilities of smart Err codemadness.org 70 i 8787 camera systems in a wide spectrum of machine vision applications including Err codemadness.org 70 i 8788 video surveillance, autonomous driving, robots and drones, smart factory, and Err codemadness.org 70 i 8789 health monitoring. Pedestrian detection plays a key role in all these Err codemadness.org 70 i 8790 applications and deep learning can be used to construct accurate Err codemadness.org 70 i 8791 state-of-the-art detectors. However, such complex paradigms do not scale easily Err codemadness.org 70 i 8792 and are not traditionally implemented in resource-constrained smart cameras for Err codemadness.org 70 i 8793 on-device processing which offers significant advantages in situations when Err codemadness.org 70 i 8794 real-time monitoring and robustness are vital. Efficient neural networks can Err codemadness.org 70 i 8795 not only enable mobile applications and on-device experiences but can also be a Err codemadness.org 70 i 8796 key enabler of privacy and security allowing a user to gain the benefits of Err codemadness.org 70 i 8797 neural networks without needing to send their data to the server to be Err codemadness.org 70 i 8798 evaluated. This work addresses the challenge of achieving a good trade-off Err codemadness.org 70 i 8799 between accuracy and speed for efficient deployment of deep-learning-based Err codemadness.org 70 i 8800 pedestrian detection in smart camera applications. A computationally efficient Err codemadness.org 70 i 8801 architecture is introduced based on separable convolutions and proposes Err codemadness.org 70 i 8802 integrating dense connections across layers and multi-scale feature fusion to Err codemadness.org 70 i 8803 improve representational capacity while decreasing the number of parameters and Err codemadness.org 70 i 8804 operations. In particular, the contributions of this work are the following: 1) Err codemadness.org 70 i 8805 An efficient backbone combining multi-scale feature operations, 2) a more Err codemadness.org 70 i 8806 elaborate loss function for improved localization, 3) an anchor-less approach Err codemadness.org 70 i 8807 for detection, The proposed approach called YOLOpeds is evaluated using the Err codemadness.org 70 i 8808 PETS2009 surveillance dataset on 320x320 images. Overall, YOLOpeds provides Err codemadness.org 70 i 8809 real-time sustained operation of over 30 frames per second with detection rates Err codemadness.org 70 i 8810 in the range of 86% outperforming existing deep learning models. Err codemadness.org 70 i 8811 </p> Err codemadness.org 70 i 8812 Err codemadness.org 70 i 8813 Err codemadness.org 70 i 8814 Err codemadness.org 70 i 8815 Regularization by Denoising via Fixed-Point Projection (RED-PRO). (arXiv:2008.00226v2 [eess.IV] UPDATED) Err codemadness.org 70 i 8816 http://fr.arxiv.org/abs/2008.00226 Err codemadness.org 70 i 8817 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Cohen_R/0/1/0/all/0/1">Regev Cohen</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Elad_M/0/1/0/all/0/1">Michael Elad</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Milanfar_P/0/1/0/all/0/1">Peyman Milanfar</a></p> Err codemadness.org 70 i 8818 Err codemadness.org 70 i 8819 <p>Inverse problems in image processing are typically cast as optimization Err codemadness.org 70 i 8820 tasks, consisting of data-fidelity and stabilizing regularization terms. A Err codemadness.org 70 i 8821 recent regularization strategy of great interest utilizes the power of Err codemadness.org 70 i 8822 denoising engines. Two such methods are the Plug-and-Play Prior (PnP) and Err codemadness.org 70 i 8823 Regularization by Denoising (RED). While both have shown state-of-the-art Err codemadness.org 70 i 8824 results in various recovery tasks, their theoretical justification is Err codemadness.org 70 i 8825 incomplete. In this paper, we aim to bridge between RED and PnP, enriching the Err codemadness.org 70 i 8826 understanding of both frameworks. Towards that end, we reformulate RED as a Err codemadness.org 70 i 8827 convex optimization problem utilizing a projection (RED-PRO) onto the Err codemadness.org 70 i 8828 fixed-point set of demicontractive denoisers. We offer a simple iterative Err codemadness.org 70 i 8829 solution to this problem, by which we show that PnP proximal gradient method is Err codemadness.org 70 i 8830 a special case of RED-PRO, while providing guarantees for the convergence of Err codemadness.org 70 i 8831 both frameworks to globally optimal solutions. In addition, we present Err codemadness.org 70 i 8832 relaxations of RED-PRO that allow for handling denoisers with limited Err codemadness.org 70 i 8833 fixed-point sets. Finally, we demonstrate RED-PRO for the tasks of image Err codemadness.org 70 i 8834 deblurring and super-resolution, showing improved results with respect to the Err codemadness.org 70 i 8835 original RED framework. Err codemadness.org 70 i 8836 </p> Err codemadness.org 70 i 8837 Err codemadness.org 70 i 8838 Err codemadness.org 70 i 8839 Err codemadness.org 70 i 8840 A Matrix Chernoff Bound for Markov Chains and Its Application to Co-occurrence Matrices. (arXiv:2008.02464v2 [stat.ML] UPDATED) Err codemadness.org 70 i 8841 http://fr.arxiv.org/abs/2008.02464 Err codemadness.org 70 i 8842 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Qiu_J/0/1/0/all/0/1">Jiezhong Qiu</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Wang_C/0/1/0/all/0/1">Chi Wang</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Liao_B/0/1/0/all/0/1">Ben Liao</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Peng_R/0/1/0/all/0/1">Richard Peng</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Tang_J/0/1/0/all/0/1">Jie Tang</a></p> Err codemadness.org 70 i 8843 Err codemadness.org 70 i 8844 <p>We prove a Chernoff-type bound for sums of matrix-valued random variables Err codemadness.org 70 i 8845 sampled via a regular (aperiodic and irreducible) finite Markov chain. Err codemadness.org 70 i 8846 Specially, consider a random walk on a regular Markov chain and a Hermitian Err codemadness.org 70 i 8847 matrix-valued function on its state space. Our result gives exponentially Err codemadness.org 70 i 8848 decreasing bounds on the tail distributions of the extreme eigenvalues of the Err codemadness.org 70 i 8849 sample mean matrix. Our proof is based on the matrix expander (regular Err codemadness.org 70 i 8850 undirected graph) Chernoff bound [Garg et al. STOC '18] and scalar Err codemadness.org 70 i 8851 Chernoff-Hoeffding bounds for Markov chains [Chung et al. STACS '12]. Err codemadness.org 70 i 8852 </p> Err codemadness.org 70 i 8853 <p>Our matrix Chernoff bound for Markov chains can be applied to analyze the Err codemadness.org 70 i 8854 behavior of co-occurrence statistics for sequential data, which have been Err codemadness.org 70 i 8855 common and important data signals in machine learning. We show that given a Err codemadness.org 70 i 8856 regular Markov chain with $n$ states and mixing time $\tau$, we need a Err codemadness.org 70 i 8857 trajectory of length $O(\tau (\log{(n)}+\log{(\tau)})/\epsilon^2)$ to achieve Err codemadness.org 70 i 8858 an estimator of the co-occurrence matrix with error bound $\epsilon$. We Err codemadness.org 70 i 8859 conduct several experiments and the experimental results are consistent with Err codemadness.org 70 i 8860 the exponentially fast convergence rate from theoretical analysis. Our result Err codemadness.org 70 i 8861 gives the first bound on the convergence rate of the co-occurrence matrix and Err codemadness.org 70 i 8862 the first sample complexity analysis in graph representation learning. Err codemadness.org 70 i 8863 </p> Err codemadness.org 70 i 8864 Err codemadness.org 70 i 8865 Err codemadness.org 70 i 8866 Err codemadness.org 70 i 8867 Integration of the 3D Environment for UAV Onboard Visual Object Tracking. (arXiv:2008.02834v3 [cs.CV] UPDATED) Err codemadness.org 70 i 8868 http://fr.arxiv.org/abs/2008.02834 Err codemadness.org 70 i 8869 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Vujasinovic_S/0/1/0/all/0/1">St&#xe9;phane Vujasinovi&#x107;</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Becker_S/0/1/0/all/0/1">Stefan Becker</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Breuer_T/0/1/0/all/0/1">Timo Breuer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bullinger_S/0/1/0/all/0/1">Sebastian Bullinger</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Scherer_Negenborn_N/0/1/0/all/0/1">Norbert Scherer-Negenborn</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Arens_M/0/1/0/all/0/1">Michael Arens</a></p> Err codemadness.org 70 i 8870 Err codemadness.org 70 i 8871 <p>Single visual object tracking from an unmanned aerial vehicle (UAV) poses Err codemadness.org 70 i 8872 fundamental challenges such as object occlusion, small-scale objects, Err codemadness.org 70 i 8873 background clutter, and abrupt camera motion. To tackle these difficulties, we Err codemadness.org 70 i 8874 propose to integrate the 3D structure of the observed scene into a Err codemadness.org 70 i 8875 detection-by-tracking algorithm. We introduce a pipeline that combines a Err codemadness.org 70 i 8876 model-free visual object tracker, a sparse 3D reconstruction, and a state Err codemadness.org 70 i 8877 estimator. The 3D reconstruction of the scene is computed with an image-based Err codemadness.org 70 i 8878 Structure-from-Motion (SfM) component that enables us to leverage a state Err codemadness.org 70 i 8879 estimator in the corresponding 3D scene during tracking. By representing the Err codemadness.org 70 i 8880 position of the target in 3D space rather than in image space, we stabilize the Err codemadness.org 70 i 8881 tracking during ego-motion and improve the handling of occlusions, background Err codemadness.org 70 i 8882 clutter, and small-scale objects. We evaluated our approach on prototypical Err codemadness.org 70 i 8883 image sequences, captured from a UAV with low-altitude oblique views. For this Err codemadness.org 70 i 8884 purpose, we adapted an existing dataset for visual object tracking and Err codemadness.org 70 i 8885 reconstructed the observed scene in 3D. The experimental results demonstrate Err codemadness.org 70 i 8886 that the proposed approach outperforms methods using plain visual cues as well Err codemadness.org 70 i 8887 as approaches leveraging image-space-based state estimations. We believe that Err codemadness.org 70 i 8888 our approach can be beneficial for traffic monitoring, video surveillance, and Err codemadness.org 70 i 8889 navigation. Err codemadness.org 70 i 8890 </p> Err codemadness.org 70 i 8891 Err codemadness.org 70 i 8892 Err codemadness.org 70 i 8893 Err codemadness.org 70 i 8894 Lifted Multiplicity Codes. (arXiv:2008.04717v2 [cs.IT] UPDATED) Err codemadness.org 70 i 8895 http://fr.arxiv.org/abs/2008.04717 Err codemadness.org 70 i 8896 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Holzbaur_L/0/1/0/all/0/1">Lukas Holzbaur</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Polyanskaya_R/0/1/0/all/0/1">Rina Polyanskaya</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Polyanskii_N/0/1/0/all/0/1">Nikita Polyanskii</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vorobyev_I/0/1/0/all/0/1">Ilya Vorobyev</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yaakobi_E/0/1/0/all/0/1">Eitan Yaakobi</a></p> Err codemadness.org 70 i 8897 Err codemadness.org 70 i 8898 <p>Lifted Reed-Solomon codes and multiplicity codes are two classes of Err codemadness.org 70 i 8899 evaluation codes that allow for the design of high-rate codes that can recover Err codemadness.org 70 i 8900 every codeword or information symbol from many disjoint sets. Recently, the Err codemadness.org 70 i 8901 underlying approaches have been combined to construct lifted bi-variate Err codemadness.org 70 i 8902 multiplicity codes, that can further improve on the rate. We continue the study Err codemadness.org 70 i 8903 of these codes by providing lower bounds on the rate and distance for lifted Err codemadness.org 70 i 8904 multiplicity codes obtained from polynomials in an arbitrary number of Err codemadness.org 70 i 8905 variables. Specifically, we investigate a subcode of a lifted multiplicity code Err codemadness.org 70 i 8906 formed by the linear span of $m$-variate monomials whose restriction to an Err codemadness.org 70 i 8907 arbitrary line in $\mathbb{F}_q^m$ is equivalent to a low-degree uni-variate Err codemadness.org 70 i 8908 polynomial. We find the tight asymptotic behavior of the fraction of such Err codemadness.org 70 i 8909 monomials when the number of variables $m$ is fixed and the alphabet size Err codemadness.org 70 i 8910 $q=2^\ell$ is large. For some parameter regimes, lifted multiplicity codes are Err codemadness.org 70 i 8911 then shown to have a better trade-off between redundancy and the number of Err codemadness.org 70 i 8912 disjoint recovering sets for every codeword or information symbol than Err codemadness.org 70 i 8913 previously known constructions. Additionally, we present a local Err codemadness.org 70 i 8914 self-correction algorithm for lifted multiplicity codes. Err codemadness.org 70 i 8915 </p> Err codemadness.org 70 i 8916 Err codemadness.org 70 i 8917 Err codemadness.org 70 i 8918 Err codemadness.org 70 i 8919 A Composable Specification Language for Reinforcement Learning Tasks. (arXiv:2008.09293v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8920 http://fr.arxiv.org/abs/2008.09293 Err codemadness.org 70 i 8921 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Jothimurugan_K/0/1/0/all/0/1">Kishor Jothimurugan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Alur_R/0/1/0/all/0/1">Rajeev Alur</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bastani_O/0/1/0/all/0/1">Osbert Bastani</a></p> Err codemadness.org 70 i 8922 Err codemadness.org 70 i 8923 <p>Reinforcement learning is a promising approach for learning control policies Err codemadness.org 70 i 8924 for robot tasks. However, specifying complex tasks (e.g., with multiple Err codemadness.org 70 i 8925 objectives and safety constraints) can be challenging, since the user must Err codemadness.org 70 i 8926 design a reward function that encodes the entire task. Furthermore, the user Err codemadness.org 70 i 8927 often needs to manually shape the reward to ensure convergence of the learning Err codemadness.org 70 i 8928 algorithm. We propose a language for specifying complex control tasks, along Err codemadness.org 70 i 8929 with an algorithm that compiles specifications in our language into a reward Err codemadness.org 70 i 8930 function and automatically performs reward shaping. We implement our approach Err codemadness.org 70 i 8931 in a tool called SPECTRL, and show that it outperforms several state-of-the-art Err codemadness.org 70 i 8932 baselines. Err codemadness.org 70 i 8933 </p> Err codemadness.org 70 i 8934 Err codemadness.org 70 i 8935 Err codemadness.org 70 i 8936 Err codemadness.org 70 i 8937 Gravilon: Applications of a New Gradient Descent Method to Machine Learning. (arXiv:2008.11370v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8938 http://fr.arxiv.org/abs/2008.11370 Err codemadness.org 70 i 8939 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kelterborn_C/0/1/0/all/0/1">Chad Kelterborn</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mazur_M/0/1/0/all/0/1">Marcin Mazur</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Petrenko_B/0/1/0/all/0/1">Bogdan V. Petrenko</a></p> Err codemadness.org 70 i 8940 Err codemadness.org 70 i 8941 <p>Gradient descent algorithms have been used in countless applications since Err codemadness.org 70 i 8942 the inception of Newton's method. The explosion in the number of applications Err codemadness.org 70 i 8943 of neural networks has re-energized efforts in recent years to improve the Err codemadness.org 70 i 8944 standard gradient descent method in both efficiency and accuracy. These methods Err codemadness.org 70 i 8945 modify the effect of the gradient in updating the values of the parameters. Err codemadness.org 70 i 8946 These modifications often incorporate hyperparameters: additional variables Err codemadness.org 70 i 8947 whose values must be specified at the outset of the program. We provide, below, Err codemadness.org 70 i 8948 a novel gradient descent algorithm, called Gravilon, that uses the geometry of Err codemadness.org 70 i 8949 the hypersurface to modify the length of the step in the direction of the Err codemadness.org 70 i 8950 gradient. Using neural networks, we provide promising experimental results Err codemadness.org 70 i 8951 comparing the accuracy and efficiency of the Gravilon method against commonly Err codemadness.org 70 i 8952 used gradient descent algorithms on MNIST digit classification. Err codemadness.org 70 i 8953 </p> Err codemadness.org 70 i 8954 Err codemadness.org 70 i 8955 Err codemadness.org 70 i 8956 Err codemadness.org 70 i 8957 On the model-based stochastic value gradient for continuous reinforcement learning. (arXiv:2008.12775v2 [cs.LG] UPDATED) Err codemadness.org 70 i 8958 http://fr.arxiv.org/abs/2008.12775 Err codemadness.org 70 i 8959 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Amos_B/0/1/0/all/0/1">Brandon Amos</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Stanton_S/0/1/0/all/0/1">Samuel Stanton</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yarats_D/0/1/0/all/0/1">Denis Yarats</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wilson_A/0/1/0/all/0/1">Andrew Gordon Wilson</a></p> Err codemadness.org 70 i 8960 Err codemadness.org 70 i 8961 <p>Model-based reinforcement learning approaches add explicit domain knowledge Err codemadness.org 70 i 8962 to agents in hopes of improving the sample-efficiency in comparison to Err codemadness.org 70 i 8963 model-free agents. However, in practice model-based methods are unable to Err codemadness.org 70 i 8964 achieve the same asymptotic performance on challenging continuous control tasks Err codemadness.org 70 i 8965 due to the complexity of learning and controlling an explicit world model. In Err codemadness.org 70 i 8966 this paper we investigate the stochastic value gradient (SVG), which is a Err codemadness.org 70 i 8967 well-known family of methods for controlling continuous systems which includes Err codemadness.org 70 i 8968 model-based approaches that distill a model-based value expansion into a Err codemadness.org 70 i 8969 model-free policy. We consider a variant of the model-based SVG that scales to Err codemadness.org 70 i 8970 larger systems and uses 1) an entropy regularization to help with exploration, Err codemadness.org 70 i 8971 2) a learned deterministic world model to improve the short-horizon value Err codemadness.org 70 i 8972 estimate, and 3) a learned model-free value estimate after the model's rollout. Err codemadness.org 70 i 8973 This SVG variation captures the model-free soft actor-critic method as an Err codemadness.org 70 i 8974 instance when the model rollout horizon is zero, and otherwise uses Err codemadness.org 70 i 8975 short-horizon model rollouts to improve the value estimate for the policy Err codemadness.org 70 i 8976 update. We surpass the asymptotic performance of other model-based methods on Err codemadness.org 70 i 8977 the proprioceptive MuJoCo locomotion tasks from the OpenAI gym, including a Err codemadness.org 70 i 8978 humanoid. We notably achieve these results with a simple deterministic world Err codemadness.org 70 i 8979 model without requiring an ensemble. Err codemadness.org 70 i 8980 </p> Err codemadness.org 70 i 8981 Err codemadness.org 70 i 8982 Err codemadness.org 70 i 8983 Err codemadness.org 70 i 8984 Introduction to logistic regression. (arXiv:2008.13567v2 [stat.ME] UPDATED) Err codemadness.org 70 i 8985 http://fr.arxiv.org/abs/2008.13567 Err codemadness.org 70 i 8986 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Chung_M/0/1/0/all/0/1">Moo K. Chung</a></p> Err codemadness.org 70 i 8987 Err codemadness.org 70 i 8988 <p>For random field theory based multiple comparison corrections In brain Err codemadness.org 70 i 8989 imaging, it is often necessary to compute the distribution of the supremum of a Err codemadness.org 70 i 8990 random field. Unfortunately, computing the distribution of the supremum of the Err codemadness.org 70 i 8991 random field is not easy and requires satisfying many distributional Err codemadness.org 70 i 8992 assumptions that may not be true in real data. Thus, there is a need to come up Err codemadness.org 70 i 8993 with a different framework that does not use the traditional statistical Err codemadness.org 70 i 8994 hypothesis testing paradigm that requires to compute p-values. With this as a Err codemadness.org 70 i 8995 motivation, we can use a different approach called the logistic regression that Err codemadness.org 70 i 8996 does not require computing the p-value and still be able to localize the Err codemadness.org 70 i 8997 regions of brain network differences. Unlike other discriminant and Err codemadness.org 70 i 8998 classification techniques that tried to classify preselected feature vectors, Err codemadness.org 70 i 8999 the method here does not require any preselected feature vectors and performs Err codemadness.org 70 i 9000 the classification at each edge level. Err codemadness.org 70 i 9001 </p> Err codemadness.org 70 i 9002 Err codemadness.org 70 i 9003 Err codemadness.org 70 i 9004 Err codemadness.org 70 i 9005 Individuation and Adaptation in Complex Systems. (arXiv:2009.00110v2 [cs.NE] UPDATED) Err codemadness.org 70 i 9006 http://fr.arxiv.org/abs/2009.00110 Err codemadness.org 70 i 9007 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Fabbro_O/0/1/0/all/0/1">Olivier Del Fabbro</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Christen_P/0/1/0/all/0/1">Patrik Christen</a></p> Err codemadness.org 70 i 9008 Err codemadness.org 70 i 9009 <p>Complex systems have certain characteristics such as network structures of a Err codemadness.org 70 i 9010 large number of individual elements, adaptation, and emergence. While these Err codemadness.org 70 i 9011 characteristics have been studied and described, it is often not so clear where Err codemadness.org 70 i 9012 they exactly come from. There is a focus on concrete system states rather than Err codemadness.org 70 i 9013 the emergence of the computer models themselves used to study these systems. To Err codemadness.org 70 i 9014 better understand typical characteristics of complex systems and their Err codemadness.org 70 i 9015 emergence, we recently presented a system metamodel based on which computer Err codemadness.org 70 i 9016 models can be created from abstract building blocks. In this study we extend Err codemadness.org 70 i 9017 our system metamodel with the concept of adaption in order to integrate Err codemadness.org 70 i 9018 adaptive computation in our so-called allagmatic method - a framework Err codemadness.org 70 i 9019 consisting of the system metamodel but also a way to study the creation of the Err codemadness.org 70 i 9020 computer model itself. Running experiments with cellular automata and Err codemadness.org 70 i 9021 artificial neural networks, we find that the system metamodel integrates Err codemadness.org 70 i 9022 adaptation with an additional operation called adaptation function that Err codemadness.org 70 i 9023 operates on the update function, which encodes the system's dynamics. It allows Err codemadness.org 70 i 9024 the creation of adaptive computations by providing an abstract template for Err codemadness.org 70 i 9025 adaptation and guidance for implementation. Further, the object-oriented and Err codemadness.org 70 i 9026 template meta-programming leads to a creation of computer models comparable to Err codemadness.org 70 i 9027 the individuation of observed systems. It therefore allows to study not only Err codemadness.org 70 i 9028 the behaviour of a running model but also its creation. The development of the Err codemadness.org 70 i 9029 system metamodel was first inspired by concepts of the philosophy of Err codemadness.org 70 i 9030 individuation of Gilbert Simondon. The theoretical background for the concept Err codemadness.org 70 i 9031 of adaptation is taken from the philosophy of organism of Alfred North Err codemadness.org 70 i 9032 Whitehead. In general, through the possibility to follow individuation, the Err codemadness.org 70 i 9033 allagmatic method allows to better understand the emergence of typical Err codemadness.org 70 i 9034 characteristics of complex systems. Err codemadness.org 70 i 9035 </p> Err codemadness.org 70 i 9036 Err codemadness.org 70 i 9037 Err codemadness.org 70 i 9038 Err codemadness.org 70 i 9039 Distance Encoding: Design Provably More Powerful Neural Networks for Graph Representation Learning. (arXiv:2009.00142v4 [cs.LG] UPDATED) Err codemadness.org 70 i 9040 http://fr.arxiv.org/abs/2009.00142 Err codemadness.org 70 i 9041 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_P/0/1/0/all/0/1">Pan Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yanbang Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1">Hongwei Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Leskovec_J/0/1/0/all/0/1">Jure Leskovec</a></p> Err codemadness.org 70 i 9042 Err codemadness.org 70 i 9043 <p>Learning representations of sets of nodes in a graph is crucial for Err codemadness.org 70 i 9044 applications ranging from node-role discovery to link prediction and molecule Err codemadness.org 70 i 9045 classification. Graph Neural Networks (GNNs) have achieved great success in Err codemadness.org 70 i 9046 graph representation learning. However, expressive power of GNNs is limited by Err codemadness.org 70 i 9047 the 1-Weisfeiler-Lehman (WL) test and thus GNNs generate identical Err codemadness.org 70 i 9048 representations for graph substructures that may in fact be very different. Err codemadness.org 70 i 9049 More powerful GNNs, proposed recently by mimicking higher-order-WL tests, only Err codemadness.org 70 i 9050 focus on representing entire graphs and they are computationally inefficient as Err codemadness.org 70 i 9051 they cannot utilize sparsity of the underlying graph. Here we propose and Err codemadness.org 70 i 9052 mathematically analyze a general class of structure-related features, termed Err codemadness.org 70 i 9053 Distance Encoding (DE). DE assists GNNs in representing any set of nodes, while Err codemadness.org 70 i 9054 providing strictly more expressive power than the 1-WL test. DE captures the Err codemadness.org 70 i 9055 distance between the node set whose representation is to be learned and each Err codemadness.org 70 i 9056 node in the graph. To capture the distance DE can apply various graph-distance Err codemadness.org 70 i 9057 measures such as shortest path distance or generalized PageRank scores. We Err codemadness.org 70 i 9058 propose two ways for GNNs to use DEs (1) as extra node features, and (2) as Err codemadness.org 70 i 9059 controllers of message aggregation in GNNs. Both approaches can utilize the Err codemadness.org 70 i 9060 sparse structure of the underlying graph, which leads to computational Err codemadness.org 70 i 9061 efficiency and scalability. We also prove that DE can distinguish node sets Err codemadness.org 70 i 9062 embedded in almost all regular graphs where traditional GNNs always fail. We Err codemadness.org 70 i 9063 evaluate DE on three tasks over six real networks: structural role prediction, Err codemadness.org 70 i 9064 link prediction, and triangle prediction. Results show that our models Err codemadness.org 70 i 9065 outperform GNNs without DE by up-to 15\% in accuracy and AUROC. Furthermore, Err codemadness.org 70 i 9066 our models also significantly outperform other state-of-the-art methods Err codemadness.org 70 i 9067 especially designed for the above tasks. Err codemadness.org 70 i 9068 </p> Err codemadness.org 70 i 9069 Err codemadness.org 70 i 9070 Err codemadness.org 70 i 9071 Err codemadness.org 70 i 9072 Accelerated reactive transport simulations in heterogeneous porous media using Reaktoro and Firedrake. (arXiv:2009.01194v2 [cs.CE] UPDATED) Err codemadness.org 70 i 9073 http://fr.arxiv.org/abs/2009.01194 Err codemadness.org 70 i 9074 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kyas_S/0/1/0/all/0/1">Svetlana Kyas</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Volpatto_D/0/1/0/all/0/1">Diego Volpatto</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Saar_M/0/1/0/all/0/1">Martin O. Saar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Leal_A/0/1/0/all/0/1">Allan M. M. Leal</a></p> Err codemadness.org 70 i 9075 Err codemadness.org 70 i 9076 <p>This work investigates the performance of the on-demand machine learning Err codemadness.org 70 i 9077 (ODML) algorithm introduced in Leal et al. (2020) when applied to different Err codemadness.org 70 i 9078 reactive transport problems in heterogeneous porous media. ODML was devised to Err codemadness.org 70 i 9079 accelerate the computationally expensive geochemical reaction calculations in Err codemadness.org 70 i 9080 reactive transport simulations. We demonstrate that the ODML algorithm speeds Err codemadness.org 70 i 9081 up these calculations by one to three orders of magnitude. Such acceleration, Err codemadness.org 70 i 9082 in turn, significantly accelerates the entire reactive transport simulation. Err codemadness.org 70 i 9083 The numerical experiments are performed by implementing the coupling of two Err codemadness.org 70 i 9084 open-source software packages: Reaktoro (Leal, 2015) and Firedrake (Rathgeber Err codemadness.org 70 i 9085 et al., 2016). Err codemadness.org 70 i 9086 </p> Err codemadness.org 70 i 9087 Err codemadness.org 70 i 9088 Err codemadness.org 70 i 9089 Err codemadness.org 70 i 9090 Analysis of Uplink IRS-Assisted NOMA under Nakagami-m Fading via Moments Matching. (arXiv:2009.03133v2 [cs.IT] UPDATED) Err codemadness.org 70 i 9091 http://fr.arxiv.org/abs/2009.03133 Err codemadness.org 70 i 9092 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tahir_B/0/1/0/all/0/1">Bashar Tahir</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Schwarz_S/0/1/0/all/0/1">Stefan Schwarz</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rupp_M/0/1/0/all/0/1">Markus Rupp</a></p> Err codemadness.org 70 i 9093 Err codemadness.org 70 i 9094 <p>This letter investigates the uplink outage performance of intelligent Err codemadness.org 70 i 9095 reflecting surface (IRS)-assisted non-orthogonal multiple access (NOMA). We Err codemadness.org 70 i 9096 consider the general case where all users have both direct and reflection Err codemadness.org 70 i 9097 links, and all links undergo Nakagami-m fading. We approximate the received Err codemadness.org 70 i 9098 powers of the NOMA users as Gamma random variables via moments matching. This Err codemadness.org 70 i 9099 allows for tractable expressions of the outage under interference cancellation Err codemadness.org 70 i 9100 (IC), while being flexible in modeling various propagation environments. Our Err codemadness.org 70 i 9101 analysis shows that under certain conditions, the presence of an IRS might Err codemadness.org 70 i 9102 degrade the performance of users that have dominant line-of-sight (LOS) to the Err codemadness.org 70 i 9103 base station (BS), while users dominated by non-line-of-sight (NLOS) will Err codemadness.org 70 i 9104 always benefit from it. Err codemadness.org 70 i 9105 </p> Err codemadness.org 70 i 9106 Err codemadness.org 70 i 9107 Err codemadness.org 70 i 9108 Err codemadness.org 70 i 9109 Physically Embedded Planning Problems: New Challenges for Reinforcement Learning. (arXiv:2009.05524v2 [cs.AI] UPDATED) Err codemadness.org 70 i 9110 http://fr.arxiv.org/abs/2009.05524 Err codemadness.org 70 i 9111 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Mirza_M/0/1/0/all/0/1">Mehdi Mirza</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jaegle_A/0/1/0/all/0/1">Andrew Jaegle</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hunt_J/0/1/0/all/0/1">Jonathan J. Hunt</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Guez_A/0/1/0/all/0/1">Arthur Guez</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tunyasuvunakool_S/0/1/0/all/0/1">Saran Tunyasuvunakool</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Muldal_A/0/1/0/all/0/1">Alistair Muldal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Weber_T/0/1/0/all/0/1">Th&#xe9;ophane Weber</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Karkus_P/0/1/0/all/0/1">Peter Karkus</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Racaniere_S/0/1/0/all/0/1">S&#xe9;bastien Racani&#xe8;re</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Buesing_L/0/1/0/all/0/1">Lars Buesing</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lillicrap_T/0/1/0/all/0/1">Timothy Lillicrap</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Heess_N/0/1/0/all/0/1">Nicolas Heess</a></p> Err codemadness.org 70 i 9112 Err codemadness.org 70 i 9113 <p>Recent work in deep reinforcement learning (RL) has produced algorithms Err codemadness.org 70 i 9114 capable of mastering challenging games such as Go, chess, or shogi. In these Err codemadness.org 70 i 9115 works the RL agent directly observes the natural state of the game and controls Err codemadness.org 70 i 9116 that state directly with its actions. However, when humans play such games, Err codemadness.org 70 i 9117 they do not just reason about the moves but also interact with their physical Err codemadness.org 70 i 9118 environment. They understand the state of the game by looking at the physical Err codemadness.org 70 i 9119 board in front of them and modify it by manipulating pieces using touch and Err codemadness.org 70 i 9120 fine-grained motor control. Mastering complicated physical systems with Err codemadness.org 70 i 9121 abstract goals is a central challenge for artificial intelligence, but it Err codemadness.org 70 i 9122 remains out of reach for existing RL algorithms. To encourage progress towards Err codemadness.org 70 i 9123 this goal we introduce a set of physically embedded planning problems and make Err codemadness.org 70 i 9124 them publicly available. We embed challenging symbolic tasks (Sokoban, Err codemadness.org 70 i 9125 tic-tac-toe, and Go) in a physics engine to produce a set of tasks that require Err codemadness.org 70 i 9126 perception, reasoning, and motor control over long time horizons. Although Err codemadness.org 70 i 9127 existing RL algorithms can tackle the symbolic versions of these tasks, we find Err codemadness.org 70 i 9128 that they struggle to master even the simplest of their physically embedded Err codemadness.org 70 i 9129 counterparts. As a first step towards characterizing the space of solution to Err codemadness.org 70 i 9130 these tasks, we introduce a strong baseline that uses a pre-trained expert game Err codemadness.org 70 i 9131 player to provide hints in the abstract space to an RL agent's policy while Err codemadness.org 70 i 9132 training it on the full sensorimotor control task. The resulting agent solves Err codemadness.org 70 i 9133 many of the tasks, underlining the need for methods that bridge the gap between Err codemadness.org 70 i 9134 abstract planning and embodied control. See illustrating video at Err codemadness.org 70 i 9135 https://youtu.be/RwHiHlym_1k. Err codemadness.org 70 i 9136 </p> Err codemadness.org 70 i 9137 Err codemadness.org 70 i 9138 Err codemadness.org 70 i 9139 Err codemadness.org 70 i 9140 Beyond Individualized Recourse: Interpretable and Interactive Summaries of Actionable Recourses. (arXiv:2009.07165v3 [cs.LG] UPDATED) Err codemadness.org 70 i 9141 http://fr.arxiv.org/abs/2009.07165 Err codemadness.org 70 i 9142 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Rawal_K/0/1/0/all/0/1">Kaivalya Rawal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lakkaraju_H/0/1/0/all/0/1">Himabindu Lakkaraju</a></p> Err codemadness.org 70 i 9143 Err codemadness.org 70 i 9144 <p>As predictive models are increasingly being deployed in high-stakes Err codemadness.org 70 i 9145 decision-making, there has been a lot of interest in developing algorithms Err codemadness.org 70 i 9146 which can provide recourses to affected individuals. While developing such Err codemadness.org 70 i 9147 tools is important, it is even more critical to analyse and interpret a Err codemadness.org 70 i 9148 predictive model, and vet it thoroughly to ensure that the recourses it offers Err codemadness.org 70 i 9149 are meaningful and non-discriminatory before it is deployed in the real world. Err codemadness.org 70 i 9150 To this end, we propose a novel model agnostic framework called Actionable Err codemadness.org 70 i 9151 Recourse Summaries (AReS) to construct global counterfactual explanations which Err codemadness.org 70 i 9152 provide an interpretable and accurate summary of recourses for the entire Err codemadness.org 70 i 9153 population. We formulate a novel objective which simultaneously optimizes for Err codemadness.org 70 i 9154 correctness of the recourses and interpretability of the explanations, while Err codemadness.org 70 i 9155 minimizing overall recourse costs across the entire population. More Err codemadness.org 70 i 9156 specifically, our objective enables us to learn, with optimality guarantees on Err codemadness.org 70 i 9157 recourse correctness, a small number of compact rule sets each of which capture Err codemadness.org 70 i 9158 recourses for well defined subpopulations within the data. We also demonstrate Err codemadness.org 70 i 9159 theoretically that several of the prior approaches proposed to generate Err codemadness.org 70 i 9160 recourses for individuals are special cases of our framework. Experimental Err codemadness.org 70 i 9161 evaluation with real world datasets and user studies demonstrate that our Err codemadness.org 70 i 9162 framework can provide decision makers with a comprehensive overview of Err codemadness.org 70 i 9163 recourses corresponding to any black box model, and consequently help detect Err codemadness.org 70 i 9164 undesirable model biases and discrimination. Err codemadness.org 70 i 9165 </p> Err codemadness.org 70 i 9166 Err codemadness.org 70 i 9167 Err codemadness.org 70 i 9168 Err codemadness.org 70 i 9169 CorDEL: A Contrastive Deep Learning Approach for Entity Linkage. (arXiv:2009.07203v2 [cs.DB] UPDATED) Err codemadness.org 70 i 9170 http://fr.arxiv.org/abs/2009.07203 Err codemadness.org 70 i 9171 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1">Zhengyang Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sisman_B/0/1/0/all/0/1">Bunyamin Sisman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wei_H/0/1/0/all/0/1">Hao Wei</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dong_X/0/1/0/all/0/1">Xin Luna Dong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ji_S/0/1/0/all/0/1">Shuiwang Ji</a></p> Err codemadness.org 70 i 9172 Err codemadness.org 70 i 9173 <p>Entity linkage (EL) is a critical problem in data cleaning and integration. Err codemadness.org 70 i 9174 In the past several decades, EL has typically been done by rule-based systems Err codemadness.org 70 i 9175 or traditional machine learning models with hand-curated features, both of Err codemadness.org 70 i 9176 which heavily depend on manual human inputs. With the ever-increasing growth of Err codemadness.org 70 i 9177 new data, deep learning (DL) based approaches have been proposed to alleviate Err codemadness.org 70 i 9178 the high cost of EL associated with the traditional models. Existing Err codemadness.org 70 i 9179 exploration of DL models for EL strictly follows the well-known twin-network Err codemadness.org 70 i 9180 architecture. However, we argue that the twin-network architecture is Err codemadness.org 70 i 9181 sub-optimal to EL, leading to inherent drawbacks of existing models. In order Err codemadness.org 70 i 9182 to address the drawbacks, we propose a novel and generic contrastive DL Err codemadness.org 70 i 9183 framework for EL. The proposed framework is able to capture both syntactic and Err codemadness.org 70 i 9184 semantic matching signals and pays attention to subtle but critical Err codemadness.org 70 i 9185 differences. Based on the framework, we develop a contrastive DL approach for Err codemadness.org 70 i 9186 EL, called CorDEL, with three powerful variants. We evaluate CorDEL with Err codemadness.org 70 i 9187 extensive experiments conducted on both public benchmark datasets and a Err codemadness.org 70 i 9188 real-world dataset. CorDEL outperforms previous state-of-the-art models by 5.2% Err codemadness.org 70 i 9189 on public benchmark datasets. Moreover, CorDEL yields a 2.4% improvement over Err codemadness.org 70 i 9190 the current best DL model on the real-world dataset, while reducing the number Err codemadness.org 70 i 9191 of training parameters by 97.6%. Err codemadness.org 70 i 9192 </p> Err codemadness.org 70 i 9193 Err codemadness.org 70 i 9194 Err codemadness.org 70 i 9195 Err codemadness.org 70 i 9196 Autoregressive Knowledge Distillation through Imitation Learning. (arXiv:2009.07253v2 [cs.CL] UPDATED) Err codemadness.org 70 i 9197 http://fr.arxiv.org/abs/2009.07253 Err codemadness.org 70 i 9198 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lin_A/0/1/0/all/0/1">Alexander Lin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wohlwend_J/0/1/0/all/0/1">Jeremy Wohlwend</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_H/0/1/0/all/0/1">Howard Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lei_T/0/1/0/all/0/1">Tao Lei</a></p> Err codemadness.org 70 i 9199 Err codemadness.org 70 i 9200 <p>The performance of autoregressive models on natural language generation tasks Err codemadness.org 70 i 9201 has dramatically improved due to the adoption of deep, self-attentive Err codemadness.org 70 i 9202 architectures. However, these gains have come at the cost of hindering Err codemadness.org 70 i 9203 inference speed, making state-of-the-art models cumbersome to deploy in Err codemadness.org 70 i 9204 real-world, time-sensitive settings. We develop a compression technique for Err codemadness.org 70 i 9205 autoregressive models that is driven by an imitation learning perspective on Err codemadness.org 70 i 9206 knowledge distillation. The algorithm is designed to address the exposure bias Err codemadness.org 70 i 9207 problem. On prototypical language generation tasks such as translation and Err codemadness.org 70 i 9208 summarization, our method consistently outperforms other distillation Err codemadness.org 70 i 9209 algorithms, such as sequence-level knowledge distillation. Student models Err codemadness.org 70 i 9210 trained with our method attain 1.4 to 4.8 BLEU/ROUGE points higher than those Err codemadness.org 70 i 9211 trained from scratch, while increasing inference speed by up to 14 times in Err codemadness.org 70 i 9212 comparison to the teacher model. Err codemadness.org 70 i 9213 </p> Err codemadness.org 70 i 9214 Err codemadness.org 70 i 9215 Err codemadness.org 70 i 9216 Err codemadness.org 70 i 9217 Video based real-time positional tracker. (arXiv:2009.08276v3 [cs.CV] UPDATED) Err codemadness.org 70 i 9218 http://fr.arxiv.org/abs/2009.08276 Err codemadness.org 70 i 9219 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Albarracin_D/0/1/0/all/0/1">David Albarrac&#xed;n</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hormigo_J/0/1/0/all/0/1">Jes&#xfa;s Hormigo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fernandez_J/0/1/0/all/0/1">Jos&#xe9; David Fern&#xe1;ndez</a></p> Err codemadness.org 70 i 9220 Err codemadness.org 70 i 9221 <p>We propose a system that uses video as the input to track the position of Err codemadness.org 70 i 9222 objects relative to their surrounding environment in real-time. The neural Err codemadness.org 70 i 9223 network employed is trained on a 100% synthetic dataset coming from our own Err codemadness.org 70 i 9224 automated generator. The positional tracker relies on a range of 1 to n video Err codemadness.org 70 i 9225 cameras placed around an arena of choice. Err codemadness.org 70 i 9226 </p> Err codemadness.org 70 i 9227 <p>The system returns the positions of the tracked objects relative to the Err codemadness.org 70 i 9228 broader world by understanding the overlapping matrices formed by the cameras Err codemadness.org 70 i 9229 and therefore these can be extrapolated into real world coordinates. Err codemadness.org 70 i 9230 </p> Err codemadness.org 70 i 9231 <p>In most cases, we achieve a higher update rate and positioning precision than Err codemadness.org 70 i 9232 any of the existing GPS-based systems, in particular for indoor objects or Err codemadness.org 70 i 9233 those occluded from clear sky. Err codemadness.org 70 i 9234 </p> Err codemadness.org 70 i 9235 Err codemadness.org 70 i 9236 Err codemadness.org 70 i 9237 Err codemadness.org 70 i 9238 An Embedded Index Code Construction Using Sub-packetization. (arXiv:2009.11329v2 [cs.IT] UPDATED) Err codemadness.org 70 i 9239 http://fr.arxiv.org/abs/2009.11329 Err codemadness.org 70 i 9240 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Sasi_S/0/1/0/all/0/1">Shanuja Sasi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Aggarwal_V/0/1/0/all/0/1">Vaneet Aggarwal</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rajan_B/0/1/0/all/0/1">B. Sundar Rajan</a></p> Err codemadness.org 70 i 9241 Err codemadness.org 70 i 9242 <p>A variant of the index coding problem (ICP), the embedded index coding Err codemadness.org 70 i 9243 problem (EICP) was introduced in [A. Porter and M. Wootters, "Embedded index Err codemadness.org 70 i 9244 coding," ITW, Sweden, 2019] which was motivated by its application in Err codemadness.org 70 i 9245 distributed computing where every user can act as sender for other users and an Err codemadness.org 70 i 9246 algorithm for code construction was reported. The constructions depends on the Err codemadness.org 70 i 9247 computation of minrank of a matrix, which is computationally intensive. In [A. Err codemadness.org 70 i 9248 Mahesh, N. Sageer Karat and B. S. Rajan, "Min-rank of Embedded Index Coding Err codemadness.org 70 i 9249 Problems," ISIT, 2020], for EICP, a notion of side-information matrix was Err codemadness.org 70 i 9250 introduced and it was proved that the length of an optimal scalar linear index Err codemadness.org 70 i 9251 code is equal to the min-rank of the side-information matrix. The authors have Err codemadness.org 70 i 9252 provided an explicit code construction for a class of EICP - Err codemadness.org 70 i 9253 \textit{Consecutive and Symmetric Embedded Index Coding Problem (CS-EICP)}. We Err codemadness.org 70 i 9254 introduce the idea of sub-packetization of the messages in index coding Err codemadness.org 70 i 9255 problems to provide a novel code construction for CS-EICP in contrast to the Err codemadness.org 70 i 9256 scalar linear solutions provided in the prior works. For CS-EICP, the Err codemadness.org 70 i 9257 normalized rate, which is defined as the number of bits transmitted by all the Err codemadness.org 70 i 9258 users together normalized by the total number of bits of all the messages, for Err codemadness.org 70 i 9259 our construction is lesser than the normalized rate achieved by Mahesh et Err codemadness.org 70 i 9260 al.,for scalar linear codes. Err codemadness.org 70 i 9261 </p> Err codemadness.org 70 i 9262 Err codemadness.org 70 i 9263 Err codemadness.org 70 i 9264 Err codemadness.org 70 i 9265 Multi-scale Deep Neural Network (MscaleDNN) Methods for Oscillatory Stokes Flows in Complex Domains. (arXiv:2009.12729v2 [math.NA] UPDATED) Err codemadness.org 70 i 9266 http://fr.arxiv.org/abs/2009.12729 Err codemadness.org 70 i 9267 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Wang_B/0/1/0/all/0/1">Bo Wang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Zhang_W/0/1/0/all/0/1">Wenzhong Zhang</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Cai_W/0/1/0/all/0/1">Wei Cai</a></p> Err codemadness.org 70 i 9268 Err codemadness.org 70 i 9269 <p>In this paper, we study a multi-scale deep neural network (MscaleDNN) as a Err codemadness.org 70 i 9270 meshless numerical method for computing oscillatory Stokes flows in complex Err codemadness.org 70 i 9271 domains. The MscaleDNN employs a multi-scale structure in the design of its DNN Err codemadness.org 70 i 9272 using radial scalings to convert the approximation of high frequency components Err codemadness.org 70 i 9273 of the highly oscillatory Stokes solution to one of lower frequencies. The Err codemadness.org 70 i 9274 MscaleDNN solution to the Stokes problem is obtained by minimizing a loss Err codemadness.org 70 i 9275 function in terms of L2 normof the residual of the Stokes equation. Three forms Err codemadness.org 70 i 9276 of loss functions are investigated based on vorticity-velocity-pressure, Err codemadness.org 70 i 9277 velocity-stress-pressure, and velocity-gradient of velocity-pressure Err codemadness.org 70 i 9278 formulations of the Stokes equation. We first conduct a systematic study of the Err codemadness.org 70 i 9279 MscaleDNN methods with various loss functions on the Kovasznay flow in Err codemadness.org 70 i 9280 comparison with normal fully connected DNNs. Then, Stokes flows with highly Err codemadness.org 70 i 9281 oscillatory solutions in a 2-D domain with six randomly placed holes are Err codemadness.org 70 i 9282 simulated by the MscaleDNN. The results show that MscaleDNN has faster Err codemadness.org 70 i 9283 convergence and consistent error decays in the simulation of Kovasznay flow for Err codemadness.org 70 i 9284 all four tested loss functions. More importantly, the MscaleDNN is capable of Err codemadness.org 70 i 9285 learning highly oscillatory solutions when the normal DNNs fail to converge. Err codemadness.org 70 i 9286 </p> Err codemadness.org 70 i 9287 Err codemadness.org 70 i 9288 Err codemadness.org 70 i 9289 Err codemadness.org 70 i 9290 Domain Generalization for Medical Imaging Classification with Linear-Dependency Regularization. (arXiv:2009.12829v3 [cs.CV] UPDATED) Err codemadness.org 70 i 9291 http://fr.arxiv.org/abs/2009.12829 Err codemadness.org 70 i 9292 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_H/0/1/0/all/0/1">Haoliang Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">YuFei Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wan_R/0/1/0/all/0/1">Renjie Wan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1">Shiqi Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_T/0/1/0/all/0/1">Tie-Qiang Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kot_A/0/1/0/all/0/1">Alex C. Kot</a></p> Err codemadness.org 70 i 9293 Err codemadness.org 70 i 9294 <p>Recently, we have witnessed great progress in the field of medical imaging Err codemadness.org 70 i 9295 classification by adopting deep neural networks. However, the recent advanced Err codemadness.org 70 i 9296 models still require accessing sufficiently large and representative datasets Err codemadness.org 70 i 9297 for training, which is often unfeasible in clinically realistic environments. Err codemadness.org 70 i 9298 When trained on limited datasets, the deep neural network is lack of Err codemadness.org 70 i 9299 generalization capability, as the trained deep neural network on data within a Err codemadness.org 70 i 9300 certain distribution (e.g. the data captured by a certain device vendor or Err codemadness.org 70 i 9301 patient population) may not be able to generalize to the data with another Err codemadness.org 70 i 9302 distribution. Err codemadness.org 70 i 9303 </p> Err codemadness.org 70 i 9304 <p>In this paper, we introduce a simple but effective approach to improve the Err codemadness.org 70 i 9305 generalization capability of deep neural networks in the field of medical Err codemadness.org 70 i 9306 imaging classification. Motivated by the observation that the domain Err codemadness.org 70 i 9307 variability of the medical images is to some extent compact, we propose to Err codemadness.org 70 i 9308 learn a representative feature space through variational encoding with a novel Err codemadness.org 70 i 9309 linear-dependency regularization term to capture the shareable information Err codemadness.org 70 i 9310 among medical data collected from different domains. As a result, the trained Err codemadness.org 70 i 9311 neural network is expected to equip with better generalization capability to Err codemadness.org 70 i 9312 the "unseen" medical data. Experimental results on two challenging medical Err codemadness.org 70 i 9313 imaging classification tasks indicate that our method can achieve better Err codemadness.org 70 i 9314 cross-domain generalization capability compared with state-of-the-art Err codemadness.org 70 i 9315 baselines. Err codemadness.org 70 i 9316 </p> Err codemadness.org 70 i 9317 Err codemadness.org 70 i 9318 Err codemadness.org 70 i 9319 Err codemadness.org 70 i 9320 Dual Attention Model for Citation Recommendation. (arXiv:2010.00182v4 [cs.IR] UPDATED) Err codemadness.org 70 i 9321 http://fr.arxiv.org/abs/2010.00182 Err codemadness.org 70 i 9322 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1">Yang Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ma_Q/0/1/0/all/0/1">Qiang Ma</a></p> Err codemadness.org 70 i 9323 Err codemadness.org 70 i 9324 <p>Based on an exponentially increasing number of academic articles, discovering Err codemadness.org 70 i 9325 and citing comprehensive and appropriate resources has become a non-trivial Err codemadness.org 70 i 9326 task. Conventional citation recommender methods suffer from severe information Err codemadness.org 70 i 9327 loss. For example, they do not consider the section of the paper that the user Err codemadness.org 70 i 9328 is writing and for which they need to find a citation, the relatedness between Err codemadness.org 70 i 9329 the words in the local context (the text span that describes a citation), or Err codemadness.org 70 i 9330 the importance on each word from the local context. These shortcomings make Err codemadness.org 70 i 9331 such methods insufficient for recommending adequate citations to academic Err codemadness.org 70 i 9332 manuscripts. In this study, we propose a novel embedding-based neural network Err codemadness.org 70 i 9333 called "dual attention model for citation recommendation (DACR)" to recommend Err codemadness.org 70 i 9334 citations during manuscript preparation. Our method adapts embedding of three Err codemadness.org 70 i 9335 dimensions of semantic information: words in the local context, structural Err codemadness.org 70 i 9336 contexts, and the section on which a user is working. A neural network is Err codemadness.org 70 i 9337 designed to maximize the similarity between the embedding of the three input Err codemadness.org 70 i 9338 (local context words, section and structural contexts) and the target citation Err codemadness.org 70 i 9339 appearing in the context. The core of the neural network is composed of Err codemadness.org 70 i 9340 self-attention and additive attention, where the former aims to capture the Err codemadness.org 70 i 9341 relatedness between the contextual words and structural context, and the latter Err codemadness.org 70 i 9342 aims to learn the importance of them. The experiments on real-world datasets Err codemadness.org 70 i 9343 demonstrate the effectiveness of the proposed approach. Err codemadness.org 70 i 9344 </p> Err codemadness.org 70 i 9345 Err codemadness.org 70 i 9346 Err codemadness.org 70 i 9347 Err codemadness.org 70 i 9348 Pretrained Language Model Embryology: The Birth of ALBERT. (arXiv:2010.02480v2 [cs.CL] UPDATED) Err codemadness.org 70 i 9349 http://fr.arxiv.org/abs/2010.02480 Err codemadness.org 70 i 9350 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chiang_C/0/1/0/all/0/1">Cheng-Han Chiang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Huang_S/0/1/0/all/0/1">Sung-Feng Huang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1">Hung-yi Lee</a></p> Err codemadness.org 70 i 9351 Err codemadness.org 70 i 9352 <p>While behaviors of pretrained language models (LMs) have been thoroughly Err codemadness.org 70 i 9353 examined, what happened during pretraining is rarely studied. We thus Err codemadness.org 70 i 9354 investigate the developmental process from a set of randomly initialized Err codemadness.org 70 i 9355 parameters to a totipotent language model, which we refer to as the embryology Err codemadness.org 70 i 9356 of a pretrained language model. Our results show that ALBERT learns to Err codemadness.org 70 i 9357 reconstruct and predict tokens of different parts of speech (POS) in different Err codemadness.org 70 i 9358 learning speeds during pretraining. We also find that linguistic knowledge and Err codemadness.org 70 i 9359 world knowledge do not generally improve as pretraining proceeds, nor do Err codemadness.org 70 i 9360 downstream tasks' performance. These findings suggest that knowledge of a Err codemadness.org 70 i 9361 pretrained model varies during pretraining, and having more pretrain steps does Err codemadness.org 70 i 9362 not necessarily provide a model with more comprehensive knowledge. We will Err codemadness.org 70 i 9363 provide source codes and pretrained models to reproduce our results at Err codemadness.org 70 i 9364 https://github.com/d223302/albert-embryology. Err codemadness.org 70 i 9365 </p> Err codemadness.org 70 i 9366 Err codemadness.org 70 i 9367 Err codemadness.org 70 i 9368 Err codemadness.org 70 i 9369 Investigating African-American Vernacular English in Transformer-Based Text Generation. (arXiv:2010.02510v2 [cs.CL] UPDATED) Err codemadness.org 70 i 9370 http://fr.arxiv.org/abs/2010.02510 Err codemadness.org 70 i 9371 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Groenwold_S/0/1/0/all/0/1">Sophie Groenwold</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ou_L/0/1/0/all/0/1">Lily Ou</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Parekh_A/0/1/0/all/0/1">Aesha Parekh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Honnavalli_S/0/1/0/all/0/1">Samhita Honnavalli</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Levy_S/0/1/0/all/0/1">Sharon Levy</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mirza_D/0/1/0/all/0/1">Diba Mirza</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_W/0/1/0/all/0/1">William Yang Wang</a></p> Err codemadness.org 70 i 9372 Err codemadness.org 70 i 9373 <p>The growth of social media has encouraged the written use of African American Err codemadness.org 70 i 9374 Vernacular English (AAVE), which has traditionally been used only in oral Err codemadness.org 70 i 9375 contexts. However, NLP models have historically been developed using dominant Err codemadness.org 70 i 9376 English varieties, such as Standard American English (SAE), due to text corpora Err codemadness.org 70 i 9377 availability. We investigate the performance of GPT-2 on AAVE text by creating Err codemadness.org 70 i 9378 a dataset of intent-equivalent parallel AAVE/SAE tweet pairs, thereby isolating Err codemadness.org 70 i 9379 syntactic structure and AAVE- or SAE-specific language for each pair. We Err codemadness.org 70 i 9380 evaluate each sample and its GPT-2 generated text with pretrained sentiment Err codemadness.org 70 i 9381 classifiers and find that while AAVE text results in more classifications of Err codemadness.org 70 i 9382 negative sentiment than SAE, the use of GPT-2 generally increases occurrences Err codemadness.org 70 i 9383 of positive sentiment for both. Additionally, we conduct human evaluation of Err codemadness.org 70 i 9384 AAVE and SAE text generated with GPT-2 to compare contextual rigor and overall Err codemadness.org 70 i 9385 quality. Err codemadness.org 70 i 9386 </p> Err codemadness.org 70 i 9387 Err codemadness.org 70 i 9388 Err codemadness.org 70 i 9389 Err codemadness.org 70 i 9390 Improved Analysis of Clipping Algorithms for Non-convex Optimization. (arXiv:2010.02519v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9391 http://fr.arxiv.org/abs/2010.02519 Err codemadness.org 70 i 9392 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1">Bohang Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Jin_J/0/1/0/all/0/1">Jikai Jin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fang_C/0/1/0/all/0/1">Cong Fang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_L/0/1/0/all/0/1">Liwei Wang</a></p> Err codemadness.org 70 i 9393 Err codemadness.org 70 i 9394 <p>Gradient clipping is commonly used in training deep neural networks partly Err codemadness.org 70 i 9395 due to its practicability in relieving the exploding gradient problem. Err codemadness.org 70 i 9396 Recently, \citet{zhang2019gradient} show that clipped (stochastic) Gradient Err codemadness.org 70 i 9397 Descent (GD) converges faster than vanilla GD/SGD via introducing a new Err codemadness.org 70 i 9398 assumption called $(L_0, L_1)$-smoothness, which characterizes the violent Err codemadness.org 70 i 9399 fluctuation of gradients typically encountered in deep neural networks. Err codemadness.org 70 i 9400 However, their iteration complexities on the problem-dependent parameters are Err codemadness.org 70 i 9401 rather pessimistic, and theoretical justification of clipping combined with Err codemadness.org 70 i 9402 other crucial techniques, e.g. momentum acceleration, are still lacking. In Err codemadness.org 70 i 9403 this paper, we bridge the gap by presenting a general framework to study the Err codemadness.org 70 i 9404 clipping algorithms, which also takes momentum methods into consideration. We Err codemadness.org 70 i 9405 provide convergence analysis of the framework in both deterministic and Err codemadness.org 70 i 9406 stochastic setting, and demonstrate the tightness of our results by comparing Err codemadness.org 70 i 9407 them with existing lower bounds. Our results imply that the efficiency of Err codemadness.org 70 i 9408 clipping methods will not degenerate even in highly non-smooth regions of the Err codemadness.org 70 i 9409 landscape. Experiments confirm the superiority of clipping-based methods in Err codemadness.org 70 i 9410 deep learning tasks. Err codemadness.org 70 i 9411 </p> Err codemadness.org 70 i 9412 Err codemadness.org 70 i 9413 Err codemadness.org 70 i 9414 Err codemadness.org 70 i 9415 Improving Local Identifiability in Probabilistic Box Embeddings. (arXiv:2010.04831v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9416 http://fr.arxiv.org/abs/2010.04831 Err codemadness.org 70 i 9417 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dasgupta_S/0/1/0/all/0/1">Shib Sankar Dasgupta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Boratko_M/0/1/0/all/0/1">Michael Boratko</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_D/0/1/0/all/0/1">Dongxu Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vilnis_L/0/1/0/all/0/1">Luke Vilnis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1">Xiang Lorraine Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+McCallum_A/0/1/0/all/0/1">Andrew McCallum</a></p> Err codemadness.org 70 i 9418 Err codemadness.org 70 i 9419 <p>Geometric embeddings have recently received attention for their natural Err codemadness.org 70 i 9420 ability to represent transitive asymmetric relations via containment. Box Err codemadness.org 70 i 9421 embeddings, where objects are represented by n-dimensional hyperrectangles, are Err codemadness.org 70 i 9422 a particularly promising example of such an embedding as they are closed under Err codemadness.org 70 i 9423 intersection and their volume can be calculated easily, allowing them to Err codemadness.org 70 i 9424 naturally represent calibrated probability distributions. The benefits of Err codemadness.org 70 i 9425 geometric embeddings also introduce a problem of local identifiability, Err codemadness.org 70 i 9426 however, where whole neighborhoods of parameters result in equivalent loss Err codemadness.org 70 i 9427 which impedes learning. Prior work addressed some of these issues by using an Err codemadness.org 70 i 9428 approximation to Gaussian convolution over the box parameters, however, this Err codemadness.org 70 i 9429 intersection operation also increases the sparsity of the gradient. In this Err codemadness.org 70 i 9430 work, we model the box parameters with min and max Gumbel distributions, which Err codemadness.org 70 i 9431 were chosen such that space is still closed under the operation of the Err codemadness.org 70 i 9432 intersection. The calculation of the expected intersection volume involves all Err codemadness.org 70 i 9433 parameters, and we demonstrate experimentally that this drastically improves Err codemadness.org 70 i 9434 the ability of such models to learn. Err codemadness.org 70 i 9435 </p> Err codemadness.org 70 i 9436 Err codemadness.org 70 i 9437 Err codemadness.org 70 i 9438 Err codemadness.org 70 i 9439 Neural-Symbolic Reasoning on Knowledge Graphs. (arXiv:2010.05446v3 [cs.AI] UPDATED) Err codemadness.org 70 i 9440 http://fr.arxiv.org/abs/2010.05446 Err codemadness.org 70 i 9441 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jing Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1">Bo Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_L/0/1/0/all/0/1">Lingxi Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ke_X/0/1/0/all/0/1">Xirui Ke</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ding_H/0/1/0/all/0/1">Haipeng Ding</a></p> Err codemadness.org 70 i 9442 Err codemadness.org 70 i 9443 <p>Knowledge graph reasoning is the fundamental component to support machine Err codemadness.org 70 i 9444 learning applications such as information extraction, information retrieval and Err codemadness.org 70 i 9445 recommendation. Since knowledge graph can be viewed as the discrete symbolic Err codemadness.org 70 i 9446 representations of knowledge, reasoning on knowledge graphs can naturally Err codemadness.org 70 i 9447 leverage the symbolic techniques. However, symbolic reasoning is intolerant of Err codemadness.org 70 i 9448 the ambiguous and noisy data. On the contrary, the recent advances of deep Err codemadness.org 70 i 9449 learning promote neural reasoning on knowledge graphs, which is robust to the Err codemadness.org 70 i 9450 ambiguous and noisy data, but lacks interpretability compared to symbolic Err codemadness.org 70 i 9451 reasoning. Considering the advantages and disadvantages of both methodologies, Err codemadness.org 70 i 9452 recent efforts have been made on combining the two reasoning methods. In this Err codemadness.org 70 i 9453 survey, we take a thorough look at the development of the symbolic reasoning, Err codemadness.org 70 i 9454 neural reasoning and the neural-symbolic reasoning on knowledge graphs. We Err codemadness.org 70 i 9455 survey two specific reasoning tasks, knowledge graph completion and question Err codemadness.org 70 i 9456 answering on knowledge graphs, and explain them in a unified reasoning Err codemadness.org 70 i 9457 framework. We also briefly discuss the future directions for knowledge graph Err codemadness.org 70 i 9458 reasoning. Err codemadness.org 70 i 9459 </p> Err codemadness.org 70 i 9460 Err codemadness.org 70 i 9461 Err codemadness.org 70 i 9462 Err codemadness.org 70 i 9463 On lattice point counting in $\Delta$-modular polyhedra. (arXiv:2010.05768v2 [cs.CC] UPDATED) Err codemadness.org 70 i 9464 http://fr.arxiv.org/abs/2010.05768 Err codemadness.org 70 i 9465 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gribanov_D/0/1/0/all/0/1">D.V. Gribanov</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zolotykh_N/0/1/0/all/0/1">N.Yu. Zolotykh</a></p> Err codemadness.org 70 i 9466 Err codemadness.org 70 i 9467 <p>Let a polyhedron $P$ be defined by one of the following ways: Err codemadness.org 70 i 9468 </p> Err codemadness.org 70 i 9469 <p>(i) $P = \{x \in R^n \colon A x \leq b\}$, where $A \in Z^{(n+k) \times n}$, Err codemadness.org 70 i 9470 $b \in Z^{(n+k)}$ and $rank\, A = n$; Err codemadness.org 70 i 9471 </p> Err codemadness.org 70 i 9472 <p>(ii) $P = \{x \in R_+^n \colon A x = b\}$, where $A \in Z^{k \times n}$, $b Err codemadness.org 70 i 9473 \in Z^{k}$ and $rank\, A = k$. Err codemadness.org 70 i 9474 </p> Err codemadness.org 70 i 9475 <p>And let all rank order minors of $A$ be bounded by $\Delta$ in absolute Err codemadness.org 70 i 9476 values. We show that the short rational generating function for the power Err codemadness.org 70 i 9477 series $$ \sum\limits_{m \in P \cap Z^n} x^m $$ can be computed with the Err codemadness.org 70 i 9478 arithmetic complexity $ O\left(T_{SNF}(d) \cdot d^{k} \cdot d^{\log_2 Err codemadness.org 70 i 9479 \Delta}\right), $ where $k$ and $\Delta$ are fixed, $d = \dim P$, and Err codemadness.org 70 i 9480 $T_{SNF}(m)$ is the complexity to compute the Smith Normal Form for $m \times Err codemadness.org 70 i 9481 m$ integer matrix. In particular, $d = n$ for the case (i) and $d = n-k$ for Err codemadness.org 70 i 9482 the case (ii). Err codemadness.org 70 i 9483 </p> Err codemadness.org 70 i 9484 <p>The simplest examples of polyhedra that meet conditions (i) or (ii) are the Err codemadness.org 70 i 9485 simplicies, the subset sum polytope and the knapsack or multidimensional Err codemadness.org 70 i 9486 knapsack polytopes. Err codemadness.org 70 i 9487 </p> Err codemadness.org 70 i 9488 <p>We apply these results to parametric polytopes, and show that the step Err codemadness.org 70 i 9489 polynomial representation of the function $c_P(y) = |P_{y} \cap Z^n|$, where Err codemadness.org 70 i 9490 $P_{y}$ is parametric polytope, can be computed by a polynomial time even in Err codemadness.org 70 i 9491 varying dimension if $P_{y}$ has a close structure to the cases (i) or (ii). As Err codemadness.org 70 i 9492 another consequence, we show that the coefficients $e_i(P,m)$ of the Ehrhart Err codemadness.org 70 i 9493 quasi-polynomial $$ \left| mP \cap Z^n\right| = \sum\limits_{j = 0}^n Err codemadness.org 70 i 9494 e_i(P,m)m^j $$ can be computed by a polynomial time algorithm for fixed $k$ and Err codemadness.org 70 i 9495 $\Delta$. Err codemadness.org 70 i 9496 </p> Err codemadness.org 70 i 9497 Err codemadness.org 70 i 9498 Err codemadness.org 70 i 9499 Err codemadness.org 70 i 9500 CAPT: Contrastive Pre-Training for Learning Denoised Sequence Representations. (arXiv:2010.06351v3 [cs.CL] UPDATED) Err codemadness.org 70 i 9501 http://fr.arxiv.org/abs/2010.06351 Err codemadness.org 70 i 9502 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Luo_F/0/1/0/all/0/1">Fuli Luo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yang_P/0/1/0/all/0/1">Pengcheng Yang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1">Shicheng Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ren_X/0/1/0/all/0/1">Xuancheng Ren</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Sun_X/0/1/0/all/0/1">Xu Sun</a></p> Err codemadness.org 70 i 9503 Err codemadness.org 70 i 9504 <p>Pre-trained self-supervised models such as BERT have achieved striking Err codemadness.org 70 i 9505 success in learning sequence representations, especially for natural language Err codemadness.org 70 i 9506 processing. These models typically corrupt the given sequences with certain Err codemadness.org 70 i 9507 types of noise, such as masking, shuffling, or substitution, and then try to Err codemadness.org 70 i 9508 recover the original input. However, such pre-training approaches are prone to Err codemadness.org 70 i 9509 learning representations that are covariant with the noise, leading to the Err codemadness.org 70 i 9510 discrepancy between the pre-training and fine-tuning stage. To remedy this, we Err codemadness.org 70 i 9511 present ContrAstive Pre-Training (CAPT) to learn noise invariant sequence Err codemadness.org 70 i 9512 representations. The proposed CAPT encourages the consistency between Err codemadness.org 70 i 9513 representations of the original sequence and its corrupted version via Err codemadness.org 70 i 9514 unsupervised instance-wise training signals. In this way, it not only Err codemadness.org 70 i 9515 alleviates the pretrain-finetune discrepancy induced by the noise of Err codemadness.org 70 i 9516 pre-training, but also aids the pre-trained model in better capturing global Err codemadness.org 70 i 9517 semantics of the input via more effective sentence-level supervision. Different Err codemadness.org 70 i 9518 from most prior work that focuses on a particular modality, comprehensive Err codemadness.org 70 i 9519 empirical evidence on 11 natural language understanding and cross-modal tasks Err codemadness.org 70 i 9520 illustrates that CAPT is applicable for both language and vision-language Err codemadness.org 70 i 9521 tasks, and obtains surprisingly consistent improvement, including 0.6% absolute Err codemadness.org 70 i 9522 gain on GLUE benchmarks and 0.8% absolute increment on NLVR. Err codemadness.org 70 i 9523 </p> Err codemadness.org 70 i 9524 Err codemadness.org 70 i 9525 Err codemadness.org 70 i 9526 Err codemadness.org 70 i 9527 Spherical Knowledge Distillation. (arXiv:2010.07485v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9528 http://fr.arxiv.org/abs/2010.07485 Err codemadness.org 70 i 9529 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Guo_J/0/1/0/all/0/1">Jia Guo</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_M/0/1/0/all/0/1">Minghao Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hu_Y/0/1/0/all/0/1">Yao Hu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhu_C/0/1/0/all/0/1">Chen Zhu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_X/0/1/0/all/0/1">Xiaofei He</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cai_D/0/1/0/all/0/1">Deng Cai</a></p> Err codemadness.org 70 i 9530 Err codemadness.org 70 i 9531 <p>Knowledge distillation aims at obtaining a small but effective deep model by Err codemadness.org 70 i 9532 transferring knowledge from a much larger one. The previous approaches try to Err codemadness.org 70 i 9533 reach this goal by simply "logit-supervised" information transferring between Err codemadness.org 70 i 9534 the teacher and student, which somehow can be subsequently decomposed as the Err codemadness.org 70 i 9535 transfer of normalized logits and $l^2$ norm. We argue that the norm of logits Err codemadness.org 70 i 9536 is actually interference, which damages the efficiency in the transfer process. Err codemadness.org 70 i 9537 To address this problem, we propose Spherical Knowledge Distillation (SKD). Err codemadness.org 70 i 9538 Specifically, we project the teacher and the student's logits into a unit Err codemadness.org 70 i 9539 sphere, and then we can efficiently perform knowledge distillation on the Err codemadness.org 70 i 9540 sphere. We verify our argument via theoretical analysis and ablation study. Err codemadness.org 70 i 9541 Extensive experiments have demonstrated the superiority and scalability of our Err codemadness.org 70 i 9542 method over the SOTAs. Err codemadness.org 70 i 9543 </p> Err codemadness.org 70 i 9544 Err codemadness.org 70 i 9545 Err codemadness.org 70 i 9546 Err codemadness.org 70 i 9547 Measuring the Dynamic Impact of High-Speed Railways on Urban Interactions in China. (arXiv:2010.08182v3 [cs.SI] UPDATED) Err codemadness.org 70 i 9548 http://fr.arxiv.org/abs/2010.08182 Err codemadness.org 70 i 9549 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gong_J/0/1/0/all/0/1">Junfang Gong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1">Shengwen Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ye_X/0/1/0/all/0/1">Xinyue Ye</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Peng_Q/0/1/0/all/0/1">Qiong Peng</a></p> Err codemadness.org 70 i 9550 Err codemadness.org 70 i 9551 <p>High-speed rail (HSR) has become an important mode of inter-city Err codemadness.org 70 i 9552 transportation between large cities. Inter-city interaction facilitated by HSR Err codemadness.org 70 i 9553 tends to play a more prominent role in promoting urban and regional economic Err codemadness.org 70 i 9554 integration and development. Quantifying the impact of HSR's interaction on Err codemadness.org 70 i 9555 cities and people is therefore crucial for long-term urban and regional Err codemadness.org 70 i 9556 development planning and policy making. We develop an evaluation framework Err codemadness.org 70 i 9557 using toponym information from social media as a proxy to estimate the dynamics Err codemadness.org 70 i 9558 of such interactions. This paper adopts two types of spatial information: Err codemadness.org 70 i 9559 toponyms from social media posts, and the geographical location information Err codemadness.org 70 i 9560 embedded in social media posts. The framework highlights the asymmetric nature Err codemadness.org 70 i 9561 of social interaction among cities, and proposes a series of metrics to Err codemadness.org 70 i 9562 quantify such impact from multiple perspectives, including interaction Err codemadness.org 70 i 9563 strength, spatial decay, and channel effect. The results show that HSRs not Err codemadness.org 70 i 9564 only greatly expand the uneven distribution of inter-city connections, but also Err codemadness.org 70 i 9565 significantly reshape the interactions that occur along HSR routes through the Err codemadness.org 70 i 9566 channel effect. Err codemadness.org 70 i 9567 </p> Err codemadness.org 70 i 9568 Err codemadness.org 70 i 9569 Err codemadness.org 70 i 9570 Err codemadness.org 70 i 9571 Learning Accurate Entropy Model with Global Reference for Image Compression. (arXiv:2010.08321v2 [eess.IV] UPDATED) Err codemadness.org 70 i 9572 http://fr.arxiv.org/abs/2010.08321 Err codemadness.org 70 i 9573 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Qian_Y/0/1/0/all/0/1">Yichen Qian</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Tan_Z/0/1/0/all/0/1">Zhiyu Tan</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sun_X/0/1/0/all/0/1">Xiuyu Sun</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Lin_M/0/1/0/all/0/1">Ming Lin</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_D/0/1/0/all/0/1">Dongyang Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Sun_Z/0/1/0/all/0/1">Zhenhong Sun</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_H/0/1/0/all/0/1">Hao Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Jin_R/0/1/0/all/0/1">Rong Jin</a></p> Err codemadness.org 70 i 9574 Err codemadness.org 70 i 9575 <p>In recent deep image compression neural networks, the entropy model plays a Err codemadness.org 70 i 9576 critical role in estimating the prior distribution of deep image encodings. Err codemadness.org 70 i 9577 Existing methods combine hyperprior with local context in the entropy Err codemadness.org 70 i 9578 estimation function. This greatly limits their performance due to the absence Err codemadness.org 70 i 9579 of a global vision. In this work, we propose a novel Global Reference Model for Err codemadness.org 70 i 9580 image compression to effectively leverage both the local and the global context Err codemadness.org 70 i 9581 information, leading to an enhanced compression rate. The proposed method scans Err codemadness.org 70 i 9582 decoded latents and then finds the most relevant latent to assist the Err codemadness.org 70 i 9583 distribution estimating of the current latent. A by-product of this work is the Err codemadness.org 70 i 9584 innovation of a mean-shifting GDN module that further improves the performance. Err codemadness.org 70 i 9585 Experimental results demonstrate that the proposed model outperforms the Err codemadness.org 70 i 9586 rate-distortion performance of most of the state-of-the-art methods in the Err codemadness.org 70 i 9587 industry. Err codemadness.org 70 i 9588 </p> Err codemadness.org 70 i 9589 Err codemadness.org 70 i 9590 Err codemadness.org 70 i 9591 Err codemadness.org 70 i 9592 A Grid-based Representation for Human Action Recognition. (arXiv:2010.08841v2 [cs.CV] UPDATED) Err codemadness.org 70 i 9593 http://fr.arxiv.org/abs/2010.08841 Err codemadness.org 70 i 9594 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Lamghari_S/0/1/0/all/0/1">Soufiane Lamghari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bilodeau_G/0/1/0/all/0/1">Guillaume-Alexandre Bilodeau</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Saunier_N/0/1/0/all/0/1">Nicolas Saunier</a></p> Err codemadness.org 70 i 9595 Err codemadness.org 70 i 9596 <p>Human action recognition (HAR) in videos is a fundamental research topic in Err codemadness.org 70 i 9597 computer vision. It consists mainly in understanding actions performed by Err codemadness.org 70 i 9598 humans based on a sequence of visual observations. In recent years, HAR have Err codemadness.org 70 i 9599 witnessed significant progress, especially with the emergence of deep learning Err codemadness.org 70 i 9600 models. However, most of existing approaches for action recognition rely on Err codemadness.org 70 i 9601 information that is not always relevant for this task, and are limited in the Err codemadness.org 70 i 9602 way they fuse the temporal information. In this paper, we propose a novel Err codemadness.org 70 i 9603 method for human action recognition that encodes efficiently the most Err codemadness.org 70 i 9604 discriminative appearance information of an action with explicit attention on Err codemadness.org 70 i 9605 representative pose features, into a new compact grid representation. Our GRAR Err codemadness.org 70 i 9606 (Grid-based Representation for Action Recognition) method is tested on several Err codemadness.org 70 i 9607 benchmark datasets demonstrating that our model can accurately recognize human Err codemadness.org 70 i 9608 actions, despite intra-class appearance variations and occlusion challenges. Err codemadness.org 70 i 9609 </p> Err codemadness.org 70 i 9610 Err codemadness.org 70 i 9611 Err codemadness.org 70 i 9612 Err codemadness.org 70 i 9613 What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. (arXiv:2010.09843v2 [cs.CR] UPDATED) Err codemadness.org 70 i 9614 http://fr.arxiv.org/abs/2010.09843 Err codemadness.org 70 i 9615 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Bhagavatula_S/0/1/0/all/0/1">Sruti Bhagavatula</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bauer_L/0/1/0/all/0/1">Lujo Bauer</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kapadia_A/0/1/0/all/0/1">Apu Kapadia</a></p> Err codemadness.org 70 i 9616 Err codemadness.org 70 i 9617 <p>Awareness about security and privacy risks is important for developing good Err codemadness.org 70 i 9618 security habits. Learning about real-world security incidents and data breaches Err codemadness.org 70 i 9619 can alert people to the ways in which their information is vulnerable online, Err codemadness.org 70 i 9620 thus playing a significant role in encouraging safe security behavior. This Err codemadness.org 70 i 9621 paper examines 1) how often people read about security incidents online, 2) of Err codemadness.org 70 i 9622 those people, whether and to what extent they follow up with an action, e.g., Err codemadness.org 70 i 9623 by trying to read more about the incident, and 3) what influences the Err codemadness.org 70 i 9624 likelihood that they will read about an incident and take some action. We study Err codemadness.org 70 i 9625 this by quantitatively examining real-world internet-browsing data from 303 Err codemadness.org 70 i 9626 participants. Err codemadness.org 70 i 9627 </p> Err codemadness.org 70 i 9628 <p>Our findings present a bleak view of awareness of security incidents. Only Err codemadness.org 70 i 9629 17% of participants visited any web pages related to six widely publicized Err codemadness.org 70 i 9630 large-scale security incidents; few read about one even when an incident was Err codemadness.org 70 i 9631 likely to have affected them (e.g., the Equifax breach almost universally Err codemadness.org 70 i 9632 affected people with Equifax credit reports). We further found that more severe Err codemadness.org 70 i 9633 incidents as well as articles that constructively spoke about the incident Err codemadness.org 70 i 9634 inspired more action. We conclude with recommendations for specific future Err codemadness.org 70 i 9635 research and for enabling useful security incident information to reach more Err codemadness.org 70 i 9636 people. Err codemadness.org 70 i 9637 </p> Err codemadness.org 70 i 9638 Err codemadness.org 70 i 9639 Err codemadness.org 70 i 9640 Err codemadness.org 70 i 9641 VarGrad: A Low-Variance Gradient Estimator for Variational Inference. (arXiv:2010.10436v2 [stat.ML] UPDATED) Err codemadness.org 70 i 9642 http://fr.arxiv.org/abs/2010.10436 Err codemadness.org 70 i 9643 <p>Authors: <a href="http://fr.arxiv.org/find/stat/1/au:+Richter_L/0/1/0/all/0/1">Lorenz Richter</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Boustati_A/0/1/0/all/0/1">Ayman Boustati</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Nusken_N/0/1/0/all/0/1">Nikolas N&#xfc;sken</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Ruiz_F/0/1/0/all/0/1">Francisco J. R. Ruiz</a>, <a href="http://fr.arxiv.org/find/stat/1/au:+Akyildiz_O/0/1/0/all/0/1">&#xd6;mer Deniz Akyildiz</a></p> Err codemadness.org 70 i 9644 Err codemadness.org 70 i 9645 <p>We analyse the properties of an unbiased gradient estimator of the ELBO for Err codemadness.org 70 i 9646 variational inference, based on the score function method with leave-one-out Err codemadness.org 70 i 9647 control variates. We show that this gradient estimator can be obtained using a Err codemadness.org 70 i 9648 new loss, defined as the variance of the log-ratio between the exact posterior Err codemadness.org 70 i 9649 and the variational approximation, which we call the $\textit{log-variance Err codemadness.org 70 i 9650 loss}$. Under certain conditions, the gradient of the log-variance loss equals Err codemadness.org 70 i 9651 the gradient of the (negative) ELBO. We show theoretically that this gradient Err codemadness.org 70 i 9652 estimator, which we call $\textit{VarGrad}$ due to its connection to the Err codemadness.org 70 i 9653 log-variance loss, exhibits lower variance than the score function method in Err codemadness.org 70 i 9654 certain settings, and that the leave-one-out control variate coefficients are Err codemadness.org 70 i 9655 close to the optimal ones. We empirically demonstrate that VarGrad offers a Err codemadness.org 70 i 9656 favourable variance versus computation trade-off compared to other Err codemadness.org 70 i 9657 state-of-the-art estimators on a discrete VAE. Err codemadness.org 70 i 9658 </p> Err codemadness.org 70 i 9659 Err codemadness.org 70 i 9660 Err codemadness.org 70 i 9661 Err codemadness.org 70 i 9662 A Coarse-To-Fine (C2F) Representation for End-To-End 6-DoF Grasp Detection. (arXiv:2010.10695v2 [cs.RO] UPDATED) Err codemadness.org 70 i 9663 http://fr.arxiv.org/abs/2010.10695 Err codemadness.org 70 i 9664 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Jeng_K/0/1/0/all/0/1">Kuang-Yu Jeng</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1">Yueh-Cheng Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1">Zhe Yu Liu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_J/0/1/0/all/0/1">Jen-Wei Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chang_Y/0/1/0/all/0/1">Ya-Liang Chang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Su_H/0/1/0/all/0/1">Hung-Ting Su</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hsu_W/0/1/0/all/0/1">Winston Hsu</a></p> Err codemadness.org 70 i 9665 Err codemadness.org 70 i 9666 <p>We proposed an end-to-end grasp detection network, Grasp Detection Network Err codemadness.org 70 i 9667 (GDN), cooperated with a novel coarse-to-fine (C2F) grasp representation design Err codemadness.org 70 i 9668 to detect diverse and accurate 6-DoF grasps based on point clouds. Compared to Err codemadness.org 70 i 9669 previous two-stage approaches which sample and evaluate multiple grasp Err codemadness.org 70 i 9670 candidates, our architecture is at least 20 times faster. It is also 8% and 40% Err codemadness.org 70 i 9671 more accurate in terms of the success rate in single object scenes and the Err codemadness.org 70 i 9672 complete rate in clutter scenes, respectively. Our method shows superior Err codemadness.org 70 i 9673 results among settings with different number of views and input points. Err codemadness.org 70 i 9674 Moreover, we propose a new AP-based metric which considers both rotation and Err codemadness.org 70 i 9675 transition errors, making it a more comprehensive evaluation tool for grasp Err codemadness.org 70 i 9676 detection models. Err codemadness.org 70 i 9677 </p> Err codemadness.org 70 i 9678 Err codemadness.org 70 i 9679 Err codemadness.org 70 i 9680 Err codemadness.org 70 i 9681 Model selection in reconciling hierarchical time series. (arXiv:2010.10742v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9682 http://fr.arxiv.org/abs/2010.10742 Err codemadness.org 70 i 9683 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Abolghasemi_M/0/1/0/all/0/1">Mahdi Abolghasemi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hyndman_R/0/1/0/all/0/1">Rob J Hyndman</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Spiliotis_E/0/1/0/all/0/1">Evangelos Spiliotis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bergmeir_C/0/1/0/all/0/1">Christoph Bergmeir</a></p> Err codemadness.org 70 i 9684 Err codemadness.org 70 i 9685 <p>Model selection has been proven an effective strategy for improving accuracy Err codemadness.org 70 i 9686 in time series forecasting applications. However, when dealing with Err codemadness.org 70 i 9687 hierarchical time series, apart from selecting the most appropriate forecasting Err codemadness.org 70 i 9688 model, forecasters have also to select a suitable method for reconciling the Err codemadness.org 70 i 9689 base forecasts produced for each series to make sure they are coherent. Err codemadness.org 70 i 9690 Although some hierarchical forecasting methods like minimum trace are strongly Err codemadness.org 70 i 9691 supported both theoretically and empirically for reconciling the base Err codemadness.org 70 i 9692 forecasts, there are still circumstances under which they might not produce the Err codemadness.org 70 i 9693 most accurate results, being outperformed by other methods. In this paper we Err codemadness.org 70 i 9694 propose an approach for dynamically selecting the most appropriate hierarchical Err codemadness.org 70 i 9695 forecasting method and succeeding better forecasting accuracy along with Err codemadness.org 70 i 9696 coherence. The approach, to be called conditional hierarchical forecasting, is Err codemadness.org 70 i 9697 based on Machine Learning classification methods and uses time series features Err codemadness.org 70 i 9698 as leading indicators for performing the selection for each hierarchy examined Err codemadness.org 70 i 9699 considering a variety of alternatives. Our results suggest that conditional Err codemadness.org 70 i 9700 hierarchical forecasting leads to significantly more accurate forecasts than Err codemadness.org 70 i 9701 standard approaches, especially at lower hierarchical levels. Err codemadness.org 70 i 9702 </p> Err codemadness.org 70 i 9703 Err codemadness.org 70 i 9704 Err codemadness.org 70 i 9705 Err codemadness.org 70 i 9706 Emformer: Efficient Memory Transformer Based Acoustic Model For Low Latency Streaming Speech Recognition. (arXiv:2010.10759v3 [cs.SD] UPDATED) Err codemadness.org 70 i 9707 http://fr.arxiv.org/abs/2010.10759 Err codemadness.org 70 i 9708 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shi_Y/0/1/0/all/0/1">Yangyang Shi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1">Yongqiang Wang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_C/0/1/0/all/0/1">Chunyang Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Yeh_C/0/1/0/all/0/1">Ching-Feng Yeh</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chan_J/0/1/0/all/0/1">Julian Chan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_F/0/1/0/all/0/1">Frank Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Le_D/0/1/0/all/0/1">Duc Le</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Seltzer_M/0/1/0/all/0/1">Mike Seltzer</a></p> Err codemadness.org 70 i 9709 Err codemadness.org 70 i 9710 <p>This paper proposes an efficient memory transformer Emformer for low latency Err codemadness.org 70 i 9711 streaming speech recognition. In Emformer, the long-range history context is Err codemadness.org 70 i 9712 distilled into an augmented memory bank to reduce self-attention's computation Err codemadness.org 70 i 9713 complexity. A cache mechanism saves the computation for the key and value in Err codemadness.org 70 i 9714 self-attention for the left context. Emformer applies a parallelized block Err codemadness.org 70 i 9715 processing in training to support low latency models. We carry out experiments Err codemadness.org 70 i 9716 on benchmark LibriSpeech data. Under average latency of 960 ms, Emformer gets Err codemadness.org 70 i 9717 WER $2.50\%$ on test-clean and $5.62\%$ on test-other. Comparing with a strong Err codemadness.org 70 i 9718 baseline augmented memory transformer (AM-TRF), Emformer gets $4.6$ folds Err codemadness.org 70 i 9719 training speedup and $18\%$ relative real-time factor (RTF) reduction in Err codemadness.org 70 i 9720 decoding with relative WER reduction $17\%$ on test-clean and $9\%$ on Err codemadness.org 70 i 9721 test-other. For a low latency scenario with an average latency of 80 ms, Err codemadness.org 70 i 9722 Emformer achieves WER $3.01\%$ on test-clean and $7.09\%$ on test-other. Err codemadness.org 70 i 9723 Comparing with the LSTM baseline with the same latency and model size, Emformer Err codemadness.org 70 i 9724 gets relative WER reduction $9\%$ and $16\%$ on test-clean and test-other, Err codemadness.org 70 i 9725 respectively. Err codemadness.org 70 i 9726 </p> Err codemadness.org 70 i 9727 Err codemadness.org 70 i 9728 Err codemadness.org 70 i 9729 Err codemadness.org 70 i 9730 Large-Scale High PV Power Grid Dynamic Model Development -- A Case Study on the U.S. Eastern Interconnection. (arXiv:2010.11150v2 [eess.SY] UPDATED) Err codemadness.org 70 i 9731 http://fr.arxiv.org/abs/2010.11150 Err codemadness.org 70 i 9732 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+You_S/0/1/0/all/0/1">Shutang You</a></p> Err codemadness.org 70 i 9733 Err codemadness.org 70 i 9734 <p>Power systems are undergoing a transformation toward a low-carbon Err codemadness.org 70 i 9735 non-synchronous generation portfolio. A major concern for system planners and Err codemadness.org 70 i 9736 operators is the system dynamics in the high renewable penetration future. Err codemadness.org 70 i 9737 Because of the scale of the system and numerous components involved, it is Err codemadness.org 70 i 9738 extremely difficult to develop high PV dynamic models based upon actual power Err codemadness.org 70 i 9739 system models. The main contribution of this paper is providing an example of Err codemadness.org 70 i 9740 developing high PV penetration models based on the validated dynamic model of Err codemadness.org 70 i 9741 an actual large-scale power grid - the U.S. Eastern Interconnection system. The Err codemadness.org 70 i 9742 displacement of conventional generators by PV is realized by optimization. Err codemadness.org 70 i 9743 Combining the PV distribution optimization and the validated dynamic model Err codemadness.org 70 i 9744 information, this approach avoids the uncertainties brought about by Err codemadness.org 70 i 9745 transmission planning. As the existing dynamic models can be validated by Err codemadness.org 70 i 9746 measurements, this approach improves the credibility of the high PV models in Err codemadness.org 70 i 9747 representing future power grids. This generic approach can be applied to Err codemadness.org 70 i 9748 develop high PV dynamic models for other actual large-scale systems. Err codemadness.org 70 i 9749 </p> Err codemadness.org 70 i 9750 Err codemadness.org 70 i 9751 Err codemadness.org 70 i 9752 Err codemadness.org 70 i 9753 Build Smart Grids on Artificial Intelligence -- A Real-world Example. (arXiv:2010.11175v2 [eess.SY] UPDATED) Err codemadness.org 70 i 9754 http://fr.arxiv.org/abs/2010.11175 Err codemadness.org 70 i 9755 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+You_S/0/1/0/all/0/1">Shutang You</a></p> Err codemadness.org 70 i 9756 Err codemadness.org 70 i 9757 <p>Power grid data are going big with the deployment of various sensors. The big Err codemadness.org 70 i 9758 data in power grids creates huge opportunities for applying artificial Err codemadness.org 70 i 9759 intelligence technologies to improve resilience and reliability. This paper Err codemadness.org 70 i 9760 introduces multiple real-world applications based on artificial intelligence to Err codemadness.org 70 i 9761 improve power grid situational awareness and resilience. These applications Err codemadness.org 70 i 9762 include event identification, inertia estimation, event location and magnitude Err codemadness.org 70 i 9763 estimation, data authentication, control, and stability assessment. These Err codemadness.org 70 i 9764 applications are operating on a real-world system called FNET-GridEye, which is Err codemadness.org 70 i 9765 a wide-area measurement network and arguably the world-largest cyber-physical Err codemadness.org 70 i 9766 system that collects power grid big data. These applications showed much better Err codemadness.org 70 i 9767 performance compared with conventional approaches and accomplished new tasks Err codemadness.org 70 i 9768 that are impossible to realized using conventional technologies. These Err codemadness.org 70 i 9769 encouraging results demonstrate that combining power grid big data and Err codemadness.org 70 i 9770 artificial intelligence can uncover and capture the non-linear correlation Err codemadness.org 70 i 9771 between power grid data and its stabilities indices and will potentially enable Err codemadness.org 70 i 9772 many advanced applications that can significantly improve power grid Err codemadness.org 70 i 9773 resilience. Err codemadness.org 70 i 9774 </p> Err codemadness.org 70 i 9775 Err codemadness.org 70 i 9776 Err codemadness.org 70 i 9777 Err codemadness.org 70 i 9778 NightOwl: Robotic Platform for Wheeled Service Robot. (arXiv:2010.11505v2 [cs.RO] UPDATED) Err codemadness.org 70 i 9779 http://fr.arxiv.org/abs/2010.11505 Err codemadness.org 70 i 9780 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Al_Fahsi_R/0/1/0/all/0/1">Resha Dwika Hefni Al-Fahsi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Winanta_K/0/1/0/all/0/1">Kevin Aldian Winanta</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pradana_F/0/1/0/all/0/1">Fauzan Pradana</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ardiyanto_I/0/1/0/all/0/1">Igi Ardiyanto</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Cahyadi_A/0/1/0/all/0/1">Adha Imam Cahyadi</a></p> Err codemadness.org 70 i 9781 Err codemadness.org 70 i 9782 <p>NightOwl is a robotic platform designed exclusively for a wheeled service Err codemadness.org 70 i 9783 robot. The robot navigates autonomously in omnidirectional fashion movement and Err codemadness.org 70 i 9784 equipped with LIDAR to sense the surrounding area. The platform itself was Err codemadness.org 70 i 9785 built using the Robot Operating System (ROS) and written in two different Err codemadness.org 70 i 9786 programming languages (C++ and Python). NightOwl is composed of several modular Err codemadness.org 70 i 9787 programs, namely hardware controller, light detection and ranging (LIDAR), Err codemadness.org 70 i 9788 simultaneous localization and mapping (SLAM), world model, path planning, robot Err codemadness.org 70 i 9789 control, communication, and behaviour. The programs run in parallel and Err codemadness.org 70 i 9790 communicate reciprocally to share various information. This paper explains the Err codemadness.org 70 i 9791 role of modular programs in the term of input, process, and output. In Err codemadness.org 70 i 9792 addition, NightOwl provides simulation visualized in both Gazebo and RViz. The Err codemadness.org 70 i 9793 robot in its environment is visualized by Gazebo. Sensor data from LIDAR and Err codemadness.org 70 i 9794 results from SLAM will be visualized by RViz. Err codemadness.org 70 i 9795 </p> Err codemadness.org 70 i 9796 Err codemadness.org 70 i 9797 Err codemadness.org 70 i 9798 Err codemadness.org 70 i 9799 Label-Aware Neural Tangent Kernel: Toward Better Generalization and Local Elasticity. (arXiv:2010.11775v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9800 http://fr.arxiv.org/abs/2010.11775 Err codemadness.org 70 i 9801 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Chen_S/0/1/0/all/0/1">Shuxiao Chen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+He_H/0/1/0/all/0/1">Hangfeng He</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Su_W/0/1/0/all/0/1">Weijie J. Su</a></p> Err codemadness.org 70 i 9802 Err codemadness.org 70 i 9803 <p>As a popular approach to modeling the dynamics of training overparametrized Err codemadness.org 70 i 9804 neural networks (NNs), the neural tangent kernels (NTK) are known to fall Err codemadness.org 70 i 9805 behind real-world NNs in generalization ability. This performance gap is in Err codemadness.org 70 i 9806 part due to the \textit{label agnostic} nature of the NTK, which renders the Err codemadness.org 70 i 9807 resulting kernel not as \textit{locally elastic} as NNs~\citep{he2019local}. In Err codemadness.org 70 i 9808 this paper, we introduce a novel approach from the perspective of Err codemadness.org 70 i 9809 \emph{label-awareness} to reduce this gap for the NTK. Specifically, we propose Err codemadness.org 70 i 9810 two label-aware kernels that are each a superimposition of a label-agnostic Err codemadness.org 70 i 9811 part and a hierarchy of label-aware parts with increasing complexity of label Err codemadness.org 70 i 9812 dependence, using the Hoeffding decomposition. Through both theoretical and Err codemadness.org 70 i 9813 empirical evidence, we show that the models trained with the proposed kernels Err codemadness.org 70 i 9814 better simulate NNs in terms of generalization ability and local elasticity. Err codemadness.org 70 i 9815 </p> Err codemadness.org 70 i 9816 Err codemadness.org 70 i 9817 Err codemadness.org 70 i 9818 Err codemadness.org 70 i 9819 The Polynomial Method is Universal for Distribution-Free Correlational SQ Learning. (arXiv:2010.11925v2 [cs.DS] UPDATED) Err codemadness.org 70 i 9820 http://fr.arxiv.org/abs/2010.11925 Err codemadness.org 70 i 9821 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Gollakota_A/0/1/0/all/0/1">Aravind Gollakota</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Karmalkar_S/0/1/0/all/0/1">Sushrut Karmalkar</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Klivans_A/0/1/0/all/0/1">Adam Klivans</a></p> Err codemadness.org 70 i 9822 Err codemadness.org 70 i 9823 <p>We consider the problem of distribution-free learning for Boolean function Err codemadness.org 70 i 9824 classes in the PAC and agnostic models. Generalizing a recent beautiful work of Err codemadness.org 70 i 9825 Malach and Shalev-Shwartz (2020) who gave the first tight correlational SQ Err codemadness.org 70 i 9826 (CSQ) lower bounds for learning DNF formulas, we show that lower bounds on the Err codemadness.org 70 i 9827 threshold or approximate degree of any function class directly imply CSQ lower Err codemadness.org 70 i 9828 bounds for PAC or agnostic learning respectively. These match corresponding Err codemadness.org 70 i 9829 positive results using upper bounds on the threshold or approximate degree in Err codemadness.org 70 i 9830 the SQ model for PAC or agnostic learning. Many of these results were implicit Err codemadness.org 70 i 9831 in earlier works of Feldman and Sherstov. Err codemadness.org 70 i 9832 </p> Err codemadness.org 70 i 9833 Err codemadness.org 70 i 9834 Err codemadness.org 70 i 9835 Err codemadness.org 70 i 9836 Escape saddle points faster on manifolds via perturbed Riemannian stochastic recursive gradient. (arXiv:2010.12191v2 [math.OC] UPDATED) Err codemadness.org 70 i 9837 http://fr.arxiv.org/abs/2010.12191 Err codemadness.org 70 i 9838 <p>Authors: <a href="http://fr.arxiv.org/find/math/1/au:+Han_A/0/1/0/all/0/1">Andi Han</a>, <a href="http://fr.arxiv.org/find/math/1/au:+Gao_J/0/1/0/all/0/1">Junbin Gao</a></p> Err codemadness.org 70 i 9839 Err codemadness.org 70 i 9840 <p>In this paper, we propose a variant of Riemannian stochastic recursive Err codemadness.org 70 i 9841 gradient method that can achieve second-order convergence guarantee and escape Err codemadness.org 70 i 9842 saddle points using simple perturbation. The idea is to perturb the iterates Err codemadness.org 70 i 9843 when gradient is small and carry out stochastic recursive gradient updates over Err codemadness.org 70 i 9844 tangent space. This avoids the complication of exploiting Riemannian geometry. Err codemadness.org 70 i 9845 We show that under finite-sum setting, our algorithm requires Err codemadness.org 70 i 9846 $\widetilde{\mathcal{O}}\big( \frac{ \sqrt{n}}{\epsilon^2} + \frac{\sqrt{n} Err codemadness.org 70 i 9847 }{\delta^4} + \frac{n}{\delta^3}\big)$ stochastic gradient queries to find a Err codemadness.org 70 i 9848 $(\epsilon, \delta)$-second-order critical point. This strictly improves the Err codemadness.org 70 i 9849 complexity of perturbed Riemannian gradient descent and is superior to Err codemadness.org 70 i 9850 perturbed Riemannian accelerated gradient descent under large-sample settings. Err codemadness.org 70 i 9851 We also provide a complexity of $\widetilde{\mathcal{O}} \big( Err codemadness.org 70 i 9852 \frac{1}{\epsilon^3} + \frac{1}{\delta^3 \epsilon^2} + \frac{1}{\delta^4 Err codemadness.org 70 i 9853 \epsilon} \big)$ for online optimization, which is novel on Riemannian manifold Err codemadness.org 70 i 9854 in terms of second-order convergence using only first-order information. Err codemadness.org 70 i 9855 </p> Err codemadness.org 70 i 9856 Err codemadness.org 70 i 9857 Err codemadness.org 70 i 9858 Err codemadness.org 70 i 9859 On the mechanical contribution of head stabilization to passive dynamics of anthropometric walkers. (arXiv:2010.12234v2 [cs.RO] UPDATED) Err codemadness.org 70 i 9860 http://fr.arxiv.org/abs/2010.12234 Err codemadness.org 70 i 9861 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Benallegue_M/0/1/0/all/0/1">Mehdi Benallegue</a> (AIST), <a href="http://fr.arxiv.org/find/cs/1/au:+Laumond_J/0/1/0/all/0/1">Jean-Paul Laumond</a> (DI-ENS), <a href="http://fr.arxiv.org/find/cs/1/au:+Berthoz_A/0/1/0/all/0/1">Alain Berthoz</a> (CdF (institution))</p> Err codemadness.org 70 i 9862 Err codemadness.org 70 i 9863 <p>During the steady gait, humans stabilize their head around the vertical Err codemadness.org 70 i 9864 orientation. While there are sensori-cognitive explanations for this Err codemadness.org 70 i 9865 phenomenon, its mechanical e fect on the body dynamics remains un-explored. In Err codemadness.org 70 i 9866 this study, we take profit from the similarities that human steady gait share Err codemadness.org 70 i 9867 with the locomotion of passive dynamics robots. We introduce a simplified Err codemadness.org 70 i 9868 anthropometric D model to reproduce a broad walking dynamics. In a previous Err codemadness.org 70 i 9869 study, we showed heuristically that the presence of a stabilized head-neck Err codemadness.org 70 i 9870 system significantly influences the dynamics of walking. This paper gives new Err codemadness.org 70 i 9871 insights that lead to understanding this mechanical e fect. In particular, we Err codemadness.org 70 i 9872 introduce an original cart upper-body model that allows to better understand Err codemadness.org 70 i 9873 the mechanical interest of head stabilization when walking, and we study how Err codemadness.org 70 i 9874 this e fect is sensitive to the choice of control parameters. Err codemadness.org 70 i 9875 </p> Err codemadness.org 70 i 9876 Err codemadness.org 70 i 9877 Err codemadness.org 70 i 9878 Err codemadness.org 70 i 9879 Exploring task-based query expansion at the TREC-COVID track. (arXiv:2010.12674v2 [cs.IR] UPDATED) Err codemadness.org 70 i 9880 http://fr.arxiv.org/abs/2010.12674 Err codemadness.org 70 i 9881 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Schoegje_T/0/1/0/all/0/1">Thomas Schoegje</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Kamphuis_C/0/1/0/all/0/1">Chris Kamphuis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Dercksen_K/0/1/0/all/0/1">Koen Dercksen</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hiemstra_D/0/1/0/all/0/1">Djoerd Hiemstra</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Pieters_T/0/1/0/all/0/1">Toine Pieters</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Vries_A/0/1/0/all/0/1">Arjen de Vries</a></p> Err codemadness.org 70 i 9882 Err codemadness.org 70 i 9883 <p>We explore how to generate effective queries based on search tasks. Our Err codemadness.org 70 i 9884 approach has three main steps: 1) identify search tasks based on research Err codemadness.org 70 i 9885 goals, 2) manually classify search queries according to those tasks, and 3) Err codemadness.org 70 i 9886 compare three methods to improve search rankings based on the task context. The Err codemadness.org 70 i 9887 most promising approach is based on expanding the user's query terms using task Err codemadness.org 70 i 9888 terms, which slightly improved the NDCG@20 scores over a BM25 baseline. Further Err codemadness.org 70 i 9889 improvements might be gained if we can identify more specific search tasks. Err codemadness.org 70 i 9890 </p> Err codemadness.org 70 i 9891 Err codemadness.org 70 i 9892 Err codemadness.org 70 i 9893 Err codemadness.org 70 i 9894 Adaptive In-network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge. (arXiv:2010.12899v3 [cs.NI] UPDATED) Err codemadness.org 70 i 9895 http://fr.arxiv.org/abs/2010.12899 Err codemadness.org 70 i 9896 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Qin_Y/0/1/0/all/0/1">Yana Qin</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_D/0/1/0/all/0/1">Danye Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xu_Z/0/1/0/all/0/1">Zhiwei Xu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Tian_J/0/1/0/all/0/1">Jie Tian</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1">Yujun Zhang</a></p> Err codemadness.org 70 i 9897 Err codemadness.org 70 i 9898 <p>To enhance the quality and speed of data processing and protect the privacy Err codemadness.org 70 i 9899 and security of the data, edge computing has been extensively applied to Err codemadness.org 70 i 9900 support data-intensive intelligent processing services at edge. Among these Err codemadness.org 70 i 9901 data-intensive services, ensemble learning-based services can in natural Err codemadness.org 70 i 9902 leverage the distributed computation and storage resources at edge devices to Err codemadness.org 70 i 9903 achieve efficient data collection, processing, analysis. Err codemadness.org 70 i 9904 </p> Err codemadness.org 70 i 9905 <p>Collaborative caching has been applied in edge computing to support services Err codemadness.org 70 i 9906 close to the data source, in order to take the limited resources at edge Err codemadness.org 70 i 9907 devices to support high-performance ensemble learning solutions. To achieve Err codemadness.org 70 i 9908 this goal, we propose an adaptive in-network collaborative caching scheme for Err codemadness.org 70 i 9909 ensemble learning at edge. First, an efficient data representation structure is Err codemadness.org 70 i 9910 proposed to record cached data among different nodes. In addition, we design a Err codemadness.org 70 i 9911 collaboration scheme to facilitate edge nodes to cache valuable data for local Err codemadness.org 70 i 9912 ensemble learning, by scheduling local caching according to a summarization of Err codemadness.org 70 i 9913 data representations from different edge nodes. Our extensive simulations Err codemadness.org 70 i 9914 demonstrate the high performance of the proposed collaborative caching scheme, Err codemadness.org 70 i 9915 which significantly reduces the learning latency and the transmission overhead. Err codemadness.org 70 i 9916 </p> Err codemadness.org 70 i 9917 Err codemadness.org 70 i 9918 Err codemadness.org 70 i 9919 Err codemadness.org 70 i 9920 Lightning-Fast Gravitational Wave Parameter Inference through Neural Amortization. (arXiv:2010.12931v2 [astro-ph.IM] UPDATED) Err codemadness.org 70 i 9921 http://fr.arxiv.org/abs/2010.12931 Err codemadness.org 70 i 9922 <p>Authors: <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Delaunoy_A/0/1/0/all/0/1">Arnaud Delaunoy</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Wehenkel_A/0/1/0/all/0/1">Antoine Wehenkel</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Hinderer_T/0/1/0/all/0/1">Tanja Hinderer</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Nissanke_S/0/1/0/all/0/1">Samaya Nissanke</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Weniger_C/0/1/0/all/0/1">Christoph Weniger</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Williamson_A/0/1/0/all/0/1">Andrew R. Williamson</a>, <a href="http://fr.arxiv.org/find/astro-ph/1/au:+Louppe_G/0/1/0/all/0/1">Gilles Louppe</a></p> Err codemadness.org 70 i 9923 Err codemadness.org 70 i 9924 <p>Gravitational waves from compact binaries measured by the LIGO and Virgo Err codemadness.org 70 i 9925 detectors are routinely analyzed using Markov Chain Monte Carlo sampling Err codemadness.org 70 i 9926 algorithms. Because the evaluation of the likelihood function requires Err codemadness.org 70 i 9927 evaluating millions of waveform models that link between signal shapes and the Err codemadness.org 70 i 9928 source parameters, running Markov chains until convergence is typically Err codemadness.org 70 i 9929 expensive and requires days of computation. In this extended abstract, we Err codemadness.org 70 i 9930 provide a proof of concept that demonstrates how the latest advances in neural Err codemadness.org 70 i 9931 simulation-based inference can speed up the inference time by up to three Err codemadness.org 70 i 9932 orders of magnitude -- from days to minutes -- without impairing the Err codemadness.org 70 i 9933 performance. Our approach is based on a convolutional neural network modeling Err codemadness.org 70 i 9934 the likelihood-to-evidence ratio and entirely amortizes the computation of the Err codemadness.org 70 i 9935 posterior. We find that our model correctly estimates credible intervals for Err codemadness.org 70 i 9936 the parameters of simulated gravitational waves. Err codemadness.org 70 i 9937 </p> Err codemadness.org 70 i 9938 Err codemadness.org 70 i 9939 Err codemadness.org 70 i 9940 Err codemadness.org 70 i 9941 A Survey on Churn Analysis. (arXiv:2010.13119v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9942 http://fr.arxiv.org/abs/2010.13119 Err codemadness.org 70 i 9943 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Ahn_J/0/1/0/all/0/1">Jaehuyn Ahn</a></p> Err codemadness.org 70 i 9944 Err codemadness.org 70 i 9945 <p>In this paper, I present churn prediction techniques that have been released Err codemadness.org 70 i 9946 so far. Churn prediction is used in the fields of Internet services, games, Err codemadness.org 70 i 9947 insurance, and management. However, since it has been used intensively to Err codemadness.org 70 i 9948 increase the predictability of various industry/academic fields, there is a big Err codemadness.org 70 i 9949 difference in its definition and utilization. In this paper, I collected the Err codemadness.org 70 i 9950 definitions of churn used in the fields of business administration, marketing, Err codemadness.org 70 i 9951 IT, telecommunications, newspapers, insurance and psychology, and described Err codemadness.org 70 i 9952 their differences. Based on this, I classified and explained churn loss, Err codemadness.org 70 i 9953 feature engineering, and prediction models. Our study can be used to select the Err codemadness.org 70 i 9954 definition of churn and its associated models suitable for the service field Err codemadness.org 70 i 9955 that researchers are most interested in by integrating fragmented churn studies Err codemadness.org 70 i 9956 in industry/academic fields. Err codemadness.org 70 i 9957 </p> Err codemadness.org 70 i 9958 Err codemadness.org 70 i 9959 Err codemadness.org 70 i 9960 Err codemadness.org 70 i 9961 Geometric Exploration for Online Control. (arXiv:2010.13178v2 [cs.LG] UPDATED) Err codemadness.org 70 i 9962 http://fr.arxiv.org/abs/2010.13178 Err codemadness.org 70 i 9963 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Plevrakis_O/0/1/0/all/0/1">Orestis Plevrakis</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Hazan_E/0/1/0/all/0/1">Elad Hazan</a></p> Err codemadness.org 70 i 9964 Err codemadness.org 70 i 9965 <p>We study the control of an \emph{unknown} linear dynamical system under Err codemadness.org 70 i 9966 general convex costs. The objective is minimizing regret vs. the class of Err codemadness.org 70 i 9967 disturbance-feedback-controllers, which encompasses all stabilizing Err codemadness.org 70 i 9968 linear-dynamical-controllers. In this work, we first consider the case of known Err codemadness.org 70 i 9969 cost functions, for which we design the first polynomial-time algorithm with Err codemadness.org 70 i 9970 $n^3\sqrt{T}$-regret, where $n$ is the dimension of the state plus the Err codemadness.org 70 i 9971 dimension of control input. The $\sqrt{T}$-horizon dependence is optimal, and Err codemadness.org 70 i 9972 improves upon the previous best known bound of $T^{2/3}$. The main component of Err codemadness.org 70 i 9973 our algorithm is a novel geometric exploration strategy: we adaptively Err codemadness.org 70 i 9974 construct a sequence of barycentric spanners in the policy space. Second, we Err codemadness.org 70 i 9975 consider the case of bandit feedback, for which we give the first Err codemadness.org 70 i 9976 polynomial-time algorithm with $poly(n)\sqrt{T}$-regret, building on Stochastic Err codemadness.org 70 i 9977 Bandit Convex Optimization. Err codemadness.org 70 i 9978 </p> Err codemadness.org 70 i 9979 Err codemadness.org 70 i 9980 Err codemadness.org 70 i 9981 Err codemadness.org 70 i 9982 Efficient Joinable Table Discovery in Data Lakes: A High-Dimensional Similarity-Based Approach. (arXiv:2010.13273v2 [cs.IR] UPDATED) Err codemadness.org 70 i 9983 http://fr.arxiv.org/abs/2010.13273 Err codemadness.org 70 i 9984 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Dong_Y/0/1/0/all/0/1">Yuyang Dong</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Takeoka_K/0/1/0/all/0/1">Kunihiro Takeoka</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Xiao_C/0/1/0/all/0/1">Chuan Xiao</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Oyamada_M/0/1/0/all/0/1">Masafumi Oyamada</a></p> Err codemadness.org 70 i 9985 Err codemadness.org 70 i 9986 <p>Finding joinable tables in data lakes is key procedure in many applications Err codemadness.org 70 i 9987 such as data integration, data augmentation, data analysis, and data market. Err codemadness.org 70 i 9988 Traditional approaches that find equi-joinable tables are unable to deal with Err codemadness.org 70 i 9989 misspellings and different formats, nor do they capture any semantic joins. In Err codemadness.org 70 i 9990 this paper, we propose PEXESO, a framework for joinable table discovery in data Err codemadness.org 70 i 9991 lakes. We embed textual values as high-dimensional vectors and join columns Err codemadness.org 70 i 9992 under similarity predicates on high-dimensional vectors, hence to address the Err codemadness.org 70 i 9993 limitations of equi-join approaches and identify more meaningful results. To Err codemadness.org 70 i 9994 efficiently find joinable tables with similarity, we propose a block-and-verify Err codemadness.org 70 i 9995 method that utilizes pivot-based filtering. A partitioning technique is Err codemadness.org 70 i 9996 developed to cope with the case when the data lake is large and the index Err codemadness.org 70 i 9997 cannot fit in main memory. An experimental evaluation on real datasets shows Err codemadness.org 70 i 9998 that our solution identifies substantially more tables than equi-joins and Err codemadness.org 70 i 9999 outperforms other similarity-based options, and the join results are useful in Err codemadness.org 70 i 10000 data enrichment for machine learning tasks. The experiments also demonstrate Err codemadness.org 70 i 10001 the efficiency of the proposed method. Err codemadness.org 70 i 10002 </p> Err codemadness.org 70 i 10003 Err codemadness.org 70 i 10004 Err codemadness.org 70 i 10005 Err codemadness.org 70 i 10006 Malicious Requests Detection with Improved Bidirectional Long Short-term Memory Neural Networks. (arXiv:2010.13285v2 [cs.LG] UPDATED) Err codemadness.org 70 i 10007 http://fr.arxiv.org/abs/2010.13285 Err codemadness.org 70 i 10008 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1">Wenhao Li</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1">Bincheng Zhang</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1">Jiajie Zhang</a></p> Err codemadness.org 70 i 10009 Err codemadness.org 70 i 10010 <p>Detecting and intercepting malicious requests are one of the most widely used Err codemadness.org 70 i 10011 ways against attacks in the network security. Most existing detecting Err codemadness.org 70 i 10012 approaches, including matching blacklist characters and machine learning Err codemadness.org 70 i 10013 algorithms have all shown to be vulnerable to sophisticated attacks. To address Err codemadness.org 70 i 10014 the above issues, a more general and rigorous detection method is required. In Err codemadness.org 70 i 10015 this paper, we formulate the problem of detecting malicious requests as a Err codemadness.org 70 i 10016 temporal sequence classification problem, and propose a novel deep learning Err codemadness.org 70 i 10017 model namely Convolutional Neural Network-Bidirectional Long Short-term Err codemadness.org 70 i 10018 Memory-Convolutional Neural Network (CNN-BiLSTM-CNN). By connecting the shadow Err codemadness.org 70 i 10019 and deep feature maps of the convolutional layers, the malicious feature Err codemadness.org 70 i 10020 extracting ability is improved on more detailed functionality. Experimental Err codemadness.org 70 i 10021 results on HTTP dataset CSIC 2010 have demonstrated the effectiveness of the Err codemadness.org 70 i 10022 proposed method when compared with the state-of-the-arts. Err codemadness.org 70 i 10023 </p> Err codemadness.org 70 i 10024 Err codemadness.org 70 i 10025 Err codemadness.org 70 i 10026 Err codemadness.org 70 i 10027 Recent Developments on ESPnet Toolkit Boosted by Conformer. (arXiv:2010.13956v2 [eess.AS] UPDATED) Err codemadness.org 70 i 10028 http://fr.arxiv.org/abs/2010.13956 Err codemadness.org 70 i 10029 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Guo_P/0/1/0/all/0/1">Pengcheng Guo</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Boyer_F/0/1/0/all/0/1">Florian Boyer</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Chang_X/0/1/0/all/0/1">Xuankai Chang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Hayashi_T/0/1/0/all/0/1">Tomoki Hayashi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Higuchi_Y/0/1/0/all/0/1">Yosuke Higuchi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Inaguma_H/0/1/0/all/0/1">Hirofumi Inaguma</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Kamo_N/0/1/0/all/0/1">Naoyuki Kamo</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Li_C/0/1/0/all/0/1">Chenda Li</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Garcia_Romero_D/0/1/0/all/0/1">Daniel Garcia-Romero</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1">Jiatong Shi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1">Jing Shi</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Watanabe_S/0/1/0/all/0/1">Shinji Watanabe</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Wei_K/0/1/0/all/0/1">Kun Wei</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_W/0/1/0/all/0/1">Wangyou Zhang</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zhang_Y/0/1/0/all/0/1">Yuekai Zhang</a></p> Err codemadness.org 70 i 10030 Err codemadness.org 70 i 10031 <p>In this study, we present recent developments on ESPnet: End-to-End Speech Err codemadness.org 70 i 10032 Processing toolkit, which mainly involves a recently proposed architecture Err codemadness.org 70 i 10033 called Conformer, Convolution-augmented Transformer. This paper shows the Err codemadness.org 70 i 10034 results for a wide range of end-to-end speech processing applications, such as Err codemadness.org 70 i 10035 automatic speech recognition (ASR), speech translations (ST), speech separation Err codemadness.org 70 i 10036 (SS) and text-to-speech (TTS). Our experiments reveal various training tips and Err codemadness.org 70 i 10037 significant performance benefits obtained with the Conformer on different Err codemadness.org 70 i 10038 tasks. These results are competitive or even outperform the current Err codemadness.org 70 i 10039 state-of-art Transformer models. We are preparing to release all-in-one recipes Err codemadness.org 70 i 10040 using open source and publicly available corpora for all the above tasks with Err codemadness.org 70 i 10041 pre-trained models. Our aim for this work is to contribute to our research Err codemadness.org 70 i 10042 community by reducing the burden of preparing state-of-the-art research Err codemadness.org 70 i 10043 environments usually requiring high resources. Err codemadness.org 70 i 10044 </p> Err codemadness.org 70 i 10045 Err codemadness.org 70 i 10046 Err codemadness.org 70 i 10047 Err codemadness.org 70 i 10048 Simultaenous Sieves: A Deterministic Streaming Algorithm for Non-Monotone Submodular Maximization. (arXiv:2010.14367v2 [cs.DS] UPDATED) Err codemadness.org 70 i 10049 http://fr.arxiv.org/abs/2010.14367 Err codemadness.org 70 i 10050 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Kuhnle_A/0/1/0/all/0/1">Alan Kuhnle</a></p> Err codemadness.org 70 i 10051 Err codemadness.org 70 i 10052 <p>In this work, we present a combinatorial, deterministic single-pass streaming Err codemadness.org 70 i 10053 algorithm for the problem of maximizing a submodular function, not necessarily Err codemadness.org 70 i 10054 monotone, with respect to a cardinality constraint (SMCC). In the case the Err codemadness.org 70 i 10055 function is monotone, our algorithm reduces to the optimal streaming algorithm Err codemadness.org 70 i 10056 of Badanidiyuru et al. (2014). In general, our algorithm achieves ratio $\alpha Err codemadness.org 70 i 10057 / (1 + \alpha) - \varepsilon$, for any $\varepsilon &gt; 0$, where $\alpha$ is the Err codemadness.org 70 i 10058 ratio of an offline (deterministic) algorithm for SMCC used for Err codemadness.org 70 i 10059 post-processing. Thus, if exponential computation time is allowed, our Err codemadness.org 70 i 10060 algorithm deterministically achieves nearly the optimal $1/2$ ratio. These Err codemadness.org 70 i 10061 results nearly match those of a recently proposed, randomized streaming Err codemadness.org 70 i 10062 algorithm that achieves the same ratios in expectation. For a deterministic, Err codemadness.org 70 i 10063 single-pass streaming algorithm, our algorithm achieves in polynomial time an Err codemadness.org 70 i 10064 improvement of the best approximation factor from $1/9$ of previous literature Err codemadness.org 70 i 10065 to $\approx 0.2689$. Err codemadness.org 70 i 10066 </p> Err codemadness.org 70 i 10067 Err codemadness.org 70 i 10068 Err codemadness.org 70 i 10069 Err codemadness.org 70 i 10070 Memory Optimization for Deep Networks. (arXiv:2010.14501v2 [cs.LG] UPDATED) Err codemadness.org 70 i 10071 http://fr.arxiv.org/abs/2010.14501 Err codemadness.org 70 i 10072 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Shah_A/0/1/0/all/0/1">Aashaka Shah</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Wu_C/0/1/0/all/0/1">Chao-Yuan Wu</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mohan_J/0/1/0/all/0/1">Jayashree Mohan</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Chidambaram_V/0/1/0/all/0/1">Vijay Chidambaram</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Krahenbuhl_P/0/1/0/all/0/1">Philipp Kr&#xe4;henb&#xfc;hl</a></p> Err codemadness.org 70 i 10073 Err codemadness.org 70 i 10074 <p>Deep learning is slowly, but steadily, hitting a memory bottleneck. While the Err codemadness.org 70 i 10075 tensor computation in top-of-the-line GPUs increased by 32x over the last five Err codemadness.org 70 i 10076 years, the total available memory only grew by 2.5x. This prevents researchers Err codemadness.org 70 i 10077 from exploring larger architectures, as training large networks requires more Err codemadness.org 70 i 10078 memory for storing intermediate outputs. In this paper, we present MONeT, an Err codemadness.org 70 i 10079 automatic framework that minimizes both the memory footprint and computational Err codemadness.org 70 i 10080 overhead of deep networks. MONeT jointly optimizes the checkpointing schedule Err codemadness.org 70 i 10081 and the implementation of various operators. MONeT is able to outperform all Err codemadness.org 70 i 10082 prior hand-tuned operations as well as automated checkpointing. MONeT reduces Err codemadness.org 70 i 10083 the overall memory requirement by 3x for various PyTorch models, with a 9-16% Err codemadness.org 70 i 10084 overhead in computation. For the same computation cost, MONeT requires 1.2-1.8x Err codemadness.org 70 i 10085 less memory than current state-of-the-art automated checkpointing frameworks. Err codemadness.org 70 i 10086 Our code is available at https://github.com/utsaslab/MONeT. Err codemadness.org 70 i 10087 </p> Err codemadness.org 70 i 10088 Err codemadness.org 70 i 10089 Err codemadness.org 70 i 10090 Err codemadness.org 70 i 10091 Language ID in the Wild: Unexpected Challenges on the Path to a Thousand-Language Web Text Corpus. (arXiv:2010.14571v2 [cs.CL] UPDATED) Err codemadness.org 70 i 10092 http://fr.arxiv.org/abs/2010.14571 Err codemadness.org 70 i 10093 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Caswell_I/0/1/0/all/0/1">Isaac Caswell</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Breiner_T/0/1/0/all/0/1">Theresa Breiner</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Esch_D/0/1/0/all/0/1">Daan van Esch</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bapna_A/0/1/0/all/0/1">Ankur Bapna</a></p> Err codemadness.org 70 i 10094 Err codemadness.org 70 i 10095 <p>Large text corpora are increasingly important for a wide variety of Natural Err codemadness.org 70 i 10096 Language Processing (NLP) tasks, and automatic language identification (LangID) Err codemadness.org 70 i 10097 is a core technology needed to collect such datasets in a multilingual context. Err codemadness.org 70 i 10098 LangID is largely treated as solved in the literature, with models reported Err codemadness.org 70 i 10099 that achieve over 90% average F1 on as many as 1,366 languages. We train LangID Err codemadness.org 70 i 10100 models on up to 1,629 languages with comparable quality on held-out test sets, Err codemadness.org 70 i 10101 but find that human-judged LangID accuracy for web-crawl text corpora created Err codemadness.org 70 i 10102 using these models is only around 5% for many lower-resource languages, Err codemadness.org 70 i 10103 suggesting a need for more robust evaluation. Further analysis revealed a Err codemadness.org 70 i 10104 variety of error modes, arising from domain mismatch, class imbalance, language Err codemadness.org 70 i 10105 similarity, and insufficiently expressive models. We propose two classes of Err codemadness.org 70 i 10106 techniques to mitigate these errors: wordlist-based tunable-precision filters Err codemadness.org 70 i 10107 (for which we release curated lists in about 500 languages) and Err codemadness.org 70 i 10108 transformer-based semi-supervised LangID models, which increase median dataset Err codemadness.org 70 i 10109 precision from 5.5% to 71.2%. These techniques enable us to create an initial Err codemadness.org 70 i 10110 data set covering 100K or more relatively clean sentences in each of 500+ Err codemadness.org 70 i 10111 languages, paving the way towards a 1,000-language web text corpus. Err codemadness.org 70 i 10112 </p> Err codemadness.org 70 i 10113 Err codemadness.org 70 i 10114 Err codemadness.org 70 i 10115 Err codemadness.org 70 i 10116 Predicting Themes within Complex Unstructured Texts: A Case Study on Safeguarding Reports. (arXiv:2010.14584v2 [cs.CL] UPDATED) Err codemadness.org 70 i 10117 http://fr.arxiv.org/abs/2010.14584 Err codemadness.org 70 i 10118 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Edwards_A/0/1/0/all/0/1">Aleksandra Edwards</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Rogers_D/0/1/0/all/0/1">David Rogers</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Camacho_Collados_J/0/1/0/all/0/1">Jose Camacho-Collados</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Ribaupierre_H/0/1/0/all/0/1">H&#xe9;l&#xe8;ne de Ribaupierre</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Preece_A/0/1/0/all/0/1">Alun Preece</a></p> Err codemadness.org 70 i 10119 Err codemadness.org 70 i 10120 <p>The task of text and sentence classification is associated with the need for Err codemadness.org 70 i 10121 large amounts of labelled training data. The acquisition of high volumes of Err codemadness.org 70 i 10122 labelled datasets can be expensive or unfeasible, especially for Err codemadness.org 70 i 10123 highly-specialised domains for which documents are hard to obtain. Research on Err codemadness.org 70 i 10124 the application of supervised classification based on small amounts of training Err codemadness.org 70 i 10125 data is limited. In this paper, we address the combination of state-of-the-art Err codemadness.org 70 i 10126 deep learning and classification methods and provide an insight into what Err codemadness.org 70 i 10127 combination of methods fit the needs of small, domain-specific, and Err codemadness.org 70 i 10128 terminologically-rich corpora. We focus on a real-world scenario related to a Err codemadness.org 70 i 10129 collection of safeguarding reports comprising learning experiences and Err codemadness.org 70 i 10130 reflections on tackling serious incidents involving children and vulnerable Err codemadness.org 70 i 10131 adults. The relatively small volume of available reports and their use of Err codemadness.org 70 i 10132 highly domain-specific terminology makes the application of automated Err codemadness.org 70 i 10133 approaches difficult. We focus on the problem of automatically identifying the Err codemadness.org 70 i 10134 main themes in a safeguarding report using supervised classification Err codemadness.org 70 i 10135 approaches. Our results show the potential of deep learning models to simulate Err codemadness.org 70 i 10136 subject-expert behaviour even for complex tasks with limited labelled data. Err codemadness.org 70 i 10137 </p> Err codemadness.org 70 i 10138 Err codemadness.org 70 i 10139 Err codemadness.org 70 i 10140 Err codemadness.org 70 i 10141 Batch Reinforcement Learning with a Nonparametric Off-Policy Policy Gradient. (arXiv:2010.14771v2 [cs.LG] UPDATED) Err codemadness.org 70 i 10142 http://fr.arxiv.org/abs/2010.14771 Err codemadness.org 70 i 10143 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Tosatto_S/0/1/0/all/0/1">Samuele Tosatto</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Carvalho_J/0/1/0/all/0/1">Jo&#xe3;o Carvalho</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Peters_J/0/1/0/all/0/1">Jan Peters</a></p> Err codemadness.org 70 i 10144 Err codemadness.org 70 i 10145 <p>Off-policy Reinforcement Learning (RL) holds the promise of better data Err codemadness.org 70 i 10146 efficiency as it allows sample reuse and potentially enables safe interaction Err codemadness.org 70 i 10147 with the environment. Current off-policy policy gradient methods either suffer Err codemadness.org 70 i 10148 from high bias or high variance, delivering often unreliable estimates. The Err codemadness.org 70 i 10149 price of inefficiency becomes evident in real-world scenarios such as Err codemadness.org 70 i 10150 interaction-driven robot learning, where the success of RL has been rather Err codemadness.org 70 i 10151 limited, and a very high sample cost hinders straightforward application. In Err codemadness.org 70 i 10152 this paper, we propose a nonparametric Bellman equation, which can be solved in Err codemadness.org 70 i 10153 closed form. The solution is differentiable w.r.t the policy parameters and Err codemadness.org 70 i 10154 gives access to an estimation of the policy gradient. In this way, we avoid the Err codemadness.org 70 i 10155 high variance of importance sampling approaches, and the high bias of Err codemadness.org 70 i 10156 semi-gradient methods. We empirically analyze the quality of our gradient Err codemadness.org 70 i 10157 estimate against state-of-the-art methods, and show that it outperforms the Err codemadness.org 70 i 10158 baselines in terms of sample efficiency on classical control tasks. Err codemadness.org 70 i 10159 </p> Err codemadness.org 70 i 10160 Err codemadness.org 70 i 10161 Err codemadness.org 70 i 10162 Err codemadness.org 70 i 10163 Transferable Universal Adversarial Perturbations Using Generative Models. (arXiv:2010.14919v2 [cs.CV] UPDATED) Err codemadness.org 70 i 10164 http://fr.arxiv.org/abs/2010.14919 Err codemadness.org 70 i 10165 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Hashemi_A/0/1/0/all/0/1">Atiye Sadat Hashemi</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Bar_A/0/1/0/all/0/1">Andreas B&#xe4;r</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Mozaffari_S/0/1/0/all/0/1">Saeed Mozaffari</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Fingscheidt_T/0/1/0/all/0/1">Tim Fingscheidt</a></p> Err codemadness.org 70 i 10166 Err codemadness.org 70 i 10167 <p>Deep neural networks tend to be vulnerable to adversarial perturbations, Err codemadness.org 70 i 10168 which by adding to a natural image can fool a respective model with high Err codemadness.org 70 i 10169 confidence. Recently, the existence of image-agnostic perturbations, also known Err codemadness.org 70 i 10170 as universal adversarial perturbations (UAPs), were discovered. However, Err codemadness.org 70 i 10171 existing UAPs still lack a sufficiently high fooling rate, when being applied Err codemadness.org 70 i 10172 to an unknown target model. In this paper, we propose a novel deep learning Err codemadness.org 70 i 10173 technique for generating more transferable UAPs. We utilize a perturbation Err codemadness.org 70 i 10174 generator and some given pretrained networks so-called source models to Err codemadness.org 70 i 10175 generate UAPs using the ImageNet dataset. Due to the similar feature Err codemadness.org 70 i 10176 representation of various model architectures in the first layer, we propose a Err codemadness.org 70 i 10177 loss formulation that focuses on the adversarial energy only in the respective Err codemadness.org 70 i 10178 first layer of the source models. This supports the transferability of our Err codemadness.org 70 i 10179 generated UAPs to any other target model. We further empirically analyze our Err codemadness.org 70 i 10180 generated UAPs and demonstrate that these perturbations generalize very well Err codemadness.org 70 i 10181 towards different target models. Surpassing the current state of the art in Err codemadness.org 70 i 10182 both, fooling rate and model-transferability, we can show the superiority of Err codemadness.org 70 i 10183 our proposed approach. Using our generated non-targeted UAPs, we obtain an Err codemadness.org 70 i 10184 average fooling rate of 93.36% on the source models (state of the art: 82.16%). Err codemadness.org 70 i 10185 Generating our UAPs on the deep ResNet-152, we obtain about a 12% absolute Err codemadness.org 70 i 10186 fooling rate advantage vs. cutting-edge methods on VGG-16 and VGG-19 target Err codemadness.org 70 i 10187 models. Err codemadness.org 70 i 10188 </p> Err codemadness.org 70 i 10189 Err codemadness.org 70 i 10190 Err codemadness.org 70 i 10191 Err codemadness.org 70 i 10192 Estimating Multiplicative Relations in Neural Networks. (arXiv:2010.15003v2 [cs.LG] UPDATED) Err codemadness.org 70 i 10193 http://fr.arxiv.org/abs/2010.15003 Err codemadness.org 70 i 10194 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Goel_B/0/1/0/all/0/1">Bhaavan Goel</a></p> Err codemadness.org 70 i 10195 Err codemadness.org 70 i 10196 <p>Universal approximation theorem suggests that a shallow neural network can Err codemadness.org 70 i 10197 approximate any function. The input to neurons at each layer is a weighted sum Err codemadness.org 70 i 10198 of previous layer neurons and then an activation is applied. These activation Err codemadness.org 70 i 10199 functions perform very well when the output is a linear combination of input Err codemadness.org 70 i 10200 data. When trying to learn a function which involves product of input data, the Err codemadness.org 70 i 10201 neural networks tend to overfit the data to approximate the function. In this Err codemadness.org 70 i 10202 paper we will use properties of logarithmic functions to propose a pair of Err codemadness.org 70 i 10203 activation functions which can translate products into linear expression and Err codemadness.org 70 i 10204 learn using backpropagation. We will try to generalize this approach for some Err codemadness.org 70 i 10205 complex arithmetic functions and test the accuracy on a disjoint distribution Err codemadness.org 70 i 10206 with the training set. Err codemadness.org 70 i 10207 </p> Err codemadness.org 70 i 10208 Err codemadness.org 70 i 10209 Err codemadness.org 70 i 10210 Err codemadness.org 70 i 10211 Benchmarking Parallelism in FaaS Platforms. (arXiv:2010.15032v2 [cs.DC] UPDATED) Err codemadness.org 70 i 10212 http://fr.arxiv.org/abs/2010.15032 Err codemadness.org 70 i 10213 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Barcelona_Pons_D/0/1/0/all/0/1">Daniel Barcelona-Pons</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Garcia_Lopez_P/0/1/0/all/0/1">Pedro Garc&#xed;a-L&#xf3;pez</a></p> Err codemadness.org 70 i 10214 Err codemadness.org 70 i 10215 <p>Serverless computing has seen a myriad of work exploring its potential. Some Err codemadness.org 70 i 10216 systems tackle Function-as-a-Service (FaaS) properties on automatic elasticity Err codemadness.org 70 i 10217 and scale to run highly-parallel computing jobs. However, they focus on Err codemadness.org 70 i 10218 specific platforms and convey that their ideas can be extrapolated to any FaaS Err codemadness.org 70 i 10219 runtime. Err codemadness.org 70 i 10220 </p> Err codemadness.org 70 i 10221 <p>An important question arises: do all FaaS platforms fit parallel Err codemadness.org 70 i 10222 computations? In this paper, we argue that not all of them provide the Err codemadness.org 70 i 10223 necessary means to host highly-parallel applications. To validate our Err codemadness.org 70 i 10224 hypothesis, we create a comparative framework and categorize the architectures Err codemadness.org 70 i 10225 of four cloud FaaS offerings, with emphasis on parallel performance. We attest Err codemadness.org 70 i 10226 and extend this description with an empirical experiment that consists in Err codemadness.org 70 i 10227 plotting in deep detail the evolution of a parallel computing job on each Err codemadness.org 70 i 10228 service. Err codemadness.org 70 i 10229 </p> Err codemadness.org 70 i 10230 <p>The analysis of our results evinces that FaaS is not inherently good for Err codemadness.org 70 i 10231 parallel computations and architectural differences across platforms are Err codemadness.org 70 i 10232 decisive to categorize their performance. A key insight is the importance of Err codemadness.org 70 i 10233 virtualization technologies and the scheduling approach of FaaS platforms. Err codemadness.org 70 i 10234 Parallelism improves with lighter virtualization and proactive scheduling due Err codemadness.org 70 i 10235 to finer resource allocation and faster elasticity. This causes some platforms Err codemadness.org 70 i 10236 like AWS and IBM to perform well for highly-parallel computations, while others Err codemadness.org 70 i 10237 such as Azure present difficulties to achieve the required parallelism degree. Err codemadness.org 70 i 10238 Consequently, the information in this paper becomes of special interest to help Err codemadness.org 70 i 10239 users choose the most adequate infrastructure for their parallel applications. Err codemadness.org 70 i 10240 </p> Err codemadness.org 70 i 10241 Err codemadness.org 70 i 10242 Err codemadness.org 70 i 10243 Err codemadness.org 70 i 10244 Measuring non-trivial compositionality in emergent communication. (arXiv:2010.15058v2 [cs.NE] UPDATED) Err codemadness.org 70 i 10245 http://fr.arxiv.org/abs/2010.15058 Err codemadness.org 70 i 10246 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Korbak_T/0/1/0/all/0/1">Tomasz Korbak</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Zubek_J/0/1/0/all/0/1">Julian Zubek</a>, <a href="http://fr.arxiv.org/find/cs/1/au:+Raczaszek_Leonardi_J/0/1/0/all/0/1">Joanna R&#x105;czaszek-Leonardi</a></p> Err codemadness.org 70 i 10247 Err codemadness.org 70 i 10248 <p>Compositionality is an important explanatory target in emergent communication Err codemadness.org 70 i 10249 and language evolution. The vast majority of computational models of Err codemadness.org 70 i 10250 communication account for the emergence of only a very basic form of Err codemadness.org 70 i 10251 compositionality: trivial compositionality. A compositional protocol is Err codemadness.org 70 i 10252 trivially compositional if the meaning of a complex signal (e.g. blue circle) Err codemadness.org 70 i 10253 boils down to the intersection of meanings of its constituents (e.g. the Err codemadness.org 70 i 10254 intersection of the set of blue objects and the set of circles). A protocol is Err codemadness.org 70 i 10255 non-trivially compositional (NTC) if the meaning of a complex signal (e.g. Err codemadness.org 70 i 10256 biggest apple) is a more complex function of the meanings of their Err codemadness.org 70 i 10257 constituents. In this paper, we review several metrics of compositionality used Err codemadness.org 70 i 10258 in emergent communication and experimentally show that most of them fail to Err codemadness.org 70 i 10259 detect NTC - i.e. they treat non-trivial compositionality as a failure of Err codemadness.org 70 i 10260 compositionality. The one exception is tree reconstruction error, a metric Err codemadness.org 70 i 10261 motivated by formal accounts of compositionality. These results emphasise Err codemadness.org 70 i 10262 important limitations of emergent communication research that could hamper Err codemadness.org 70 i 10263 progress on modelling the emergence of NTC. Err codemadness.org 70 i 10264 </p> Err codemadness.org 70 i 10265 Err codemadness.org 70 i 10266 Err codemadness.org 70 i 10267 Err codemadness.org 70 i 10268 The fundamental equations of change in statistical ensembles and biological populations. (arXiv:2010.14544v1 [q-bio.PE] CROSS LISTED) Err codemadness.org 70 i 10269 http://fr.arxiv.org/abs/2010.14544 Err codemadness.org 70 i 10270 <p>Authors: <a href="http://fr.arxiv.org/find/q-bio/1/au:+Frank_S/0/1/0/all/0/1">Steven A. Frank</a>, <a href="http://fr.arxiv.org/find/q-bio/1/au:+Bruggeman_F/0/1/0/all/0/1">Frank J. Bruggeman</a></p> Err codemadness.org 70 i 10271 Err codemadness.org 70 i 10272 <p>A recent article in Nature Physics unified key results from thermodynamics, Err codemadness.org 70 i 10273 statistics, and information theory. The unification arose from a general Err codemadness.org 70 i 10274 equation for the rate of change in the information content of a system. The Err codemadness.org 70 i 10275 general equation describes the change in the moments of an observable quantity Err codemadness.org 70 i 10276 over a probability distribution. One term in the equation describes the change Err codemadness.org 70 i 10277 in the probability distribution. The other term describes the change in the Err codemadness.org 70 i 10278 observable values for a given state. We show the equivalence of this general Err codemadness.org 70 i 10279 equation for moment dynamics with the widely known Price equation from Err codemadness.org 70 i 10280 evolutionary theory, named after George Price. We introduce the Price equation Err codemadness.org 70 i 10281 from its biological roots, review a mathematically abstract form of the Err codemadness.org 70 i 10282 equation, and discuss the potential for this equation to unify diverse Err codemadness.org 70 i 10283 mathematical theories from different disciplines. The new work in Nature Err codemadness.org 70 i 10284 Physics and many applications in biology show that this equation also provides Err codemadness.org 70 i 10285 the basis for deriving many novel theoretical results within each discipline. Err codemadness.org 70 i 10286 </p> Err codemadness.org 70 i 10287 Err codemadness.org 70 i 10288 Err codemadness.org 70 i 10289 Err codemadness.org 70 i 10290 Generalized eigen, singular value, and partial least squares decompositions: The GSVD package. (arXiv:2010.14734v2 [cs.MS] CROSS LISTED) Err codemadness.org 70 i 10291 http://fr.arxiv.org/abs/2010.14734 Err codemadness.org 70 i 10292 <p>Authors: <a href="http://fr.arxiv.org/find/cs/1/au:+Beaton_D/0/1/0/all/0/1">Derek Beaton</a> (1) ((1) Rotman Research Institute, Baycrest Health Sciences)</p> Err codemadness.org 70 i 10293 Err codemadness.org 70 i 10294 <p>The generalized singular value decomposition (GSVD, a.k.a. "SVD triplet", Err codemadness.org 70 i 10295 "duality diagram" approach) provides a unified strategy and basis to perform Err codemadness.org 70 i 10296 nearly all of the most common multivariate analyses (e.g., principal Err codemadness.org 70 i 10297 components, correspondence analysis, multidimensional scaling, canonical Err codemadness.org 70 i 10298 correlation, partial least squares). Though the GSVD is ubiquitous, powerful, Err codemadness.org 70 i 10299 and flexible, it has very few implementations. Here I introduce the GSVD Err codemadness.org 70 i 10300 package for R. The general goal of GSVD is to provide a small set of accessible Err codemadness.org 70 i 10301 functions to perform the GSVD and two other related decompositions (generalized Err codemadness.org 70 i 10302 eigenvalue decomposition, generalized partial least squares-singular value Err codemadness.org 70 i 10303 decomposition). Furthermore, GSVD helps provide a more unified conceptual Err codemadness.org 70 i 10304 approach and nomenclature to many techniques. I first introduce the concept of Err codemadness.org 70 i 10305 the GSVD, followed by a formal definition of the generalized decompositions. Err codemadness.org 70 i 10306 Next I provide some key decisions made during development, and then a number of Err codemadness.org 70 i 10307 examples of how to use GSVD to implement various statistical techniques. These Err codemadness.org 70 i 10308 examples also illustrate one of the goals of GSVD: how others can (or should) Err codemadness.org 70 i 10309 build analysis packages that depend on GSVD. Finally, I discuss the possible Err codemadness.org 70 i 10310 future of GSVD. Err codemadness.org 70 i 10311 </p> Err codemadness.org 70 i 10312 Err codemadness.org 70 i 10313 Err codemadness.org 70 i 10314 Err codemadness.org 70 i 10315 Continuous Chaotic Nonlinear System and Lyapunov controller Optimization using Deep Learning. (arXiv:2010.14746v1 [eess.SY] CROSS LISTED) Err codemadness.org 70 i 10316 http://fr.arxiv.org/abs/2010.14746 Err codemadness.org 70 i 10317 <p>Authors: <a href="http://fr.arxiv.org/find/eess/1/au:+Mahmoud_A/0/1/0/all/0/1">Amr Mahmoud</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Ismaeil_Y/0/1/0/all/0/1">Youmna Ismaeil</a>, <a href="http://fr.arxiv.org/find/eess/1/au:+Zohdy_M/0/1/0/all/0/1">Mohamed Zohdy</a></p> Err codemadness.org 70 i 10318 Err codemadness.org 70 i 10319 <p>The introduction of unexpected system disturbances and new system dynamics Err codemadness.org 70 i 10320 does not allow initially selected static system and controller parameters to Err codemadness.org 70 i 10321 guarantee continued system stability and performance. In this research we Err codemadness.org 70 i 10322 present a novel approach for detecting early failure indicators of non-linear Err codemadness.org 70 i 10323 highly chaotic system and accordingly predict the best parameter calibrations Err codemadness.org 70 i 10324 to offset such instability using deep machine learning regression model. The Err codemadness.org 70 i 10325 approach proposed continuously monitors the system and controller signals. The Err codemadness.org 70 i 10326 Re-calibration of the system and controller parameters is triggered according Err codemadness.org 70 i 10327 to a set of conditions designed to maintain system stability without compromise Err codemadness.org 70 i 10328 to the system speed, intended outcome or required processing power. The deep Err codemadness.org 70 i 10329 neural model predicts the parameter values that would best counteract the Err codemadness.org 70 i 10330 expected system in-stability. To demonstrate the effectiveness of the proposed Err codemadness.org 70 i 10331 approach, it is applied to the non-linear complex combination of Duffing Van Err codemadness.org 70 i 10332 der pol oscillators. The approach is also tested under different scenarios the Err codemadness.org 70 i 10333 system and controller parameters are initially chosen incorrectly or the system Err codemadness.org 70 i 10334 parameters are changed while running or new system dynamics are introduced Err codemadness.org 70 i 10335 while running to measure effectiveness and reaction time. Err codemadness.org 70 i 10336 </p> Err codemadness.org 70 i 10337 Err codemadness.org 70 i 10338 Err codemadness.org 70 i 10339 Err codemadness.org 70 i 10340 Err codemadness.org 70 .