Introduction
Introduction Statistics Contact Development Disclaimer Help
arxiv.org.rss.091.xml - sfeed_tests - sfeed tests and RSS and Atom files
git clone git://git.codemadness.org/sfeed_tests
Log
Files
Refs
README
LICENSE
---
arxiv.org.rss.091.xml (806587B)
---
1 <?xml version="1.0" encoding="UTF-8"?>
2
3 <!DOCTYPE rss PUBLIC "-//Netscape Communications//DTD RSS 0.91//EN"
4 "http://www.rssboard.org/rss-0.91.dtd">
5
6 <rss version="0.91">
7
8 <channel>
9 <title>cs updates on arXiv.org</title>
10 <link>http://fr.arxiv.org/</link>
11 <description>Computer Science (cs) updates on the arXiv.org e-print arch…
12 <language>en-us</language>
13 <pubDate>Fri, 30 Oct 2020 00:30:00 GMT</pubDate>
14 <lastBuildDate>Fri, 30 Oct 2020 00:30:00 GMT</lastBuildDate>
15 <managingEditor>[email protected]</managingEditor>
16
17 <image>
18 <title>arXiv.org</title>
19 <url>http://fr.arxiv.org/icons/sfx.gif</url>
20 <link>http://fr.arxiv.org/</link>
21 </image>
22 <item>
23 <title>Raw Audio for Depression Detection Can Be More Robust Against Gen…
24 <link>http://fr.arxiv.org/abs/2010.15120</link>
25 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
26
27 &lt;p&gt;Depression is a large-scale mental health problem and a challen…
28 machine learning researchers in terms of the detection of depression. Da…
29 such as the Distress Analysis Interview Corpus - Wizard of Oz have been …
30 to aid research in this area. However, on top of the challenges inherent…
31 accurately detecting depression, biases in datasets may result in skewed
32 classification performance. In this paper we examine gender bias in the
33 DAIC-WOZ dataset using audio-based deep neural networks. We show that ge…
34 biases in DAIC-WOZ can lead to an overreporting of performance, which ha…
35 overlooked in the past due to the same gender biases being present in th…
36 set. By using raw audio and different concepts from Fair Machine Learnin…
37 as data re-distribution, we can mitigate against the harmful effects of …
38 &lt;/p&gt;
39 </description>
40 </item>
41 <item>
42 <title>papaya2: 2D Irreducible Minkowski Tensor computation. (arXiv:2010…
43 <link>http://fr.arxiv.org/abs/2010.15138</link>
44 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
45
46 &lt;p&gt;A common challenge in scientific and technical domains is the q…
47 description of geometries and shapes, e.g. in the analysis of microscope
48 imagery or astronomical observation data. Frequently, it is desirable to…
49 beyond scalar shape metrics such as porosity and surface to volume ratios
50 because the samples are anisotropic or because direction-dependent quant…
51 such as conductances or elasticity are of interest. Minkowski Tensors ar…
52 systematic family of versatile and robust higher-order shape descriptors…
53 allow for shape characterization of arbitrary order and promise a path to
54 systematic structure-function relationships for direction-dependent prop…
55 Papaya2 is a software to calculate 2D higher-order shape metrics with a …
56 interface, support for Irreducible Minkowski Tensors and interpolated ma…
57 squares. Extensions to Matlab, JavaScript and Python are provided as wel…
58 While the tensor of inertia is computed by many tools, we are not aware …
59 other open-source software which provides higher-rank shape characteriza…
60 2D.
61 &lt;/p&gt;
62 </description>
63 </item>
64 <item>
65 <title>DeSMOG: Detecting Stance in Media On Global Warming. (arXiv:2010.…
66 <link>http://fr.arxiv.org/abs/2010.15149</link>
67 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
68
69 &lt;p&gt;Citing opinions is a powerful yet understudied strategy in argu…
70 example, an environmental activist might say, &quot;Leading scientists a…
71 global warming is a serious concern,&quot; framing a clause which affirm…
72 stance (&quot;that global warming is serious&quot;) as an opinion endors…
73 agree&quot;) by a reputable source (&quot;leading&quot;). In contrast, a…
74 might frame the same clause as the opinion of an untrustworthy source wi…
75 predicate connoting doubt: &quot;Mistaken scientists claim [...].&quot; …
76 opinion-framing in the global warming (GW) debate, an increasingly parti…
77 issue that has received little attention in NLP. We introduce DeSMOG, a …
78 of stance-labeled GW sentences, and train a BERT classifier to study nov…
79 aspects of argumentation in how different sides of a debate represent th…
80 and each other&apos;s opinions. From 56K news articles, we find that sim…
81 linguistic devices for self-affirming and opponent-doubting discourse ar…
82 across GW-accepting and skeptic media, though GW-skeptical media shows m…
83 opponent-doubt. We also find that authors often characterize sources as
84 hypocritical, by ascribing opinions expressing the author&apos;s own vie…
85 entities known to publicly endorse the opposing view. We release our sta…
86 dataset, model, and lexicons of framing devices for future work on
87 opinion-framing and the automatic detection of GW stance.
88 &lt;/p&gt;
89 </description>
90 </item>
91 <item>
92 <title>On the Optimality and Convergence Properties of the Learning Mode…
93 <link>http://fr.arxiv.org/abs/2010.15153</link>
94 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
95
96 &lt;p&gt;In this technical note we analyse the performance improvement a…
97 properties of the Learning Model Predictive Control (LMPC) strategy for …
98 deterministic systems. The LMPC framework is a policy iteration scheme w…
99 closed-loop trajectories are used to update the control policy for the n…
100 execution of the control task. We show that, when a Linear Independence
101 Constraint Qualification (LICQ) condition holds, the LMPC scheme guarant…
102 strict iterative performance improvement and optimality, meaning that the
103 closed-loop cost evaluated over the entire task converges asymptotically…
104 optimal cost of the infinite-horizon control problem. Compared to previo…
105 works this sufficient LICQ condition can be easily checked, it holds for…
106 larger class of systems and it can be used to adaptively select the pred…
107 horizon of the controller, as demonstrated by a numerical example.
108 &lt;/p&gt;
109 </description>
110 </item>
111 <item>
112 <title>Kernel Aggregated Fast Multipole Method: Efficient summation of L…
113 <link>http://fr.arxiv.org/abs/2010.15155</link>
114 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
115
116 &lt;p&gt;Many different simulation methods for Stokes flow problems invo…
117 computationally intense task---the summation of a kernel function over $…
118 pairs of points. One popular technique is the Kernel Independent Fast Mu…
119 Method (KIFMM), which constructs a spatial adaptive octree and places a …
120 number of equivalent multipole and local points around each octree box, …
121 completes the kernel sum with $O(N)$ performance. However, the KIFMM can…
122 used directly with nonlinear kernels, can be inefficient for complicated…
123 kernels, and in general is difficult to implement compared to less-effic…
124 alternatives such as Ewald-type methods. Here we present the Kernel Aggr…
125 Fast Multipole Method (KAFMM), which overcomes these drawbacks by allowi…
126 different kernel functions to be used for specific stages of octree trav…
127 In many cases a simpler linear kernel suffices during the most extensive…
128 of octree traversal, even for nonlinear kernel summation problems. The K…
129 thereby improves computational efficiency in general and also allows eff…
130 evaluation of some nonlinear kernel functions such as the regularized
131 Stokeslet. We have implemented our method as an open-source software lib…
132 STKFMM with support for Laplace kernels, the Stokeslet, regularized Stok…
133 Rotne-Prager-Yamakawa (RPY) tensor, and the Stokes double-layer and trac…
134 operators. Open and periodic boundary conditions are supported for all k…
135 and the no-slip wall boundary condition is supported for the Stokeslet a…
136 tensor. The package is designed to be ready-to-use as well as being read…
137 extensible to additional kernels. Massive parallelism is supported with …
138 OpenMP and MPI.
139 &lt;/p&gt;
140 </description>
141 </item>
142 <item>
143 <title>Diagnostic data integration using deep neural networks for real-t…
144 <link>http://fr.arxiv.org/abs/2010.15156</link>
145 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
146
147 &lt;p&gt;Recent advances in acquisition equipment is providing experimen…
148 growing amounts of precise yet affordable sensors. At the same time an i…
149 computational power, coming from new hardware resources (GPU, FPGA, ACAP…
150 been made available at relatively low costs. This led us to explore the
151 possibility of completely renewing the chain of acquisition for a fusion
152 experiment, where many high-rate sources of data, coming from different
153 diagnostics, can be combined in a wide framework of algorithms. If on on…
154 adding new data sources with different diagnostics enriches our knowledg…
155 physical aspects, on the other hand the dimensions of the overall model …
156 making relations among variables more and more opaque. A new approach fo…
157 integration of such heterogeneous diagnostics, based on composition of d…
158 \textit{variational autoencoders}, could ease this problem, acting as a
159 structural sparse regularizer. This has been applied to RFX-mod experime…
160 data, integrating the soft X-ray linear images of plasma temperature wit…
161 magnetic state.
162 &lt;/p&gt;
163 &lt;p&gt;However to ensure a real-time signal analysis, those algorithmi…
164 must be adapted to run in well suited hardware. In particular it is show…
165 attempting a quantization of neurons transfer functions, such models can…
166 modified to create an embedded firmware. This firmware, approximating th…
167 inference model to a set of simple operations, fits well with the simple…
168 units that are largely abundant in FPGAs. This is the key factor that pe…
169 the use of affordable hardware with complex deep neural topology and ope…
170 them in real-time.
171 &lt;/p&gt;
172 </description>
173 </item>
174 <item>
175 <title>Panoster: End-to-end Panoptic Segmentation of LiDAR Point Clouds.…
176 <link>http://fr.arxiv.org/abs/2010.15157</link>
177 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
178
179 &lt;p&gt;Panoptic segmentation has recently unified semantic and instance
180 segmentation, previously addressed separately, thus taking a step further
181 towards creating more comprehensive and efficient perception systems. In…
182 paper, we present Panoster, a novel proposal-free panoptic segmentation …
183 for point clouds. Unlike previous approaches relying on several steps to…
184 pixels or points into objects, Panoster proposes a simplified framework
185 incorporating a learning-based clustering solution to identify instances…
186 inference time, this acts as a class-agnostic semantic segmentation, all…
187 Panoster to be fast, while outperforming prior methods in terms of accur…
188 Additionally, we showcase how our approach can be flexibly and effective…
189 applied on diverse existing semantic architectures to deliver panoptic
190 predictions.
191 &lt;/p&gt;
192 </description>
193 </item>
194 <item>
195 <title>CNN Profiler on Polar Coordinate Images for Tropical Cyclone Stru…
196 <link>http://fr.arxiv.org/abs/2010.15158</link>
197 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
198
199 &lt;p&gt;Convolutional neural networks (CNN) have achieved great success…
200 tropical cyclones (TC) with satellite images in several tasks, such as TC
201 intensity estimation. In contrast, TC structure, which is conventionally
202 described by a few parameters estimated subjectively by meteorology
203 specialists, is still hard to be profiled objectively and routinely. Thi…
204 applies CNN on satellite images to create the entire TC structure profil…
205 covering all the structural parameters. By utilizing the meteorological …
206 knowledge to construct TC wind profiles based on historical structure
207 parameters, we provide valuable labels for training in our newly released
208 benchmark dataset. With such a dataset, we hope to attract more attentio…
209 this crucial issue among data scientists. Meanwhile, a baseline is estab…
210 with a specialized convolutional model operating on polar-coordinates. We
211 discovered that it is more feasible and physically reasonable to extract
212 structural information on polar-coordinates, instead of Cartesian coordi…
213 according to a TC&apos;s rotational and spiral natures. Experimental res…
214 released benchmark dataset verified the robustness of the proposed model…
215 demonstrated the potential for applying deep learning techniques for this
216 barely developed yet important topic.
217 &lt;/p&gt;
218 </description>
219 </item>
220 <item>
221 <title>Sizeless: Predicting the optimal size of serverless functions. (a…
222 <link>http://fr.arxiv.org/abs/2010.15162</link>
223 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
224
225 &lt;p&gt;Serverless functions are a cloud computing paradigm that reduce…
226 overheads for developers, because the cloud provider takes care of resou…
227 management tasks such as resource provisioning, deployment, and auto-sca…
228 The only resource management task that developers are still in charge of…
229 resource sizing, that is, selecting how much resources are allocated to …
230 worker instance. However, due to the challenging nature of resource sizi…
231 developers often neglect it despite its significant cost and performance
232 benefits. Existing approaches aiming to automate serverless functions re…
233 sizing require dedicated performance tests, which are time consuming to
234 implement and maintain.
235 &lt;/p&gt;
236 &lt;p&gt;In this paper, we introduce Sizeless -- an approach to predict …
237 resource size of a serverless function using monitoring data from a sing…
238 resource size. As our approach requires only production monitoring data,
239 developers no longer need to implement and maintain representative perfo…
240 tests. Furthermore, it enables cloud providers, which cannot engage in t…
241 the performance of user functions, to implement resource sizing on a pla…
242 level and automate the last resource management task associated with ser…
243 functions. In our evaluation, Sizeless was able to predict the execution…
244 of the serverless functions of a realistic server-less application with a
245 median prediction accuracy of 93.1%. Using Sizeless to optimize the memo…
246 of this application results in a speedup of 16.7% while simultaneously
247 decreasing costs by 2.5%.
248 &lt;/p&gt;
249 </description>
250 </item>
251 <item>
252 <title>Polymer Informatics with Multi-Task Learning. (arXiv:2010.15166v1…
253 <link>http://fr.arxiv.org/abs/2010.15166</link>
254 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
255
256 &lt;p&gt;Modern data-driven tools are transforming application-specific …
257 development cycles. Surrogate models that can be trained to predict the
258 properties of new polymers are becoming commonplace. Nevertheless, these…
259 do not utilize the full breadth of the knowledge available in datasets, …
260 are oftentimes sparse; inherent correlations between different property
261 datasets are disregarded. Here, we demonstrate the potency of multi-task
262 learning approaches that exploit such inherent correlations effectively,
263 particularly when some property dataset sizes are small. Data pertaining…
264 different properties of over $13, 000$ polymers (corresponding to over $…
265 data points) are coalesced and supplied to deep-learning multi-task
266 architectures. Compared to conventional single-task learning models (tha…
267 trained on individual property datasets independently), the multi-task a…
268 is accurate, efficient, scalable, and amenable to transfer learning as m…
269 data on the same or different properties become available. Moreover, the…
270 models are interpretable. Chemical rules, that explain how certain featu…
271 control trends in specific property values, emerge from the present work,
272 paving the way for the rational design of application specific polymers …
273 desired property or performance objectives.
274 &lt;/p&gt;
275 </description>
276 </item>
277 <item>
278 <title>Semi-Grant-Free NOMA: Ergodic Rates Analysis with Random Deployed…
279 <link>http://fr.arxiv.org/abs/2010.15169</link>
280 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
281
282 &lt;p&gt;Semi-grant-free (Semi-GF) non-orthogonal multiple access (NOMA)…
283 grant-free (GF) and grant-based (GB) users to share the same resource bl…
284 thereby balancing the connectivity and stability of communications. This…
285 analyzes ergodic rates of Semi-GF NOMA systems. First, this paper exploi…
286 Semi-GF protocol, denoted as dynamic protocol, for selecting GF users in…
287 occupied GB channels via the GB user&apos;s instantaneous received power…
288 protocol, the closed-form analytical and approximated expressions for er…
289 rates are derived. The numerical results illustrate that the GF user (we…
290 user) has a performance upper limit, while the ergodic rate of the GB us…
291 (strong NOMA user) increases linearly versus the transmit signal-to-noise
292 ratio.
293 &lt;/p&gt;
294 </description>
295 </item>
296 <item>
297 <title>Slicing a single wireless collision channel among throughput- and…
298 <link>http://fr.arxiv.org/abs/2010.15171</link>
299 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
300
301 &lt;p&gt;The fifth generation (5G) wireless system has a platform-driven…
302 aiming to support heterogeneous connections with very diverse requiremen…
303 shared wireless resources should be sliced in a way that each user perce…
304 that its requirement has been met. Heterogeneity challenges the traditio…
305 notion of resource efficiency, as the resource usage has cater for, e.g.…
306 maximization for one user and timeliness requirement for another user. T…
307 paper treats a model for radio access network (RAN) uplink, where a
308 throughput-demanding broadband user shares wireless resources with an
309 intermittently active user that wants to optimize the timeliness, expres…
310 terms of latency-reliability or Age of Information (AoI). We evaluate the
311 trade-offs between throughput and timeliness for Orthogonal Multiple Acc…
312 (OMA) as well as Non-Orthogonal Multiple Access (NOMA) with successive
313 interference cancellation (SIC). We observe that NOMA with SIC, in a
314 conservative scenario with destructive collisions, is just slightly infe…
315 that of OMA, which indicates that it may offer significant benefits in
316 practical deployments where the capture effect is frequently encountered…
317 the other hand, finding the optimal configuration of NOMA with SIC depen…
318 the activity pattern of the intermittent user, to which OMA is insensiti…
319 &lt;/p&gt;
320 </description>
321 </item>
322 <item>
323 <title>Improving Perceptual Quality by Phone-Fortified Perceptual Loss f…
324 <link>http://fr.arxiv.org/abs/2010.15174</link>
325 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
326
327 &lt;p&gt;Speech enhancement (SE) aims to improve speech quality and inte…
328 which are both related to a smooth transition in speech segments that ma…
329 linguistic information, e.g. phones and syllables. In this study, we took
330 phonetic characteristics into account in the SE training process. Hence,…
331 designed a phone-fortified perceptual (PFP) loss, and the training of ou…
332 model was guided by PFP loss. In PFP loss, phonetic characteristics are
333 extracted by wav2vec, an unsupervised learning model based on the contra…
334 predictive coding (CPC) criterion. Different from previous deep-feature-…
335 approaches, the proposed approach explicitly uses the phonetic informati…
336 the deep feature extraction process to guide the SE model training. To t…
337 proposed approach, we first confirmed that the wav2vec representations c…
338 clear phonetic information using a t-distributed stochastic neighbor emb…
339 (t-SNE) analysis. Next, we observed that the proposed PFP loss was more
340 strongly correlated with the perceptual evaluation metrics than point-wi…
341 signal-level losses, thus achieving higher scores for standardized quali…
342 intelligibility evaluation metrics in the Voice Bank--DEMAND dataset.
343 &lt;/p&gt;
344 </description>
345 </item>
346 <item>
347 <title>A Study on Efficiency in Continual Learning Inspired by Human Lea…
348 <link>http://fr.arxiv.org/abs/2010.15187</link>
349 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
350
351 &lt;p&gt;Humans are efficient continual learning systems; we continually…
352 skills from birth with finite cells and resources. Our learning is highly
353 optimized both in terms of capacity and time while not suffering from
354 catastrophic forgetting. In this work we study the efficiency of continu…
355 learning systems, taking inspiration from human learning. In particular,
356 inspired by the mechanisms of sleep, we evaluate popular pruning-based
357 continual learning algorithms, using PackNet as a case study. First, we
358 identify that weight freezing, which is used in continual learning witho…
359 biological justification, can result in over $2\times$ as many weights b…
360 used for a given level of performance. Secondly, we note the similarity …
361 human day and night time behaviors to the training and pruning phases
362 respectively of PackNet. We study a setting where the pruning phase is g…
363 time budget, and identify connections between iterative pruning and mult…
364 sleep cycles in humans. We show there exists an optimal choice of iterat…
365 v.s. epochs given different tasks.
366 &lt;/p&gt;
367 </description>
368 </item>
369 <item>
370 <title>Explicit stabilized multirate method for stiff stochastic differe…
371 <link>http://fr.arxiv.org/abs/2010.15193</link>
372 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
373
374 &lt;p&gt;Stabilized explicit methods are particularly efficient for larg…
375 stiff stochastic differential equations (SDEs) due to their extended sta…
376 domain. However, they loose their efficiency when a severe stiffness is …
377 by very few &quot;fast&quot; degrees of freedom, as the stiff and nonsti…
378 evaluated concurrently. Therefore, inspired by [A. Abdulle, M. J. Grote,…
379 Rosilho de Souza, Preprint (2020), &lt;a href=&quot;/abs/2006.00744&quot…
380 modified equation whose stiffness depends solely on the &quot;slow&quot;…
381 integrating this modified equation with a stabilized explicit scheme we …
382 a multirate method which overcomes the bottleneck caused by a few severe…
383 stiff terms and recovers the efficiency of stabilized schemes for large …
384 of nonlinear SDEs. The scheme is not based on any scale separation assum…
385 of the SDE and therefore it is employable for problems stemming from the
386 spatial discretization of stochastic parabolic partial differential equa…
387 on locally refined grids. The multirate scheme has strong order 1/2, wea…
388 1 and its stability is proved on a model problem. Numerical experiments …
389 the efficiency and accuracy of the scheme.
390 &lt;/p&gt;
391 </description>
392 </item>
393 <item>
394 <title>Reinforcement Learning for Sparse-Reward Object-Interaction Tasks…
395 <link>http://fr.arxiv.org/abs/2010.15195</link>
396 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
397
398 &lt;p&gt;First-person object-interaction tasks in high-fidelity, 3D, sim…
399 environments such as the AI2Thor virtual home-environment pose significa…
400 sample-efficiency challenges for reinforcement learning (RL) agents lear…
401 from sparse task rewards. To alleviate these challenges, prior work has
402 provided extensive supervision via a combination of reward-shaping,
403 ground-truth object-information, and expert demonstrations. In this work…
404 show that one can learn object-interaction tasks from scratch without
405 supervision by learning an attentive object-model as an auxiliary task d…
406 task learning with an object-centric relational RL agent. Our key insigh…
407 that learning an object-model that incorporates object-attention into fo…
408 prediction provides a dense learning signal for unsupervised representat…
409 learning of both objects and their relationships. This, in turn, enables…
410 policy learning for an object-centric relational RL agent. We demonstrat…
411 agent by introducing a set of challenging object-interaction tasks in the
412 AI2Thor environment where learning with our attentive object-model is ke…
413 strong performance. Specifically, we compare our agent and relational RL…
414 with alternative auxiliary tasks to a relational RL agent equipped with
415 ground-truth object-information, and show that learning with our object-…
416 best closes the performance gap in terms of both learning speed and maxi…
417 success rate. Additionally, we find that incorporating object-attention …
418 object-model&apos;s forward predictions is key to learning representatio…
419 capture object-category and object-state.
420 &lt;/p&gt;
421 </description>
422 </item>
423 <item>
424 <title>A fast and scalable computational framework for large-scale and h…
425 <link>http://fr.arxiv.org/abs/2010.15196</link>
426 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
427
428 &lt;p&gt;We develop a fast and scalable computational framework to solve…
429 and high-dimensional Bayesian optimal experimental design problems. In
430 particular, we consider the problem of optimal observation sensor placem…
431 Bayesian inference of high-dimensional parameters governed by partial
432 differential equations (PDEs), which is formulated as an optimization pr…
433 that seeks to maximize an expected information gain (EIG). Such optimiza…
434 problems are particularly challenging due to the curse of dimensionality…
435 high-dimensional parameters and the expensive solution of large-scale PD…
436 address these challenges, we exploit two essential properties of such pr…
437 the low-rank structure of the Jacobian of the parameter-to-observable ma…
438 extract the intrinsically low-dimensional data-informed subspace, and th…
439 correlation of the approximate EIGs by a series of approximations to red…
440 number of PDE solves. We propose an efficient offline-online decompositi…
441 the optimization problem: an offline stage of computing all the quantiti…
442 require a limited number of PDE solves independent of parameter and data
443 dimensions, and an online stage of optimizing sensor placement that does…
444 require any PDE solve. For the online optimization, we propose a swapping
445 greedy algorithm that first construct an initial set of sensors using le…
446 scores and then swap the chosen sensors with other candidates until cert…
447 convergence criteria are met. We demonstrate the efficiency and scalabil…
448 the proposed computational framework by a linear inverse problem of infe…
449 the initial condition for an advection-diffusion equation, and a nonline…
450 inverse problem of inferring the diffusion coefficient of a log-normal
451 diffusion equation, with both the parameter and data dimensions ranging …
452 few tens to a few thousands.
453 &lt;/p&gt;
454 </description>
455 </item>
456 <item>
457 <title>Forecasting Hamiltonian dynamics without canonical coordinates. (…
458 <link>http://fr.arxiv.org/abs/2010.15201</link>
459 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
460
461 &lt;p&gt;Conventional neural networks are universal function approximato…
462 because they are unaware of underlying symmetries or physical laws, they…
463 need impractically many training data to approximate nonlinear dynamics.
464 Recently introduced Hamiltonian neural networks can efficiently learn and
465 forecast dynamical systems that conserve energy, but they require special
466 inputs called canonical coordinates, which may be hard to infer from dat…
467 we significantly expand the scope of such networks by demonstrating a si…
468 way to train them with any set of generalised coordinates, including eas…
469 observable ones.
470 &lt;/p&gt;
471 </description>
472 </item>
473 <item>
474 <title>Micromobility in Smart Cities: A Closer Look at Shared Dockless E…
475 <link>http://fr.arxiv.org/abs/2010.15203</link>
476 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
477
478 &lt;p&gt;The micromobility is shaping first- and last-mile travels in ur…
479 Recently, shared dockless electric scooters (e-scooters) have emerged as…
480 daily alternative to driving for short-distance commuters in large citie…
481 to the affordability, easy accessibility via an app, and zero emissions.
482 Meanwhile, e-scooters come with challenges in city management, such as t…
483 rules, public safety, parking regulations, and liability issues. In this…
484 we collected and investigated 5.8 million scooter-tagged tweets and 144,…
485 images, generated by 2.7 million users from October 2018 to March 2020, …
486 a closer look at shared e-scooters via crowdsourcing data analytics. We
487 profiled e-scooter usages from spatial-temporal perspectives, explored
488 different business roles (i.e., riders, gig workers, and ridesharing
489 companies), examined operation patterns (e.g., injury types, and parking
490 behaviors), and conducted sentiment analysis. To our best knowledge, thi…
491 is the first large-scale systematic study on shared e-scooters using big…
492 data.
493 &lt;/p&gt;
494 </description>
495 </item>
496 <item>
497 <title>Rosella: A Self-Driving Distributed Scheduler for Heterogeneous C…
498 <link>http://fr.arxiv.org/abs/2010.15206</link>
499 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
500
501 &lt;p&gt;Large-scale interactive web services and advanced AI applicatio…
502 sophisticated decisions in real-time, based on executing a massive amoun…
503 computation tasks on thousands of servers. Task schedulers, which often …
504 in heterogeneous and volatile environments, require high throughput, i.e…
505 scheduling millions of tasks per second, and low latency, i.e., incurring
506 minimal scheduling delays for millisecond-level tasks. Scheduling is fur…
507 complicated by other users&apos; workloads in a shared system, other bac…
508 activities, and the diverse hardware configurations inside datacenters.
509 &lt;/p&gt;
510 &lt;p&gt;We present Rosella, a new self-driving, distributed approach fo…
511 scheduling in heterogeneous clusters. Our system automatically learns the
512 compute environment and adjust its scheduling policy in real-time. The s…
513 provides high throughput and low latency simultaneously, because it runs…
514 parallel on multiple machines with minimum coordination and only performs
515 simple operations for each scheduling decision. Our learning module moni…
516 total system load, and uses the information to dynamically determine opt…
517 estimation strategy for the backends&apos; compute-power. Our scheduling…
518 generalizes power-of-two-choice algorithms to handle heterogeneous worke…
519 reducing the max queue length of $O(\log n)$ obtained by prior algorithm…
520 $O(\log \log n)$. We implement a Rosella prototype and evaluate it with a
521 variety of workloads. Experimental results show that Rosella significant…
522 reduces task response times, and adapts to environment changes quickly.
523 &lt;/p&gt;
524 </description>
525 </item>
526 <item>
527 <title>Ground Roll Suppression using Convolutional Neural Networks. (arX…
528 <link>http://fr.arxiv.org/abs/2010.15209</link>
529 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
530
531 &lt;p&gt;Seismic data processing plays a major role in seismic explorati…
532 conditions much of the seismic interpretation performance. In this conte…
533 generating reliable post-stack seismic data depends also on disposing of…
534 efficient pre-stack noise attenuation tool. Here we tackle ground roll n…
535 one of the most challenging and common noises observed in pre-stack seis…
536 data. Since ground roll is characterized by relative low frequencies and…
537 amplitudes, most commonly used approaches for its suppression are based …
538 frequency-amplitude filters for ground roll characteristic bands. Howeve…
539 signal and noise share the same frequency ranges, these methods usually …
540 also signal suppression or residual noise. In this paper we take advanta…
541 the highly non-linear features of convolutional neural networks, and pro…
542 use different architectures to detect ground roll in shot gathers and
543 ultimately to suppress them using conditional generative adversarial net…
544 Additionally, we propose metrics to evaluate ground roll suppression, and
545 report strong results compared to expert filtering. Finally, we discuss
546 generalization of trained models for similar and different geologies to …
547 understand the feasibility of our proposal in real applications.
548 &lt;/p&gt;
549 </description>
550 </item>
551 <item>
552 <title>On Linearizability and the Termination of Randomized Algorithms. …
553 <link>http://fr.arxiv.org/abs/2010.15210</link>
554 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
555
556 &lt;p&gt;We study the question of whether the &quot;termination with pro…
557 property of a randomized algorithm is preserved when one replaces the at…
558 registers that the algorithm uses with linearizable (implementations of)
559 registers. We show that in general this is not so: roughly speaking, eve…
560 randomized algorithm A has a corresponding algorithm A&apos; that solves…
561 problem if the registers that it uses are atomic or strongly-linearizabl…
562 does not terminate if these registers are replaced with &quot;merely&quo…
563 ones. Together with a previous result shown in [15], this implies that o…
564 cannot use the well-known ABD implementation of registers in message-pas…
565 systems to automatically transform any randomized algorithm that works in
566 shared-memory systems into a randomized algorithm that works in message-…
567 systems: with a strong adversary the resulting algorithm may not termina…
568 &lt;/p&gt;
569 </description>
570 </item>
571 <item>
572 <title>Safety-Aware Cascade Controller Tuning Using Constrained Bayesian…
573 <link>http://fr.arxiv.org/abs/2010.15211</link>
574 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
575
576 &lt;p&gt;This paper presents an automated, model-free, data-driven metho…
577 tuning of PID cascade controller gains based on Bayesian optimization. T…
578 optimization objective is composed of data-driven performance metrics and
579 modeled using Gaussian processes. We further introduce a data-driven con…
580 that captures the stability requirements from system data. Numerical eva…
581 shows that the proposed approach outperforms relay feedback autotuning a…
582 quickly converges to the global optimum, thanks to a tailored stopping
583 criterion. We demonstrate the performance of the method in simulations a…
584 experiments on a linear axis drive of a grinding machine. For experiment…
585 implementation, in addition to the introduced safety constraint, we inte…
586 method for automatic detection of the critical gains and extend the
587 optimization objective with a penalty depending on the proximity of the …
588 candidate points to the critical gains. The resulting automated tuning m…
589 optimizes system performance while ensuring stability and standardizatio…
590 &lt;/p&gt;
591 </description>
592 </item>
593 <item>
594 <title>Away from Trolley Problems and Toward Risk Management. (arXiv:201…
595 <link>http://fr.arxiv.org/abs/2010.15217</link>
596 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
597
598 &lt;p&gt;As automated vehicles receive more attention from the media, th…
599 an equivalent increase in the coverage of the ethical choices a vehicle …
600 forced to make in certain crash situations with no clear safe outcome. M…
601 this coverage has focused on a philosophical thought experiment known as…
602 &quot;trolley problem,&quot; and substituting an automated vehicle for t…
603 the car&apos;s software for the bystander. While this is a stark and str…
604 example of ethical decision making for an automated vehicle, it risks
605 marginalizing the entire field if it is to become the only ethical probl…
606 the public&apos;s mind. In this chapter, I discuss the shortcomings of t…
607 problem, and introduce more nuanced examples that involve crash risk and
608 uncertainty. Risk management is introduced as an alternative approach, a…
609 ethical dimensions are discussed.
610 &lt;/p&gt;
611 </description>
612 </item>
613 <item>
614 <title>StencilFlow: Mapping Large Stencil Programs to Distributed Spatia…
615 <link>http://fr.arxiv.org/abs/2010.15218</link>
616 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
617
618 &lt;p&gt;Spatial computing devices have been shown to significantly acce…
619 computations, but have so far relied on unrolling the iterative dimensio…
620 single stencil operation to increase temporal locality. This work consid…
621 general case of mapping directed acyclic graphs of heterogeneous stencil
622 computations to spatial computing systems, assuming large input programs
623 without an iterative component. StencilFlow maximizes temporal locality …
624 ensures deadlock freedom in this setting, providing end-to-end analysis …
625 mapping from a high-level program description to distributed hardware. We
626 evaluate the generated architectures on an FPGA testbed, demonstrating t…
627 highest single-device and multi-device performance recorded for stencil
628 programs on FPGAs to date, then leverage the framework to study a complex
629 stencil program from a production weather simulation application. Our wo…
630 enables productively targeting distributed spatial computing systems wit…
631 stencil programs, and offers insight into architecture characteristics r…
632 for their efficient execution in practice.
633 &lt;/p&gt;
634 </description>
635 </item>
636 <item>
637 <title>Geometric Sampling of Networks. (arXiv:2010.15221v1 [math.DG])</t…
638 <link>http://fr.arxiv.org/abs/2010.15221</link>
639 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
640
641 &lt;p&gt;Motivated by the methods and results of manifold sampling based…
642 curvature, we propose a similar approach for networks. To this end we ma…
643 appeal to three types of discrete curvature, namely the graph Forman-, f…
644 Forman- and Haantjes-Ricci curvatures for edge-based and node-based samp…
645 We present the results of experiments on real life networks, as well as …
646 square grids arising in Image Processing. Moreover, we consider fitting …
647 flows and we employ them for the detection of networks&apos; backbone. W…
648 develop embedding kernels related to the Forman-Ricci curvatures and emp…
649 them for the detection of the coarse structure of networks, as well as f…
650 network visualization with applications to SVM. The relation between the…
651 curvature of the original manifold and that of a Ricci curvature driven
652 discretization is also studied.
653 &lt;/p&gt;
654 </description>
655 </item>
656 <item>
657 <title>Exploring complex networks with the ICON R package. (arXiv:2010.1…
658 <link>http://fr.arxiv.org/abs/2010.15222</link>
659 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
660
661 &lt;p&gt;We introduce ICON, an R package that contains 1075 complex netw…
662 in a standard edgelist format. All provided datasets have associated cit…
663 and have been indexed by the Colorado Index of Complex Networks - also r…
664 to as ICON. In addition to supplying a large and diverse corpus of useful
665 real-world networks, ICON also implements an S3 generic to work with the
666 network and ggnetwork R packages for network analysis and visualization,
667 respectively. Sample code in this report also demonstrates how ICON can …
668 in conjunction with the igraph package. Currently, the Comprehensive R A…
669 Network hosts ICON v0.4.0. We hope that ICON will serve as a standard co…
670 for complex network research and prevent redundant work that would be ot…
671 necessary by individual research groups. The open source code for ICON a…
672 this reproducible report can be found at https://github.com/rrrlw/ICON.
673 &lt;/p&gt;
674 </description>
675 </item>
676 <item>
677 <title>A Visuospatial Dataset for Naturalistic Verb Learning. (arXiv:201…
678 <link>http://fr.arxiv.org/abs/2010.15225</link>
679 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
680
681 &lt;p&gt;We introduce a new dataset for training and evaluating grounded…
682 models. Our data is collected within a virtual reality environment and is
683 designed to emulate the quality of language data to which a pre-verbal c…
684 likely to have access: That is, naturalistic, spontaneous speech paired …
685 richly grounded visuospatial context. We use the collected data to compa…
686 several distributional semantics models for verb learning. We evaluate n…
687 models based on 2D (pixel) features as well as feature-engineered models…
688 on 3D (symbolic, spatial) features, and show that neither modeling appro…
689 achieves satisfactory performance. Our results are consistent with evide…
690 from child language acquisition that emphasizes the difficulty of learni…
691 verbs from naive distributional data. We discuss avenues for future work…
692 cognitively-inspired grounded language learning, and release our corpus …
693 the intent of facilitating research on the topic.
694 &lt;/p&gt;
695 </description>
696 </item>
697 <item>
698 <title>Speech-Based Emotion Recognition using Neural Networks and Inform…
699 <link>http://fr.arxiv.org/abs/2010.15229</link>
700 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
701
702 &lt;p&gt;Emotions recognition is commonly employed for health assessment…
703 typical metric for evaluation in therapy is based on patient-doctor appr…
704 This process can fall into the issue of subjectivity, while also requiri…
705 healthcare professionals to deal with copious amounts of information. Th…
706 machine learning algorithms can be a useful tool for the classification …
707 emotions. While several models have been developed in this domain, there…
708 lack of userfriendly representations of the emotion classification syste…
709 therapy. We propose a tool which enables users to take speech samples and
710 identify a range of emotions (happy, sad, angry, surprised, neutral, cla…
711 disgust, and fear) from audio elements through a machine learning model.…
712 dashboard is designed based on local therapists&apos; needs for intuitive
713 representations of speech data in order to gain insights and informative
714 analyses of their sessions with their patients.
715 &lt;/p&gt;
716 </description>
717 </item>
718 <item>
719 <title>Construction Payment Automation Using Blockchain-Enabled Smart Co…
720 <link>http://fr.arxiv.org/abs/2010.15232</link>
721 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
722
723 &lt;p&gt;This paper presents a smart contract-based solution for autonom…
724 administration of construction progress payments. It bridges the gap bet…
725 payments (cash flow) and the progress assessments at job sites (product …
726 enabled by reality capture technologies and building information modeling
727 (BIM). The approach eliminates the reliance on the centralized and heavi…
728 intermediated mechanisms of existing payment applications. The construct…
729 progress is stored in a distributed manner using content addressable file
730 sharing; it is broadcasted to a smart contract which automates the on-ch…
731 payment settlements and the transfer of lien rights. The method was
732 successfully used for processing payments to 7 subcontractors in two com…
733 construction projects where progress monitoring was performed using a
734 camera-equipped unmanned aerial vehicle (UAV) and an unmanned ground veh…
735 (UGV) equipped with a laser scanner. The results show promise for the me…
736 potential for increasing the frequency, granularity, and transparency of
737 payments. The paper is concluded with a discussion of implications for p…
738 management, introducing a new model of project as a singleton state mach…
739 &lt;/p&gt;
740 </description>
741 </item>
742 <item>
743 <title>Accurate Prostate Cancer Detection and Segmentation on Biparametr…
744 <link>http://fr.arxiv.org/abs/2010.15233</link>
745 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
746
747 &lt;p&gt;Purpose: We aimed to develop deep machine learning (DL) models …
748 detection and segmentation of intraprostatic lesions (IL) on bp-MRI by u…
749 whole amount prostatectomy specimen-based delineations. We also aimed to
750 investigate whether transfer learning and self-training would improve re…
751 with small amount labelled data.
752 &lt;/p&gt;
753 &lt;p&gt;Methods: 158 patients had suspicious lesions delineated on MRI …
754 bp-MRI, 64 patients had ILs delineated on MRI based on whole mount
755 prostatectomy specimen sections, 40 patients were unlabelled. A non-loca…
756 R-CNN was proposed to improve the segmentation accuracy. Transfer learni…
757 investigated by fine-tuning a model trained using MRI-based delineations…
758 prostatectomy-based delineations. Two label selection strategies were
759 investigated in self-training. The performance of models was evaluated b…
760 detection rate, dice similarity coefficient (DSC), 95 percentile Hausdra…
761 HD, mm) and true positive ratio (TPR).
762 &lt;/p&gt;
763 &lt;p&gt;Results: With prostatectomy-based delineations, the non-local M…
764 fine-tuning and self-training significantly improved all evaluation metr…
765 For the model with the highest detection rate and DSC, 80.5% (33/41) of …
766 in all Gleason Grade Groups (GGG) were detected with DSC of 0.548[0.165]…
767 of 5.72[3.17] and TPR of 0.613[0.193]. Among them, 94.7% (18/19) of lesi…
768 with GGG &amp;gt; 2 were detected with DSC of 0.604[0.135], 95 HD of 6.2…
769 TPR of 0.580[0.190].
770 &lt;/p&gt;
771 &lt;p&gt;Conclusion: DL models can achieve high prostate cancer detectio…
772 segmentation accuracy on bp-MRI based on annotations from histologic ima…
773 further improve the performance, more data with annotations of both MRI …
774 whole amount prostatectomy specimens are required.
775 &lt;/p&gt;
776 </description>
777 </item>
778 <item>
779 <title>Linear Regression Games: Convergence Guarantees to Approximate Ou…
780 <link>http://fr.arxiv.org/abs/2010.15234</link>
781 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
782
783 &lt;p&gt;Recently, invariant risk minimization (IRM) (Arjovsky et al.) w…
784 a promising solution to address out-of-distribution (OOD) generalization…
785 Ahuja et al., it was shown that solving for the Nash equilibria of a new…
786 of &quot;ensemble-games&quot; is equivalent to solving IRM. In this work…
787 framework in Ahuja et al. for linear regressions by projecting the
788 ensemble-game on an $\ell_{\infty}$ ball. We show that such projections …
789 achieve non-trivial OOD guarantees despite not achieving perfect invaria…
790 For linear models with confounders, we prove that Nash equilibria of the…
791 games are closer to the ideal OOD solutions than the standard empirical …
792 minimization (ERM) and we also provide learning algorithms that provably
793 converge to these Nash Equilibria. Empirical comparisons of the proposed
794 approach with the state-of-the-art show consistent gains in achieving OOD
795 solutions in several settings involving anti-causal variables and confou…
796 &lt;/p&gt;
797 </description>
798 </item>
799 <item>
800 <title>SD-Access: Practical Experiences in Designing and Deploying Softw…
801 <link>http://fr.arxiv.org/abs/2010.15236</link>
802 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
803
804 &lt;p&gt;Enterprise Networks, over the years, have become more and more …
805 to keep up with new requirements that challenge traditional solutions. J…
806 mention one out of many possible examples, technologies such as Virtual …
807 (VLANs) struggle to address the scalability and operational requirements
808 introduced by Internet of Things (IoT) use cases. To keep up with these
809 challenges we have identified four main requirements that are common acr…
810 modern enterprise networks: (i) scalable mobility, (ii) endpoint segment…
811 (iii) simplified administration, and (iv) resource optimization. To addr…
812 these challenges we designed SDA (Software Defined Access), a solution f…
813 modern enterprise networks that leverages Software-Defined Networking (S…
814 other state of the art techniques. In this paper we present the design,
815 implementation and evaluation of SDA. Specifically, SDA: (i) leverages a
816 combination of an overlay approach with an event-driven protocol (LISP) …
817 dynamically adapt to traffic and mobility patterns while preserving reso…
818 and (ii) enforces dynamic endpoint groups for scalable segmentation with…
819 operational burden. We present our experience with deploying SDA in two
820 real-life scenarios: an enterprise campus, and a large warehouse with mo…
821 robots. Our evaluation shows that SDA, when compared with traditional
822 enterprise networks, can (i) reduce overall data plane forwarding state …
823 70% thanks to a reactive protocol using a centralized routing server, an…
824 reduce by an order of magnitude the handover delays in scenarios of mass…
825 mobility with respect to other approaches. Finally, we discuss lessons l…
826 while deploying and operating SDA, and possible optimizations regarding …
827 of an event-driven protocol and group-based segmentation.
828 &lt;/p&gt;
829 </description>
830 </item>
831 <item>
832 <title>Bandit Policies for Reliable Cellular Network Handovers in Extrem…
833 <link>http://fr.arxiv.org/abs/2010.15237</link>
834 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
835
836 &lt;p&gt;The demand for seamless Internet access under extreme user mobi…
837 on high-speed trains and vehicles, has become a norm rather than an exce…
838 However, the 4G/5G mobile network is not always reliable to meet this de…
839 with non-negligible failures during the handover between base stations. A
840 fundamental challenge of reliability is to balance the exploration of mo…
841 measurements for satisfactory handover, and exploitation for timely hand…
842 (before the fast-moving user leaves the serving base station&apos;s radi…
843 This paper formulates this trade-off in extreme mobility as a compositio…
844 two distinct multi-armed bandit problems. We propose Bandit and Threshold
845 Tuning (BATT) to minimize the regret of handover failures in extreme mob…
846 BATT uses $\epsilon$-binary-search to optimize the threshold of the serv…
847 cell&apos;s signal strength to initiate the handover procedure with
848 $\mathcal{O}(\log J \log T)$ regret.It further devises opportunistic Tho…
849 sampling, which optimizes the sequence of the target cells to measure for
850 reliable handover with $\mathcal{O}(\log T)$ regret.Our experiment over …
851 LTE dataset from Chinese high-speed rails validates significant regret
852 reduction and a 29.1% handover failure reduction.
853 &lt;/p&gt;
854 </description>
855 </item>
856 <item>
857 <title>Cloud-Based Dynamic Programming for an Electric City Bus Energy M…
858 <link>http://fr.arxiv.org/abs/2010.15239</link>
859 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
860
861 &lt;p&gt;Electric city bus gains popularity in recent years for its low …
862 emission, low noise level, etc. Different from a passenger car, the weig…
863 city bus varies significantly with different amounts of onboard passenge…
864 which is not well studied in existing literature. This study proposes a
865 passenger load prediction model using day-of-week, time-of-day, weather,
866 temperatures, wind levels, and holiday information as inputs. The average
867 model, Regression Tree, Gradient Boost Decision Tree, and Neural Networks
868 models are compared in the passenger load prediction. The Gradient Boost
869 Decision Tree model is selected due to its best accuracy and high stabil…
870 Given the predicted passenger load, dynamic programming algorithm determ…
871 the optimal power demand for supercapacitor and battery by optimizing the
872 battery aging and energy usage in the cloud. Then rule extraction is con…
873 on dynamic programming results, and the rule is real-time loaded to onbo…
874 controllers of vehicles. The proposed cloud-based dynamic programming an…
875 extraction framework with the passenger load prediction shows 4% and 11%…
876 bus operating costs in off-peak and peak hours, respectively. The operat…
877 cost by the proposed framework is less than 1% shy of the dynamic progra…
878 with the true passenger load information.
879 &lt;/p&gt;
880 </description>
881 </item>
882 <item>
883 <title>Test Set Optimization by Machine Learning Algorithms. (arXiv:2010…
884 <link>http://fr.arxiv.org/abs/2010.15240</link>
885 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
886
887 &lt;p&gt;Diagnosis results are highly dependent on the volume of test se…
888 the most efficient test set, we propose several machine learning based m…
889 to predict the minimum amount of test data that produces relatively accu…
890 diagnosis. By collecting outputs from failing circuits, the feature matr…
891 label vector are generated, which involves the inference information of …
892 test termination point. Thus we develop a prediction model to fit the da…
893 determine when to terminate testing. The considered methods include LASS…
894 Support Vector Machine(SVM) where the relationship between goals(label) …
895 predictors(feature matrix) are considered to be linear in LASSO and nonl…
896 in SVM. Numerical results show that SVM reaches a diagnosis accuracy of …
897 while deducting the volume of test set by 35.24%.
898 &lt;/p&gt;
899 </description>
900 </item>
901 <item>
902 <title>A marine radioisotope gamma-ray spectrum analysis method based on…
903 <link>http://fr.arxiv.org/abs/2010.15245</link>
904 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
905
906 &lt;p&gt;A multilayer perceptron (MLP) neural network is built to analyz…
907 concentration in seawater via gamma-ray spectrums measured by a LaBr3 de…
908 The MLP is trained and tested by a large data set generated by combining
909 measured and Monte Carlo simulated spectrums under the assumption that a…
910 measured spectrums have 0 Cs-137 concentration. And the performance of M…
911 evaluated and compared with the traditional net-peak area method. The re…
912 show an improvement of 7% in accuracy and 0.036 in the ROC-curve area co…
913 to those of the net peak area method. And the influence of the assumptio…
914 Cs-137 concentration in the training data set on the classifying perform…
915 MLP is evaluated.
916 &lt;/p&gt;
917 </description>
918 </item>
919 <item>
920 <title>Semantic video segmentation for autonomous driving. (arXiv:2010.1…
921 <link>http://fr.arxiv.org/abs/2010.15250</link>
922 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
923
924 &lt;p&gt;We aim to solve semantic video segmentation in autonomous drivi…
925 road detection in real time video, using techniques discussed in (Shelha…
926 al., 2016a). While fully convolutional network gives good result, we sho…
927 the speed can be halved while preserving the accuracy. The test dataset …
928 used is KITTI, which consists of real footage from Germany&apos;s street…
929 &lt;/p&gt;
930 </description>
931 </item>
932 <item>
933 <title>Fusion Models for Improved Visual Captioning. (arXiv:2010.15251v1…
934 <link>http://fr.arxiv.org/abs/2010.15251</link>
935 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
936
937 &lt;p&gt;Visual captioning aims to generate textual descriptions given i…
938 Traditionally, the captioning models are trained on human annotated data…
939 such as Flickr30k and MS-COCO, which are limited in size and diversity. …
940 limitation hinders the generalization capabilities of these models while…
941 rendering them to often make mistakes. Language models can, however, be …
942 on vast amounts of freely available unlabelled data and have recently em…
943 as successful language encoders and coherent text generators. Meanwhile,
944 several unimodal and multimodal fusion techniques have been proven to wo…
945 for natural language generation and automatic speech recognition. Buildi…
946 these recent developments, and with an aim of improving the quality of
947 generated captions, the contribution of our work in this paper is two-fo…
948 First, we propose a generic multimodal model fusion framework for caption
949 generation as well as emendation where we utilize different fusion strat…
950 to integrate a pretrained Auxiliary Language Model (AuxLM) within the
951 traditional encoder-decoder visual captioning frameworks. Next, we emplo…
952 same fusion strategies to integrate a pretrained Masked Language Model (…
953 namely BERT, with a visual captioning model, viz. Show, Attend, and Tell…
954 emending both syntactic and semantic errors in captions. Our caption eme…
955 experiments on three benchmark image captioning datasets, viz. Flickr8k,
956 Flickr30k, and MSCOCO, show improvements over the baseline, indicating t…
957 usefulness of our proposed multimodal fusion strategies. Further, we per…
958 preliminary qualitative analysis on the emended captions and identify er…
959 categories based on the type of corrections.
960 &lt;/p&gt;
961 </description>
962 </item>
963 <item>
964 <title>Model Minimization For Online Predictability. (arXiv:2010.15255v1…
965 <link>http://fr.arxiv.org/abs/2010.15255</link>
966 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
967
968 &lt;p&gt;For humans in a teaming scenario, context switching between rea…
969 teammate&apos;s behavior and thinking about thier own task can slow us d…
970 especially if the cognitive cost of predicting the teammate&apos;s actio…
971 So if we can make the prediction of a robot-teammate&apos;s actions quic…
972 the human can be more productive. In this paper we present an approach to
973 constrain the actions of a robot so as to increase predictability (speci…
974 online predictability) while keeping the plan costs of the robot within
975 acceptable limits. Existing works on human-robot interaction do not cons…
976 the computational cost for predictability, which we consider in our appr…
977 We approach this problem from the perspective of directed graph minimiza…
978 and we connect the concept of predictability to the out-degree of vertic…
979 present an algorithm to minimize graphs for predictability, and contrast…
980 with minimization for legibility (goal inference) and optimality.
981 &lt;/p&gt;
982 </description>
983 </item>
984 <item>
985 <title>DNSMOS: A Non-Intrusive Perceptual Objective Speech Quality metri…
986 <link>http://fr.arxiv.org/abs/2010.15258</link>
987 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
988
989 &lt;p&gt;Human subjective evaluation is the gold standard to evaluate sp…
990 optimized for human perception. Perceptual objective metrics serve as a …
991 for subjective scores. The conventional and widely used metrics require a
992 reference clean speech signal, which is unavailable in real recordings. …
993 no-reference approaches correlate poorly with human ratings and are not …
994 adopted in the research community. One of the biggest use cases of these
995 perceptual objective metrics is to evaluate noise suppression algorithms…
996 paper introduces a multi-stage self-teaching based perceptual objective …
997 that is designed to evaluate noise suppressors. The proposed method gene…
998 well in challenging test conditions with a high correlation to human rat…
999 &lt;/p&gt;
1000 </description>
1001 </item>
1002 <item>
1003 <title>Object sieving and morphological closing to reduce false detectio…
1004 <link>http://fr.arxiv.org/abs/2010.15260</link>
1005 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1006
1007 &lt;p&gt;For object detection in wide-area aerial imagery, post-processi…
1008 needed to reduce false detections. We propose a two-stage post-processing
1009 scheme which comprises an area-thresholding sieving process and a morpho…
1010 closing operation. We use two wide-area aerial videos to compare the
1011 performance of five object detection algorithms in the absence and in the
1012 presence of our post-processing scheme. The automatic detection results …
1013 compared with the ground-truth objects. Several metrics are used for
1014 performance comparison.
1015 &lt;/p&gt;
1016 </description>
1017 </item>
1018 <item>
1019 <title>Deep Shells: Unsupervised Shape Correspondence with Optimal Trans…
1020 <link>http://fr.arxiv.org/abs/2010.15261</link>
1021 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1022
1023 &lt;p&gt;We propose a novel unsupervised learning approach to 3D shape c…
1024 that builds a multiscale matching pipeline into a deep neural network. T…
1025 approach is based on smooth shells, the current state-of-the-art axiomat…
1026 correspondence method, which requires an a priori stochastic search over…
1027 space of initial poses. Our goal is to replace this costly preprocessing…
1028 by directly learning good initializations from the input surfaces. To th…
1029 we systematically derive a fully differentiable, hierarchical matching p…
1030 from entropy regularized optimal transport. This allows us to combine it…
1031 local feature extractor based on smooth, truncated spectral convolution
1032 filters. Finally, we show that the proposed unsupervised method signific…
1033 improves over the state-of-the-art on multiple datasets, even in compari…
1034 the most recent supervised methods. Moreover, we demonstrate compelling
1035 generalization results by applying our learned filters to examples that
1036 significantly deviate from the training set.
1037 &lt;/p&gt;
1038 </description>
1039 </item>
1040 <item>
1041 <title>CopyNext: Explicit Span Copying and Alignment in Sequence to Sequ…
1042 <link>http://fr.arxiv.org/abs/2010.15266</link>
1043 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1044
1045 &lt;p&gt;Copy mechanisms are employed in sequence to sequence models (se…
1046 generate reproductions of words from the input to the output. These fram…
1047 operating at the lexical type level, fail to provide an explicit alignme…
1048 records where each token was copied from. Further, they require contiguo…
1049 token sequences from the input (spans) to be copied individually. We pre…
1050 model with an explicit token-level copy operation and extend it to copyi…
1051 entire spans. Our model provides hard alignments between spans in the in…
1052 output, allowing for nontraditional applications of seq2seq, like inform…
1053 extraction. We demonstrate the approach on Nested Named Entity Recogniti…
1054 achieving near state-of-the-art accuracy with an order of magnitude incr…
1055 decoding speed.
1056 &lt;/p&gt;
1057 </description>
1058 </item>
1059 <item>
1060 <title>Understanding the Pathologies of Approximate Policy Evaluation wh…
1061 <link>http://fr.arxiv.org/abs/2010.15268</link>
1062 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1063
1064 &lt;p&gt;Despite empirical success, the theory of reinforcement learning…
1065 value function approximation remains fundamentally incomplete. Prior wor…
1066 identified a variety of pathological behaviours that arise in RL algorit…
1067 that combine approximate on-policy evaluation and greedification. One pr…
1068 example is policy oscillation, wherein an algorithm may cycle indefinite…
1069 between policies, rather than converging to a fixed point. What is not w…
1070 understood however is the quality of the policies in the region of oscil…
1071 In this paper we present simple examples illustrating that in addition to
1072 policy oscillation and multiple fixed points -- the same basic issue can…
1073 to convergence to the worst possible policy for a given approximation. S…
1074 behaviours can arise when algorithms optimize evaluation accuracy weight…
1075 the distribution of states that occur under the current policy, but gree…
1076 based on the value of states which are rare or nonexistent under this
1077 distribution. This means the values used for greedification are unreliab…
1078 can steer the policy in undesirable directions. Our observation that thi…
1079 lead to the worst possible policy shows that in a general sense such alg…
1080 are unreliable. The existence of such examples helps to narrow the kind …
1081 theoretical guarantees that are possible and the kind of algorithmic ide…
1082 are likely to be helpful. We demonstrate analytically and experimentally…
1083 such pathological behaviours can impact a wide range of RL and dynamic
1084 programming algorithms; such behaviours can arise both with and without
1085 bootstrapping, and with linear function approximation as well as with mo…
1086 complex parameterized functions like neural networks.
1087 &lt;/p&gt;
1088 </description>
1089 </item>
1090 <item>
1091 <title>GloFlow: Global Image Alignment for Creation of Whole Slide Image…
1092 <link>http://fr.arxiv.org/abs/2010.15269</link>
1093 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1094
1095 &lt;p&gt;The application of deep learning to pathology assumes the exist…
1096 digital whole slide images of pathology slides. However, slide digitizat…
1097 bottlenecked by the high cost of precise motor stages in slide scanners …
1098 are needed for position information used for slide stitching. We propose
1099 GloFlow, a two-stage method for creating a whole slide image using optic…
1100 flow-based image registration with global alignment using a computationa…
1101 tractable graph-pruning approach. In the first stage, we train an optica…
1102 predictor to predict pairwise translations between successive video fram…
1103 approximate a stitch. In the second stage, this approximate stitch is us…
1104 create a neighborhood graph to produce a corrected stitch. On a simulated
1105 dataset of video scans of WSIs, we find that our method outperforms known
1106 approaches to slide-stitching, and stitches WSIs resembling those produc…
1107 slide scanners.
1108 &lt;/p&gt;
1109 </description>
1110 </item>
1111 <item>
1112 <title>A globally convergent modified Newton method for the direct minim…
1113 <link>http://fr.arxiv.org/abs/2010.15271</link>
1114 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1115
1116 &lt;p&gt;We propose a fast and robust scheme for the direct minimization…
1117 Ohta-Kawasaki energy that characterizes the microphase separation of dib…
1118 copolymer melts. The scheme employs a globally convergent modified Newton
1119 method with line search which is shown to be mass-conservative,
1120 energy-descending, asymptotically quadratically convergent, and three or…
1121 magnitude more efficient than the commonly-used gradient flow approach. …
1122 regularity and the first-order condition of minimizers are analyzed. A
1123 numerical study of the chemical substrate guided directed self-assembly …
1124 diblock copolymer melts, based on a novel polymer-substrate interaction …
1125 and the proposed scheme, is provided.
1126 &lt;/p&gt;
1127 </description>
1128 </item>
1129 <item>
1130 <title>The distribution of inhibitory neurons in the C. elegans connecto…
1131 <link>http://fr.arxiv.org/abs/2010.15272</link>
1132 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1133
1134 &lt;p&gt;The nervous system of the nematode soil worm Caenorhabditis ele…
1135 remarkable complexity despite the worm&apos;s small size. A general chal…
1136 better understand the relationship between neural organization and neural
1137 activity at the system level, including the functional roles of inhibito…
1138 connections. Here we implemented an abstract simulation model of the C. …
1139 connectome that approximates the neurotransmitter identity of each neuro…
1140 we explored the functional role of these physiological differences for n…
1141 activity. In particular, we created a Hopfield neural network in which a…
1142 the worm&apos;s neurons characterized by inhibitory neurotransmitters ar…
1143 inhibitory outgoing connections. Then, we created a control condition in…
1144 the same number of inhibitory connections are arbitrarily distributed ac…
1145 the network. A comparison of these two conditions revealed that the biol…
1146 distribution of inhibitory connections facilitates the self-optimization…
1147 coordinated neural activity compared with an arbitrary distribution of
1148 inhibitory connections.
1149 &lt;/p&gt;
1150 </description>
1151 </item>
1152 <item>
1153 <title>Representation learning for improved interpretability and classif…
1154 <link>http://fr.arxiv.org/abs/2010.15274</link>
1155 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1156
1157 &lt;p&gt;Despite extensive standardization, diagnostic interviews for me…
1158 disorders encompass substantial subjective judgment. Previous studies ha…
1159 demonstrated that EEG-based neural measures can function as reliable obj…
1160 correlates of depression, or even predictors of depression and its cours…
1161 However, their clinical utility has not been fully realized because of 1…
1162 lack of automated ways to deal with the inherent noise associated with E…
1163 at scale, and 2) the lack of knowledge of which aspects of the EEG signa…
1164 be markers of a clinical disorder. Here we adapt an unsupervised pipelin…
1165 the recent deep representation learning literature to address these prob…
1166 1) learning a disentangled representation using $\beta$-VAE to denoise t…
1167 signal, and 2) extracting interpretable features associated with a spars…
1168 of clinical labels using a Symbol-Concept Association Network (SCAN). We
1169 demonstrate that our method is able to outperform the canonical hand-eng…
1170 baseline classification method on a number of factors, including partici…
1171 age and depression diagnosis. Furthermore, our method recovers a represe…
1172 that can be used to automatically extract denoised Event Related Potenti…
1173 (ERPs) from novel, single EEG trajectories, and supports fast supervised
1174 re-mapping to various clinical labels, allowing clinicians to re-use a s…
1175 EEG representation regardless of updates to the standardized diagnostic …
1176 Finally, single factors of the learned disentangled representations often
1177 correspond to meaningful markers of clinical factors, as automatically d…
1178 by SCAN, allowing for human interpretability and post-hoc expert analysi…
1179 the recommendations made by the model.
1180 &lt;/p&gt;
1181 </description>
1182 </item>
1183 <item>
1184 <title>A direct method for solving inverse Sturm-Liouville problems. (ar…
1185 <link>http://fr.arxiv.org/abs/2010.15275</link>
1186 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1187
1188 &lt;p&gt;We consider two main inverse Sturm-Liouville problems: the prob…
1189 recovery of the potential and the boundary conditions from two spectra o…
1190 a spectral density function. A simple method for practical solution of s…
1191 problems is developed, based on the transmutation operator approach, new
1192 Neumann series of Bessel functions representations for solutions and the
1193 Gelfand-Levitan equation. The method allows one to reduce the inverse
1194 Sturm-Liouville problem directly to a system of linear algebraic equatio…
1195 such that the potential is recovered from the first element of the solut…
1196 vector. We prove the stability of the method and show its numerical effi…
1197 with several numerical examples.
1198 &lt;/p&gt;
1199 </description>
1200 </item>
1201 <item>
1202 <title>Class-incremental learning: survey and performance evaluation. (a…
1203 <link>http://fr.arxiv.org/abs/2010.15277</link>
1204 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1205
1206 &lt;p&gt;For future learning systems incremental learning is desirable, …
1207 allows for: efficient resource usage by eliminating the need to retrain …
1208 scratch at the arrival of new data; reduced memory usage by preventing or
1209 limiting the amount of data required to be stored -- also important when
1210 privacy limitations are imposed; and learning that more closely resemble…
1211 learning. The main challenge for incremental learning is catastrophic
1212 forgetting, which refers to the precipitous drop in performance on previ…
1213 learned tasks after learning a new one. Incremental learning of deep neu…
1214 networks has seen explosive growth in recent years. Initial work focused…
1215 task incremental learning, where a task-ID is provided at inference time.
1216 Recently we have seen a shift towards class-incremental learning where t…
1217 learner must classify at inference time between all classes seen in prev…
1218 tasks without recourse to a task-ID. In this paper, we provide a complete
1219 survey of existing methods for incremental learning, and in particular we
1220 perform an extensive experimental evaluation on twelve class-incremental
1221 methods. We consider several new experimental scenarios, including a com…
1222 of class-incremental methods on multiple large-scale datasets, investiga…
1223 into small and large domain shifts, and comparison on various network
1224 architectures.
1225 &lt;/p&gt;
1226 </description>
1227 </item>
1228 <item>
1229 <title>Specification description and verification of multitask hybrid sy…
1230 <link>http://fr.arxiv.org/abs/2010.15280</link>
1231 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1232
1233 &lt;p&gt;To develop IoT and/or CSP systems, we need consider both contin…
1234 physical world and discrete data in computer systems. Such a system is c…
1235 hybrid system. Because of density of continuous data, it is not easy to …
1236 software testing to ensure reliability of hybrid systems. Moreover, the …
1237 the state space increases exponentially for multitask systems. Formal
1238 descriptions of hybrid systems may help us to verify desired properties …
1239 given system formally with computer supports. In this paper, we propose …
1240 to describe a formal specification of a given multitask hybrid system as…
1241 observational transition system in CafeOBJ algebraic specification langu…
1242 verify it by the proof score method based on equational reasoning implem…
1243 in CafeOBJ interpreter.
1244 &lt;/p&gt;
1245 </description>
1246 </item>
1247 <item>
1248 <title>GENs: Generative Encoding Networks. (arXiv:2010.15283v1 [cs.LG])<…
1249 <link>http://fr.arxiv.org/abs/2010.15283</link>
1250 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1251
1252 &lt;p&gt;Mapping data from and/or onto a known family of distributions h…
1253 important topic in machine learning and data analysis. Deep generative m…
1254 (e.g., generative adversarial networks ) have been used effectively to m…
1255 known and unknown distributions. Nonetheless, when the form of the target
1256 distribution is known, analytical methods are advantageous in providing …
1257 results with provable properties. In this paper, we propose and analyze …
1258 of nonparametric density methods to estimate the Jensen-Shannon divergen…
1259 matching unknown data distributions to known target distributions, such
1260 Gaussian or mixtures of Gaussians, in latent spaces. This analytical met…
1261 several advantages: better behavior when training sample quantity is low,
1262 provable convergence properties, and relatively few parameters, which ca…
1263 derived analytically. Using the proposed method, we enforce the latent
1264 representation of an autoencoder to match a target distribution in a lea…
1265 framework that we call a {\em generative encoding network}. Here, we pre…
1266 the numerical methods; derive the expected distribution of the data in t…
1267 latent space; evaluate the properties of the latent space, sample
1268 reconstruction, and generated samples; show the advantages over the adve…
1269 counterpart; and demonstrate the application of the method in real world.
1270 &lt;/p&gt;
1271 </description>
1272 </item>
1273 <item>
1274 <title>Speech-Image Semantic Alignment Does Not Depend on Any Prior Clas…
1275 <link>http://fr.arxiv.org/abs/2010.15288</link>
1276 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1277
1278 &lt;p&gt;Semantically-aligned $(speech, image)$ datasets can be used to …
1279 &quot;visually-grounded speech&quot;. In a majority of existing investig…
1280 of an image signal are extracted using neural networks &quot;pre-trained…
1281 tasks (e.g., classification on ImageNet). In still others, pre-trained n…
1282 are used to extract audio features prior to semantic embedding. Without
1283 &quot;transfer learning&quot; through pre-trained initialization or pre-…
1284 extraction, previous results have tended to show low rates of recall in …
1285 \rightarrow image$ and $image \rightarrow speech$ queries.
1286 &lt;/p&gt;
1287 &lt;p&gt;Choosing appropriate neural architectures for encoders in the s…
1288 image branches and using large datasets, one can obtain competitive reca…
1289 rates without any reliance on any pre-trained initialization or feature
1290 extraction: $(speech,image)$ semantic alignment and $speech \rightarrow …
1291 and $image \rightarrow speech$ retrieval are canonical tasks worthy of
1292 independent investigation of their own and allow one to explore other
1293 questions---e.g., the size of the audio embedder can be reduced signific…
1294 with little loss of recall rates in $speech \rightarrow image$ and $image
1295 \rightarrow speech$ queries.
1296 &lt;/p&gt;
1297 </description>
1298 </item>
1299 <item>
1300 <title>Link inference of noisy delay-coupled networks: Machine learning …
1301 <link>http://fr.arxiv.org/abs/2010.15289</link>
1302 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1303
1304 &lt;p&gt;We devise a machine learning technique to solve the general pro…
1305 inferring network links that have time-delays. The goal is to do this pu…
1306 from time-series data of the network nodal states. This task has applica…
1307 in fields ranging from applied physics and engineering to neuroscience a…
1308 biology. To achieve this, we first train a type of machine learning syst…
1309 known as reservoir computing to mimic the dynamics of the unknown networ…
1310 formulate and test a technique that uses the trained parameters of the
1311 reservoir system output layer to deduce an estimate of the unknown netwo…
1312 structure. Our technique, by its nature, is non-invasive, but is motivat…
1313 the widely-used invasive network inference method whereby the responses …
1314 active perturbations applied to the network are observed and employed to…
1315 network links (e.g., knocking down genes to infer gene regulatory networ…
1316 test this technique on experimental and simulated data from delay-coupled
1317 opto-electronic oscillator networks. We show that the technique often yi…
1318 very good results particularly if the system does not exhibit synchrony.…
1319 also find that the presence of dynamical noise can strikingly enhance the
1320 accuracy and ability of our technique, especially in networks that exhib…
1321 synchrony.
1322 &lt;/p&gt;
1323 </description>
1324 </item>
1325 <item>
1326 <title>Fact or Factitious? Contextualized Opinion Spam Detection. (arXiv…
1327 <link>http://fr.arxiv.org/abs/2010.15296</link>
1328 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1329
1330 &lt;p&gt;In this paper we perform an analytic comparison of a number of …
1331 used to detect fake and deceptive online reviews. We apply a number mach…
1332 learning approaches found to be effective, and introduce our own approac…
1333 fine-tuning state of the art contextualised embeddings. The results we o…
1334 show the potential of contextualised embeddings for fake review detectio…
1335 lay the groundwork for future research in this area.
1336 &lt;/p&gt;
1337 </description>
1338 </item>
1339 <item>
1340 <title>Analysis of Chorin-Type Projection Methods for the Stochastic Sto…
1341 <link>http://fr.arxiv.org/abs/2010.15297</link>
1342 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1343
1344 &lt;p&gt;This paper is concerned with numerical analysis of two fully di…
1345 Chorin-type projection methods for the stochastic Stokes equations with …
1346 non-solenoidal multiplicative noise. The first scheme is the standard Ch…
1347 scheme and the second one is a modified Chorin scheme which is designed …
1348 employing the Helmholtz decomposition on the noise function at each time…
1349 to produce a projected divergence-free noise and a &quot;pseudo pressure…
1350 combining the original pressure and the curl-free part of the decomposit…
1351 Optimal order rates of the convergence are proved for both velocity and
1352 pressure approximations of these two (semi-discrete) Chorin schemes. It …
1353 crucial to measure the errors in appropriate norms. The fully discrete f…
1354 element methods are formulated by discretizing both semi-discrete Chorin
1355 schemes in space by the standard finite element method. Suboptimal order…
1356 estimates are derived for both fully discrete methods. It is proved that…
1357 spatial error constants contain a growth factor $k^{-1/2}$, where $k$ de…
1358 the time step size, which explains the deteriorating performance of the
1359 standard Chorin scheme when $k\to 0$ and the space mesh size is fixed as
1360 observed earlier in the numerical tests of [9]. Numerical results are al…
1361 provided to guage the performance of the proposed numerical methods and …
1362 validate the sharpness of the theoretical error estimates.
1363 &lt;/p&gt;
1364 </description>
1365 </item>
1366 <item>
1367 <title>Uncovering Latent Biases in Text: Method and Application to Peer …
1368 <link>http://fr.arxiv.org/abs/2010.15300</link>
1369 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1370
1371 &lt;p&gt;Quantifying systematic disparities in numerical quantities such…
1372 rates and wages between population subgroups provides compelling evidenc…
1373 the existence of societal biases. However, biases in the text written for
1374 members of different subgroups (such as in recommendation letters for ma…
1375 non-male candidates), though widely reported anecdotally, remain challen…
1376 quantify. In this work, we introduce a novel framework to quantify bias …
1377 caused by the visibility of subgroup membership indicators. We develop a
1378 nonparametric estimation and inference procedure to estimate this bias. …
1379 formalize an identification strategy to causally link the estimated bias…
1380 visibility of subgroup membership indicators, provided observations from…
1381 periods both before and after an identity-hiding policy change. We ident…
1382 application wherein &quot;ground truth&quot; bias can be inferred to eva…
1383 framework, instead of relying on synthetic or secondary data. Specifical…
1384 apply our framework to quantify biases in the text of peer reviews from a
1385 reputed machine learning conference before and after the conference adop…
1386 double-blind reviewing policy. We show evidence of biases in the review …
1387 that serves as &quot;ground truth&quot;, and show that our proposed fram…
1388 detects these biases from the review text without having access to the r…
1389 ratings.
1390 &lt;/p&gt;
1391 </description>
1392 </item>
1393 <item>
1394 <title>Point Cloud Attribute Compression via Successive Subspace Graph T…
1395 <link>http://fr.arxiv.org/abs/2010.15302</link>
1396 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1397
1398 &lt;p&gt;Inspired by the recently proposed successive subspace learning …
1399 principles, we develop a successive subspace graph transform (SSGT) to a…
1400 point cloud attribute compression in this work. The octree geometry stru…
1401 is utilized to partition the point cloud, where every node of the octree
1402 represents a point cloud subspace with a certain spatial size. We design…
1403 weighted graph with self-loop to describe the subspace and define a graph
1404 Fourier transform based on the normalized graph Laplacian. The transform…
1405 applied to large point clouds from the leaf nodes to the root node of the
1406 octree recursively, while the represented subspace is expanded from the
1407 smallest one to the whole point cloud successively. It is shown by exper…
1408 results that the proposed SSGT method offers better R-D performances tha…
1409 previous Region Adaptive Haar Transform (RAHT) method.
1410 &lt;/p&gt;
1411 </description>
1412 </item>
1413 <item>
1414 <title>Automatic joint damage quantification using computer vision and d…
1415 <link>http://fr.arxiv.org/abs/2010.15303</link>
1416 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1417
1418 &lt;p&gt;Joint raveled or spalled damage (henceforth called joint damage…
1419 the safety and long-term performance of concrete pavements. It is import…
1420 assess and quantify the joint damage over time to assist in building act…
1421 plans for maintenance, predicting maintenance costs, and maximize the co…
1422 pavement service life. A framework for the accurate, autonomous, and rap…
1423 quantification of joint damage with a low-cost camera is proposed using a
1424 computer vision technique with a deep learning (DL) algorithm. The DL mo…
1425 employed to train 263 images of sawcuts with joint damage. The trained D…
1426 is used for pixel-wise color-masking joint damage in a series of query 2D
1427 images, which are used to reconstruct a 3D image using open-source struc…
1428 from motion algorithm. Another damage quantification algorithm using a c…
1429 threshold is applied to detect and compute the surface area of the damag…
1430 the 3D reconstructed image. The effectiveness of the framework was valid…
1431 through inspecting joint damage at four transverse contraction joints in
1432 Illinois, USA, including three acceptable joints and one unacceptable jo…
1433 visual inspection. The results show the framework achieves 76% recall an…
1434 error.
1435 &lt;/p&gt;
1436 </description>
1437 </item>
1438 <item>
1439 <title>ACCDOA: Activity-Coupled Cartesian Direction of Arrival Represent…
1440 <link>http://fr.arxiv.org/abs/2010.15306</link>
1441 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1442
1443 &lt;p&gt;Neural-network (NN)-based methods show high performance in soun…
1444 localization and detection (SELD). Conventional NN-based methods use two
1445 branches for a sound event detection (SED) target and a direction-of-arr…
1446 (DOA) target. The two-branch representation with a single network has to…
1447 how to balance the two objectives during optimization. Using two networks
1448 dedicated to each task increases system complexity and network size. To …
1449 these problems, we propose an activity-coupled Cartesian DOA (ACCDOA)
1450 representation, which assigns a sound event activity to the length of a
1451 corresponding Cartesian DOA vector. The ACCDOA representation enables us…
1452 solve a SELD task with a single target and has two advantages: avoiding …
1453 necessity of balancing the objectives and model size increase. In experi…
1454 evaluations with the DCASE 2020 Task 3 dataset, the ACCDOA representation
1455 outperformed the two-branch representation in SELD metrics with a smaller
1456 network size. The ACCDOA-based SELD system also performed better than
1457 state-of-the-art SELD systems in terms of localization and location-depe…
1458 detection.
1459 &lt;/p&gt;
1460 </description>
1461 </item>
1462 <item>
1463 <title>DeviceTTS: A Small-Footprint, Fast, Stable Network for On-Device …
1464 <link>http://fr.arxiv.org/abs/2010.15311</link>
1465 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1466
1467 &lt;p&gt;With the number of smart devices increasing, the demand for on-…
1468 text-to-speech (TTS) increases rapidly. In recent years, many prominent
1469 End-to-End TTS methods have been proposed, and have greatly improved the
1470 quality of synthesized speech. However, to ensure the qualified speech, …
1471 TTS systems depend on large and complex neural network models, and it&ap…
1472 deploy these TTS systems on-device. In this paper, a small-footprint, fa…
1473 stable network for on-device TTS is proposed, named as DeviceTTS. Device…
1474 makes use of a duration predictor as a bridge between encoder and decode…
1475 to avoid the problem of words skipping and repeating in Tacotron. As we …
1476 know, model size is a key factor for on-device TTS. For DeviceTTS, Deep
1477 Feedforward Sequential Memory Network (DFSMN) is used as the basic compo…
1478 Moreover, to speed up inference, mix-resolution decoder is proposed for …
1479 the inference speed and speech quality. Experiences are done with WORLD …
1480 LPCNet vocoder. Finally, with only 1.4 million model parameters and 0.099
1481 GFLOPS, DeviceTTS achieves comparable performance with Tacotron and Fast…
1482 As far as we know, the DeviceTTS can meet the needs of most of the devic…
1483 practical application.
1484 &lt;/p&gt;
1485 </description>
1486 </item>
1487 <item>
1488 <title>&quot;where is this relationship going?&quot;: Understanding Rela…
1489 <link>http://fr.arxiv.org/abs/2010.15313</link>
1490 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1491
1492 &lt;p&gt;We examine a new commonsense reasoning task: given a narrative …
1493 social interaction that centers on two protagonists, systems make infere…
1494 about the underlying relationship trajectory. Specifically, we propose t…
1495 evaluation tasks: Relationship Outlook Prediction MCQ and Resolution Pre…
1496 MCQ. In Relationship Outlook Prediction, a system maps an interaction to…
1497 relationship outlook that captures how the interaction is expected to ch…
1498 the relationship. In Resolution Prediction, a system attributes a given
1499 relationship outlook to a particular resolution that explains the outcom…
1500 These two tasks parallel two real-life questions that people frequently …
1501 upon as they navigate different social situations: &quot;where is this r…
1502 going?&quot; and &quot;how did we end up here?&quot;. To facilitate the …
1503 social relationships through these two tasks, we construct a new dataset,
1504 Social Narrative Tree, which consists of 1250 stories documenting a vari…
1505 daily social interactions. The narratives encode a multitude of social e…
1506 that interweave to give rise to rich commonsense knowledge of how relati…
1507 evolve with respect to social interactions. We establish baseline perfor…
1508 using language models and the accuracies are significantly lower than hu…
1509 performance. The results demonstrate that models need to look beyond syn…
1510 and semantic signals to comprehend complex human relationships.
1511 &lt;/p&gt;
1512 </description>
1513 </item>
1514 <item>
1515 <title>Recurrent neural circuits for contour detection. (arXiv:2010.1531…
1516 <link>http://fr.arxiv.org/abs/2010.15314</link>
1517 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1518
1519 &lt;p&gt;We introduce a deep recurrent neural network architecture that …
1520 visual cortical circuits. We show that this architecture, which we refer…
1521 the gamma-net, learns to solve contour detection tasks with better sample
1522 efficiency than state-of-the-art feedforward networks, while also exhibi…
1523 classic perceptual illusion, known as the orientation-tilt illusion. Cor…
1524 this illusion significantly reduces gamma-net contour detection accuracy…
1525 driving it to prefer low-level edges over high-level object boundary con…
1526 Overall, our study suggests that the orientation-tilt illusion is a bypr…
1527 of neural circuits that help biological visual systems achieve robust and
1528 efficient contour detection, and that incorporating these circuits in
1529 artificial neural networks can improve computer vision.
1530 &lt;/p&gt;
1531 </description>
1532 </item>
1533 <item>
1534 <title>Exploring Generative Adversarial Networks for Image-to-Image Tran…
1535 <link>http://fr.arxiv.org/abs/2010.15315</link>
1536 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1537
1538 &lt;p&gt;The use of accurate scanning transmission electron microscopy (…
1539 simulation methods require large computation times that can make their u…
1540 infeasible for the simulation of many images. Other simulation methods b…
1541 linear imaging models, such as the convolution method, are much faster b…
1542 too inaccurate to be used in application. In this paper, we explore deep
1543 learning models that attempt to translate a STEM image produced by the
1544 convolution method to a prediction of the high accuracy multislice image…
1545 then compare our results to those of regression methods. We find that us…
1546 deep learning model Generative Adversarial Network (GAN) provides us wit…
1547 best results and performs at a similar accuracy level to previous regres…
1548 models on the same dataset. Codes and data for this project can be found…
1549 this GitHub repository, https://github.com/uw-cmg/GAN-STEM-Conv2MultiSli…
1550 &lt;/p&gt;
1551 </description>
1552 </item>
1553 <item>
1554 <title>Multiple Sclerosis Severity Classification From Clinical Text. (a…
1555 <link>http://fr.arxiv.org/abs/2010.15316</link>
1556 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1557
1558 &lt;p&gt;Multiple Sclerosis (MS) is a chronic, inflammatory and degenera…
1559 neurological disease, which is monitored by a specialist using the Expan…
1560 Disability Status Scale (EDSS) and recorded in unstructured text in the …
1561 a neurology consult note. An EDSS measurement contains an overall &quot;…
1562 and several functional subscores. Typically, expert knowledge is require…
1563 interpret consult notes and generate these scores. Previous approaches u…
1564 limited context length Word2Vec embeddings and keyword searches to predi…
1565 scores given a consult note, but often failed when scores were not expli…
1566 stated. In this work, we present MS-BERT, the first publicly available
1567 transformer model trained on real clinical data other than MIMIC. Next, …
1568 present MSBC, a classifier that applies MS-BERT to generate embeddings a…
1569 predict EDSS and functional subscores. Lastly, we explore combining MSBC…
1570 other models through the use of Snorkel to generate scores for unlabelled
1571 consult notes. MSBC achieves state-of-the-art performance on all metrics…
1572 prediction tasks and outperforms the models generated from the Snorkel
1573 ensemble. We improve Macro-F1 by 0.12 (to 0.88) for predicting EDSS and …
1574 average by 0.29 (to 0.63) for predicting functional subscores over previ…
1575 Word2Vec CNN and rule-based approaches.
1576 &lt;/p&gt;
1577 </description>
1578 </item>
1579 <item>
1580 <title>The IQIYI System for Voice Conversion Challenge 2020. (arXiv:2010…
1581 <link>http://fr.arxiv.org/abs/2010.15317</link>
1582 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1583
1584 &lt;p&gt;This paper presents the IQIYI voice conversion system (T24) for…
1585 Conversion 2020. In the competition, each target speaker has 70 sentence…
1586 have built an end-to-end voice conversion system based on PPG. First, th…
1587 acoustic model calculates the BN feature, which represents the content-r…
1588 information in the speech. Then the Mel feature is calculated through an
1589 improved prosody tacotron model. Finally, the Mel spectrum is converted …
1590 through an improved LPCNet. The evaluation results show that this system…
1591 achieve better voice conversion effects. In the case of using 16k rather…
1592 24k sampling rate audio, the conversion result is relatively good in
1593 naturalness and similarity. Among them, our best results are in the simi…
1594 evaluation of the Task 2, the 2nd in the ASV-based objective evaluation …
1595 5th in the subjective evaluation.
1596 &lt;/p&gt;
1597 </description>
1598 </item>
1599 <item>
1600 <title>Gaussian Processes Model-based Control of Underactuated Balance R…
1601 <link>http://fr.arxiv.org/abs/2010.15320</link>
1602 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1603
1604 &lt;p&gt;Ranging from cart-pole systems and autonomous bicycles to biped…
1605 control of these underactuated balance robots aims to achieve both exter…
1606 (actuated) subsystem trajectory tracking and internal (unactuated) subsy…
1607 balancing tasks with limited actuation authority. This paper proposes a
1608 learning model-based control framework for underactuated balance robots.…
1609 key idea to simultaneously achieve tracking and balancing tasks is to de…
1610 control strategies in slow- and fast-time scales, respectively. In slow-…
1611 scale, model predictive control (MPC) is used to generate the desired in…
1612 subsystem trajectory that encodes the external subsystem tracking perfor…
1613 and control input. In fast-time scale, the actual internal trajectory is
1614 stabilized to the desired internal trajectory by using an inverse dynami…
1615 controller. The coupling effects between the external and internal subsy…
1616 are captured through the planned internal trajectory profile and the dual
1617 structural properties of the robotic systems. The control design is base…
1618 Gaussian processes (GPs) regression model that are learned from experime…
1619 without need of priori knowledge about the robot dynamics nor successful
1620 balance demonstration. The GPs provide estimates of modeling uncertainti…
1621 the robotic systems and these uncertainty estimations are incorporated i…
1622 MPC design to enhance the control robustness to modeling errors. The
1623 learning-based control design is analyzed with guaranteed stability and
1624 performance. The proposed design is demonstrated by experiments on a Fur…
1625 pendulum and an autonomous bikebot.
1626 &lt;/p&gt;
1627 </description>
1628 </item>
1629 <item>
1630 <title>Improvement of EAST Data Acquisition Configuration Management. (a…
1631 <link>http://fr.arxiv.org/abs/2010.15322</link>
1632 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1633
1634 &lt;p&gt;The data acquisition console is an important component of the E…
1635 acquisition system which provides unified data acquisition and long-term…
1636 storage for diagnostics. The data acquisition console is used to manage …
1637 data acquisition configuration information and control the data acquisit…
1638 workflow. The data acquisition console has been developed many years, an…
1639 increasing of data acquisition nodes and emergence of new control nodes,…
1640 function of configuration management has become inadequate. It is going …
1641 update the configuration management function of data acquisition console…
1642 upgraded data acquisition console based on LabVIEW should be oriented to…
1643 data acquisition administrator, with the functions of managing data acqu…
1644 nodes, managing control nodes, setting and publishing configuration para…
1645 batch management, database backup, monitoring the status of data acquisi…
1646 nodes, controlling the data acquisition workflow, and shot simulation da…
1647 acquisition test. The upgraded data acquisition console has been designe…
1648 under testing recently.
1649 &lt;/p&gt;
1650 </description>
1651 </item>
1652 <item>
1653 <title>Do Wide and Deep Networks Learn the Same Things? Uncovering How N…
1654 <link>http://fr.arxiv.org/abs/2010.15327</link>
1655 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1656
1657 &lt;p&gt;A key factor in the success of deep neural networks is the abil…
1658 models to improve performance by varying the architecture depth and widt…
1659 simple property of neural network design has resulted in highly effective
1660 architectures for a variety of tasks. Nevertheless, there is limited
1661 understanding of effects of depth and width on the learned representatio…
1662 this paper, we study this fundamental question. We begin by investigatin…
1663 varying depth and width affects model hidden representations, finding a
1664 characteristic block structure in the hidden representations of larger c…
1665 (wider or deeper) models. We demonstrate that this block structure arise…
1666 model capacity is large relative to the size of the training set, and is
1667 indicative of the underlying layers preserving and propagating the domin…
1668 principal component of their representations. This discovery has importa…
1669 ramifications for features learned by different models, namely, represen…
1670 outside the block structure are often similar across architectures with …
1671 widths and depths, but the block structure is unique to each model. We a…
1672 the output predictions of different model architectures, finding that ev…
1673 the overall accuracy is similar, wide and deep models exhibit distinctiv…
1674 patterns and variations across classes.
1675 &lt;/p&gt;
1676 </description>
1677 </item>
1678 <item>
1679 <title>Scalable Attack-Resistant Obfuscation of Logic Circuits. (arXiv:2…
1680 <link>http://fr.arxiv.org/abs/2010.15329</link>
1681 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1682
1683 &lt;p&gt;Hardware IP protection has been one of the most critical areas …
1684 the past years. Recently, attacks on hardware IPs (such as reverse engin…
1685 or cloning) have evolved as attackers have developed sophisticated techn…
1686 Therefore, hardware obfuscation has been introduced as a powerful tool to
1687 protect IPs against piracy attacks. However, many recent attempts to bre…
1688 existing obfuscation methods have been successful in unlocking the IP and
1689 restoring its functionality. In this paper, we propose SARO, a Scalable
1690 Attack-Resistant Obfuscation that provides a robust functional and struc…
1691 design transformation process. SARO treats the target circuit as a graph…
1692 performs a partitioning algorithm to produce a set of sub-graphs, then a…
1693 our novel Truth Table Transformation (T3) process to each partition. We …
1694 propose the $T3_{metric}$, which is developed to quantify the structural…
1695 functional design transformation level caused by the obfuscation process…
1696 evaluate SARO on ISCAS85 and EPFL benchmarks, and provide full security …
1697 performance analysis of our proposed framework.
1698 &lt;/p&gt;
1699 </description>
1700 </item>
1701 <item>
1702 <title>Learning Sampling Distributions Using Local 3D Workspace Decompos…
1703 <link>http://fr.arxiv.org/abs/2010.15335</link>
1704 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1705
1706 &lt;p&gt;Earlier work has shown that reusing experience from prior motio…
1707 problems can improve the efficiency of similar, future motion planning q…
1708 However, for robots with many degrees-of-freedom, these methods exhibit …
1709 generalization across different environments and often require large dat…
1710 that are impractical to gather. We present SPARK and FLAME , two
1711 experience-based frameworks for sampling-based planning applicable to co…
1712 manipulators in 3 D environments. Both combine samplers associated with
1713 features from a workspace decomposition into a global biased sampling
1714 distribution. SPARK decomposes the environment based on exact geometry w…
1715 FLAME is more general, and uses an octree-based decomposition obtained f…
1716 sensor data. We demonstrate the effectiveness of SPARK and FLAME on a Fe…
1717 robot tasked with challenging pick-and-place manipulation problems. Our
1718 approaches can be trained incrementally and significantly improve perfor…
1719 with only a handful of examples, generalizing better over diverse tasks …
1720 environments as compared to prior approaches.
1721 &lt;/p&gt;
1722 </description>
1723 </item>
1724 <item>
1725 <title>SAR-NAS: Skeleton-based Action Recognition via Neural Architectur…
1726 <link>http://fr.arxiv.org/abs/2010.15336</link>
1727 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1728
1729 &lt;p&gt;This paper presents a study of automatic design of neural netwo…
1730 architectures for skeleton-based action recognition. Specifically, we en…
1731 skeleton-based action instance into a tensor and carefully define a set …
1732 operations to build two types of network cells: normal cells and reducti…
1733 cells. The recently developed DARTS (Differentiable Architecture Search)…
1734 adopted to search for an effective network architecture that is built up…
1735 two types of cells. All operations are 2D based in order to reduce the o…
1736 computation and search space. Experiments on the challenging NTU RGB+D a…
1737 Kinectics datasets have verified that most of the networks developed to …
1738 for skeleton-based action recognition are likely not compact and efficie…
1739 proposed method provides an approach to search for such a compact networ…
1740 is able to achieve comparative or even better performance than the
1741 state-of-the-art methods.
1742 &lt;/p&gt;
1743 </description>
1744 </item>
1745 <item>
1746 <title>A New &quot;Model-Free&quot; Method Combined with Neural Network …
1747 <link>http://fr.arxiv.org/abs/2010.15338</link>
1748 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1749
1750 &lt;p&gt;In this brief, a model-free adaptive predictive control (MFAPC)…
1751 It outperforms the current model-free adaptive control (MFAC) for not on…
1752 solving the time delay problem in multiple-input multiple-output (MIMO) …
1753 but also relaxing the current rigorous assumptions for sake of a wider
1754 applicable range. The most attractive merit of the proposed controller i…
1755 the controller design, performance analysis and applications are easy for
1756 engineers to realize. Furthermore, the problem of how to choose the matr…
1757 {\lambda} is finished by analyzing the function of the closed-loop poles…
1758 than the previous contraction mapping method. Additionally, in view of t…
1759 nonlinear modeling capability and adaptability of neural networks (NNs),…
1760 combine these two classes of algorithms together. The feasibility and se…
1761 interesting results of the proposed method are shown in simulations.
1762 &lt;/p&gt;
1763 </description>
1764 </item>
1765 <item>
1766 <title>Identifying safe intersection design through unsupervised feature…
1767 <link>http://fr.arxiv.org/abs/2010.15343</link>
1768 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1769
1770 &lt;p&gt;The World Health Organization has listed the design of safer in…
1771 a key intervention to reduce global road trauma. This article presents t…
1772 first study to systematically analyze the design of all intersections in…
1773 large country, based on aerial imagery and deep learning. Approximately …
1774 satellite images were downloaded for all intersections in Australia and
1775 customized computer vision techniques emphasized the road infrastructure…
1776 deep autoencoder extracted high-level features, including the intersecti…
1777 type, size, shape, lane markings, and complexity, which were used to clu…
1778 similar designs. An Australian telematics data set linked infrastructure…
1779 to driving behaviors captured during 66 million kilometers of driving. T…
1780 showed more frequent hard acceleration events (per vehicle) at four- than
1781 three-way intersections, relatively low hard deceleration frequencies at
1782 T-intersections, and consistently low average speeds on roundabouts. Ove…
1783 domain-specific feature extraction enabled the identification of infrast…
1784 improvements that could result in safer driving behaviors, potentially r…
1785 road trauma.
1786 &lt;/p&gt;
1787 </description>
1788 </item>
1789 <item>
1790 <title>Sea-Net: Squeeze-And-Excitation Attention Net For Diabetic Retino…
1791 <link>http://fr.arxiv.org/abs/2010.15344</link>
1792 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1793
1794 &lt;p&gt;Diabetes is one of the most common disease in individuals. \tex…
1795 retinopathy} (DR) is a complication of diabetes, which could lead to bli…
1796 Automatic DR grading based on retinal images provides a great diagnostic…
1797 prognostic value for treatment planning. However, the subtle differences…
1798 severity levels make it difficult to capture important features using
1799 conventional methods. To alleviate the problems, a new deep learning
1800 architecture for robust DR grading is proposed, referred to as SEA-Net, …
1801 which, spatial attention and channel attention are alternatively carried…
1802 and boosted with each other, improving the classification performance. In
1803 addition, a hybrid loss function is proposed to further maximize the
1804 inter-class distance and reduce the intra-class variability. Experimental
1805 results have shown the effectiveness of the proposed architecture.
1806 &lt;/p&gt;
1807 </description>
1808 </item>
1809 <item>
1810 <title>Developing Augmented Reality based Gaming Model to Teach Ethical …
1811 <link>http://fr.arxiv.org/abs/2010.15346</link>
1812 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1813
1814 &lt;p&gt;Education sector is adopting new technologies for both teaching…
1815 pedagogy. Augmented Reality (AR) is a new technology that can be used in…
1816 educational pedagogy to enhance the engagement with students. Students i…
1817 with AR-based educational material for more visualization and explanatio…
1818 Therefore, the use of AR in education is becoming more popular. However,…
1819 researches narrate the use of AR technologies in the field of English, M…
1820 Science, Culture, Arts, and History education but the absence of ethical
1821 education is visible. In our paper, we design the system and develop an
1822 AR-based mobile game model in the field of Ethical education for pre-pri…
1823 students. Students from pre-primary require more interactive lessons than
1824 theoretical concepts. So, we use AR technology to develop a game which o…
1825 interactive procedures where students can learn with fun and engage with…
1826 context. Finally, we develop a prototype that works with our research
1827 objective. We conclude our paper with future works.
1828 &lt;/p&gt;
1829 </description>
1830 </item>
1831 <item>
1832 <title>Distance Invariant Sparse Autoencoder for Wireless Signal Strengt…
1833 <link>http://fr.arxiv.org/abs/2010.15347</link>
1834 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1835
1836 &lt;p&gt;Wireless signal strength based localization can enable robust l…
1837 for robots using inexpensive sensors. For this, a location-to-signal-str…
1838 map has to be learned for each access point in the environment. Due to t…
1839 ubiquity of Wireless networks in most environments, this can result in t…
1840 hundreds of maps. To reduce the dimensionality of this problem, we employ
1841 autoencoders, which are a popular unsupervised approach for feature extr…
1842 and data compression. In particular, we propose the use of sparse autoen…
1843 that learn latent spaces that preserve the relative distance between inp…
1844 Distance invariance between input and latent spaces allows our system to
1845 successfully learn compact representations that allow precise data
1846 reconstruction but also have a low impact on localization performance wh…
1847 using maps from the latent space rather than the input space. We demonst…
1848 the feasibility of our approach by performing experiments in outdoor
1849 environments.
1850 &lt;/p&gt;
1851 </description>
1852 </item>
1853 <item>
1854 <title>A Hybrid Position/Force Controller for Joint Robots. (arXiv:2010.…
1855 <link>http://fr.arxiv.org/abs/2010.15350</link>
1856 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1857
1858 &lt;p&gt;In this paper, we present a hybrid position/force controller fo…
1859 joint robots. The hybrid controller has two goals---motion tracking and …
1860 regulating. As long as these two goals are not mutually exclusive, they …
1861 decoupled in some way. In this work, we make use of the smooth and inver…
1862 mapping from joint space to task space to decouple the two control goals…
1863 design controllers separately. The traditional motion controller in task…
1864 is used for motion control, while the force controller is designed throu…
1865 manipulating the desired trajectory to regulate the force indirectly. Tw…
1866 studies---contour tracking/polishing surfaces and grabbing boxes with two
1867 robotic arms---are presented to show the efficacy of the hybrid controll…
1868 simulations with physics engines are carried out to validate the efficac…
1869 the proposed method.
1870 &lt;/p&gt;
1871 </description>
1872 </item>
1873 <item>
1874 <title>An automated and multi-parametric algorithm for objective analysi…
1875 <link>http://fr.arxiv.org/abs/2010.15352</link>
1876 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1877
1878 &lt;p&gt;Meibography is a non-contact imaging technique used by ophthalm…
1879 assist in the evaluation and diagnosis of meibomian gland dysfunction (M…
1880 While artificial qualitative analysis of meibography images could lead t…
1881 repeatability and efficiency and multi-parametric analysis is demanding …
1882 offer more comprehensive information in discovering subtle changes of me…
1883 glands during MGD progression, we developed an automated and multi-param…
1884 algorithm for objective and quantitative analysis of meibography images.…
1885 full architecture of the algorithm can be divided into three steps: (1)
1886 segmentation of the tarsal conjunctiva area as the region of interest (R…
1887 (2) segmentation and identification of glands within the ROI; and (3)
1888 quantitative multi-parametric analysis including newly defined gland dia…
1889 deformation index (DI), gland tortuosity index (TI), and glands signal i…
1890 (SI). To evaluate the performance of the automated algorithm, the simila…
1891 index (k) and the segmentation error including the false positive rate (…
1892 and the false negative rate (r_N) are calculated between the manually de…
1893 ground truth and the automatic segmentations of both the ROI and meibomi…
1894 glands of 15 typical meibography images. The feasibility of the algorith…
1895 demonstrated in analyzing typical meibograhy images.
1896 &lt;/p&gt;
1897 </description>
1898 </item>
1899 <item>
1900 <title>Domain decomposition and partitioning methods for mixed finite el…
1901 <link>http://fr.arxiv.org/abs/2010.15353</link>
1902 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1903
1904 &lt;p&gt;We develop non-overlapping domain decomposition methods for the…
1905 of poroelasticity in a mixed form. The solid deformation is modeled with…
1906 mixed three-field formulation with weak stress symmetry. The fluid flow …
1907 modeled with a mixed Darcy formulation. We introduce displacement and pr…
1908 Lagrange multipliers on the subdomain interfaces to impose weakly contin…
1909 normal stress and normal velocity, respectively. The global problem is r…
1910 to an interface problem for the Lagrange multipliers, which is solved by…
1911 Krylov space iterative method. We study both monolithic and split method…
1912 the monolithic method, a coupled displacement-pressure interface problem…
1913 solved, with each iteration requiring the solution of local Biot problem…
1914 show that the resulting interface operator is positive definite and anal…
1915 convergence of the iteration. We further study drained split and fixed s…
1916 Biot splittings, in which case we solve separate interface problems requ…
1917 elasticity and Darcy solves. We analyze the stability of the split
1918 formulations. Numerical experiments are presented to illustrate the conv…
1919 of the domain decomposition methods and compare their accuracy and effic…
1920 &lt;/p&gt;
1921 </description>
1922 </item>
1923 <item>
1924 <title>Reconfigurable Intelligent Surface Aided Secure Transmission: Out…
1925 <link>http://fr.arxiv.org/abs/2010.15354</link>
1926 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1927
1928 &lt;p&gt;Reconfigurable intelligent surface (RIS) has the potential to s…
1929 enhance the network secure transmission performance by reconfiguring the
1930 wireless propagation environment. However, due to the passive nature of
1931 eavesdroppers and the cascaded channel brought by the RIS, the eavesdrop…
1932 channel state information is imperfectly obtained at the base station. U…
1933 the channel uncertainty, the optimal phase-shift, power allocation, and
1934 transmission rate design for secure transmission is currently unknown du…
1935 the difficulty of handling the probabilistic constraint with coupled var…
1936 To fill this gap, this paper formulates a problem of energy-efficient se…
1937 transmission design while incorporating the probabilistic constraint. By
1938 transforming the probabilistic constraint and decoupling variables, the …
1939 energy efficiency maximization problem can be solved via alternatively
1940 executing difference-of-convex programming and semidefinite relaxation
1941 technique. To scale the solution to massive antennas and reflecting elem…
1942 scenario, a fast first-order algorithm with low complexity is further pr…
1943 Simulation results show that the proposed first-order algorithm achieves
1944 identical performance to the conventional method but saves at least two …
1945 of magnitude in computation time. Moreover, the resultant RIS aided secu…
1946 transmission significantly improves the energy efficiency compared to ba…
1947 schemes of random phase-shift, fixed phase-shift, and RIS ignoring CSI
1948 uncertainty.
1949 &lt;/p&gt;
1950 </description>
1951 </item>
1952 <item>
1953 <title>Financial ticket intelligent recognition system based on deep lea…
1954 <link>http://fr.arxiv.org/abs/2010.15356</link>
1955 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1956
1957 &lt;p&gt;Facing the rapid growth in the issuance of financial tickets (o…
1958 invoices etc.), traditional manual invoice reimbursement and financial
1959 accounting system are imposing an increasing burden on financial account…
1960 and consuming excessive manpower. To solve this problem, we proposes an
1961 iterative self-learning Framework of Financial Ticket intelligent Recogn…
1962 System (FFTRS), which can support the fast iterative updating and extens…
1963 of the algorithm model, which are the fundamental requirements for a pra…
1964 financial accounting system. In addition, we designed a simple yet effic…
1965 Financial Ticket Faster Detection network (FTFDNet) and an intelligent d…
1966 warehouse of financial ticket are designed to strengthen its efficiency …
1967 performance. At present, the system can recognize 194 kinds of financial
1968 tickets and has an automatic iterative optimization mechanism, which mea…
1969 with the increase of application time, the types of tickets supported by…
1970 system will continue to increase, and the accuracy of recognition will c…
1971 to improve. Experimental results show that the average recognition accur…
1972 the system is 97.07%, and the average running time for a single ticket is
1973 175.67ms. The practical value of the system has been tested in a commerc…
1974 application, which makes a beneficial attempt for the deep learning tech…
1975 in financial accounting work.
1976 &lt;/p&gt;
1977 </description>
1978 </item>
1979 <item>
1980 <title>A stochastic optimization algorithm for analyzing planar central …
1981 <link>http://fr.arxiv.org/abs/2010.15358</link>
1982 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1983
1984 &lt;p&gt;A stochastic optimization algorithm for analyzing planar centra…
1985 configurations in the $n$-body problem is presented. We find a comprehen…
1986 list of equal mass central configurations satisfying the Morse equality …
1987 $n=12$. We show some exemplary balanced configurations in the case $n=5$…
1988 well as some balanced configurations without any axis of symmetry in the…
1989 $n=4$ and $n=10$.
1990 &lt;/p&gt;
1991 </description>
1992 </item>
1993 <item>
1994 <title>Combining Self-Training and Self-Supervised Learning for Unsuperv…
1995 <link>http://fr.arxiv.org/abs/2010.15360</link>
1996 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
1997
1998 &lt;p&gt;Most existing approaches to disfluency detection heavily rely on
1999 human-annotated corpora, which is expensive to obtain in practice. There…
2000 been several proposals to alleviate this issue with, for instance,
2001 self-supervised learning techniques, but they still require human-annota…
2002 corpora. In this work, we explore the unsupervised learning paradigm whi…
2003 potentially work with unlabeled text corpora that are cheaper and easier…
2004 obtain. Our model builds upon the recent work on Noisy Student Training,…
2005 semi-supervised learning approach that extends the idea of self-training.
2006 Experimental results on the commonly used English Switchboard test set s…
2007 that our approach achieves competitive performance compared to the previ…
2008 state-of-the-art supervised systems using contextualized word embeddings…
2009 BERT and ELECTRA).
2010 &lt;/p&gt;
2011 </description>
2012 </item>
2013 <item>
2014 <title>Model-Agnostic Counterfactual Reasoning for Eliminating Popularit…
2015 <link>http://fr.arxiv.org/abs/2010.15363</link>
2016 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2017
2018 &lt;p&gt;The general aim of the recommender system is to provide persona…
2019 suggestions to users, which is opposed to suggesting popular items. Howe…
2020 the normal training paradigm, i.e., fitting a recommender model to recov…
2021 user behavior data with pointwise or pairwise loss, makes the model bias…
2022 towards popular items. This results in the terrible Matthew effect, maki…
2023 popular items be more frequently recommended and become even more popula…
2024 Existing work addresses this issue with Inverse Propensity Weighting (IP…
2025 which decreases the impact of popular items on the training and increase…
2026 impact of long-tail items. Although theoretically sound, IPW methods are…
2027 sensitive to the weighting strategy, which is notoriously difficult to t…
2028 &lt;/p&gt;
2029 &lt;p&gt;In this work, we explore the popularity bias issue from a novel…
2030 fundamental perspective -- cause-effect. We identify that popularity bia…
2031 in the direct effect from the item node to the ranking score, such that …
2032 item&apos;s intrinsic property is the cause of mistakenly assigning it a…
2033 ranking score. To eliminate popularity bias, it is essential to answer t…
2034 counterfactual question that what the ranking score would be if the mode…
2035 uses item property. To this end, we formulate a causal graph to describe…
2036 important cause-effect relations in the recommendation process. During
2037 training, we perform multi-task learning to achieve the contribution of …
2038 cause; during testing, we perform counterfactual inference to remove the…
2039 of item popularity. Remarkably, our solution amends the learning process…
2040 recommendation which is agnostic to a wide range of models. We demonstra…
2041 on Matrix Factorization (MF) and LightGCN, which are representative of t…
2042 conventional and state-of-the-art model for collaborative filtering.
2043 Experiments on five real-world datasets demonstrate the effectiveness of…
2044 method.
2045 &lt;/p&gt;
2046 </description>
2047 </item>
2048 <item>
2049 <title>Online State-Time Trajectory Planning Using Timed-ESDF in Highly …
2050 <link>http://fr.arxiv.org/abs/2010.15364</link>
2051 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2052
2053 &lt;p&gt;Online state-time trajectory planning in highly dynamic environ…
2054 an unsolved problem due to the unpredictable motions of moving obstacles…
2055 the curse of dimensionality from the state-time space. Existing state-ti…
2056 planners are typically implemented based on randomized sampling approach…
2057 path searching on discretized state graph. The smoothness, path clearanc…
2058 planning efficiency of these planners are usually not satisfying. In thi…
2059 we propose a gradient-based planner over the state-time space for online
2060 trajectory generation in highly dynamic environments. To enable the
2061 gradient-based optimization, we propose a Timed-ESDT that supports dista…
2062 gradient queries with state-time keys. Based on the Timed-ESDT, we also …
2063 a smooth prior and an obstacle likelihood function that is compatible wi…
2064 state-time space. The trajectory planning is then formulated to a MAP pr…
2065 and solved by an efficient numerical optimizer. Moreover, to improve the
2066 optimality of the planner, we also define a state-time graph and then co…
2067 path searching on it to find a better initialization for the optimizer. …
2068 integrating the graph searching, the planning quality is significantly
2069 improved. Experiment results on simulated and benchmark datasets show th…
2070 planner can outperform the state-of-the-art methods, demonstrating its
2071 significant advantages over the traditional ones.
2072 &lt;/p&gt;
2073 </description>
2074 </item>
2075 <item>
2076 <title>Infinite Time Solutions of Numerical Schemes for Advection Proble…
2077 <link>http://fr.arxiv.org/abs/2010.15365</link>
2078 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2079
2080 &lt;p&gt;This paper addresses the question whether there are numerical s…
2081 constant-coefficient advection problems that can yield convergent soluti…
2082 an infinite time horizon. The motivation is that such methods may serve …
2083 building blocks for long-time accurate solutions in more complex
2084 advection-dominated problems. After establishing a new notion of converg…
2085 an infinite time limit of numerical methods, we first show that linear m…
2086 cannot meet this convergence criterion. Then we present a new numerical
2087 methodology, based on a nonlinear jet scheme framework. We show that the…
2088 methods do satisfy the new convergence criterion, thus establishing that
2089 numerical methods exist that converge on an infinite time horizon, and
2090 demonstrate the long-time accuracy gains incurred by this property.
2091 &lt;/p&gt;
2092 </description>
2093 </item>
2094 <item>
2095 <title>Self-supervised Pre-training Reduces Label Permutation Instabilit…
2096 <link>http://fr.arxiv.org/abs/2010.15366</link>
2097 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2098
2099 &lt;p&gt;Speech separation has been well-developed while there are still…
2100 waiting to be solved. The main problem we focus on in this paper is the
2101 frequent label permutation switching of permutation invariant training (…
2102 For N-speaker separation, there would be N! possible label permutations.…
2103 stably select correct label permutations is a long-standing problem. In …
2104 paper, we utilize self-supervised pre-training to stabilize the label
2105 permutations. Among several types of self-supervised tasks, speech enhan…
2106 based pre-training tasks show significant effectiveness in our experimen…
2107 When using off-the-shelf pre-trained models, training duration could be
2108 shortened to one-third to two-thirds. Furthermore, even taking pre-train…
2109 time into account, the entire training process could still be shorter wi…
2110 performance drop when using a larger batch size.
2111 &lt;/p&gt;
2112 </description>
2113 </item>
2114 <item>
2115 <title>Learning Centric Wireless Resource Allocation for Edge Computing:…
2116 <link>http://fr.arxiv.org/abs/2010.15371</link>
2117 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2118
2119 &lt;p&gt;Edge intelligence is an emerging network architecture that inte…
2120 sensing, communication, computing components, and supports various machi…
2121 learning applications, where a fundamental communication question is: ho…
2122 allocate the limited wireless resources (such as time, energy) to the
2123 simultaneous model training of heterogeneous learning tasks? Existing me…
2124 ignore two important facts: 1) different models have heterogeneous deman…
2125 training data; 2) there is a mismatch between the simulated environment …
2126 real-world environment. As a result, they could lead to low learning
2127 performance in practice. This paper proposes the learning centric wirele…
2128 resource allocation (LCWRA) scheme that maximizes the worst learning
2129 performance of multiple classification tasks. Analysis shows that the op…
2130 transmission time has an inverse power relationship with respect to the
2131 classification error. Finally, both simulation and experimental results …
2132 provided to verify the performance of the proposed LCWRA scheme and its
2133 robustness in real implementation.
2134 &lt;/p&gt;
2135 </description>
2136 </item>
2137 <item>
2138 <title>Learning Personalized Discretionary Lane-Change Initiation for Fu…
2139 <link>http://fr.arxiv.org/abs/2010.15372</link>
2140 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2141
2142 &lt;p&gt;In this article, the authors present a novel method to learn th…
2143 tactic of discretionary lane-change initiation for fully autonomous vehi…
2144 through human-computer interactions. Instead of learning from human-driv…
2145 demonstrations, a reinforcement learning technique is employed to learn …
2146 initiate lane changes from traffic context, the action of a self-driving
2147 vehicle, and in-vehicle user feedback. The proposed offline algorithm re…
2148 the action-selection strategy when the user gives positive feedback and
2149 penalizes it when negative feedback. Also, a multi-dimensional driving s…
2150 is considered to represent a more realistic lane-change trade-off. The r…
2151 show that the lane-change initiation model obtained by this method can
2152 reproduce the personal lane-change tactic, and the performance of the
2153 customized models (average accuracy 86.1%) is much better than that of t…
2154 non-customized models (average accuracy 75.7%). This method allows conti…
2155 improvement of customization for users during fully autonomous driving e…
2156 without human-driving experience, which will significantly enhance the u…
2157 acceptance of high-level autonomy of self-driving vehicles.
2158 &lt;/p&gt;
2159 </description>
2160 </item>
2161 <item>
2162 <title>Solving Sparse Linear Inverse Problems in Communication Systems: …
2163 <link>http://fr.arxiv.org/abs/2010.15376</link>
2164 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2165
2166 &lt;p&gt;Sparse signal recovery problems from noisy linear measurements …
2167 areas of wireless communications. In recent years, deep learning (DL) ba…
2168 approaches have attracted interests of researchers to solve the sparse l…
2169 inverse problem by unfolding iterative algorithms as neural networks.
2170 Typically, research concerning DL assume a fixed number of network layer…
2171 However, it ignores a key character in traditional iterative algorithms,…
2172 the number of iterations required for convergence changes with varying s…
2173 levels. By investigating on the projected gradient descent, we unveil the
2174 drawbacks of the existing DL methods with fixed depth. Then we propose an
2175 end-to-end trainable DL architecture, which involves an extra halting sc…
2176 each layer. Therefore, the proposed method learns how many layers to exe…
2177 emit an output, and the network depth is dynamically adjusted for each t…
2178 the inference phase. We conduct experiments using both synthetic data and
2179 applications including random access in massive MTC and massive MIMO cha…
2180 estimation, and the results demonstrate the improved efficiency for the
2181 proposed approach.
2182 &lt;/p&gt;
2183 </description>
2184 </item>
2185 <item>
2186 <title>Supervised sequential pattern mining of event sequences in sport …
2187 <link>http://fr.arxiv.org/abs/2010.15377</link>
2188 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2189
2190 &lt;p&gt;Given a set of sequences comprised of time-ordered events, sequ…
2191 mining is useful to identify frequent sub-sequences from different seque…
2192 within the same sequence. However, in sport, these techniques cannot det…
2193 the importance of particular patterns of play to good or bad outcomes, w…
2194 often of greater interest to coaches. In this study, we apply a supervis…
2195 sequential pattern mining algorithm called safe pattern pruning (SPP) to…
2196 labelled event sequences representing passages of play from one rugby te…
2197 matches from the 2018 Japan Top League, and then evaluate the importance…
2198 obtained sub-sequences to points-scoring outcomes. Linebreaks, successful
2199 lineouts, regained kicks in play, repeated phase-breakdown play, and fai…
2200 opposition exit plays were identified as important patterns of play for …
2201 team scoring. When sequences were labelled with points scoring outcomes …
2202 opposition teams, opposition team linebreaks, errors made by the team,
2203 opposition team lineouts, and repeated phase-breakdown play by the oppos…
2204 team were identified as important patterns of play for the opposition te…
2205 scoring. By virtue of its supervised nature and pruning properties, SPP
2206 obtained a greater variety of generally more sophisticated patterns than…
2207 well-known unsupervised PrefixSpan algorithm.
2208 &lt;/p&gt;
2209 </description>
2210 </item>
2211 <item>
2212 <title>Collaborative Method for Incremental Learning on Classification a…
2213 <link>http://fr.arxiv.org/abs/2010.15378</link>
2214 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2215
2216 &lt;p&gt;Although well-trained deep neural networks have shown remarkabl…
2217 on numerous tasks, they rapidly forget what they have learned as soon as…
2218 begin to learn with additional data with the previous data stop being pr…
2219 In this paper, we introduce a novel algorithm, Incremental Class Learnin…
2220 Attribute Sharing (ICLAS), for incremental class learning with deep neur…
2221 networks. As one of its component, we also introduce a generative model,
2222 incGAN, which can generate images with increased variety compared with t…
2223 training data. Under challenging environment of data deficiency, ICLAS
2224 incrementally trains classification and the generation networks. Since I…
2225 trains both networks, our algorithm can perform multiple times of increm…
2226 class learning. The experiments on MNIST dataset demonstrate the advanta…
2227 our algorithm.
2228 &lt;/p&gt;
2229 </description>
2230 </item>
2231 <item>
2232 <title>The Performance Analysis of Generalized Margin Maximizer (GMM) on…
2233 <link>http://fr.arxiv.org/abs/2010.15379</link>
2234 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2235
2236 &lt;p&gt;Logistic models are commonly used for binary classification tas…
2237 success of such models has often been attributed to their connection to
2238 maximum-likelihood estimators. It has been shown that gradient descent
2239 algorithm, when applied on the logistic loss, converges to the max-margin
2240 classifier (a.k.a. hard-margin SVM). The performance of the max-margin
2241 classifier has been recently analyzed. Inspired by these results, in this
2242 paper, we present and study a more general setting, where the underlying
2243 parameters of the logistic model possess certain structures (sparse,
2244 block-sparse, low-rank, etc.) and introduce a more general framework (wh…
2245 referred to as &quot;Generalized Margin Maximizer&quot;, GMM). While cla…
2246 classifiers minimize the $2$-norm of the parameter vector subject to lin…
2247 separating the data, GMM minimizes any arbitrary convex function of the
2248 parameter vector. We provide a precise analysis of the performance of GM…
2249 the solution of a system of nonlinear equations. We also provide a detai…
2250 study for three special cases: ($1$) $\ell_2$-GMM that is the max-margin
2251 classifier, ($2$) $\ell_1$-GMM which encourages sparsity, and ($3$)
2252 $\ell_{\infty}$-GMM which is often used when the parameter vector has bi…
2253 entries. Our theoretical results are validated by extensive simulation r…
2254 across a range of parameter values, problem instances, and model structu…
2255 &lt;/p&gt;
2256 </description>
2257 </item>
2258 <item>
2259 <title>Learning to Actively Learn: A Robust Approach. (arXiv:2010.15382v…
2260 <link>http://fr.arxiv.org/abs/2010.15382</link>
2261 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2262
2263 &lt;p&gt;This work proposes a procedure for designing algorithms for spe…
2264 data collection tasks like active learning and pure-exploration multi-ar…
2265 bandits. Unlike the design of traditional adaptive algorithms that rely …
2266 concentration of measure and careful analysis to justify the correctness…
2267 sample complexity of the procedure, our adaptive algorithm is learned via
2268 adversarial training over equivalence classes of problems derived from
2269 information theoretic lower bounds. In particular, a single adaptive lea…
2270 algorithm is learned that competes with the best adaptive algorithm lear…
2271 each equivalence class. Our procedure takes as input just the available
2272 queries, set of hypotheses, loss function, and total query budget. This …
2273 contrast to existing meta-learning work that learns an adaptive algorithm
2274 relative to an explicit, user-defined subset or prior distribution over
2275 problems which can be challenging to define and be mismatched to the ins…
2276 encountered at test time. This work is particularly focused on the regim…
2277 the total query budget is very small, such as a few dozen, which is much
2278 smaller than those budgets typically considered by theoretically derived
2279 algorithms. We perform synthetic experiments to justify the stability and
2280 effectiveness of the training procedure, and then evaluate the method on…
2281 derived from real data including a noisy 20 Questions game and a joke
2282 recommendation task.
2283 &lt;/p&gt;
2284 </description>
2285 </item>
2286 <item>
2287 <title>Prediction-Based Power Oversubscription in Cloud Platforms. (arXi…
2288 <link>http://fr.arxiv.org/abs/2010.15388</link>
2289 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2290
2291 &lt;p&gt;Datacenter designers rely on conservative estimates of IT equip…
2292 draw to provision resources. This leaves resources underutilized and req…
2293 more datacenters to be built. Prior work has used power capping to shave…
2294 rare power peaks and add more servers to the datacenter, thereby
2295 oversubscribing its resources and lowering capital costs. This works wel…
2296 the workloads and their server placements are known. Unfortunately, these
2297 factors are unknown in public clouds, forcing providers to limit the
2298 oversubscription so that performance is never impacted.
2299 &lt;/p&gt;
2300 &lt;p&gt;In this paper, we argue that providers can use predictions of w…
2301 performance criticality and virtual machine (VM) resource utilization to
2302 increase oversubscription. This poses many challenges, such as identifyi…
2303 performance-critical workloads from black-box VMs, creating support for
2304 criticality-aware power management, and increasing oversubscription while
2305 limiting the impact of capping. We address these challenges for the hard…
2306 and software infrastructures of Microsoft Azure. The results show that we
2307 enable a 2x increase in oversubscription with minimum impact to critical
2308 workloads.
2309 &lt;/p&gt;
2310 </description>
2311 </item>
2312 <item>
2313 <title>Learning Audio Embeddings with User Listening Data for Content-ba…
2314 <link>http://fr.arxiv.org/abs/2010.15389</link>
2315 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2316
2317 &lt;p&gt;Personalized recommendation on new track releases has always be…
2318 challenging problem in the music industry. To combat this problem, we fi…
2319 explore user listening history and demographics to construct a user embe…
2320 representing the user&apos;s music preference. With the user embedding a…
2321 data from user&apos;s liked and disliked tracks, an audio embedding can …
2322 for each track using metric learning with Siamese networks. For a new tr…
2323 can decide the best group of users to recommend by computing the similar…
2324 between the track&apos;s audio embedding and different user embeddings,
2325 respectively. The proposed system yields state-of-the-art performance on
2326 content-based music recommendation tested with millions of users and tra…
2327 Also, we extract audio embeddings as features for music genre classifica…
2328 tasks. The results show the generalization ability of our audio embeddin…
2329 &lt;/p&gt;
2330 </description>
2331 </item>
2332 <item>
2333 <title>Multitask Bandit Learning through Heterogeneous Feedback Aggregat…
2334 <link>http://fr.arxiv.org/abs/2010.15390</link>
2335 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2336
2337 &lt;p&gt;In many real-world applications, multiple agents seek to learn …
2338 highly related yet slightly different tasks in an online bandit learning
2339 protocol. We formulate this problem as the $\epsilon$-multi-player multi…
2340 bandit problem, in which a set of players concurrently interact with a s…
2341 arms, and for each arm, the reward distributions for all players are sim…
2342 but not necessarily identical. We develop an upper confidence bound-based
2343 algorithm, RobustAgg$(\epsilon)$, that adaptively aggregates rewards col…
2344 by different players. In the setting where an upper bound on the pairwise
2345 similarities of reward distributions between players is known, we achieve
2346 instance-dependent regret guarantees that depend on the amenability of
2347 information sharing across players. We complement these upper bounds with
2348 nearly matching lower bounds. In the setting where pairwise similarities…
2349 unknown, we provide a lower bound, as well as an algorithm that trades o…
2350 minimax regret guarantees for adaptivity to unknown similarity structure.
2351 &lt;/p&gt;
2352 </description>
2353 </item>
2354 <item>
2355 <title>Robustifying Binary Classification to Adversarial Perturbation. (…
2356 <link>http://fr.arxiv.org/abs/2010.15391</link>
2357 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2358
2359 &lt;p&gt;Despite the enormous success of machine learning models in vari…
2360 applications, most of these models lack resilience to (even small)
2361 perturbations in their input data. Hence, new methods to robustify machi…
2362 learning models seem very essential. To this end, in this paper we consi…
2363 problem of binary classification with adversarial perturbations. Investi…
2364 the solution to a min-max optimization (which considers the worst-case l…
2365 the presence of adversarial perturbations) we introduce a generalization…
2366 max-margin classifier which takes into account the power of the adversar…
2367 manipulating the data. We refer to this classifier as the &quot;Robust M…
2368 (RM) classifier. Under some mild assumptions on the loss function, we
2369 theoretically show that the gradient descent iterates (with sufficiently…
2370 step size) converge to the RM classifier in its direction. Therefore, th…
2371 classifier can be studied to compute various performance measures (e.g.
2372 generalization error) of binary classification with adversarial perturba…
2373 &lt;/p&gt;
2374 </description>
2375 </item>
2376 <item>
2377 <title>Off-Policy Interval Estimation with Lipschitz Value Iteration. (a…
2378 <link>http://fr.arxiv.org/abs/2010.15392</link>
2379 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2380
2381 &lt;p&gt;Off-policy evaluation provides an essential tool for evaluating…
2382 of different policies or treatments using only observed data. When appli…
2383 high-stakes scenarios such as medical diagnosis or financial decision-ma…
2384 it is crucial to provide provably correct upper and lower bounds of the
2385 expected reward, not just a classical single point estimate, to the end-…
2386 as executing a poor policy can be very costly. In this work, we propose a
2387 provably correct method for obtaining interval bounds for off-policy eva…
2388 in a general continuous setting. The idea is to search for the maximum a…
2389 minimum values of the expected reward among all the Lipschitz Q-function…
2390 are consistent with the observations, which amounts to solving a constra…
2391 optimization problem on a Lipschitz function space. We go on to introduc…
2392 Lipschitz value iteration method to monotonically tighten the interval, …
2393 is simple yet efficient and provably convergent. We demonstrate the prac…
2394 efficiency of our method on a range of benchmarks.
2395 &lt;/p&gt;
2396 </description>
2397 </item>
2398 <item>
2399 <title>Discovery and classification of Twitter bots. (arXiv:2010.15393v1…
2400 <link>http://fr.arxiv.org/abs/2010.15393</link>
2401 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2402
2403 &lt;p&gt;A very large number of people use Online Social Networks daily.…
2404 platforms thus become attractive targets for agents that seek to gain ac…
2405 the attention of large audiences, and influence perceptions or opinions.
2406 Botnets, collections of automated accounts controlled by a single agent,…
2407 common mechanism for exerting maximum influence. Botnets may be used to …
2408 infiltrate the social graph over time and to create an illusion of commu…
2409 behavior, amplifying their message and increasing persuasion.
2410 &lt;/p&gt;
2411 &lt;p&gt;This paper investigates Twitter botnets, their behavior, their …
2412 with user communities and their evolution over time. We analyzed a dense…
2413 of a subset of Twitter traffic, amounting to nearly all interactions by
2414 Greek-speaking Twitter users for a period of 36 months. We detected over…
2415 million events where seemingly unrelated accounts tweeted nearly identic…
2416 content at nearly the same time. We filtered these concurrent content in…
2417 events and detected a set of 1,850 accounts that repeatedly exhibit this
2418 pattern of behavior, suggesting that they are fully or in part controlle…
2419 orchestrated by the same software. We found botnets that appear for brief
2420 intervals and disappear, as well as botnets that evolve and grow, spanni…
2421 duration of our dataset. We analyze statistical differences between bot
2422 accounts and human users, as well as botnet interaction with user commun…
2423 and Twitter trending topics.
2424 &lt;/p&gt;
2425 </description>
2426 </item>
2427 <item>
2428 <title>Smart Homes: Security Challenges and Privacy Concerns. (arXiv:201…
2429 <link>http://fr.arxiv.org/abs/2010.15394</link>
2430 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2431
2432 &lt;p&gt;Development and growth of Internet of Things (IoT) technology h…
2433 exponentially increased over the course of the last 10 years since its
2434 inception, and as a result has directly influenced the popularity and si…
2435 smart homes. In this article we present the main technologies and applic…
2436 that constitute a smart home, we identify the main security and privacy
2437 challenges that smart home face and we provide good practices to mitigat…
2438 threats.
2439 &lt;/p&gt;
2440 </description>
2441 </item>
2442 <item>
2443 <title>Channel Estimation and Equalization for CP-OFDM-based OTFS in Fra…
2444 <link>http://fr.arxiv.org/abs/2010.15396</link>
2445 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2446
2447 &lt;p&gt;Orthogonal time frequency and space (OTFS) modulation is a prom…
2448 technology that satisfies high Doppler requirements for future mobile sy…
2449 OTFS modulation encodes information symbols and pilot symbols into the
2450 two-dimensional (2D) delay-Doppler (DD) domain. The received symbols suf…
2451 from inter-Doppler interference (IDI) in the fading channels with fracti…
2452 Doppler shifts that are sampled at noninteger indices in the DD domain. …
2453 been treated as an unavoidable effect because the fractional Doppler shi…
2454 cannot be obtained directly from the received pilot symbols. In this pap…
2455 provide a solution to channel estimation for fractional Doppler channels…
2456 proposed estimation provides new insight into the OTFS input-output rela…
2457 the DD domain as a 2D circular convolution with a small approximation.
2458 According to the input-output relation, we also provide a low-complexity
2459 channel equalization method using the estimated channel information. We
2460 demonstrate the error performance of the proposed channel estimation and
2461 equalization in several channels by simulations. The simulation results …
2462 that in high-mobility environments, the total system utilizing the propo…
2463 methods outperforms orthogonal frequency division multiplexing (OFDM) wi…
2464 ideal channel estimation and a conventional channel estimation method us…
2465 pseudo sequence.
2466 &lt;/p&gt;
2467 </description>
2468 </item>
2469 <item>
2470 <title>Free-boundary conformal parameterization of point clouds. (arXiv:…
2471 <link>http://fr.arxiv.org/abs/2010.15399</link>
2472 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2473
2474 &lt;p&gt;With the advancement in 3D scanning technology, there has been …
2475 interest in the use of point clouds in science and engineering. To facil…
2476 the computations and analyses of point clouds, prior works have consider…
2477 parameterizing them onto some simple planar domains with a fixed boundar…
2478 such as a unit circle or a rectangle. However, the geometry of the fixed…
2479 may lead to some undesirable distortion in the parameterization. It is
2480 therefore more natural to consider free-boundary conformal parameterizat…
2481 point clouds, which minimize the local geometric distortion of the mappi…
2482 without constraining the overall shape. In this work, we propose a novel
2483 approximation scheme of the Laplace--Beltrami operator on point clouds a…
2484 utilize it for developing a free-boundary conformal parameterization met…
2485 disk-type point clouds. With the aid of the free-boundary conformal
2486 parameterization, high-quality point cloud meshing can be easily achieve…
2487 Furthermore, we show that using the idea of conformal welding in complex
2488 analysis, the point cloud conformal parameterization can be computed in a
2489 divide-and-conquer manner. Experimental results are presented to demonst…
2490 the effectiveness of the proposed method.
2491 &lt;/p&gt;
2492 </description>
2493 </item>
2494 <item>
2495 <title>On Efficient and Scalable Time-Continuous Spatial Crowdsourcing -…
2496 <link>http://fr.arxiv.org/abs/2010.15404</link>
2497 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2498
2499 &lt;p&gt;The proliferation of advanced mobile terminals opened up a new …
2500 avenue, spatial crowdsourcing, to utilize the crowd potential to perform
2501 real-world tasks. In this work, we study a new type of spatial crowdsour…
2502 called time-continuous spatial crowdsourcing (TCSC in short). It support…
2503 applications for long-term continuous spatial data acquisition, ranging …
2504 environmental monitoring to traffic surveillance in citizen science and
2505 crowdsourcing projects. However, due to limited budgets and limited
2506 availability of workers in practice, the data collected is often incompl…
2507 incurring data deficiency problem. To tackle that, in this work, we first
2508 propose an entropy-based quality metric, which captures the joint effect…
2509 incompletion in data acquisition and the imprecision in data interpolati…
2510 Based on that, we investigate quality-aware task assignment methods for …
2511 single- and multi-task scenarios. We show the NP-hardness of the single-…
2512 case, and design polynomial-time algorithms with guaranteed approximation
2513 ratios. We study novel indexing and pruning techniques for further enhan…
2514 the performance in practice. Then, we extend the solution to multi-task
2515 scenarios and devise a parallel framework for speeding up the process of
2516 optimization. We conduct extensive experiments on both real and synthetic
2517 datasets to show the effectiveness of our proposals.
2518 &lt;/p&gt;
2519 </description>
2520 </item>
2521 <item>
2522 <title>Conversation Graph: Data Augmentation, Training and Evaluation fo…
2523 <link>http://fr.arxiv.org/abs/2010.15411</link>
2524 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2525
2526 &lt;p&gt;Task-oriented dialogue systems typically rely on large amounts …
2527 high-quality training data or require complex handcrafted rules. However,
2528 existing datasets are often limited in size considering the complexity o…
2529 dialogues. Additionally, conventional training signal inference is not s…
2530 for non-deterministic agent behaviour, i.e. considering multiple actions…
2531 valid in identical dialogue states. We propose the Conversation Graph
2532 (ConvGraph), a graph-based representation of dialogues that can be explo…
2533 for data augmentation, multi-reference training and evaluation of
2534 non-deterministic agents. ConvGraph generates novel dialogue paths to au…
2535 data volume and diversity. Intrinsic and extrinsic evaluation across thr…
2536 datasets shows that data augmentation and/or multi-reference training wi…
2537 ConvGraph can improve dialogue success rates by up to 6.4%.
2538 &lt;/p&gt;
2539 </description>
2540 </item>
2541 <item>
2542 <title>Measuring and Harnessing Transference in Multi-Task Learning. (ar…
2543 <link>http://fr.arxiv.org/abs/2010.15413</link>
2544 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2545
2546 &lt;p&gt;Multi-task learning can leverage information learned by one tas…
2547 the training of other tasks. Despite this capacity, na\&quot;ive formula…
2548 degrade performance and in particular, identifying the tasks that would …
2549 from co-training remains a challenging design question. In this paper, we
2550 analyze the dynamics of information transfer, or transference, across ta…
2551 throughout training. Specifically, we develop a similarity measure that …
2552 quantify transference among tasks and use this quantity to both better
2553 understand the optimization dynamics of multi-task learning as well as i…
2554 overall learning performance. In the latter case, we propose two methods…
2555 leverage our transference metric. The first operates at a macro-level by
2556 selecting which tasks should train together while the second functions a…
2557 micro-level by determining how to combine task gradients at each trainin…
2558 We find these methods can lead to significant improvement over prior wor…
2559 three supervised multi-task learning benchmarks and one multi-task
2560 reinforcement learning paradigm.
2561 &lt;/p&gt;
2562 </description>
2563 </item>
2564 <item>
2565 <title>A Novel Anomaly Detection Algorithm for Hybrid Production Systems…
2566 <link>http://fr.arxiv.org/abs/2010.15415</link>
2567 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2568
2569 &lt;p&gt;Performing anomaly detection in hybrid systems is a challenging…
2570 requires analysis of timing behavior and mutual dependencies of both dis…
2571 and continuous signals. Typically, it requires modeling system behavior,…
2572 is often accomplished manually by human engineers. Using machine learnin…
2573 creating a behavioral model from observations has advantages, such as lo…
2574 development costs and fewer requirements for specific knowledge about the
2575 system. The paper presents DAD:DeepAnomalyDetection, a new approach for
2576 automatic model learning and anomaly detection in hybrid production syst…
2577 combines deep learning and timed automata for creating behavioral model …
2578 observations. The ability of deep belief nets to extract binary features…
2579 real-valued inputs is used for transformation of continuous to discrete
2580 signals. These signals, together with the original discrete signals are …
2581 handled in an identical way. Anomaly detection is performed by the compa…
2582 of actual and predicted system behavior. The algorithm has been applied …
2583 data sets including two from real systems and has shown promising result…
2584 &lt;/p&gt;
2585 </description>
2586 </item>
2587 <item>
2588 <title>ProCAN: Progressive Growing Channel Attentive Non-Local Network f…
2589 <link>http://fr.arxiv.org/abs/2010.15417</link>
2590 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2591
2592 &lt;p&gt;Lung cancer classification in screening computed tomography (CT…
2593 of the most crucial tasks for early detection of this disease. Many live…
2594 be saved if we are able to accurately classify malignant/ cancerous lung
2595 nodules. Consequently, several deep learning based models have been prop…
2596 recently to classify lung nodules as malignant or benign. Nevertheless, …
2597 large variation in the size and heterogeneous appearance of the nodules …
2598 this task an extremely challenging one. We propose a new Progressive Gro…
2599 Channel Attentive Non-Local (ProCAN) network for lung nodule classificat…
2600 The proposed method addresses this challenge from three different aspect…
2601 First, we enrich the Non-Local network by adding channel-wise attention
2602 capability to it. Second, we apply Curriculum Learning principles, where…
2603 first train our model on easy examples before hard/ difficult ones. Thir…
2604 the classification task gets harder during the Curriculum learning, our …
2605 is progressively grown to increase its capability of handling the task a…
2606 We examined our proposed method on two different public datasets and com…
2607 its performance with state-of-the-art methods in the literature. The res…
2608 show that the ProCAN model outperforms state-of-the-art methods and achi…
2609 AUC of 98.05% and accuracy of 95.28% on the LIDC-IDRI dataset. Moreover,…
2610 conducted extensive ablation studies to analyze the contribution and eff…
2611 each new component of our proposed method.
2612 &lt;/p&gt;
2613 </description>
2614 </item>
2615 <item>
2616 <title>Scalable Graph Neural Networks via Bidirectional Propagation. (ar…
2617 <link>http://fr.arxiv.org/abs/2010.15421</link>
2618 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2619
2620 &lt;p&gt;Graph Neural Networks (GNN) is an emerging field for learning on
2621 non-Euclidean data. Recently, there has been increased interest in desig…
2622 GNN that scales to large graphs. Most existing methods use &quot;graph s…
2623 &quot;layer-wise sampling&quot; techniques to reduce training time. Howe…
2624 methods still suffer from degrading performance and scalability problems…
2625 applying to graphs with billions of edges. This paper presents GBP, a sc…
2626 GNN that utilizes a localized bidirectional propagation process from bot…
2627 feature vectors and the training/testing nodes. Theoretical analysis sho…
2628 GBP is the first method that achieves sub-linear time complexity for bot…
2629 precomputation and the training phases. An extensive empirical study
2630 demonstrates that GBP achieves state-of-the-art performance with signifi…
2631 less training/testing time. Most notably, GBP can deliver superior perfo…
2632 on a graph with over 60 million nodes and 1.8 billion edges in less than…
2633 an hour on a single machine.
2634 &lt;/p&gt;
2635 </description>
2636 </item>
2637 <item>
2638 <title>Tilde at WMT 2020: News Task Systems. (arXiv:2010.15423v1 [cs.CL]…
2639 <link>http://fr.arxiv.org/abs/2010.15423</link>
2640 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2641
2642 &lt;p&gt;This paper describes Tilde&apos;s submission to the WMT2020 sha…
2643 translation for both directions of the English-Polish language pair in b…
2644 constrained and the unconstrained tracks. We follow our submissions from…
2645 previous years and build our baseline systems to be morphologically moti…
2646 sub-word unit-based Transformer base models that we train using the Mari…
2647 machine translation toolkit. Additionally, we experiment with different
2648 parallel and monolingual data selection schemes, as well as sampled
2649 back-translation. Our final models are ensembles of Transformer base and
2650 Transformer big models that feature right-to-left re-ranking.
2651 &lt;/p&gt;
2652 </description>
2653 </item>
2654 <item>
2655 <title>Detection of asteroid trails in Hubble Space Telescope images usi…
2656 <link>http://fr.arxiv.org/abs/2010.15425</link>
2657 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2658
2659 &lt;p&gt;We present an application of Deep Learning for the image recogn…
2660 asteroid trails in single-exposure photos taken by the Hubble Space Tele…
2661 Using algorithms based on multi-layered deep Convolutional Neural Networ…
2662 report accuracies of above 80% on the validation set. Our project was mo…
2663 by the Hubble Asteroid Hunter project on Zooniverse, which focused on
2664 identifying these objects in order to localize and better characterize t…
2665 aim to demonstrate that Machine Learning techniques can be very useful in
2666 trying to solve problems that are closely related to Astronomy and
2667 Astrophysics, but that they are still not developed enough for very spec…
2668 tasks.
2669 &lt;/p&gt;
2670 </description>
2671 </item>
2672 <item>
2673 <title>Physics-informed deep learning for flow and deformation in poroel…
2674 <link>http://fr.arxiv.org/abs/2010.15426</link>
2675 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2676
2677 &lt;p&gt;A physics-informed neural network is presented for poroelastic …
2678 coupled flow and deformation processes. The governing equilibrium and ma…
2679 balance equations are discussed and specific derivations for two-dimensi…
2680 cases are presented. A fully-connected deep neural network is used for
2681 training. Barry and Mercer&apos;s source problem with time-dependent flu…
2682 injection/extraction in an idealized poroelastic medium, which has an ex…
2683 analytical solution, is used as a numerical example. A random sample fro…
2684 analytical solution is used as training data and the performance of the …
2685 is tested by predicting the solution on the entire domain after training…
2686 deep learning model predicts the horizontal and vertical deformations we…
2687 while the error in the predicted pore pressure predictions is slightly h…
2688 because of the sparsity of the pore pressure values.
2689 &lt;/p&gt;
2690 </description>
2691 </item>
2692 <item>
2693 <title>Sparse Signal Reconstruction for Nonlinear Models via Piecewise R…
2694 <link>http://fr.arxiv.org/abs/2010.15427</link>
2695 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2696
2697 &lt;p&gt;We propose a method to reconstruct sparse signals degraded by a…
2698 distortion and acquired at a limited sampling rate. Our method formulate…
2699 reconstruction problem as a nonconvex minimization of the sum of a data …
2700 term and a penalization term. In contrast with most previous works which…
2701 for approximated local solutions, we seek for a global solution to the o…
2702 challenging nonconvex problem. Our global approach relies on the so-call…
2703 Lasserre relaxation of polynomial optimization. We here specifically inc…
2704 our approach the case of piecewise rational functions, which makes it po…
2705 to address a wide class of nonconvex exact and continuous relaxations of…
2706 $\ell_0$ penalization function. Additionally, we study the complexity of…
2707 optimization problem. It is shown how to use the structure of the proble…
2708 lighten the computational burden efficiently. Finally, numerical simulat…
2709 illustrate the benefits of our method in terms of both global optimality…
2710 signal reconstruction.
2711 &lt;/p&gt;
2712 </description>
2713 </item>
2714 <item>
2715 <title>Self-paced Data Augmentation for Training Neural Networks. (arXiv…
2716 <link>http://fr.arxiv.org/abs/2010.15434</link>
2717 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2718
2719 &lt;p&gt;Data augmentation is widely used for machine learning; however,…
2720 method to apply data augmentation has not been established even though it
2721 includes several factors that should be tuned carefully. One such factor…
2722 sample suitability, which involves selecting samples that are suitable f…
2723 augmentation. A typical method that applies data augmentation to all tra…
2724 samples disregards sample suitability, which may reduce classifier perfo…
2725 To address this problem, we propose the self-paced augmentation (SPA) to
2726 automatically and dynamically select suitable samples for data augmentat…
2727 when training a neural network. The proposed method mitigates the deteri…
2728 of generalization performance caused by ineffective data augmentation. We
2729 discuss two reasons the proposed SPA works relative to curriculum learni…
2730 desirable changes to loss function instability. Experimental results
2731 demonstrate that the proposed SPA can improve the generalization perform…
2732 particularly when the number of training samples is small. In addition, …
2733 proposed SPA outperforms the state-of-the-art RandAugment method.
2734 &lt;/p&gt;
2735 </description>
2736 </item>
2737 <item>
2738 <title>Group-Harmonic and Group-Closeness Maximization -- Approximation …
2739 <link>http://fr.arxiv.org/abs/2010.15435</link>
2740 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2741
2742 &lt;p&gt;Centrality measures characterize important nodes in networks. E…
2743 computing such nodes has received a lot of attention. When considering t…
2744 generalization of computing central groups of nodes, challenging optimiz…
2745 problems occur. In this work, we study two such problems, group-harmonic
2746 maximization and group-closeness maximization both from a theoretical an…
2747 an algorithm engineering perspective.
2748 &lt;/p&gt;
2749 &lt;p&gt;On the theoretical side, we obtain the following results. For g…
2750 maximization, unless $P=NP$, there is no polynomial-time algorithm that
2751 achieves an approximation factor better than $1-1/e$ (directed) and $1-1…
2752 (undirected), even for unweighted graphs. On the positive side, we show …
2753 greedy algorithm achieves an approximation factor of $\lambda(1-2/e)$
2754 (directed) and $\lambda(1-1/e)/2$ (undirected), where $\lambda$ is the r…
2755 minimal and maximal edge weights. For group-closeness maximization, the
2756 undirected case is $NP$-hard to be approximated to within a factor bette…
2757 $1-1/(e+1)$ and a constant approximation factor is achieved by a local-s…
2758 algorithm. For the directed case, however, we show that, for any
2759 $\epsilon&amp;lt;1/2$, the problem is $NP$-hard to be approximated withi…
2760 $4|V|^{-\epsilon}$.
2761 &lt;/p&gt;
2762 &lt;p&gt;From the algorithm engineering perspective, we provide efficient
2763 implementations of the above greedy and local search algorithms. In our
2764 experimental study we show that, on small instances where an optimum sol…
2765 can be computed in reasonable time, the quality of both the greedy and t…
2766 local search algorithms come very close to the optimum. On larger instan…
2767 our local search algorithms yield results with superior quality compared…
2768 existing greedy and local search solutions, at the cost of additional ru…
2769 time. We thus advocate local search for scenarios where solution quality…
2770 highest concern.
2771 &lt;/p&gt;
2772 </description>
2773 </item>
2774 <item>
2775 <title>Affordance-Aware Handovers with Human Arm Mobility Constraints. (…
2776 <link>http://fr.arxiv.org/abs/2010.15436</link>
2777 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2778
2779 &lt;p&gt;Reasoning about object handover configurations allows an assist…
2780 estimate the appropriateness of handover for a receiver with different a…
2781 mobility capacities. While there are existing approaches to estimating t…
2782 effectiveness of handovers, their findings are limited to users without …
2783 mobility impairments and to specific objects. Therefore, current
2784 state-of-the-art approaches are unable to hand over novel objects to rec…
2785 with different arm mobility capacities. We propose a method that general…
2786 handover behaviours to previously unseen objects, subject to the constra…
2787 a user&apos;s arm mobility levels and the task context. We propose a
2788 heuristic-guided hierarchically optimised cost whose optimisation adapts…
2789 configurations for receivers with low arm mobility. This also ensures th…
2790 robot grasps consider the context of the user&apos;s upcoming task, i.e.…
2791 of the object. To understand preferences over handover configurations, we
2792 report on the findings of an online study, wherein we presented different
2793 handover methods, including ours, to $259$ users with different levels o…
2794 mobility. We encapsulate these preferences in a SRL that is able to reas…
2795 about the most suitable handover configuration given a receiver&apos;s a…
2796 and upcoming task. We find that people&apos;s preferences over handover …
2797 correlated to their arm mobility capacities. In experiments with a PR2 r…
2798 platform, we obtained an average handover accuracy of $90.8\%$ when
2799 generalising handovers to novel objects.
2800 &lt;/p&gt;
2801 </description>
2802 </item>
2803 <item>
2804 <title>Memory Attentive Fusion: External Language Model Integration for …
2805 <link>http://fr.arxiv.org/abs/2010.15437</link>
2806 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2807
2808 &lt;p&gt;This paper presents a novel fusion method for integrating an ex…
2809 language model (LM) into the Transformer based sequence-to-sequence (seq…
2810 model. While paired data are basically required to train the seq2seq mod…
2811 external LM can be trained with only unpaired data. Thus, it is importan…
2812 leverage memorized knowledge in the external LM for building the seq2seq…
2813 since it is hard to prepare a large amount of paired data. However, the
2814 existing fusion methods assume that the LM is integrated with recurrent …
2815 network-based seq2seq models instead of the Transformer. Therefore, this…
2816 proposes a fusion method that can explicitly utilize network structures …
2817 Transformer. The proposed method, called {\bf memory attentive fusion},
2818 leverages the Transformer-style attention mechanism that repeats source-…
2819 attention in a multi-hop manner for reading the memorized knowledge in t…
2820 Our experiments on two text-style conversion tasks demonstrate that the
2821 proposed method performs better than conventional fusion methods.
2822 &lt;/p&gt;
2823 </description>
2824 </item>
2825 <item>
2826 <title>Modeling and Control of COVID-19 Epidemic through Testing Policie…
2827 <link>http://fr.arxiv.org/abs/2010.15438</link>
2828 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2829
2830 &lt;p&gt;Testing for the infected cases is one of the most important mec…
2831 control an epidemic. It enables to isolate the detected infected individ…
2832 thereby limiting the disease transmission to the susceptible population.
2833 However, despite the significance of testing policies, the recent litera…
2834 the subject lacks a control-theoretic perspective. In this work, an epid…
2835 model that incorporates the testing rate as a control input is presented…
2836 proposed model differentiates the undetected infected from the detected
2837 infected cases, who are assumed to be removed from the disease spreading
2838 process in the population. First, the model is estimated and validated f…
2839 COVID-19 data in France. Then, two testing policies are proposed, the so…
2840 best-effort strategy for testing (BEST) and constant optimal strategy for
2841 testing (COST). The BEST policy is a suppression strategy that provides …
2842 bound on the testing rate such that the epidemic switches from a spreadi…
2843 non-spreading state. The COST policy is a mitigation strategy that provi…
2844 optimal value of testing rate that minimizes the peak value of the infec…
2845 population when the total stockpile of tests is limited. Both testing po…
2846 are evaluated by predicting the number of active intensive care unit (IC…
2847 cases and the cumulative number of deaths due to COVID-19.
2848 &lt;/p&gt;
2849 </description>
2850 </item>
2851 <item>
2852 <title>FlatNet: Towards Photorealistic Scene Reconstruction from Lensles…
2853 <link>http://fr.arxiv.org/abs/2010.15440</link>
2854 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2855
2856 &lt;p&gt;Lensless imaging has emerged as a potential solution towards re…
2857 ultra-miniature cameras by eschewing the bulky lens in a traditional cam…
2858 Without a focusing lens, the lensless cameras rely on computational algo…
2859 to recover the scenes from multiplexed measurements. However, the current
2860 iterative-optimization-based reconstruction algorithms produce noisier a…
2861 perceptually poorer images. In this work, we propose a non-iterative deep
2862 learning based reconstruction approach that results in orders of magnitu…
2863 improvement in image quality for lensless reconstructions. Our approach,…
2864 $\textit{FlatNet}$, lays down a framework for reconstructing high-quality
2865 photorealistic images from mask-based lensless cameras, where the camera…
2866 forward model formulation is known. FlatNet consists of two stages: (1) …
2867 inversion stage that maps the measurement into a space of intermediate
2868 reconstruction by learning parameters within the forward model formulati…
2869 (2) a perceptual enhancement stage that improves the perceptual quality …
2870 intermediate reconstruction. These stages are trained together in an end…
2871 manner. We show high-quality reconstructions by performing extensive
2872 experiments on real and challenging scenes using two different types of
2873 lensless prototypes: one which uses a separable forward model and anothe…
2874 which uses a more general non-separable cropped-convolution model. Our
2875 end-to-end approach is fast, produces photorealistic reconstructions, an…
2876 easy to adopt for other mask-based lensless cameras.
2877 &lt;/p&gt;
2878 </description>
2879 </item>
2880 <item>
2881 <title>Self-awareness in intelligent vehicles: Feature based dynamic Bay…
2882 <link>http://fr.arxiv.org/abs/2010.15441</link>
2883 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2884
2885 &lt;p&gt;The evolution of Intelligent Transportation Systems in recent t…
2886 necessitates the development of self-awareness in agents. Before the int…
2887 use of Machine Learning, the detection of abnormalities was manually pro…
2888 by checking every variable and creating huge nested conditions that are …
2889 difficult to track. This paper aims to introduce a novel method to devel…
2890 self-awareness in autonomous vehicles that mainly focuses on detecting a…
2891 situations around the considered agents. Multi-sensory time-series data …
2892 the vehicles are used to develop the data-driven Dynamic Bayesian Networ…
2893 models used for future state prediction and the detection of dynamic
2894 abnormalities. Moreover, an initial level collective awareness model tha…
2895 perform joint anomaly detection in co-operative tasks is proposed. The G…
2896 algorithm learns the DBN models&apos; discrete node variables; probabili…
2897 transition links connect the node variables. A Markov Jump Particle Filt…
2898 (MJPF) is applied to predict future states and detect when the vehicle is
2899 potentially misbehaving using learned DBNs as filter parameters. In this…
2900 datasets from real experiments of autonomous vehicles performing various…
2901 used to learn and test a set of switching DBN models.
2902 &lt;/p&gt;
2903 </description>
2904 </item>
2905 <item>
2906 <title>Advanced Python Performance Monitoring with Score-P. (arXiv:2010.…
2907 <link>http://fr.arxiv.org/abs/2010.15444</link>
2908 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2909
2910 &lt;p&gt;Within the last years, Python became more prominent in the scie…
2911 community and is now used for simulations, machine learning, and data an…
2912 All these tasks profit from additional compute power offered by parallel…
2913 offloading. In the domain of High Performance Computing (HPC), we can lo…
2914 to decades of experience exploiting different levels of parallelism on t…
2915 core, node or inter-node level, as well as utilising accelerators. By us…
2916 performance analysis tools to investigate all these levels of parallelis…
2917 can tune applications for unprecedented performance. Unfortunately, stan…
2918 Python performance analysis tools cannot cope with highly parallel progr…
2919 Since the development of such software is complex and error-prone, we
2920 demonstrate an easy-to-use solution based on an existing tool infrastruc…
2921 for performance analysis. In this paper, we describe how to apply the
2922 established instrumentation framework \scorep to trace Python applicatio…
2923 finish with a study of the overhead that users can expect for instrument…
2924 their applications.
2925 &lt;/p&gt;
2926 </description>
2927 </item>
2928 <item>
2929 <title>Progressive Voice Trigger Detection: Accuracy vs Latency. (arXiv:…
2930 <link>http://fr.arxiv.org/abs/2010.15446</link>
2931 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2932
2933 &lt;p&gt;We present an architecture for voice trigger detection for virt…
2934 assistants. The main idea in this work is to exploit information in word…
2935 immediately follow the trigger phrase. We first demonstrate that by incl…
2936 more audio context after a detected trigger phrase, we can indeed get a …
2937 accurate decision. However, waiting to listen to more audio each time in…
2938 latency increase. Progressive Voice Trigger Detection allows us to trade…
2939 latency and accuracy by accepting clear trigger candidates quickly, but …
2940 for more context to decide whether to accept more marginal examples. Usi…
2941 two-stage architecture, we show that by delaying the decision for just 3…
2942 detected true triggers in the test set, we are able to obtain a relative
2943 improvement of 66% in false rejection rate, while incurring only a negli…
2944 increase in latency.
2945 &lt;/p&gt;
2946 </description>
2947 </item>
2948 <item>
2949 <title>Capacity-achieving codes: a review on double transitivity. (arXiv…
2950 <link>http://fr.arxiv.org/abs/2010.15453</link>
2951 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2952
2953 &lt;p&gt;Recently it was proved that if a linear code is invariant under…
2954 a doubly transitive permutation group, it achieves the capacity of erasu…
2955 channel. Therefore, it is of sufficient interest to classify all codes,
2956 invariant under such permutation groups. We take a step in this directio…
2957 give a review of all suitable groups and the known results on codes inva…
2958 under these groups. It turns out that there are capacity-achieving famil…
2959 algebraic geometric codes.
2960 &lt;/p&gt;
2961 </description>
2962 </item>
2963 <item>
2964 <title>Scalable Federated Learning over Passive Optical Networks. (arXiv…
2965 <link>http://fr.arxiv.org/abs/2010.15454</link>
2966 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2967
2968 &lt;p&gt;Two-step aggregation is introduced to facilitate scalable feder…
2969 (SFL) over passive optical networks (PONs). Results reveal that the SFL …
2970 the required PON upstream bandwidth constant regardless of the number of
2971 involved clients, while bringing ~10% learning accuracy improvement.
2972 &lt;/p&gt;
2973 </description>
2974 </item>
2975 <item>
2976 <title>Optimal Sharing and and Fair Cost Allocation of Community Energy …
2977 <link>http://fr.arxiv.org/abs/2010.15455</link>
2978 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
2979
2980 &lt;p&gt;This paper studies an ES sharing model where multiple buildings…
2981 invest and share a community ES (CES) to harness economic benefits from …
2982 renewable integration and utility price arbitrage. Particularly, we form…
2983 the problem that integrates the optimal ES sizing, operation and cost
2984 allocation as a coalition game, which are generally addressed separately…
2985 literature. Particularly, we address the fair ex-post cost allocation wh…
2986 not been well studied. To overcome the computational challenge of comput…
2987 entire information of explicit characteristic functions that takes expon…
2988 time, we propose a fair cost allocation based on nucleolus by employing a
2989 constraints generation technique. We study the fairness and computational
2990 efficiency of the method through a number of case studies. The numeric r…
2991 imply that the proposed method outperforms the Shapley approach and
2992 proportional method either in computational efficiency or fairness. Nota…
2993 for the proposed method, only a small fraction of characteristic functio…
2994 (2.54%) is computed to achieve the cost allocation versus the entire
2995 information required by Shapley approach. With the proposed cost allocat…
2996 investigate the enhanced economic benefits of the CES model for individu…
2997 buildings over individual ES (IES) installation. We see the CES model pr…
2998 higher cost reduction to each committed buildings. Moreover, the value of
2999 storage is obviously improved (about 1.83 times) with the CES model over…
3000 IES model.
3001 &lt;/p&gt;
3002 </description>
3003 </item>
3004 <item>
3005 <title>Multilayer Clustered Graph Learning. (arXiv:2010.15456v1 [cs.LG])…
3006 <link>http://fr.arxiv.org/abs/2010.15456</link>
3007 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3008
3009 &lt;p&gt;Multilayer graphs are appealing mathematical tools for modeling…
3010 types of relationship in the data. In this paper, we aim at analyzing
3011 multilayer graphs by properly combining the information provided by indi…
3012 layers, while preserving the specific structure that allows us to eventu…
3013 identify communities or clusters that are crucial in the analysis of gra…
3014 data. To do so, we learn a clustered representative graph by solving an
3015 optimization problem that involves a data fidelity term to the observed …
3016 and a regularization pushing for a sparse and community-aware graph. We …
3017 contrastive loss as a data fidelity term, in order to properly aggregate…
3018 observed layers into a representative graph. The regularization is based…
3019 measure of graph sparsification called &quot;effective resistance&quot;,…
3020 penalization of the first few eigenvalues of the representative graph La…
3021 matrix to favor the formation of communities. The proposed optimization …
3022 is nonconvex but fully differentiable, and thus can be solved via the pr…
3023 gradient method. Experiments show that our method leads to a significant
3024 improvement w.r.t. state-of-the-art multilayer graph learning algorithms…
3025 solving clustering problems.
3026 &lt;/p&gt;
3027 </description>
3028 </item>
3029 <item>
3030 <title>FiGLearn: Filter and Graph Learning using Optimal Transport. (arX…
3031 <link>http://fr.arxiv.org/abs/2010.15457</link>
3032 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3033
3034 &lt;p&gt;In many applications, a dataset can be considered as a set of o…
3035 signals that live on an unknown underlying graph structure. Some of these
3036 signals may be seen as white noise that has been filtered on the graph t…
3037 by a graph filter. Hence, the knowledge of the filter and the graph prov…
3038 valuable information about the underlying data generation process and the
3039 complex interactions that arise in the dataset. We hence introduce a nov…
3040 graph signal processing framework for jointly learning the graph and its
3041 generating filter from signal observations. We cast a new optimisation p…
3042 that minimises the Wasserstein distance between the distribution of the …
3043 observations and the filtered signal distribution model. Our proposed me…
3044 outperforms state-of-the-art graph learning frameworks on synthetic data…
3045 then apply our method to a temperature anomaly dataset, and further show…
3046 this framework can be used to infer missing values if only very little
3047 information is available.
3048 &lt;/p&gt;
3049 </description>
3050 </item>
3051 <item>
3052 <title>Named Entity Recognition for Social Media Texts with Semantic Aug…
3053 <link>http://fr.arxiv.org/abs/2010.15458</link>
3054 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3055
3056 &lt;p&gt;Existing approaches for named entity recognition suffer from da…
3057 problems when conducted on short and informal texts, especially user-gen…
3058 social media content. Semantic augmentation is a potential way to allevi…
3059 this problem. Given that rich semantic information is implicitly preserv…
3060 pre-trained word embeddings, they are potential ideal resources for sema…
3061 augmentation. In this paper, we propose a neural-based approach to NER f…
3062 social media texts where both local (from running text) and augmented se…
3063 are taken into account. In particular, we obtain the augmented semantic
3064 information from a large-scale corpus, and propose an attentive semantic
3065 augmentation module and a gate module to encode and aggregate such infor…
3066 respectively. Extensive experiments are performed on three benchmark dat…
3067 collected from English and Chinese social media platforms, where the res…
3068 demonstrate the superiority of our approach to previous studies across a…
3069 three datasets.
3070 &lt;/p&gt;
3071 </description>
3072 </item>
3073 <item>
3074 <title>Concatenated Codes for Recovery From Multiple Reads of DNA Sequen…
3075 <link>http://fr.arxiv.org/abs/2010.15461</link>
3076 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3077
3078 &lt;p&gt;Decoding sequences that stem from multiple transmissions of a c…
3079 an insertion, deletion, and substitution channel is a critical component…
3080 efficient deoxyribonucleic acid (DNA) data storage systems. In this pape…
3081 consider a concatenated coding scheme with an outer low-density parity-c…
3082 code and either an inner convolutional code or a block code. We propose …
3083 decoding algorithms for inference from multiple received sequences, both
3084 combining the inner code and channel to a joint hidden Markov model to i…
3085 symbolwise a posteriori probabilities (APPs). The first decoder computes…
3086 exact APPs by jointly decoding the received sequences, whereas the second
3087 decoder approximates the APPs by combining the results of separately dec…
3088 received sequences. Using the proposed algorithms, we evaluate the perfo…
3089 of decoding multiple received sequences by means of achievable informati…
3090 rates and Monte-Carlo simulations. We show significant performance gains
3091 compared to a single received sequence.
3092 &lt;/p&gt;
3093 </description>
3094 </item>
3095 <item>
3096 <title>Self-Supervised Video Representation Using Pretext-Contrastive Le…
3097 <link>http://fr.arxiv.org/abs/2010.15464</link>
3098 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3099
3100 &lt;p&gt;Pretext tasks and contrastive learning have been successful in
3101 self-supervised learning for video retrieval and recognition. In this st…
3102 analyze their optimization targets and utilize the hyper-sphere feature …
3103 to explore the connections between them, indicating the compatibility and
3104 consistency of these two different learning methods. Based on the analys…
3105 propose a self-supervised training method, referred as Pretext-Contrasti…
3106 Learning (PCL), to learn video representations. Extensive experiments ba…
3107 different combinations of pretext task baselines and contrastive losses …
3108 the strong agreement with their self-supervised learning targets, demons…
3109 the effectiveness and the generality of PCL. The combination of pretext …
3110 and contrastive losses showed significant improvements in both video ret…
3111 and recognition over the corresponding baselines. And we can also outper…
3112 current state-of-the-art methods in the same manner. Further, our PCL is
3113 flexible and can be applied to almost all existing pretext task methods.
3114 &lt;/p&gt;
3115 </description>
3116 </item>
3117 <item>
3118 <title>Improving Named Entity Recognition with Attentive Ensemble of Syn…
3119 <link>http://fr.arxiv.org/abs/2010.15466</link>
3120 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3121
3122 &lt;p&gt;Named entity recognition (NER) is highly sensitive to sententia…
3123 and semantic properties where entities may be extracted according to how…
3124 are used and placed in the running text. To model such properties, one c…
3125 rely on existing resources to providing helpful knowledge to the NER tas…
3126 existing studies proved the effectiveness of doing so, and yet are limit…
3127 appropriately leveraging the knowledge such as distinguishing the import…
3128 ones for particular context. In this paper, we improve NER by leveraging
3129 different types of syntactic information through attentive ensemble, whi…
3130 functionalizes by the proposed key-value memory networks, syntax attenti…
3131 the gate mechanism for encoding, weighting and aggregating such syntactic
3132 information, respectively. Experimental results on six English and Chine…
3133 benchmark datasets suggest the effectiveness of the proposed model and s…
3134 that it outperforms previous studies on all experiment datasets.
3135 &lt;/p&gt;
3136 </description>
3137 </item>
3138 <item>
3139 <title>Emergence of Spatial Coordinates via Exploration. (arXiv:2010.154…
3140 <link>http://fr.arxiv.org/abs/2010.15469</link>
3141 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3142
3143 &lt;p&gt;Spatial knowledge is a fundamental building block for the devel…
3144 advanced perceptive and cognitive abilities. Traditionally, in robotics,…
3145 Euclidean (x,y,z) coordinate system and the agent&apos;s forward model a…
3146 priori. We show that a naive agent can autonomously build an internal
3147 coordinate system, with the same dimension and metric regularity as the
3148 external space, simply by learning to predict the outcome of sensorimotor
3149 transitions in a self-supervised way.
3150 &lt;/p&gt;
3151 </description>
3152 </item>
3153 <item>
3154 <title>Hybrid mimetic finite-difference and virtual element formulation …
3155 <link>http://fr.arxiv.org/abs/2010.15470</link>
3156 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3157
3158 &lt;p&gt;We present a hybrid mimetic finite-difference and virtual eleme…
3159 for coupled single-phase poromechanics on unstructured meshes. The key
3160 advantage of the scheme is that it is convergent on complex meshes conta…
3161 highly distorted cells with arbitrary shapes. We use a local pressure-ju…
3162 stabilization method based on unstructured macro-elements to prevent the
3163 development of spurious pressure modes in incompressible problems approa…
3164 undrained conditions. A scalable linear solution strategy is obtained us…
3165 block-triangular preconditioner designed specifically for the saddle-poi…
3166 systems arising from the proposed discretization. The accuracy and effic…
3167 of our approach are demonstrated numerically on two-dimensional benchmark
3168 problems.
3169 &lt;/p&gt;
3170 </description>
3171 </item>
3172 <item>
3173 <title>Iteratively reweighted greedy set cover. (arXiv:2010.15476v1 [cs.…
3174 <link>http://fr.arxiv.org/abs/2010.15476</link>
3175 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3176
3177 &lt;p&gt;We empirically analyze a simple heuristic for large sparse set …
3178 problems. It uses the weighted greedy algorithm as a basic building bloc…
3179 multiplicative updates of the weights attached to the elements, the gree…
3180 solution is iteratively improved. The implementation of this algorithm is
3181 trivial and the algorithm is essentially free of parameters that would r…
3182 tuning. More iterations can only improve the solution. This set of featu…
3183 makes the approach attractive for practical problems.
3184 &lt;/p&gt;
3185 </description>
3186 </item>
3187 <item>
3188 <title>Learned infinite elements. (arXiv:2010.15479v1 [math.NA])</title>
3189 <link>http://fr.arxiv.org/abs/2010.15479</link>
3190 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3191
3192 &lt;p&gt;We study the numerical solution of scalar time-harmonic wave eq…
3193 unbounded domains which can be split into a bounded interior domain of p…
3194 interest and an exterior domain with separable geometry. To compute the
3195 solution in the interior domain, approximations to the Dirichlet-to-Neum…
3196 (DtN) map of the exterior domain have to be imposed as transparent bound…
3197 conditions on the artificial coupling boundary. Although the DtN map can…
3198 computed by separation of variables, it is a nonlocal operator with dense
3199 matrix representations, and hence computationally inefficient. Therefore,
3200 approximations of DtN maps by sparse matrices, usually involving additio…
3201 degrees of freedom, have been studied intensively in the literature usin…
3202 variety of approaches including different types of infinite elements, lo…
3203 non-reflecting boundary conditions, and perfectly matched layers. The en…
3204 of these sparse matrices are derived analytically, e.g. from transformat…
3205 asymptotic expansions of solutions to the differential equation in the e…
3206 domain. In contrast, in this paper we propose to `learn&apos; the matrix…
3207 from the DtN map in its separated form by solving an optimization proble…
3208 preprocessing step. Theoretical considerations suggest that the approxim…
3209 quality of learned infinite elements improves exponentially with increas…
3210 number of infinite element degrees of freedom, which is confirmed in num…
3211 experiments. These numerical studies also show that learned infinite ele…
3212 outperform state-of-the-art methods for the Helmholtz equation. At the s…
3213 time, learned infinite elements are much more flexible than traditional …
3214 as they, e.g., work similarly well for exterior domains involving strong
3215 reflections, for example, for the atmosphere of the Sun, which is strong…
3216 inhomogeneous and exhibits reflections at the corona.
3217 &lt;/p&gt;
3218 </description>
3219 </item>
3220 <item>
3221 <title>Convergence of Constrained Anderson Acceleration. (arXiv:2010.154…
3222 <link>http://fr.arxiv.org/abs/2010.15482</link>
3223 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3224
3225 &lt;p&gt;We prove non asymptotic linear convergence rates for the constr…
3226 acceleration extrapolation scheme. These guarantees come from new upper …
3227 on the constrained Chebyshev problem, which consists in minimizing the m…
3228 absolute value of a polynomial on a bounded real interval with $l_1$
3229 constraints on its coefficients vector. Constrained Anderson Acceleratio…
3230 numerical cost comparable to that of the original scheme.
3231 &lt;/p&gt;
3232 </description>
3233 </item>
3234 <item>
3235 <title>Beyond cross-entropy: learning highly separable feature distribut…
3236 <link>http://fr.arxiv.org/abs/2010.15487</link>
3237 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3238
3239 &lt;p&gt;Deep learning has shown outstanding performance in several appl…
3240 including image classification. However, deep classifiers are known to be
3241 highly vulnerable to adversarial attacks, in that a minor perturbation o…
3242 input can easily lead to an error. Providing robustness to adversarial a…
3243 is a very challenging task especially in problems involving a large numb…
3244 classes, as it typically comes at the expense of an accuracy decrease. I…
3245 work, we propose the Gaussian class-conditional simplex (GCCS) loss: a n…
3246 approach for training deep robust multiclass classifiers that provides
3247 adversarial robustness while at the same time achieving or even surpassi…
3248 classification accuracy of state-of-the-art methods. Differently from ot…
3249 frameworks, the proposed method learns a mapping of the input classes on…
3250 target distributions in a latent space such that the classes are linearly
3251 separable. Instead of maximizing the likelihood of target labels for ind…
3252 samples, our objective function pushes the network to produce feature
3253 distributions yielding high inter-class separation. The mean values of t…
3254 distributions are centered on the vertices of a simplex such that each c…
3255 at the same distance from every other class. We show that the regulariza…
3256 the latent space based on our approach yields excellent classification a…
3257 and inherently provides robustness to multiple adversarial attacks, both
3258 targeted and untargeted, outperforming state-of-the-art approaches over
3259 challenging datasets.
3260 &lt;/p&gt;
3261 </description>
3262 </item>
3263 <item>
3264 <title>Linearizing Combinators. (arXiv:2010.15490v1 [math.CT])</title>
3265 <link>http://fr.arxiv.org/abs/2010.15490</link>
3266 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3267
3268 &lt;p&gt;In 2017, Bauer, Johnson, Osborne, Riehl, and Tebbe (BJORT) show…
3269 Abelian functor calculus provides an example of a Cartesian differential
3270 category. The definition of a Cartesian differential category is based o…
3271 differential combinator which directly formalizes the total derivative f…
3272 multivariable calculus. However, in the aforementioned work the authors …
3273 techniques from Goodwillie&apos;s functor calculus to establish a linear…
3274 process from which they then derived a differential combinator. This rai…
3275 question of what the precise relationship between linearization and havi…
3276 differential combinator might be.
3277 &lt;/p&gt;
3278 &lt;p&gt;In this paper, we introduce the notion of a linearizing combina…
3279 abstracts linearization in the Abelian functor calculus. We then use it …
3280 provide an alternative axiomatization of a Cartesian differential catego…
3281 Every Cartesian differential category comes equipped with a canonical
3282 linearizing combinator obtained by differentiation at zero. Conversely, a
3283 differential combinator can be constructed \`a la BJORT when one has a s…
3284 of partial linearizing combinators in each context. Thus, while lineariz…
3285 combinators do provide an alternative axiomatization of Cartesian differ…
3286 categories, an explicit notion of partial linearization is required. Thi…
3287 contrast to the situation for differential combinators where partial
3288 differentiation is automatic in the presence of total differentiation. T…
3289 ability to form a system of partial linearizing combinators from a total
3290 linearizing combinator, while not being possible in general, is possible…
3291 the setting is Cartesian closed.
3292 &lt;/p&gt;
3293 </description>
3294 </item>
3295 <item>
3296 <title>A Novel Fast 3D Single Image Super-Resolution Algorithm. (arXiv:2…
3297 <link>http://fr.arxiv.org/abs/2010.15491</link>
3298 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3299
3300 &lt;p&gt;This paper introduces a novel computationally efficient method …
3301 3D single image super-resolution (SR) problem, i.e., reconstruction of a
3302 high-resolution volume from its low-resolution counterpart. The main
3303 contribution lies in the original way of handling simultaneously the ass…
3304 decimation and blurring operators, based on their underlying properties …
3305 frequency domain. In particular, the proposed decomposition technique of…
3306 decimation operator allows a straightforward implementation for Tikhonov
3307 regularization, and can be further used to take into consideration other
3308 regularization functions such as the total variation, enabling the
3309 computational cost of state-of-the-art algorithms to be considerably dec…
3310 Numerical experiments carried out showed that the proposed approach outp…
3311 existing 3D SR methods.
3312 &lt;/p&gt;
3313 </description>
3314 </item>
3315 <item>
3316 <title>&quot;What, not how&quot; -- Solving an under-actuated insertion …
3317 <link>http://fr.arxiv.org/abs/2010.15492</link>
3318 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3319
3320 &lt;p&gt;Robot manipulation requires a complex set of skills that need t…
3321 combined and coordinated to solve a task. Yet, most ReinforcementLearnin…
3322 approaches in robotics study tasks which actually consist only of a sing…
3323 manipulation skill, such as grasping an object or inserting a pre-grasped
3324 object. As a result the skill (&apos;how&apos; to solve the task) but no…
3325 of a complete manipulation (&apos;what&apos; to solve) is specified. In …
3326 study a complex manipulation goal that requires an agent to learn and co…
3327 diverse manipulation skills. We propose a challenging, highly under-actu…
3328 peg-in-hole task with a free, rotational asymmetrical peg, requiring a b…
3329 range of manipulation skills. While correct peg (re-)orientation is a
3330 requirement for successful insertion, there is no reward associated with…
3331 Hence an agent needs to understand this pre-condition and learn the skil…
3332 fulfil it. The final insertion reward is sparse, allowing freedom in the
3333 solution and leading to complex emerging behaviour not envisioned during…
3334 task design. We tackle the problem in a multi-task RL framework using Sc…
3335 Auxiliary Control (SAC-X) combined with Regularized Hierarchical Policy
3336 Optimization (RHPO) which successfully solves the task in simulation and…
3337 scratch on a single robot where data is severely limited.
3338 &lt;/p&gt;
3339 </description>
3340 </item>
3341 <item>
3342 <title>Enhancing Vulnerable Road User Safety: A Survey of Existing Pract…
3343 <link>http://fr.arxiv.org/abs/2010.15502</link>
3344 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3345
3346 &lt;p&gt;Vulnerable road users (VRUs) such as pedestrians, cyclists and …
3347 are at the highest risk in the road traffic environment. Globally, over …
3348 road traffic deaths are vulnerable road users. Although substantial effo…
3349 being made to improve VRU safety from engineering solutions to law enfor…
3350 the death toll of VRUs&apos; continues to rise. The emerging technology,…
3351 Intelligent Transportation System (C-ITS), has the proven potential to e…
3352 road safety by enabling wireless communication to exchange information a…
3353 road users. Such exchanged information is utilized for creating situatio…
3354 awareness and detecting any potential collisions in advance to take nece…
3355 measures to avoid any possible road casualties. The current state-of-the…
3356 solutions of C-ITS for VRU safety, however, are limited to unidirectional
3357 communication where VRUs are only responsible for alerting their presenc…
3358 drivers with the intention of avoiding collisions. This one-way interact…
3359 substantially limiting the enormous potential of C-ITS which otherwise c…
3360 employed to devise a more effective solution for the VRU safety where VR…
3361 be equipped with bidirectional communication with full C-ITS functionali…
3362 To address such problems and to explore better C-ITS solution suggestion…
3363 VRU, this paper reviewed and evaluated the current technologies and safe…
3364 methods proposed for VRU safety over the period 2007-2020. Later, it pre…
3365 the design considerations for a cellular-based Vehicle-to-VRU (V2VRU)
3366 communication system along with potential challenges of a cellular-based
3367 approach to provide necessary recommendations.
3368 &lt;/p&gt;
3369 </description>
3370 </item>
3371 <item>
3372 <title>A stochastic $\theta$-SEIHRD model: adding randomness to the COVI…
3373 <link>http://fr.arxiv.org/abs/2010.15504</link>
3374 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3375
3376 &lt;p&gt;In this article we mainly extend the deterministic model develo…
3377 a stochastic setting. More precisely, we incorporated randomness in some
3378 coefficients by assuming that they follow a prescribed stochastic dynami…
3379 this way, the model variables are now represented by stochastic process,…
3380 can be simulated by appropriately solve the system of stochastic differe…
3381 equations. Thus, the model becomes more complete and flexible than the
3382 deterministic analogous, as it incorporates additional uncertainties whi…
3383 present in more realistic situations. In particular, confidence interval…
3384 the main variables and worst case scenarios can be computed.
3385 &lt;/p&gt;
3386 </description>
3387 </item>
3388 <item>
3389 <title>Dynamic Formation Reshaping Based on Point Set Registration in a …
3390 <link>http://fr.arxiv.org/abs/2010.15506</link>
3391 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3392
3393 &lt;p&gt;This work focuses on the formation reshaping in an optimized ma…
3394 autonomous swarm of drones. Here, the two main problems are: 1) how to b…
3395 and reshape the initial formation in an optimal manner, and 2) how to do…
3396 reformation while minimizing the overall deviation of the drones and the
3397 overall time, i.e., without slowing down. To address the first problem, …
3398 introduce a set of routines for the drones/agents to follow while reshap…
3399 a secondary formation shape. And the second problem is resolved by utili…
3400 the temperature function reduction technique, originally used in the poi…
3401 registration process. The goal is to be able to dynamically reform the s…
3402 multi-agent based swarm in near-optimal manner while going through narrow
3403 openings between, for instance obstacles, and then bringing the agents b…
3404 their original shape after passing through the narrow passage using poin…
3405 registration technique.
3406 &lt;/p&gt;
3407 </description>
3408 </item>
3409 <item>
3410 <title>Dynamic Resource-aware Corner Detection for Bio-inspired Vision S…
3411 <link>http://fr.arxiv.org/abs/2010.15507</link>
3412 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3413
3414 &lt;p&gt;Event-based cameras are vision devices that transmit only brigh…
3415 with low latency and ultra-low power consumption. Such characteristics m…
3416 event-based cameras attractive in the field of localization and object t…
3417 in resource-constrained systems. Since the number of generated events in…
3418 cameras is huge, the selection and filtering of the incoming events are
3419 beneficial from both increasing the accuracy of the features and reducin…
3420 computational load. In this paper, we present an algorithm to detect
3421 asynchronous corners from a stream of events in real-time on embedded sy…
3422 The algorithm is called the Three Layer Filtering-Harris or TLF-Harris
3423 algorithm. The algorithm is based on an events&apos; filtering strategy …
3424 purpose is 1) to increase the accuracy by deliberately eliminating some
3425 incoming events, i.e., noise, and 2) to improve the real-time performanc…
3426 the system, i.e., preserving a constant throughput in terms of input eve…
3427 second, by discarding unnecessary events with a limited accuracy loss. An
3428 approximation of the Harris algorithm, in turn, is used to exploit its
3429 high-quality detection capability with a low-complexity implementation to
3430 enable seamless real-time performance on embedded computing platforms. T…
3431 proposed algorithm is capable of selecting the best corner candidate amo…
3432 neighbors and achieves an average execution time savings of 59 % compare…
3433 the conventional Harris score. Moreover, our approach outperforms the co…
3434 methods, such as eFAST, eHarris, and FA-Harris, in terms of real-time
3435 performance, and surpasses Arc* in terms of accuracy.
3436 &lt;/p&gt;
3437 </description>
3438 </item>
3439 <item>
3440 <title>FullSubNet: A Full-Band and Sub-Band Fusion Model for Real-Time S…
3441 <link>http://fr.arxiv.org/abs/2010.15508</link>
3442 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3443
3444 &lt;p&gt;This paper proposes a full-band and sub-band fusion model, name…
3445 FullSubNet, for single-channel real-time speech enhancement. Full-band a…
3446 sub-band refer to the models that input full-band and sub-band noisy spe…
3447 feature, output full-band and sub-band speech target, respectively. The
3448 sub-band model processes each frequency independently. Its input consist…
3449 one frequency and several context frequencies. The output is the predict…
3450 the clean speech target for the corresponding frequency. These two types…
3451 models have distinct characteristics. The full-band model can capture the
3452 global spectral context and the long-distance cross-band dependencies. H…
3453 it lacks the ability to modeling signal stationarity and attending the l…
3454 spectral pattern. The sub-band model is just the opposite. In our propos…
3455 FullSubNet, we connect a pure full-band model and a pure sub-band model
3456 sequentially and use practical joint training to integrate these two typ…
3457 models&apos; advantages. We conducted experiments on the DNS challenge (…
3458 2020) dataset to evaluate the proposed method. Experimental results show…
3459 full-band and sub-band information are complementary, and the FullSubNet…
3460 effectively integrate them. Besides, the performance of the FullSubNet a…
3461 exceeds that of the top-ranked methods in the DNS Challenge (INTERSPEECH…
3462 &lt;/p&gt;
3463 </description>
3464 </item>
3465 <item>
3466 <title>Night vision obstacle detection and avoidance based on Bio-Inspir…
3467 <link>http://fr.arxiv.org/abs/2010.15509</link>
3468 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3469
3470 &lt;p&gt;Moving towards autonomy, unmanned vehicles rely heavily on stat…
3471 collision avoidance systems (CAS). However, the detection of obstacles
3472 especially during night-time is still a challenging task since the light…
3473 conditions are not sufficient for traditional cameras to function proper…
3474 Therefore, we exploit the powerful attributes of event-based cameras to …
3475 obstacle detection in low lighting conditions. Event cameras trigger eve…
3476 asynchronously at high output temporal rate with high dynamic range of u…
3477 120 $dB$. The algorithm filters background activity noise and extracts o…
3478 using robust Hough transform technique. The depth of each detected objec…
3479 computed by triangulating 2D features extracted utilising LC-Harris. Fin…
3480 asynchronous adaptive collision avoidance (AACA) algorithm is applied for
3481 effective avoidance. Qualitative evaluation is compared using event-came…
3482 traditional camera.
3483 &lt;/p&gt;
3484 </description>
3485 </item>
3486 <item>
3487 <title>Asynchronous Corner Tracking Algorithm based on Lifetime of Event…
3488 <link>http://fr.arxiv.org/abs/2010.15510</link>
3489 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3490
3491 &lt;p&gt;Event cameras, i.e., the Dynamic and Active-pixel Vision Sensor…
3492 capture the intensity changes in the scene and generates a stream of eve…
3493 an asynchronous fashion. The output rate of such cameras can reach up to…
3494 million events per second in high dynamic environments. DAVIS cameras us…
3495 vision sensors that mimic human eyes. Their attractive attributes, such …
3496 output rate, High Dynamic Range (HDR), and high pixel bandwidth, make th…
3497 ideal solution for applications that require high-frequency tracking. Mo…
3498 applications that operate in challenging lighting scenarios can exploit …
3499 high HDR of event cameras, i.e., 140 dB compared to 60 dB of traditional
3500 cameras. In this paper, a novel asynchronous corner tracking method is p…
3501 that uses both events and intensity images captured by a DAVIS camera. T…
3502 Harris algorithm is used to extract features, i.e., frame-corners from
3503 keyframes, i.e., intensity images. Afterward, a matching algorithm is us…
3504 extract event-corners from the stream of events. Events are solely used …
3505 perform asynchronous tracking until the next keyframe is captured. Neigh…
3506 events, within a window size of 5x5 pixels around the event-corner, are …
3507 calculate the velocity and direction of extracted event-corners by fitti…
3508 2D planar using a randomized Hough transform algorithm. Experimental eva…
3509 showed that our approach is able to update the location of the extracted
3510 corners up to 100 times during the blind time of traditional cameras, i.…
3511 between two consecutive intensity images.
3512 &lt;/p&gt;
3513 </description>
3514 </item>
3515 <item>
3516 <title>An Exact Solution Path Algorithm for SLOPE and Quasi-Spherical OS…
3517 <link>http://fr.arxiv.org/abs/2010.15511</link>
3518 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3519
3520 &lt;p&gt;Sorted $L_1$ penalization estimator (SLOPE) is a regularization…
3521 sorted absolute coefficients in high-dimensional regression. By arbitrar…
3522 setting its regularization weights $\lambda$ under the monotonicity cons…
3523 SLOPE can have various feature selection and clustering properties. On w…
3524 tuning, the selected features and their clusters are very sensitive to t…
3525 tuning parameters. Moreover, the exhaustive tracking of their changes is
3526 difficult using grid search methods. This study presents a solution path
3527 algorithm that provides the complete and exact path of solutions for SLO…
3528 fine-tuning regularization weights. A simple optimality condition for SL…
3529 derived and used to specify the next splitting point of the solution pat…
3530 study also proposes a new design of a regularization sequence $\lambda$ …
3531 feature clustering, which is called the quasi-spherical and octagonal sh…
3532 and clustering algorithm for regression (QS-OSCAR). QS-OSCAR is designed…
3533 contour surface of the regularization terms most similar to a sphere. Am…
3534 several regularization sequence designs, sparsity and clustering perform…
3535 are compared through simulation studies. The numerical observations show…
3536 QS-OSCAR performs feature clustering more efficiently than other designs.
3537 &lt;/p&gt;
3538 </description>
3539 </item>
3540 <item>
3541 <title>UNetGAN: A Robust Speech Enhancement Approach in Time Domain for …
3542 <link>http://fr.arxiv.org/abs/2010.15521</link>
3543 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3544
3545 &lt;p&gt;Speech enhancement at extremely low signal-to-noise ratio (SNR)…
3546 a very challenging problem and rarely investigated in previous works. Th…
3547 paper proposes a robust speech enhancement approach (UNetGAN) based on U…
3548 and generative adversarial learning to deal with this problem. This appr…
3549 consists of a generator network and a discriminator network, which opera…
3550 directly in the time domain. The generator network adopts a U-Net like
3551 structure and employs dilated convolution in the bottleneck of it. We ev…
3552 the performance of the UNetGAN at low SNR conditions (up to -20dB) on the
3553 public benchmark. The result demonstrates that it significantly improves…
3554 speech quality and substantially outperforms the representative deep lea…
3555 models, including SEGAN, cGAN fo SE, Bidirectional LSTM using phase-sens…
3556 spectrum approximation cost function (PSA-BLSTM) and Wave-U-Net regarding
3557 Short-Time Objective Intelligibility (STOI) and Perceptual evaluation of…
3558 quality (PESQ).
3559 &lt;/p&gt;
3560 </description>
3561 </item>
3562 <item>
3563 <title>A brief overview of swarm intelligence-based algorithms for numer…
3564 <link>http://fr.arxiv.org/abs/2010.15524</link>
3565 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3566
3567 &lt;p&gt;Numerical Association Rule Mining is a popular variant of Assoc…
3568 Mining, where numerical attributes are handled without discretization. T…
3569 means that the algorithms for dealing with this problem can operate dire…
3570 not only with categorical, but also with numerical attributes. Until rec…
3571 a big portion of these algorithms were based on a stochastic nature-insp…
3572 population-based paradigm. As a result, evolutionary and swarm
3573 intelligence-based algorithms showed big efficiency for dealing with the
3574 problem. In line with this, the main mission of this chapter is to make a
3575 historical overview of swarm intelligence-based algorithms for Numerical
3576 Association Rule Mining, as well as to present the main features of these
3577 algorithms for the observed problem. A taxonomy of the algorithms was pr…
3578 on the basis of the applied features found in this overview. Challenges,
3579 waiting in the future, finish this paper.
3580 &lt;/p&gt;
3581 </description>
3582 </item>
3583 <item>
3584 <title>Self-Learning Threshold-Based Load Balancing. (arXiv:2010.15525v1…
3585 <link>http://fr.arxiv.org/abs/2010.15525</link>
3586 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3587
3588 &lt;p&gt;We consider a large-scale service system where incoming tasks h…
3589 instantaneously dispatched to one out of many parallel server pools. The
3590 dispatcher uses a threshold for balancing the load and keeping the maxim…
3591 number of concurrent tasks across server pools low. We demonstrate that …
3592 policy is optimal on the fluid and diffusion scales for a suitable thres…
3593 value, while only involving a small communication overhead. In order to …
3594 threshold optimally, it is important, however, to learn the load of the …
3595 which may be uncertain or even time-varying. For that purpose, we design…
3596 control rule for tuning the threshold in an online manner. We provide
3597 conditions which guarantee that this adaptive threshold settles at the o…
3598 value, along with estimates for the time until this happens.
3599 &lt;/p&gt;
3600 </description>
3601 </item>
3602 <item>
3603 <title>A comparison of automatic multi-tissue segmentation methods of th…
3604 <link>http://fr.arxiv.org/abs/2010.15526</link>
3605 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3606
3607 &lt;p&gt;It is critical to quantitatively analyse the developing human f…
3608 order to fully understand neurodevelopment in both normal fetuses and th…
3609 with congenital disorders. To facilitate this analysis, automatic multi-…
3610 fetal brain segmentation algorithms are needed, which in turn requires o…
3611 databases of segmented fetal brains. Here we introduce a publicly availa…
3612 database of 50 manually segmented pathological and non-pathological fetal
3613 magnetic resonance brain volume reconstructions across a range of gestat…
3614 ages (20 to 33 weeks) into 7 different tissue categories (external
3615 cerebrospinal fluid, grey matter, white matter, ventricles, cerebellum, …
3616 grey matter, brainstem/spinal cord). In addition, we quantitatively eval…
3617 the accuracy of several automatic multi-tissue segmentation algorithms o…
3618 developing human fetal brain. Four research groups participated, submitt…
3619 total of 10 algorithms, demonstrating the benefits the database for the
3620 development of automatic algorithms.
3621 &lt;/p&gt;
3622 </description>
3623 </item>
3624 <item>
3625 <title>On the robustness of kernel-based pairwise learning. (arXiv:2010.…
3626 <link>http://fr.arxiv.org/abs/2010.15527</link>
3627 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3628
3629 &lt;p&gt;It is shown that many results on the statistical robustness of …
3630 pairwise learning can be derived under basically no assumptions on the i…
3631 and output spaces. In particular neither moment conditions on the condit…
3632 distribution of Y given X = x nor the boundedness of the output space is
3633 needed. We obtain results on the existence and boundedness of the influe…
3634 function and show qualitative robustness of the kernel-based estimator. …
3635 present paper generalizes results by Christmann and Zhou (2016) by allow…
3636 prediction function to take two arguments and can thus be applied in a v…
3637 of situations such as ranking.
3638 &lt;/p&gt;
3639 </description>
3640 </item>
3641 <item>
3642 <title>An End to End Network Architecture for Fundamental Matrix Estimat…
3643 <link>http://fr.arxiv.org/abs/2010.15528</link>
3644 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3645
3646 &lt;p&gt;In this paper, we present a novel end-to-end network architectu…
3647 fundamental matrix directly from stereo images. To establish a complete …
3648 pipeline, different deep neural networks in charge of finding correspond…
3649 in images, performing outlier rejection and calculating fundamental matr…
3650 integrated into an end-to-end network architecture.
3651 &lt;/p&gt;
3652 &lt;p&gt;To well train the network and preserve geometry properties of f…
3653 matrix, a new loss function is introduced. To evaluate the accuracy of
3654 estimated fundamental matrix more reasonably, we design a new evaluation…
3655 which is highly consistent with visualization result. Experiments conduc…
3656 both outdoor and indoor data-sets show that this network outperforms
3657 traditional methods as well as previous deep learning based methods on v…
3658 metrics and achieves significant performance improvements.
3659 &lt;/p&gt;
3660 </description>
3661 </item>
3662 <item>
3663 <title>Probabilistic interval predictor based on dissimilarity functions…
3664 <link>http://fr.arxiv.org/abs/2010.15530</link>
3665 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3666
3667 &lt;p&gt;This work presents a new method to obtain probabilistic interva…
3668 of a dynamical system. The method uses stored past system measurements to
3669 estimate the future evolution of the system. The proposed method relies …
3670 use of dissimilarity functions to estimate the conditional probability d…
3671 function of the outputs. A family of empirical probability density funct…
3672 parameterized by means of two parameters, is introduced. It is shown tha…
3673 the proposed family encompasses the multivariable normal probability den…
3674 function as a particular case. We show that the proposed method constitu…
3675 generalization of classical estimation methods. A cross-validation schem…
3676 used to tune the two parameters on which the methodology relies. In orde…
3677 prove the effectiveness of the methodology presented, some numerical exa…
3678 and comparisons are provided.
3679 &lt;/p&gt;
3680 </description>
3681 </item>
3682 <item>
3683 <title>Coordinated Formation Control for Intelligent and Connected Vehic…
3684 <link>http://fr.arxiv.org/abs/2010.15531</link>
3685 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3686
3687 &lt;p&gt;In this paper, a unified multi-vehicle formation control framew…
3688 Intelligent and Connected Vehicles (ICVs) that can apply to multiple tra…
3689 scenarios is proposed. In the one-dimensional scenario, different format…
3690 geometries are analyzed and the interlaced structure is mathematically
3691 modelized to improve driving safety while making full use of the lane ca…
3692 The assignment problem for vehicles and target positions is solved using
3693 Hungarian Algorithm to improve the flexibility of the method in multiple
3694 scenarios. In the two-dimensional scenario, an improved virtual platoon …
3695 is proposed to transfer the complex two-dimensional passing problem to t…
3696 one-dimensional formation control problem based on the idea of rotation
3697 projection. Besides, the vehicle regrouping method is proposed to connec…
3698 two scenarios. Simulation results prove that the proposed multi-vehicle
3699 formation control framework can apply to multiple typical scenarios and …
3700 better performance than existing methods.
3701 &lt;/p&gt;
3702 </description>
3703 </item>
3704 <item>
3705 <title>How do Offline Measures for Exploration in Reinforcement Learning…
3706 <link>http://fr.arxiv.org/abs/2010.15533</link>
3707 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3708
3709 &lt;p&gt;Sufficient exploration is paramount for the success of a reinfo…
3710 learning agent. Yet, exploration is rarely assessed in an algorithm-inde…
3711 way. We compare the behavior of three data-based, offline exploration me…
3712 described in the literature on intuitive simple distributions and highli…
3713 problems to be aware of when using them. We propose a fourth metric,unif…
3714 relative entropy, and implement it using either a k-nearest-neighbor or a
3715 nearest-neighbor-ratio estimator, highlighting that the implementation c…
3716 have a profound impact on these measures.
3717 &lt;/p&gt;
3718 </description>
3719 </item>
3720 <item>
3721 <title>Poster: Benchmarking Financial Data Feed Systems. (arXiv:2010.155…
3722 <link>http://fr.arxiv.org/abs/2010.15534</link>
3723 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3724
3725 &lt;p&gt;Data-driven solutions for the investment industry require event…
3726 systems to process high-volume financial data feeds with low latency, hi…
3727 throughput, and guaranteed delivery modes.
3728 &lt;/p&gt;
3729 &lt;p&gt;At vwd we process an average of 18 billion incoming event notif…
3730 500+ data sources for 30 million symbols per day and peak rates of 1+ mi…
3731 notifications per second using custom-built platforms that keep audit lo…
3732 every event.
3733 &lt;/p&gt;
3734 &lt;p&gt;We currently assess modern open source event-processing platfor…
3735 Kafka, NATS, Redis, Flink or Storm for the use in our ticker plant to re…
3736 the maintenance effort for cross-cutting concerns and leverage hybrid
3737 deployment models. For comparability and repeatability we benchmark cand…
3738 with a standardized workload we derived from our real data feeds.
3739 &lt;/p&gt;
3740 &lt;p&gt;We have enhanced an existing light-weight open source benchmark…
3741 its processing, logging, and reporting capabilities to cope with our wor…
3742 The resulting tool wrench can simulate workloads or replay snapshots in …
3743 and dynamics like those we process in our ticker plant. We provide the t…
3744 open source.
3745 &lt;/p&gt;
3746 &lt;p&gt;As part of ongoing work we contribute details on (a) our worklo…
3747 requirements for benchmarking candidate platforms for financial feed
3748 processing; (b) the current state of the tool wrench.
3749 &lt;/p&gt;
3750 </description>
3751 </item>
3752 <item>
3753 <title>Unbabel&apos;s Participation in the WMT20 Metrics Shared Task. (a…
3754 <link>http://fr.arxiv.org/abs/2010.15535</link>
3755 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3756
3757 &lt;p&gt;We present the contribution of the Unbabel team to the WMT 2020…
3758 on Metrics. We intend to participate on the segment-level, document-leve…
3759 system-level tracks on all language pairs, as well as the &apos;QE as a …
3760 track. Accordingly, we illustrate results of our models in these tracks …
3761 reference to test sets from the previous year. Our submissions build upo…
3762 recently proposed COMET framework: We train several estimator models to …
3763 on different human-generated quality scores and a novel ranking model tr…
3764 on relative ranks obtained from Direct Assessments. We also propose a si…
3765 technique for converting segment-level predictions into a document-level…
3766 Overall, our systems achieve strong results for all language pairs on pr…
3767 test sets and in many cases set a new state-of-the-art.
3768 &lt;/p&gt;
3769 </description>
3770 </item>
3771 <item>
3772 <title>Matern Gaussian Processes on Graphs. (arXiv:2010.15538v1 [stat.ML…
3773 <link>http://fr.arxiv.org/abs/2010.15538</link>
3774 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3775
3776 &lt;p&gt;Gaussian processes are a versatile framework for learning unkno…
3777 in a manner that permits one to utilize prior information about their
3778 properties. Although many different Gaussian process models are readily
3779 available when the input space is Euclidean, the choice is much more lim…
3780 for Gaussian processes whose input space is an undirected graph. In this…
3781 we leverage the stochastic partial differential equation characterizatio…
3782 Mat\&apos;{e}rn Gaussian processes - a widely-used model class in the Eu…
3783 setting - to study their analog for undirected graphs. We show that the
3784 resulting Gaussian processes inherit various attractive properties of th…
3785 Euclidean and Riemannian analogs and provide techniques that allow them …
3786 trained using standard methods, such as inducing points. This enables gr…
3787 Mat\&apos;{e}rn Gaussian processes to be employed in mini-batch and non-…
3788 settings, thereby making them more accessible to practitioners and easie…
3789 deploy within larger learning frameworks.
3790 &lt;/p&gt;
3791 </description>
3792 </item>
3793 <item>
3794 <title>Micromagnetics of thin films in the presence of Dzyaloshinskii-Mo…
3795 <link>http://fr.arxiv.org/abs/2010.15541</link>
3796 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3797
3798 &lt;p&gt;In this paper, we study the thin-film limit of the micromagneti…
3799 functional in the presence of bulk Dzyaloshinskii-Moriya interaction (DM…
3800 analysis includes both a stationary $\Gamma$-convergence result for the
3801 micromagnetic energy, as well as the identification of the asymptotic be…
3802 of the associated Landau-Lifshitz-Gilbert equation. In particular, we pr…
3803 that, in the limiting model, part of the DMI term behaves like the proje…
3804 of the magnetic moment onto the normal to the film, contributing this wa…
3805 increase in the shape anisotropy arising from the magnetostatic self-ene…
3806 Finally, we discuss a convergent finite element approach for the approxi…
3807 of the time-dependent case and use it to numerically compare the original
3808 three-dimensional model with the two-dimensional thin-film limit.
3809 &lt;/p&gt;
3810 </description>
3811 </item>
3812 <item>
3813 <title>Systematic literature review protocol Identification and classifi…
3814 <link>http://fr.arxiv.org/abs/2010.15545</link>
3815 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3816
3817 &lt;p&gt;Context: The importance of feature modeling languages for softw…
3818 lines and the planning stage for a systematic literature review. Objecti…
3819 protocol for carrying out a systematic literature review about the evide…
3820 identifying and classifying the errors in feature modeling languages. Me…
3821 The definition of a protocol to conduct a systematic literature review
3822 according to the guidelines of B. Kitchenham. Results: A validated proto…
3823 conduct a systematic literature review. Conclusions: A proposal for the
3824 protocol definition of a systematic literature review about the identifi…
3825 and classification of errors in feature modeling was built. Initial resu…
3826 show that the effects and results for solving these errors should be car…
3827 out.
3828 &lt;/p&gt;
3829 </description>
3830 </item>
3831 <item>
3832 <title>Multi-Constitutive Neural Network for Large Deformation Poromecha…
3833 <link>http://fr.arxiv.org/abs/2010.15549</link>
3834 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3835
3836 &lt;p&gt;In this paper, we study the problem of large-strain consolidati…
3837 poromechanics with deep neural networks. Given different material proper…
3838 and different loading conditions, the goal is to predict pore pressure a…
3839 settlement. We propose a novel method &quot;multi-constitutive neural ne…
3840 (MCNN) such that one model can solve several different constitutive laws…
3841 introduce a one-hot encoding vector as an additional input vector, which…
3842 used to label the constitutive law we wish to solve. Then we build a DNN…
3843 takes as input (X, t) along with a constitutive model label and outputs …
3844 corresponding solution. It is the first time, to our knowledge, that we …
3845 evaluate multi-constitutive laws through only one training process while…
3846 obtaining good accuracies. We found that MCNN trained to solve multiple …
3847 outperforms individual neural network solvers trained with PDE.
3848 &lt;/p&gt;
3849 </description>
3850 </item>
3851 <item>
3852 <title>ADABOOK &amp; MULTIBOOK: Adaptive Boosting with Chance Correction…
3853 <link>http://fr.arxiv.org/abs/2010.15550</link>
3854 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3855
3856 &lt;p&gt;There has been considerable interest in boosting and bagging, i…
3857 combination of the adaptive techniques of AdaBoost with the random selec…
3858 with replacement techniques of Bagging. At the same time there has been a
3859 revisiting of the way we evaluate, with chance-corrected measures like K…
3860 Informedness, Correlation or ROC AUC being advocated. This leads to the
3861 question of whether learning algorithms can do better by optimizing an
3862 appropriate chance corrected measure. Indeed, it is possible for a weak …
3863 to optimize Accuracy to the detriment of the more reaslistic chance-corr…
3864 measures, and when this happens the booster can give up too early. This
3865 phenomenon is known to occur with conventional Accuracy-based AdaBoost, …
3866 MultiBoost algorithm has been developed to overcome such problems using …
3867 techniques based on bagging. This paper thus complements the theoretical…
3868 showing the necessity of using chance-corrected measures for evaluation,…
3869 empirical work showing how use of a chance-corrected measure can improve
3870 boosting. We show that the early surrender problem occurs in MultiBoost …
3871 multiclass situations, so that chance-corrected AdaBook and Multibook ca…
3872 standard Multiboost or AdaBoost, and we further identify which chance-co…
3873 measures to use when.
3874 &lt;/p&gt;
3875 </description>
3876 </item>
3877 <item>
3878 <title>Investigating the Robustness of Artificial Intelligent Algorithms…
3879 <link>http://fr.arxiv.org/abs/2010.15551</link>
3880 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3881
3882 &lt;p&gt;Artificial intelligent (AI) algorithms, such as deep learning a…
3883 are used in numerous applications including computer vision, autonomous
3884 driving, and medical diagnostics. The robustness of these AI algorithms …
3885 great interest as inaccurate prediction could result in safety concerns …
3886 limit the adoption of AI systems. In this paper, we propose a framework …
3887 on design of experiments to systematically investigate the robustness of…
3888 classification algorithms. A robust classification algorithm is expected…
3889 have high accuracy and low variability under different application scena…
3890 The robustness can be affected by a wide range of factors such as the im…
3891 of class labels in the training dataset, the chosen prediction algorithm…
3892 chosen dataset of the application, and a change of distribution in the t…
3893 and test datasets. To investigate the robustness of AI classification
3894 algorithms, we conduct a comprehensive set of mixture experiments to col…
3895 prediction performance results. Then statistical analyses are conducted …
3896 understand how various factors affect the robustness of AI classification
3897 algorithms. We summarize our findings and provide suggestions to practit…
3898 in AI applications.
3899 &lt;/p&gt;
3900 </description>
3901 </item>
3902 <item>
3903 <title>Successive Halving Top-k Operator. (arXiv:2010.15552v1 [cs.LG])</…
3904 <link>http://fr.arxiv.org/abs/2010.15552</link>
3905 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3906
3907 &lt;p&gt;We propose a differentiable successive halving method of relaxi…
3908 operator, rendering gradient-based optimization possible. The need to pe…
3909 softmax iteratively on the entire vector of scores is avoided by using a
3910 tournament-style selection. As a result, a much better approximation of …
3911 with lower computational cost is achieved compared to the previous appro…
3912 &lt;/p&gt;
3913 </description>
3914 </item>
3915 <item>
3916 <title>Modulation Pattern Detection Using Complex Convolutions in Deep L…
3917 <link>http://fr.arxiv.org/abs/2010.15556</link>
3918 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3919
3920 &lt;p&gt;Transceivers used for telecommunications transmit and receive s…
3921 modulation patterns that are represented as sequences of complex numbers.
3922 Classifying modulation patterns is challenging because noise and channel
3923 impairments affect the signals in complicated ways such that the received
3924 signal bears little resemblance to the transmitted signal. Although deep
3925 learning approaches have shown great promise over statistical methods in…
3926 problem space, deep learning frameworks continue to lag in support for
3927 complex-valued data. To address this gap, we study the implementation an…
3928 of complex convolutions in a series of convolutional neural network
3929 architectures. Replacement of data structure and convolution operations …
3930 their complex generalization in an architecture improves performance, wi…
3931 statistical significance, at recognizing modulation patterns in complex-…
3932 signals with high SNR after being trained on low SNR signals. This sugge…
3933 complex-valued convolutions enables networks to learn more meaningful
3934 representations. We investigate this hypothesis by comparing the features
3935 learned in each experiment by visualizing the inputs that results in one…
3936 modulation pattern classification for each network.
3937 &lt;/p&gt;
3938 </description>
3939 </item>
3940 <item>
3941 <title>Quantum Computing: A Taxonomy, Systematic Review and Future Direc…
3942 <link>http://fr.arxiv.org/abs/2010.15559</link>
3943 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3944
3945 &lt;p&gt;Quantum computing is an emerging paradigm with the potential to…
3946 significant computational advantage over conventional classical computin…
3947 exploiting quantum-mechanical principles such as entanglement and
3948 superposition. It is anticipated that this computational advantage of qu…
3949 computing will help to solve many complex and computationally intractable
3950 problems in several areas of research such as drug design, data science,…
3951 energy, finance, industrial chemical development, secure communications,…
3952 quantum chemistry, among others. In recent years, tremendous progress in…
3953 quantum hardware development and quantum software/algorithm have brought
3954 quantum computing much closer to reality. As the quantum devices are exp…
3955 to steadily scale up in the next few years, quantum decoherence and qubit
3956 interconnectivity are two of the major challenges to achieve quantum adv…
3957 in the NISQ era. Quantum computing is a highly topical and fast-moving f…
3958 research with significant ongoing progress in all facets. A systematic r…
3959 of the existing literature on quantum computing will be invaluable to
3960 understand the current status of this emerging field and identify open
3961 challenges for the quantum computing community in the coming years. This…
3962 article presents a comprehensive review of quantum computing literature,…
3963 taxonomy of quantum computing. Further, the proposed taxonomy is used to…
3964 various related studies to identify the research gaps. A detailed overvi…
3965 quantum software tools and technologies, post-quantum cryptography and q…
3966 computer hardware development to document the current state-of-the-art i…
3967 respective areas. We finish the article by highlighting various open cha…
3968 and promising future directions for research.
3969 &lt;/p&gt;
3970 </description>
3971 </item>
3972 <item>
3973 <title>Genetic U-Net: Automatically Designing Lightweight U-shaped CNN A…
3974 <link>http://fr.arxiv.org/abs/2010.15560</link>
3975 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3976
3977 &lt;p&gt;Many previous works based on deep learning for retinal vessel s…
3978 have achieved promising performance by manually designing U-shaped
3979 convolutional neural networks (CNNs). However, the manual design of thes…
3980 is time-consuming and requires extensive empirical knowledge. To address…
3981 problem, we propose a novel method using genetic algorithms (GAs) to
3982 automatically design a lightweight U-shaped CNN for retinal vessel
3983 segmentation, called Genetic U-Net. Here we first design a special searc…
3984 containing the structure of U-Net and its corresponding operations, and …
3985 use genetic algorithm to search for superior architectures in this search
3986 space. Experimental results show that the proposed method outperforms the
3987 existing methods on three public datasets, DRIVE, CHASE_DB1 and STARE. In
3988 addition, the architectures obtained by the proposed method are more
3989 lightweight but robust than the state-of-the-art models.
3990 &lt;/p&gt;
3991 </description>
3992 </item>
3993 <item>
3994 <title>Federated Transfer Learning: concept and applications. (arXiv:201…
3995 <link>http://fr.arxiv.org/abs/2010.15561</link>
3996 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
3997
3998 &lt;p&gt;Development of Artificial Intelligence (AI) is inherently tied …
3999 development of data. However, in most industries data exists in form of
4000 isolated islands, with limited scope of sharing between different
4001 organizations. This is an hindrance to the further development of AI. Fe…
4002 learning has emerged as a possible solution to this problem in the last …
4003 years without compromising user privacy. Among different variants of the
4004 federated learning, noteworthy is federated transfer learning (FTL) that…
4005 knowledge to be transferred across domains that do not have many overlap…
4006 features and users. In this work we provide a comprehensive survey of the
4007 existing works on this topic. In more details, we study the background o…
4008 and its different existing applications. We further analyze FTL from pri…
4009 and machine learning perspective.
4010 &lt;/p&gt;
4011 </description>
4012 </item>
4013 <item>
4014 <title>Limitations of the recall capabilities in delay based reservoir c…
4015 <link>http://fr.arxiv.org/abs/2010.15562</link>
4016 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4017
4018 &lt;p&gt;We analyze the memory capacity of a delay based reservoir compu…
4019 Hopf normal form as nonlinearity and numerically compute the linear as w…
4020 the higher order recall capabilities. A possible physical realisation co…
4021 a laser with external cavity, for which the information is fed via elect…
4022 injection. A task independent quantification of the computational capabi…
4023 the reservoir system is done via a complete orthonormal set of basis fun…
4024 Our results suggest that even for constant readout dimension the total m…
4025 capacity is dependent on the ratio between the information input period,…
4026 called the clock cycle, and the time delay in the system. Optimal perfor…
4027 is found for a time delay about 1.6 times the clock cycle
4028 &lt;/p&gt;
4029 </description>
4030 </item>
4031 <item>
4032 <title>Overcoming The Limitations of Neural Networks in Composite-Patter…
4033 <link>http://fr.arxiv.org/abs/2010.15571</link>
4034 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4035
4036 &lt;p&gt;The effectiveness of neural networks in solving complex problem…
4037 recognized; however, little is known about their limitations. We demonst…
4038 that the feed-forward architecture, for most commonly used activation
4039 functions, is incapable of approximating functions comprised of multiple
4040 sub-patterns while simultaneously respecting their composite-pattern str…
4041 We overcome this bottleneck with a simple architecture modification that
4042 reallocates the neurons of any single feed-forward network across several
4043 smaller sub-networks, each specialized on a distinct part of the input-s…
4044 The modified architecture, called an Architope, is more expressive on two
4045 fronts. First, it is dense in an associated space of piecewise continuous
4046 functions in which the feed-forward architecture is not dense. Second, it
4047 achieves the same approximation rate as the feed-forward networks while …
4048 requiring $\mathscr{O}(N^{-1})$ fewer parameters in its hidden layers.
4049 Moreover, the architecture achieves these approximation improvements whi…
4050 preserving the target&apos;s composite-pattern structure.
4051 &lt;/p&gt;
4052 </description>
4053 </item>
4054 <item>
4055 <title>Experimental Analysis of Communication Relaying Delay in Low-Ener…
4056 <link>http://fr.arxiv.org/abs/2010.15572</link>
4057 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4058
4059 &lt;p&gt;In recent years, more and more applications use ad-hoc networks…
4060 communications, but in some cases such as when using WSNs, the software
4061 processing delay induced by packets relaying may not be negligible. In t…
4062 paper, we planned and carried out a delay measurement experiment using
4063 Raspberry Pi Zero W. The results demonstrated that, in low-energy ad-hoc
4064 networks, processing delay of the application is always too large to ign…
4065 is at least ten times greater than the kernel routing and corresponds to…
4066 the transmission delay. Furthermore, if the task is CPU-intensive, such …
4067 packet encryption, the processing delay can be greater than the transmis…
4068 delay and its behavior is represented by a simple linear model. Our find…
4069 indicate that the key factor for achieving QoS in ad-hoc networks is an
4070 appropriate node-to-node load balancing that takes into account the CPU
4071 performance and the amount of traffic passing through each node.
4072 &lt;/p&gt;
4073 </description>
4074 </item>
4075 <item>
4076 <title>Import test questions into Moodle LMS. (arXiv:2010.15577v1 [cs.CY…
4077 <link>http://fr.arxiv.org/abs/2010.15577</link>
4078 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4079
4080 &lt;p&gt;The purpose of the study is to highlight the theoretical and me…
4081 aspects of preparing the test questions of the most common types in the …
4082 text files for further import into learning management system (LMS) Mood…
4083 subject of the research is the automated filling of the Moodle LMS test
4084 database. The objectives of the study: to analyze the import files of te…
4085 questions, their advantages and disadvantages; to develop guidelines for…
4086 preparation of test questions of common types in the form of text files …
4087 further import into Moodle LMS. The action algorithms for importing ques…
4088 and instructions for submitting question files in such formats as Aiken,…
4089 Moodle XML, &quot;True/False&quot; questions, &quot;Multiple Choice&quot…
4090 many), &quot;Matching&quot;, with an open answer - &quot;Numerical&quot;…
4091 &quot;Essay&quot; are offered in this article. The formats for submittin…
4092 examples of its designing and developed questions were demonstrated in v…
4093 mode in Moodle LMS.
4094 &lt;/p&gt;
4095 </description>
4096 </item>
4097 <item>
4098 <title>Exploring the Nuances of Designing (with/for) Artificial Intellig…
4099 <link>http://fr.arxiv.org/abs/2010.15578</link>
4100 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4101
4102 &lt;p&gt;Solutions relying on artificial intelligence are devised to pre…
4103 patterns and answer questions that are clearly defined, involve an enume…
4104 set of solutions, clear rules, and inherently binary decision mechanisms…
4105 as they become exponentially implemented in our daily activities, they b…
4106 transcend these initial boundaries and to affect the larger sociotechnic…
4107 system in which they are situated. In this arrangement, a solution is un…
4108 pressure to surpass true or false criteria and move to an ethical evalua…
4109 right and wrong. Neither algorithmic solutions, nor purely humanistic on…
4110 be enough to fully mitigate undesirable outcomes in the narrow state of …
4111 its future incarnations. We must take a holistic view. In this paper we …
4112 the construct of infrastructure as a means to simultaneously address
4113 algorithmic and societal issues when designing AI.
4114 &lt;/p&gt;
4115 </description>
4116 </item>
4117 <item>
4118 <title>Modeling biomedical breathing signals with convolutional deep pro…
4119 <link>http://fr.arxiv.org/abs/2010.15579</link>
4120 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4121
4122 &lt;p&gt;One of the main problems with biomedical signals is the limited…
4123 patient-specific data and the significant amount of time needed to recor…
4124 sufficient number of samples for diagnostic and treatment purposes. We e…
4125 the use of Variational Autoencoder (VAE) and Adversarial Autoencoder (AA…
4126 algorithms based on one-dimensional convolutional neural networks in ord…
4127 build generative models able to capture and represent the variability of…
4128 of unlabeled quasi-periodic signals using as few as 10 parameters. Furth…
4129 we introduce a modified AAE architecture that allows simultaneous
4130 semi-supervised classification and generation of different types of sign…
4131 Our study is based on physical breathing signals, i.e. time series descr…
4132 the position of chest markers, generally used to describe respiratory mo…
4133 The time series are discretized into a vector of periods, with each peri…
4134 containing 6 time and position values. These vectors can be transformed …
4135 into time series through an additional reconstruction neural network and…
4136 to generate extended signals while simplifying the modeling task. The ob…
4137 models can be used to generate realistic breathing realizations from pat…
4138 population data and to classify new recordings. We show that by incorpor…
4139 the labels from around 10-15\% of the dataset during training, the model…
4140 guided to group data according to the patient it belongs to, or based on…
4141 presence of different types of breathing irregularities such as baseline
4142 shifts. Our specific motivation is to model breathing motion during
4143 radiotherapy lung cancer treatments, for which the developed model serve…
4144 efficient tool to robustify plans against breathing uncertainties. Howev…
4145 same methodology can in principle be applied to any other kind of
4146 quasi-periodic biomedical signal, representing a generically applicable …
4147 &lt;/p&gt;
4148 </description>
4149 </item>
4150 <item>
4151 <title>The De-democratization of AI: Deep Learning and the Compute Divid…
4152 <link>http://fr.arxiv.org/abs/2010.15581</link>
4153 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4154
4155 &lt;p&gt;Increasingly, modern Artificial Intelligence (AI) research has …
4156 computationally intensive. However, a growing concern is that due to une…
4157 access to computing power, only certain firms and elite universities have
4158 advantages in modern AI research. Using a novel dataset of 171394 papers…
4159 57 prestigious computer science conferences, we document that firms, in
4160 particular, large technology firms and elite universities have increased
4161 participation in major AI conferences since deep learning&apos;s unantic…
4162 in 2012. The effect is concentrated among elite universities, which are …
4163 1-50 in the QS World University Rankings. Further, we find two strategies
4164 through which firms increased their presence in AI research: first, they…
4165 increased firm-only publications; and second, firms are collaborating pr…
4166 with elite universities. Consequently, this increased presence of firms …
4167 elite universities in AI research has crowded out mid-tier (QS ranked 20…
4168 and lower-tier (QS ranked 301-500) universities. To provide causal evide…
4169 that deep learning&apos;s unanticipated rise resulted in this divergence…
4170 leverage the generalized synthetic control method, a data-driven counter…
4171 estimator. Using machine learning based text analysis methods, we provide
4172 additional evidence that the divergence between these two groups - large…
4173 and non-elite universities - is driven by access to computing power or c…
4174 which we term as the &quot;compute divide&quot;. This compute divide bet…
4175 and non-elite universities increases concerns around bias and fairness w…
4176 AI technology, and presents an obstacle towards &quot;democratizing&quot…
4177 results suggest that a lack of access to specialized equipment such as c…
4178 can de-democratize knowledge production.
4179 &lt;/p&gt;
4180 </description>
4181 </item>
4182 <item>
4183 <title>Improving Accuracy of Federated Learning in Non-IID Settings. (ar…
4184 <link>http://fr.arxiv.org/abs/2010.15582</link>
4185 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4186
4187 &lt;p&gt;Federated Learning (FL) is a decentralized machine learning pro…
4188 allows a set of participating agents to collaboratively train a model wi…
4189 sharing their data. This makes FL particularly suitable for settings whe…
4190 privacy is desired. However, it has been observed that the performance o…
4191 closely tied with the local data distributions of agents. Particularly, …
4192 settings where local data distributions vastly differ among agents, FL p…
4193 rather poorly with respect to the centralized training. To address this
4194 problem, we hypothesize the reasons behind the performance degradation, …
4195 develop some techniques to address these reasons accordingly. In this wo…
4196 identify four simple techniques that can improve the performance of trai…
4197 models without incurring any additional communication overhead to FL, but
4198 rather, some light computation overhead either on the client, or the
4199 server-side. In our experimental analysis, combination of our techniques
4200 improved the validation accuracy of a model trained via FL by more than …
4201 with respect to our baseline. This is about 5% less than the accuracy of…
4202 model trained on centralized data.
4203 &lt;/p&gt;
4204 </description>
4205 </item>
4206 <item>
4207 <title>Probabilistic Transformers. (arXiv:2010.15583v1 [cs.LG])</title>
4208 <link>http://fr.arxiv.org/abs/2010.15583</link>
4209 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4210
4211 &lt;p&gt;We show that Transformers are Maximum Posterior Probability est…
4212 Mixtures of Gaussian Models. This brings a probabilistic point of view to
4213 Transformers and suggests extensions to other probabilistic cases.
4214 &lt;/p&gt;
4215 </description>
4216 </item>
4217 <item>
4218 <title>Future Directions of the Cyberinfrastructure for Sustained Scient…
4219 <link>http://fr.arxiv.org/abs/2010.15584</link>
4220 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4221
4222 &lt;p&gt;The CSSI 2019 workshop was held on October 28-29, 2019, in Aust…
4223 main objectives of this workshop were to (1) understand the impact of th…
4224 program on the community over the last 9 years, (2) engage workshop
4225 participants in identifying gaps and opportunities in the current CSSI
4226 landscape, (3) gather ideas on the cyberinfrastructure needs and expecta…
4227 of the community with respect to the CSSI program, and (4) prepare a rep…
4228 summarizing the feedback gathered from the community that can inform the…
4229 solicitations of the CSSI program. The workshop brought together differe…
4230 stakeholders interested in provisioning sustainable cyberinfrastructure …
4231 can power discoveries impacting the various fields of science and techno…
4232 and maintaining the nation&apos;s competitiveness in the areas such as s…
4233 software, HPC, networking, cybersecurity, and data/information science. …
4234 workshop served as a venue for gathering the community-feedback on the c…
4235 state of the CSSI program and its future directions.
4236 &lt;/p&gt;
4237 </description>
4238 </item>
4239 <item>
4240 <title>Panel: Economic Policy and Governance during Pandemics using AI. …
4241 <link>http://fr.arxiv.org/abs/2010.15585</link>
4242 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4243
4244 &lt;p&gt;The global food supply chain (starting at farms and ending with…
4245 has been seriously disrupted by many outlier events such as trade wars, …
4246 China demand shock, natural disasters, and pandemics. Outlier events cre…
4247 uncertainty along the entire supply chain in addition to intervening pol…
4248 responses to mitigate their adverse effects. Artificial Intelligence (AI)
4249 methods (i.e. machine/reinforcement/deep learning) provide an opportunit…
4250 better understand outcomes during outlier events by identifying regular,
4251 irregular and contextual components. Employing AI can provide guidance to
4252 decision making suppliers, farmers, processors, wholesalers, and retaile…
4253 along the supply chain, and policy makers to facilitate welfare-improving
4254 outcomes. This panel discusses these issues.
4255 &lt;/p&gt;
4256 </description>
4257 </item>
4258 <item>
4259 <title>Event-Driven Learning of Systematic Behaviours in Stock Markets. …
4260 <link>http://fr.arxiv.org/abs/2010.15586</link>
4261 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4262
4263 &lt;p&gt;It is reported that financial news, especially financial events…
4264 news, provide information to investors&apos; long/short decisions and in…
4265 movements of stock markets. Motivated by this, we leverage financial eve…
4266 streams to train a classification neural network that detects latent
4267 event-stock linkages and stock markets&apos; systematic behaviours in th…
4268 market. Our proposed pipeline includes (1) a combined event extraction m…
4269 that utilizes Open Information Extraction and neural co-reference resolu…
4270 (2) a BERT/ALBERT enhanced representation of events, and (3) an extended
4271 hierarchical attention network that includes attentions on event, news a…
4272 temporal levels. Our pipeline achieves significantly better accuracies a…
4273 higher simulated annualized returns than state-of-the-art models when be…
4274 applied to predicting Standard\&amp;amp;Poor 500, Dow Jones, Nasdaq indi…
4275 individual stocks.
4276 &lt;/p&gt;
4277 </description>
4278 </item>
4279 <item>
4280 <title>Impact of (SARS-CoV-2) COVID 19 on the indigenous language-speaki…
4281 <link>http://fr.arxiv.org/abs/2010.15588</link>
4282 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4283
4284 &lt;p&gt;The importance of the working document is that it allows the an…
4285 information and the status of cases associated with (SARS-CoV-2) COVID-1…
4286 open data at the municipal, state and national level, with a daily recor…
4287 patients, according to a age, sex, comorbidities, for the condition of
4288 (SARS-CoV-2) COVID-19 according to the following characteristics: a) Pos…
4289 b) Negative, c) Suspicious. Likewise, it presents information related to…
4290 identification of an outpatient and / or hospitalized patient, attending…
4291 their medical development, identifying: a) Recovered, b) Deaths and c) A…
4292 in Phase 3 and Phase 4, in the five main population areas speaker of ind…
4293 language in the State of Veracruz - Mexico. The data analysis is carried…
4294 through the application of a data mining algorithm, which provides the
4295 information, fast and timely, required for the estimation of Medical Care
4296 Scenarios of (SARS-CoV-2) COVID-19, as well as for know the impact on the
4297 indigenous language-speaking population in Mexico.
4298 &lt;/p&gt;
4299 </description>
4300 </item>
4301 <item>
4302 <title>Enjeux \&apos;ethiques de l&apos;IA en sant\&apos;e : une humanis…
4303 <link>http://fr.arxiv.org/abs/2010.15590</link>
4304 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4305
4306 &lt;p&gt;Considering the use of artificial intelligence for greater pers…
4307 patient care and better management of human and material resources may s…
4308 like an opportunity not to be missed. In order to offer a better humaniz…
4309 of the care pathway, artificial intelligence is a tool that decision-mak…
4310 the hospital sector must appropriate by taking care of the new ethical i…
4311 and conflicts of values that this technology generates.
4312 &lt;/p&gt;
4313 &lt;p&gt;Envisager le recours \`a l&apos;intelligence artificielle pour …
4314 personnalisation de la prise en charge du patient et une meilleure gesti…
4315 ressources humaines et mat\&apos;erielles peut sembler une opportunit\&a…
4316 manquer. Afin de proposer une meilleure humanisation du parcours de soin,
4317 l&apos;intelligence artificielle est un outil que les d\&apos;ecideurs d…
4318 hospitalier doivent s&apos;approprier en veillant aux nouveaux enjeux \&…
4319 conflits de valeurs que cette technologie engendre.
4320 &lt;/p&gt;
4321 </description>
4322 </item>
4323 <item>
4324 <title>Shared Space Transfer Learning for analyzing multi-site fMRI data…
4325 <link>http://fr.arxiv.org/abs/2010.15594</link>
4326 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4327
4328 &lt;p&gt;Multi-voxel pattern analysis (MVPA) learns predictive models fr…
4329 functional magnetic resonance imaging (fMRI) data, for distinguishing wh…
4330 subjects are performing different cognitive tasks -- e.g., watching movi…
4331 making decisions. MVPA works best with a well-designed feature set and an
4332 adequate sample size. However, most fMRI datasets are noisy, high-dimens…
4333 expensive to collect, and with small sample sizes. Further, training a r…
4334 generalized predictive model that can analyze homogeneous cognitive tasks
4335 provided by multi-site fMRI datasets has additional challenges. This pap…
4336 proposes the Shared Space Transfer Learning (SSTL) as a novel transfer l…
4337 (TL) approach that can functionally align homogeneous multi-site fMRI da…
4338 and so improve the prediction performance in every site. SSTL first extr…
4339 set of common features for all subjects in each site. It then uses TL to…
4340 these site-specific features to a site-independent shared space in order…
4341 improve the performance of the MVPA. SSTL uses a scalable optimization
4342 procedure that works effectively for high-dimensional fMRI datasets. The
4343 optimization procedure extracts the common features for each site by usi…
4344 single-iteration algorithm and maps these site-specific common features …
4345 site-independent shared space. We evaluate the effectiveness of the prop…
4346 method for transferring between various cognitive tasks. Our comprehensi…
4347 experiments validate that SSTL achieves superior performance to other
4348 state-of-the-art analysis techniques.
4349 &lt;/p&gt;
4350 </description>
4351 </item>
4352 <item>
4353 <title>Verification of Patterns. (arXiv:2010.15596v1 [cs.LO])</title>
4354 <link>http://fr.arxiv.org/abs/2010.15596</link>
4355 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4356
4357 &lt;p&gt;The software patterns provide building blocks to the design and
4358 implementation of a software system, and try to make the software engine…
4359 to progress from experience to science. The software patterns were made …
4360 because of the introduction as the design patterns. After that, patterns…
4361 been researched and developed widely and rapidly. The series of books of
4362 pattern-oriented software architecture should be marked in the developme…
4363 software patterns. As mentioned in these books, formalization of pattern…
4364 an intermediate pattern language are needed and should be developed in t…
4365 future of patterns. So, in this book, we formalize software patterns acc…
4366 to the categories of the series of books of pattern-oriented software
4367 architecture, and verify the correctness of patterns based on truly conc…
4368 process algebra. In one aspect, patterns are formalized and verified; in…
4369 other aspect, truly concurrent process algebra can play a role of an
4370 intermediate pattern language for its rigorous theory.
4371 &lt;/p&gt;
4372 </description>
4373 </item>
4374 <item>
4375 <title>Enhancing reinforcement learning by a finite reward response filt…
4376 <link>http://fr.arxiv.org/abs/2010.15597</link>
4377 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4378
4379 &lt;p&gt;In many reinforcement learning (RL) problems, it takes some tim…
4380 taken action by the agent reaches its maximum effect on the environment …
4381 consequently the agent receives the reward corresponding to that action …
4382 delay called action-effect delay. Such delays reduce the performance of …
4383 learning algorithm and increase the computational costs, as the reinforc…
4384 learning agent values the immediate rewards more than the future reward …
4385 more related to the taken action. This paper addresses this issue by
4386 introducing an applicable enhanced Q-learning method in which at the beg…
4387 of the learning phase, the agent takes a single action and builds a func…
4388 that reflects the environments response to that action, called the refle…
4389 $\gamma$ - function. During the training phase, the agent utilizes the c…
4390 reflexive $\gamma$- function to update the Q-values. We have applied the
4391 developed method to a structural control problem in which the goal of th…
4392 is to reduce the vibrations of a building subjected to earthquake excita…
4393 with a specified delay. Seismic control problems are considered as a com…
4394 task in structural engineering because of the stochastic and unpredictab…
4395 nature of earthquakes and the complex behavior of the structure. Three
4396 scenarios are presented to study the effects of zero, medium, and long
4397 action-effect delays and the performance of the Enhanced method is compa…
4398 the standard Q-learning method. Both RL methods use neural network to le…
4399 estimate the state-action value function that is used to control the str…
4400 The results show that the enhanced method significantly outperforms the
4401 performance of the original method in all cases, and also improves the
4402 stability of the algorithm in dealing with action-effect delays.
4403 &lt;/p&gt;
4404 </description>
4405 </item>
4406 <item>
4407 <title>May I Ask Who&apos;s Calling? Named Entity Recognition on Call Ce…
4408 <link>http://fr.arxiv.org/abs/2010.15598</link>
4409 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4410
4411 &lt;p&gt;We investigate using Named Entity Recognition on a new type of …
4412 text: a call center conversation. These conversations combine problems f…
4413 spontaneous speech with problems novel to conversational Automated Speech
4414 Recognition, including incorrect recognition, alongside other common pro…
4415 from noisy user-generated text. Using our own corpus with new annotation…
4416 training custom contextual string embeddings, and applying a BiLSTM-CRF,…
4417 match state-of-the-art results on our novel task.
4418 &lt;/p&gt;
4419 </description>
4420 </item>
4421 <item>
4422 <title>Expert Selection in High-Dimensional Markov Decision Processes. (…
4423 <link>http://fr.arxiv.org/abs/2010.15599</link>
4424 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4425
4426 &lt;p&gt;In this work we present a multi-armed bandit framework for onli…
4427 selection in Markov decision processes and demonstrate its use in
4428 high-dimensional settings. Our method takes a set of candidate expert po…
4429 and switches between them to rapidly identify the best performing expert…
4430 a variant of the classical upper confidence bound algorithm, thus ensuri…
4431 regret in the overall performance of the system. This is useful in appli…
4432 where several expert policies may be available, and one needs to be sele…
4433 run-time for the underlying environment.
4434 &lt;/p&gt;
4435 </description>
4436 </item>
4437 <item>
4438 <title>Three computational models and its equivalence. (arXiv:2010.15600…
4439 <link>http://fr.arxiv.org/abs/2010.15600</link>
4440 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4441
4442 &lt;p&gt;The study of computability has its origin in Hilbert&apos;s con…
4443 where an adjacent question, to the ones he asked, is to give a precise
4444 description of the notion of algorithm. In the search for a good definit…
4445 arose three independent theories: Turing and the Turing machines, G\&quo…
4446 the recursive functions, Church and the Lambda Calculus.
4447 &lt;/p&gt;
4448 &lt;p&gt;Later there were established by Kleene that the classic models …
4449 are equivalent. This fact is widely accepted by many textbooks and the p…
4450 omitted since the proof is tedious and unreadable. We intend to fill thi…
4451 presenting the proof in a modern way, without forgetting the mathematical
4452 details.
4453 &lt;/p&gt;
4454 </description>
4455 </item>
4456 <item>
4457 <title>Using a Binary Classification Model to Predict the Likelihood of …
4458 <link>http://fr.arxiv.org/abs/2010.15601</link>
4459 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4460
4461 &lt;p&gt;With the recent implementation of the K to 12 Program, academic…
4462 specifically, Colleges and Universities in the Philippines have been fac…
4463 difficulties in determining projected freshmen enrollees vis-a-vis
4464 decision-making factors for efficient resource management. Enrollment ta…
4465 directly impacts success factors of Higher Education Institutions. This …
4466 covered an analysis of various characteristics of freshmen applicants af…
4467 their admission status in a Philippine university. A predictive model was
4468 developed using Logistic Regression to evaluate the probability that an
4469 admitted student will pursue to enroll in the Institution or not. The da…
4470 used was acquired from the University Admissions Office. The office desi…
4471 online application form to capture applicants&apos; details. The online …
4472 distributed to all student applicants, and most often, students, tend to
4473 provide incomplete information. Despite this fact, student characteristi…
4474 well as geographic and demographic data based on the students&apos; loca…
4475 significant predictors of enrollment decision. The results of the study …
4476 that given limited information about prospective students, Higher Educat…
4477 Institutions can implement machine learning techniques to supplement man…
4478 decisions and provide estimates of class sizes, in this way, it will all…
4479 institution to optimize the allocation of resources and will have better
4480 control over net tuition revenue.
4481 &lt;/p&gt;
4482 </description>
4483 </item>
4484 <item>
4485 <title>Designing learning experiences for online teaching and learning. …
4486 <link>http://fr.arxiv.org/abs/2010.15602</link>
4487 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4488
4489 &lt;p&gt;Teaching is about constantly innovating strategies, ways and me…
4490 diverse students in active and meaningful learning. In line with this, S…
4491 adopts various student-centric teaching and learning teaching methods and
4492 approaches. This means that our graduate/undergraduate instructors have …
4493 ready to teach using these student student-centric teaching and learning
4494 pedagogies. In this article, I share my experiences of redesigning this
4495 teaching course that is typically conducted face-to-face to a synchronous
4496 online course and also invite one of the participant in this course to r…
4497 on his experience as a student.
4498 &lt;/p&gt;
4499 </description>
4500 </item>
4501 <item>
4502 <title>Suppressing Mislabeled Data via Grouping and Self-Attention. (arX…
4503 <link>http://fr.arxiv.org/abs/2010.15603</link>
4504 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4505
4506 &lt;p&gt;Deep networks achieve excellent results on large-scale clean da…
4507 significantly when learning from noisy labels. To suppressing the impact…
4508 mislabeled data, this paper proposes a conceptually simple yet efficient
4509 training block, termed as Attentive Feature Mixup (AFM), which allows pa…
4510 more attention to clean samples and less to mislabeled ones via sample
4511 interactions in small groups. Specifically, this plug-and-play AFM first
4512 leverages a \textit{group-to-attend} module to construct groups and assi…
4513 attention weights for group-wise samples, and then uses a \textit{mixup}…
4514 with the attention weights to interpolate massive noisy-suppressed sampl…
4515 AFM has several appealing benefits for noise-robust deep learning. (i) I…
4516 not rely on any assumptions and extra clean subset. (ii) With massive
4517 interpolations, the ratio of useless samples is reduced dramatically com…
4518 to the original noisy ratio. (iii) \pxj{It jointly optimizes the interpo…
4519 weights with classifiers, suppressing the influence of mislabeled data v…
4520 attention weights. (iv) It partially inherits the vicinal risk minimizat…
4521 mixup to alleviate over-fitting while improves it by sampling fewer
4522 feature-target vectors around mislabeled data from the mixup vicinal
4523 distribution.} Extensive experiments demonstrate that AFM yields
4524 state-of-the-art results on two challenging real-world noisy datasets: F…
4525 and Clothing1M. The code will be available at
4526 https://github.com/kaiwang960112/AFM.
4527 &lt;/p&gt;
4528 </description>
4529 </item>
4530 <item>
4531 <title>Autoregressive Asymmetric Linear Gaussian Hidden Markov Models. (…
4532 <link>http://fr.arxiv.org/abs/2010.15604</link>
4533 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4534
4535 &lt;p&gt;In a real life process evolving over time, the relationship bet…
4536 relevant variables may change. Therefore, it is advantageous to have dif…
4537 inference models for each state of the process. Asymmetric hidden Markov…
4538 fulfil this dynamical requirement and provide a framework where the tren…
4539 the process can be expressed as a latent variable. In this paper, we mod…
4540 these recent asymmetric hidden Markov models to have an asymmetric
4541 autoregressive component, allowing the model to choose the order of
4542 autoregression that maximizes its penalized likelihood for a given train…
4543 set. Additionally, we show how inference, hidden states decoding and par…
4544 learning must be adapted to fit the proposed model. Finally, we run expe…
4545 with synthetic and real data to show the capabilities of this new model.
4546 &lt;/p&gt;
4547 </description>
4548 </item>
4549 <item>
4550 <title>Manifold learning-based feature extraction for structural defect …
4551 <link>http://fr.arxiv.org/abs/2010.15605</link>
4552 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4553
4554 &lt;p&gt;Data-driven quantitative defect reconstructions using ultrasoni…
4555 has recently demonstrated great potential in the area of non-destructive
4556 testing. In this paper, we develop an efficient deep learning-based defe…
4557 reconstruction framework, called NetInv, which recasts the inverse guide…
4558 scattering problem as a data-driven supervised learning progress that re…
4559 a mapping between reflection coefficients in wavenumber domain and defect
4560 profiles in the spatial domain. The superiorities of the proposed NetInv…
4561 conventional reconstruction methods for defect reconstruction have been
4562 demonstrated by several examples. Results show that NetInv has the abili…
4563 achieve the higher quality of defect profiles with remarkable efficiency…
4564 provides valuable insight into the development of effective data driven
4565 structural health monitoring and defect reconstruction using machine lea…
4566 &lt;/p&gt;
4567 </description>
4568 </item>
4569 <item>
4570 <title>Design and Evaluation of Electric Bus Systems for Metropolitan Ci…
4571 <link>http://fr.arxiv.org/abs/2010.15606</link>
4572 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4573
4574 &lt;p&gt;Over the past decade, most of the metropolitan cities across th…
4575 been witnessing a degrading trend in air quality index. Exhaust emission…
4576 observations show that promotion of public transport could be a potentia…
4577 out of this gridlock. Due to environmental concerns, numerous public tra…
4578 authorities harbor a great interest in introducing zero emission electric
4579 buses. A shift from conventional diesel buses to electric buses comes wi…
4580 several benefits in terms of reduction in local pollution, noise, and fu…
4581 consumption. This paper proposes the relevant vehicle technologies, powe…
4582 and charging systems, which, in combination, provides a comprehensive
4583 methodology to design an Electric Bus that can be deployed in metropolit…
4584 cities to mitigate emission concerns.
4585 &lt;/p&gt;
4586 </description>
4587 </item>
4588 <item>
4589 <title>CRICTRS: Embeddings based Statistical and Semi Supervised Cricket…
4590 <link>http://fr.arxiv.org/abs/2010.15607</link>
4591 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4592
4593 &lt;p&gt;Team Recommendation has always been a challenging aspect in tea…
4594 systems aim to recommend a player combination best suited against the
4595 opposition players, resulting in an optimal outcome. In this paper, we p…
4596 a semi-supervised statistical approach to build a team recommendation sy…
4597 for cricket by modelling players into embeddings. To build these embeddi…
4598 design a qualitative and quantitative rating system which considers the
4599 strength of opposition also for evaluating player performance. The embed…
4600 obtained, describes the strengths and weaknesses of the players based on…
4601 performances of the player. We also embark on a critical aspect of team
4602 composition, which includes the number of batsmen and bowlers in the tea…
4603 team composition changes over time, depending on different factors which…
4604 tough to predict, so we take this input from the user and use the player
4605 embeddings to decide the best possible team combination with the given t…
4606 composition.
4607 &lt;/p&gt;
4608 </description>
4609 </item>
4610 <item>
4611 <title>An Overview Of 3D Object Detection. (arXiv:2010.15614v1 [cs.CV])<…
4612 <link>http://fr.arxiv.org/abs/2010.15614</link>
4613 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4614
4615 &lt;p&gt;Point cloud 3D object detection has recently received major att…
4616 becomes an active research topic in 3D computer vision community. Howeve…
4617 recognizing 3D objects in LiDAR (Light Detection and Ranging) is still a
4618 challenge due to the complexity of point clouds. Objects such as pedestr…
4619 cyclists, or traffic cones are usually represented by quite sparse point…
4620 which makes the detection quite complex using only point cloud. In this
4621 project, we propose a framework that uses both RGB and point cloud data …
4622 perform multiclass object recognition. We use existing 2D detection mode…
4623 localize the region of interest (ROI) on the RGB image, followed by a pi…
4624 mapping strategy in the point cloud, and finally, lift the initial 2D bo…
4625 box to 3D space. We use the recently released nuScenes dataset---a large…
4626 dataset contains many data formats---to training and evaluate our propos…
4627 architecture.
4628 &lt;/p&gt;
4629 </description>
4630 </item>
4631 <item>
4632 <title>Sampling and Reconstruction of Sparse Signals in Shift-Invariant …
4633 <link>http://fr.arxiv.org/abs/2010.15618</link>
4634 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4635
4636 &lt;p&gt;This paper introduces a novel framework and corresponding metho…
4637 sampling and reconstruction of sparse signals in shift-invariant (SI) sp…
4638 We reinterpret the random demodulator, a system that acquires sparse
4639 bandlimited signals, as a system for acquisition of linear combinations …
4640 samples in the SI setting with the box function as the sampling kernel. …
4641 sparsity assumption is exploited by compressive sensing (CS) framework f…
4642 recovery of the SI samples from a reduced set of measurements. The sampl…
4643 subsequently filtered by a discrete-time correction filter in order to
4644 reconstruct expansion coefficients of an observed signal. Furthermore, w…
4645 a generalization of the proposed framework to other sampling kernels tha…
4646 in arbitrary SI spaces. The generalized method embeds the correction fil…
4647 a CS optimization problem which directly reconstructs expansion coeffici…
4648 the signal. Both approaches recast an inherently infinite-dimensional in…
4649 problem as a finite-dimensional CS problem in an exact way. Finally, we …
4650 numerical experiments on signals in B-spline spaces whose expansion
4651 coefficients are assumed to be sparse in a certain transform domain. The
4652 coefficients can be regarded as parametric models of an underlying conti…
4653 signal, obtained from a reduced set of measurements. Such continuous sig…
4654 representations are particularly suitable for signal processing without
4655 converting them into samples.
4656 &lt;/p&gt;
4657 </description>
4658 </item>
4659 <item>
4660 <title>CAFE: Coarse-to-Fine Neural Symbolic Reasoning for Explainable Re…
4661 <link>http://fr.arxiv.org/abs/2010.15620</link>
4662 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4663
4664 &lt;p&gt;Recent research explores incorporating knowledge graphs (KG) in…
4665 recommender systems, not only to achieve better recommendation performan…
4666 more importantly to generate explanations of why particular decisions ar…
4667 This can be achieved by explicit KG reasoning, where a model starts from…
4668 node, sequentially determines the next step, and walks towards an item n…
4669 potential interest to the user. However, this is challenging due to the …
4670 search space, unknown destination, and sparse signals over the KG, so
4671 informative and effective guidance is needed to achieve a satisfactory
4672 recommendation quality. To this end, we propose a CoArse-to-FinE neural
4673 symbolic reasoning approach (CAFE). It first generates user profiles as …
4674 sketches of user behaviors, which subsequently guide a path-finding proc…
4675 derive reasoning paths for recommendations as fine-grained predictions. …
4676 profiles can capture prominent user behaviors from the history, and prov…
4677 valuable signals about which kinds of path patterns are more likely to l…
4678 potential items of interest for the user. To better exploit the user pro…
4679 an improved path-finding algorithm called Profile-guided Path Reasoning …
4680 is also developed, which leverages an inventory of neural symbolic reaso…
4681 modules to effectively and efficiently find a batch of paths over a larg…
4682 KG. We extensively experiment on four real-world benchmarks and observe
4683 substantial gains in the recommendation performance compared with
4684 state-of-the-art methods.
4685 &lt;/p&gt;
4686 </description>
4687 </item>
4688 <item>
4689 <title>Low-Variance Policy Gradient Estimation with World Models. (arXiv…
4690 <link>http://fr.arxiv.org/abs/2010.15622</link>
4691 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4692
4693 &lt;p&gt;In this paper, we propose World Model Policy Gradient (WMPG), a…
4694 reduce the variance of policy gradient estimates using learned world mod…
4695 (WM&apos;s). In WMPG, a WM is trained online and used to imagine traject…
4696 imagined trajectories are used in two ways. Firstly, to calculate a
4697 without-replacement estimator of the policy gradient. Secondly, the retu…
4698 the imagined trajectories is used as an informed baseline. We compare the
4699 proposed approach with AC and MAC on a set of environments of increasing
4700 complexity (CartPole, LunarLander and Pong) and find that WMPG has better
4701 sample efficiency. Based on these results, we conclude that WMPG can yie…
4702 increased sample efficiency in cases where a robust latent representatio…
4703 the environment can be learned.
4704 &lt;/p&gt;
4705 </description>
4706 </item>
4707 <item>
4708 <title>Fast Minimal Presentations of Bi-graded Persistence Modules. (arX…
4709 <link>http://fr.arxiv.org/abs/2010.15623</link>
4710 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4711
4712 &lt;p&gt;Multi-parameter persistent homology is a recent branch of topol…
4713 analysis. In this area, data sets are investigated through the lens of h…
4714 with respect to two or more scale parameters. The high computational cos…
4715 many algorithms calls for a preprocessing step to reduce the input size.…
4716 general, a minimal presentation is the smallest possible representation …
4717 persistence module. Lesnick and Wright proposed recently an algorithm (t…
4718 LW-algorithm) for computing minimal presentations based on matrix reduct…
4719 this work, we propose, implement and benchmark several improvements over…
4720 LW-algorithm. Most notably, we propose the use of priority queues to avo…
4721 extensive scanning of the matrix columns, which constitutes the computat…
4722 bottleneck in the LW-algorithm, and we combine their algorithm with idea…
4723 the multi-parameter chunk algorithm by Fugacci and Kerber. Our extensive
4724 experiments show that our algorithm outperforms the LW-algorithm and com…
4725 the minimal presentation for data sets with millions of simplices within…
4726 seconds. Our software is publicly available.
4727 &lt;/p&gt;
4728 </description>
4729 </item>
4730 <item>
4731 <title>Abstract Value Iteration for Hierarchical Reinforcement Learning.…
4732 <link>http://fr.arxiv.org/abs/2010.15638</link>
4733 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4734
4735 &lt;p&gt;We propose a novel hierarchical reinforcement learning framewor…
4736 with continuous state and action spaces. In our framework, the user spec…
4737 subgoal regions which are subsets of states; then, we (i) learn options …
4738 serve as transitions between these subgoal regions, and (ii) construct a
4739 high-level plan in the resulting abstract decision process (ADP). A key
4740 challenge is that the ADP may not be Markov, which we address by proposi…
4741 algorithms for planning in the ADP. Our first algorithm is conservative,
4742 allowing us to prove theoretical guarantees on its performance, which he…
4743 inform the design of subgoal regions. Our second algorithm is a practica…
4744 that interweaves planning at the abstract level and learning at the conc…
4745 level. In our experiments, we demonstrate that our approach outperforms
4746 state-of-the-art hierarchical reinforcement learning algorithms on sever…
4747 challenging benchmarks.
4748 &lt;/p&gt;
4749 </description>
4750 </item>
4751 <item>
4752 <title>Teaching a GAN What Not to Learn. (arXiv:2010.15639v1 [stat.ML])<…
4753 <link>http://fr.arxiv.org/abs/2010.15639</link>
4754 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4755
4756 &lt;p&gt;Generative adversarial networks (GANs) were originally envision…
4757 unsupervised generative models that learn to follow a target distributio…
4758 Variants such as conditional GANs, auxiliary-classifier GANs (ACGANs) pr…
4759 GANs on to supervised and semi-supervised learning frameworks by providi…
4760 labelled data and using multi-class discriminators. In this paper, we ap…
4761 the supervised GAN problem from a different perspective, one that is mot…
4762 by the philosophy of the famous Persian poet Rumi who said, &quot;The ar…
4763 is knowing what to ignore.&quot; In the GAN framework, we not only provi…
4764 positive data that it must learn to model, but also present it with so-c…
4765 negative samples that it must learn to avoid - we call this &quot;The Ru…
4766 Framework.&quot; This formulation allows the discriminator to represent …
4767 underlying target distribution better by learning to penalize generated …
4768 that are undesirable - we show that this capability accelerates the lear…
4769 process of the generator. We present a reformulation of the standard GAN…
4770 and least-squares GAN (LSGAN) within the Rumi setting. The advantage of …
4771 reformulation is demonstrated by means of experiments conducted on MNIST,
4772 Fashion MNIST, CelebA, and CIFAR-10 datasets. Finally, we consider an
4773 application of the proposed formulation to address the important problem…
4774 learning an under-represented class in an unbalanced dataset. The Rumi a…
4775 results in substantially lower FID scores than the standard GAN framewor…
4776 while possessing better generalization capability.
4777 &lt;/p&gt;
4778 </description>
4779 </item>
4780 <item>
4781 <title>Free-Form Image Inpainting via Contrastive Attention Network. (ar…
4782 <link>http://fr.arxiv.org/abs/2010.15643</link>
4783 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4784
4785 &lt;p&gt;Most deep learning based image inpainting approaches adopt auto…
4786 variants to fill missing regions in images. Encoders are usually utilize…
4787 learn powerful representational spaces, which are important for dealing …
4788 sophisticated learning tasks. Specifically, in image inpainting tasks, m…
4789 with any shapes can appear anywhere in images (i.e., free-form masks) wh…
4790 form complex patterns. It is difficult for encoders to capture such powe…
4791 representations under this complex situation. To tackle this problem, we
4792 propose a self-supervised Siamese inference network to improve the robus…
4793 and generalization. It can encode contextual semantics from full resolut…
4794 images and obtain more discriminative representations. we further propos…
4795 multi-scale decoder with a novel dual attention fusion module (DAF), whi…
4796 combine both the restored and known regions in a smooth way. This multi-…
4797 architecture is beneficial for decoding discriminative representations l…
4798 by encoders into images layer by layer. In this way, unknown regions wil…
4799 filled naturally from outside to inside. Qualitative and quantitative
4800 experiments on multiple datasets, including facial and natural datasets …
4801 Celeb-HQ, Pairs Street View, Places2 and ImageNet), demonstrate that our
4802 proposed method outperforms state-of-the-art methods in generating high-…
4803 inpainting results.
4804 &lt;/p&gt;
4805 </description>
4806 </item>
4807 <item>
4808 <title>Brain Tumor Segmentation Network Using Attention-based Fusion and…
4809 <link>http://fr.arxiv.org/abs/2010.15647</link>
4810 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4811
4812 &lt;p&gt;Delineating the brain tumor from magnetic resonance (MR) images…
4813 for the treatment of gliomas. However, automatic delineation is challeng…
4814 to the complex appearance and ambiguous outlines of tumors. Considering …
4815 multi-modal MR images can reflect different tumor biological properties,…
4816 develop a novel multi-modal tumor segmentation network (MMTSN) to robust…
4817 segment brain tumors based on multi-modal MR images. The MMTSN is compos…
4818 three sub-branches and a main branch. Specifically, the sub-branches are…
4819 to capture different tumor features from multi-modal images, while in th…
4820 branch, we design a spatial-channel fusion block (SCFB) to effectively
4821 aggregate multi-modal features. Additionally, inspired by the fact that …
4822 spatial relationship between sub-regions of tumor is relatively fixed, e…
4823 the enhancing tumor is always in the tumor core, we propose a spatial lo…
4824 constrain the relationship between different sub-regions of tumor. We ev…
4825 our method on the test set of multi-modal brain tumor segmentation chall…
4826 2020 (BraTs2020). The method achieves 0.8764, 0.8243 and 0.773 dice scor…
4827 whole tumor, tumor core and enhancing tumor, respectively.
4828 &lt;/p&gt;
4829 </description>
4830 </item>
4831 <item>
4832 <title>Reliable Graph Neural Networks via Robust Aggregation. (arXiv:201…
4833 <link>http://fr.arxiv.org/abs/2010.15651</link>
4834 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4835
4836 &lt;p&gt;Perturbations targeting the graph structure have proven to be e…
4837 effective in reducing the performance of Graph Neural Networks (GNNs), a…
4838 traditional defenses such as adversarial training do not seem to be able…
4839 improve robustness. This work is motivated by the observation that
4840 adversarially injected edges effectively can be viewed as additional sam…
4841 a node&apos;s neighborhood aggregation function, which results in distor…
4842 aggregations accumulating over the layers. Conventional GNN aggregation
4843 functions, such as a sum or mean, can be distorted arbitrarily by a sing…
4844 outlier. We propose a robust aggregation function motivated by the field…
4845 robust statistics. Our approach exhibits the largest possible breakdown …
4846 of 0.5, which means that the bias of the aggregation is bounded as long …
4847 fraction of adversarial edges of a node is less than 50\%. Our novel
4848 aggregation function, Soft Medoid, is a fully differentiable generalizat…
4849 the Medoid and therefore lends itself well for end-to-end deep learning.
4850 Equipping a GNN with our aggregation improves the robustness with respec…
4851 structure perturbations on Cora ML by a factor of 3 (and 5.5 on Citeseer…
4852 by a factor of 8 for low-degree nodes.
4853 &lt;/p&gt;
4854 </description>
4855 </item>
4856 <item>
4857 <title>Semi-Supervised Speech Recognition via Graph-based Temporal Class…
4858 <link>http://fr.arxiv.org/abs/2010.15653</link>
4859 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4860
4861 &lt;p&gt;Semi-supervised learning has demonstrated promising results in …
4862 speech recognition (ASR) by self-training using a seed ASR model with
4863 pseudo-labels generated for unlabeled data. The effectiveness of this ap…
4864 largely relies on the pseudo-label accuracy, for which typically only the
4865 1-best ASR hypothesis is used. However, alternative ASR hypotheses of an…
4866 list can provide more accurate labels for an unlabeled speech utterance …
4867 also reflect uncertainties of the seed ASR model. In this paper, we prop…
4868 generalized form of the connectionist temporal classification (CTC) obje…
4869 that accepts a graph representation of the training targets. The newly p…
4870 graph-based temporal classification (GTC) objective is applied for
4871 self-training with WFST-based supervision, which is generated from an N-…
4872 list of pseudo-labels. In this setup, GTC is used to learn not only a te…
4873 alignment, similarly to CTC, but also a label alignment to obtain the op…
4874 pseudo-label sequence from the weighted graph. Results show that this ap…
4875 can effectively exploit an N-best list of pseudo-labels with associated …
4876 outperforming standard pseudo-labeling by a large margin, with ASR resul…
4877 close to an oracle experiment in which the best hypotheses of the N-best…
4878 are selected manually.
4879 &lt;/p&gt;
4880 </description>
4881 </item>
4882 <item>
4883 <title>Identification of complex mixtures for Raman spectroscopy using a…
4884 <link>http://fr.arxiv.org/abs/2010.15654</link>
4885 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4886
4887 &lt;p&gt;With noisy environment caused by fluoresence and additive white…
4888 as complicated spectrum fingerprints, the identification of complex mixt…
4889 materials remains a major challenge in Raman spectroscopy application. I…
4890 paper, we propose a new scheme based on a constant wavelet transform (CW…
4891 a deep network for classifying complex mixture. The scheme first transfo…
4892 noisy Raman spectrum to a two-dimensional scale map using CWT. A multi-l…
4893 deep neural network model (MDNN) is then applied for classifying materia…
4894 proposed model accelerates the feature extraction and expands the featur…
4895 using the global averaging pooling layer. The Sigmoid function is implem…
4896 in the last layer of the model. The MDNN model was trained, validated and
4897 tested with data collected from the samples prepared from substances in …
4898 oil. During training and validating process, data augmentation is applie…
4899 overcome the imbalance of data and enrich the diversity of Raman spectra…
4900 the test results, it is found that the MDNN model outperforms previously
4901 proposed deep neural network models in terms of Hamming loss, one error,
4902 coverage, ranking loss, average precision, F1 macro averaging and F1 mic…
4903 averaging, respectively. The average detection time obtained from our mo…
4904 5.31 s, which is much faster than the detection time of the previously p…
4905 models.
4906 &lt;/p&gt;
4907 </description>
4908 </item>
4909 <item>
4910 <title>Generalization bounds for deep thresholding networks. (arXiv:2010…
4911 <link>http://fr.arxiv.org/abs/2010.15658</link>
4912 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4913
4914 &lt;p&gt;We consider compressive sensing in the scenario where the spars…
4915 (dictionary) is not known in advance, but needs to be learned from examp…
4916 Motivated by the well-known iterative soft thresholding algorithm for the
4917 reconstruction, we define deep networks parametrized by the dictionary, …
4918 we call deep thresholding networks. Based on training samples, we aim at
4919 learning the optimal sparsifying dictionary and thereby the optimal netw…
4920 that reconstructs signals from their low-dimensional linear measurements…
4921 dictionary learning is performed via minimizing the empirical risk. We d…
4922 generalization bounds by analyzing the Rademacher complexity of hypothes…
4923 classes consisting of such deep networks. We obtain estimates of the sam…
4924 complexity that depend only linearly on the dimensions and on the depth.
4925 &lt;/p&gt;
4926 </description>
4927 </item>
4928 <item>
4929 <title>Independence Tests Without Ground Truth for Noisy Learners. (arXi…
4930 <link>http://fr.arxiv.org/abs/2010.15662</link>
4931 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4932
4933 &lt;p&gt;Exact ground truth invariant polynomial systems can be written …
4934 arbitrarily correlated binary classifiers. Their solutions give estimate…
4935 sample statistics that require knowledge of the ground truth of the corr…
4936 labels in the sample. Of these polynomial systems, only a few have been …
4937 in closed form. Here we discuss the exact solution for independent binary
4938 classifiers - resolving an outstanding problem that has been presented a…
4939 conference and others. Its practical applicability is hampered by its so…
4940 remaining assumption - the classifiers need to be independent in their s…
4941 errors. We discuss how to use the closed form solution to create a
4942 self-consistent test that can validate the independence assumption itself
4943 absent the correct labels ground truth. It can be cast as an algebraic g…
4944 conjecture for binary classifiers that remains unsolved. A similar conje…
4945 for the ground truth invariant algebraic system for scalar regressors is
4946 solvable, and we present the solution here. We also discuss experiments …
4947 Penn ML Benchmark classification tasks that provide further evidence tha…
4948 conjecture may be true for the polynomial system of binary classifiers.
4949 &lt;/p&gt;
4950 </description>
4951 </item>
4952 <item>
4953 <title>Machine Ethics and Automated Vehicles. (arXiv:2010.15665v1 [cs.CY…
4954 <link>http://fr.arxiv.org/abs/2010.15665</link>
4955 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4956
4957 &lt;p&gt;Road vehicle travel at a reasonable speed involves some risk, e…
4958 computer-controlled driving with failure-free hardware and perfect sensi…
4959 fully-automated vehicle must continuously decide how to allocate this ri…
4960 without a human driver&apos;s oversight. These are ethical decisions, pa…
4961 in instances where an automated vehicle cannot avoid crashing. In this c…
4962 I introduce the concept of moral behavior for an automated vehicle, argu…
4963 need for research in this area through responses to anticipated critique…
4964 discuss relevant applications from machine ethics and moral modeling res…
4965 &lt;/p&gt;
4966 </description>
4967 </item>
4968 <item>
4969 <title>PeopleXploit -- A hybrid tool to collect public data. (arXiv:2010…
4970 <link>http://fr.arxiv.org/abs/2010.15668</link>
4971 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4972
4973 &lt;p&gt;This paper introduces the concept of Open Source Intelligence (…
4974 important application in intelligent profiling of individuals. With a va…
4975 of tools available, significant data shall be obtained on an individual …
4976 consequence of analyzing his/her internet presence but all of this comes…
4977 cost of low relevance. To increase the relevance score in profiling,
4978 PeopleXploit is being introduced. PeopleXploit is a hybrid tool which he…
4979 collecting the publicly available information that is reliable and relev…
4980 the given input. This tool is used to track and trace the given target w…
4981 their digital footprints like Name, Email, Phone Number, User IDs etc. a…
4982 tool will scan &amp;amp; search other associated data from public availa…
4983 from the internet and create a summary report against the target. People…
4984 profiles a person using authorship analysis and finds the best matching …
4985 Also, the type of analysis performed (professional/matrimonial/criminal …
4986 varies with the requirement of the user.
4987 &lt;/p&gt;
4988 </description>
4989 </item>
4990 <item>
4991 <title>Using Twitter to Analyze Political Polarization During National C…
4992 <link>http://fr.arxiv.org/abs/2010.15669</link>
4993 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
4994
4995 &lt;p&gt;Democrats and Republicans have seemed to grow apart in the past…
4996 decades. Since the United States as we know it today is undeniably bipar…
4997 this phenomenon would not appear as a surprise to most. However, there a…
4998 triggers which can cause spikes in disagreements between Democrats and
4999 Republicans at a higher rate than how the two parties have been growing …
5000 gradually over time. This study has analyzed the idea that national even…
5001 which generally are detrimental to all individuals can be one of those
5002 triggers. By testing polarization before and after three events (Hurrica…
5003 Sandy [2012], N. Korea Missile Test Surge [2019], COVID-19 [2020]) using
5004 Twitter data, we show that a measurable spike in polarization occurs bet…
5005 the Democrat and Republican party. In order to measure polarization, sen…
5006 of Twitter users aligned to the Democrat and Republican parties are comp…
5007 identical entities (events, people, locations, etc.). Using hundreds of
5008 thousands of data samples, a 2.8% increase in polarization was measured …
5009 times of crisis compared to times where no crises were occurring. Regard…
5010 the reasoning that the gap between political parties can increase so much
5011 during times of suffering and stress, it is definitely alarming to see t…
5012 among other aspects of life, the partisan gap worsens during detrimental
5013 national events.
5014 &lt;/p&gt;
5015 </description>
5016 </item>
5017 <item>
5018 <title>Detecting Individuals with Depressive Disorder fromPersonal Googl…
5019 <link>http://fr.arxiv.org/abs/2010.15670</link>
5020 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5021
5022 &lt;p&gt;Depressive disorder is one of the most prevalent mental illness…
5023 global population. However, traditional screening methods require exacti…
5024 in-person interviews and may fail to provide immediate interventions. In…
5025 work, we leverage ubiquitous personal longitudinal Google Search and You…
5026 engagement logs to detect individuals with depressive disorder. We colle…
5027 Google Search and YouTube history data and clinical depression evaluation
5028 results from $212$ participants ($99$ of them suffered from moderate to …
5029 depressions). We then propose a personalized framework for classifying
5030 individuals with and without depression symptoms based on mutual-excitin…
5031 process that captures both the temporal and semantic aspects of online
5032 activities. Our best model achieved an average F1 score of $0.77 \pm 0.0…
5033 an AUC ROC of $0.81 \pm 0.02$.
5034 &lt;/p&gt;
5035 </description>
5036 </item>
5037 <item>
5038 <title>Computing Crisp Bisimulations for Fuzzy Structures. (arXiv:2010.1…
5039 <link>http://fr.arxiv.org/abs/2010.15671</link>
5040 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5041
5042 &lt;p&gt;Fuzzy structures such as fuzzy automata, fuzzy transition syste…
5043 social networks and fuzzy interpretations in fuzzy description logics ha…
5044 widely studied. For such structures, bisimulation is a natural notion for
5045 characterizing indiscernibility between states or individuals. There are…
5046 kinds of bisimulations for fuzzy structures: crisp bisimulations and fuz…
5047 bisimulations. While the latter fits to the fuzzy paradigm, the former h…
5048 attracted attention due to the application of crisp equivalence relation…
5049 example, in minimizing structures. Bisimulations can be formulated for f…
5050 labeled graphs and then adapted to other fuzzy structures. In this artic…
5051 present an efficient algorithm for computing the partition corresponding…
5052 largest crisp bisimulation of a given finite fuzzy labeled graph. Its
5053 complexity is of order $O((m\log{l} + n)\log{n})$, where $n$, $m$ and $l…
5054 the number of vertices, the number of nonzero edges and the number of di…
5055 fuzzy degrees of edges of the input graph, respectively. We also study a
5056 similar problem for the setting with counting successors, which correspo…
5057 the case with qualified number restrictions in description logics and gr…
5058 modalities in modal logics. In particular, we provide an efficient algor…
5059 with the complexity $O((m\log{m} + n)\log{n})$ for the considered proble…
5060 that setting.
5061 &lt;/p&gt;
5062 </description>
5063 </item>
5064 <item>
5065 <title>FD Cell-Free mMIMO: Analysis and Optimization. (arXiv:2010.15672v…
5066 <link>http://fr.arxiv.org/abs/2010.15672</link>
5067 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5068
5069 &lt;p&gt;We consider a full-duplex cell-free massive multiple-input-mult…
5070 system with limited capacity fronthaul links. We derive its downlink/upl…
5071 closed-form spectral efficiency (SE) lower bounds with maximum-ratio
5072 transmission/maximum-ratio combining and optimal uniform quantization. To
5073 reduce carbon footprint, this paper maximizes the non-convex weighted sum
5074 energy efficiency (WSEE) via downlink and uplink power control, and succ…
5075 convex approximation framework. We show that with low fronthaul capacity…
5076 system requires a higher number of fronthaul quantization bits to achiev…
5077 SE and WSEE. For high fronthaul capacity, higher number of bits, however,
5078 achieves high SE but a reduced WSEE.
5079 &lt;/p&gt;
5080 </description>
5081 </item>
5082 <item>
5083 <title>Machine Learning Based Demand Modelling for On-Demand Transit Ser…
5084 <link>http://fr.arxiv.org/abs/2010.15673</link>
5085 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5086
5087 &lt;p&gt;The use of mobile applications apps and GPS service on smartpho…
5088 transportation management applications has enabled the new &quot;on-dema…
5089 service, where the transportation supply is following the users&apos; sc…
5090 routes. In September 2018, the City of Belleville in Canada and Pantonium
5091 operationalized the same idea, but for the public transit service in the…
5092 to develop an on-demand transit (ODT) service. An existing fixed route (…
5093 public transit service was converted into an on-demand service during th…
5094 as a pilot project to maintain a higher demand sensitivity and highest
5095 operation cost efficiency per trip. In this study, Random Forest (RF), B…
5096 Artificial Neural Network (ANN), and Deep Neural Network (DNN) machine l…
5097 algorithms were adopted to develop a pickup demand model (trip generatio…
5098 a trip demand model (trip distribution model) for Belleville ODT service…
5099 on the dissemination areas&apos; demographic characteristics and the exi…
5100 characteristics. The developed models aim to explain the demand behavior,
5101 investigate the main factors affecting the trip pattern and their relati…
5102 importance, and to predict the number of generated trips from any dissem…
5103 area as well as between any two dissemination areas. The results indicat…
5104 the developed models can predict 63% and 70% of the pickup and trip dema…
5105 levels, respectively. Both models are most affected by the month of the …
5106 and the day of the week variables. In addition, the population density h…
5107 higher impact on the ODT service pickup demand levels than the other
5108 demographic characteristics followed by the working age percentages and …
5109 income characteristics. Whereas, the distribution of the trips depends o…
5110 demographic characteristics of the destination area more than the origin…
5111 &lt;/p&gt;
5112 </description>
5113 </item>
5114 <item>
5115 <title>Analyzing Societal Impact of COVID-19: A Study During the Early D…
5116 <link>http://fr.arxiv.org/abs/2010.15674</link>
5117 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5118
5119 &lt;p&gt;In this paper, we collect and study Twitter communications to u…
5120 societal impact of COVID-19 in the United States during the early days o…
5121 pandemic. With infections soaring rapidly, users took to Twitter asking …
5122 to self isolate and quarantine themselves. Users also demanded closure of
5123 schools, bars, and restaurants as well as lockdown of cities and states.…
5124 methodically collect tweets by identifying and tracking trending COVID-r…
5125 hashtags. We first manually group the hashtags into six main categories,
5126 namely, 1) General COVID, 2) Quarantine, 3) Panic Buying, 4) School Clos…
5127 5) Lockdowns, and 6) Frustration and Hope}, and study the temporal evolu…
5128 tweets in these hashtags. We conduct a linguistic analysis of words comm…
5129 all hashtag groups and specific to each hashtag group and identify the c…
5130 concerns of people as the pandemic gripped the nation (e.g., exploring b…
5131 as an alternative to toilet paper). We conduct sentiment analysis and our
5132 investigation reveals that people reacted positively to school closures …
5133 negatively to the lack of availability of essential goods due to panic b…
5134 We adopt a state-of-the-art semantic role labeling approach to identify …
5135 action words and then leverage a LSTM-based dependency parsing model to …
5136 the context of action words (e.g., verb deal is accompanied by nouns suc…
5137 anxiety, stress, and crisis). Finally, we develop a scalable seeded topic
5138 modeling approach to automatically categorize and isolate tweets into ha…
5139 groups and experimentally validate that our topic model provides a group…
5140 similar to our manual grouping. Our study presents a systematic way to
5141 construct an aggregated picture of peoples&apos; response to the pandemi…
5142 the groundwork for future fine-grained linguistic and behavioral analysi…
5143 &lt;/p&gt;
5144 </description>
5145 </item>
5146 <item>
5147 <title>Deep DA for Ordinal Regression of Pain Intensity Estimation Using…
5148 <link>http://fr.arxiv.org/abs/2010.15675</link>
5149 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5150
5151 &lt;p&gt;Automatic estimation of pain intensity from facial expressions …
5152 an immense potential in health care applications. However, domain adapta…
5153 (DA) is needed to alleviate the problem of domain shifts that typically …
5154 between video data captured in source and target do-mains. Given the lab…
5155 task of collecting and annotating videos, and the subjective bias due to
5156 ambiguity among adjacent intensity levels, weakly-supervised learning (W…
5157 gaining attention in such applications. Yet, most state-of-the-art WSL m…
5158 are typically formulated as regression problems, and do not leverage the
5159 ordinal relation between intensity levels, nor the temporal coherence of
5160 multiple consecutive frames. This paper introduces a new deep learn-ing …
5161 for weakly-supervised DA with ordinal regression(WSDA-OR), where videos …
5162 target domain have coarse la-bels provided on a periodic basis. The WSDA…
5163 model enforces ordinal relationships among the intensity levels as-signe…
5164 the target sequences, and associates multiple relevant frames to sequenc…
5165 labels (instead of a single frame). In particular, it learns discriminan…
5166 domain-invariant feature representations by integrating multiple in-stan…
5167 learning with deep adversarial DA, where soft Gaussian labels are used to
5168 efficiently represent the weak ordinal sequence-level labels from the ta…
5169 domain. The proposed approach was validated on the RECOLA video dataset …
5170 fully-labeled source domain, and UNBC-McMaster video data as weakly-labe…
5171 target domain. We have also validated WSDA-OR on BIOVID and Fatigue (pri…
5172 datasets for sequence level estimation. Experimental results indicate th…
5173 approach can provide a significant improvement over the state-of-the-art
5174 models, allowing to achieve a greater localization accuracy.
5175 &lt;/p&gt;
5176 </description>
5177 </item>
5178 <item>
5179 <title>Optimization Fabrics for Behavioral Design. (arXiv:2010.15676v1 […
5180 <link>http://fr.arxiv.org/abs/2010.15676</link>
5181 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5182
5183 &lt;p&gt;Second-order differential equations define smooth system behavi…
5184 general, there is no guarantee that a system will behave well when force…
5185 potential function, but in some cases they do and may exhibit smooth
5186 optimization properties such as convergence to a local minimum of the
5187 potential. Such a property is desirable in system design since it is inh…
5188 linked to asymptotic stability. This paper presents a comprehensive theo…
5189 optimization fabrics which are second-order differential equations that …
5190 nominal behaviors on a space and are guaranteed to optimize when forced …
5191 from those nominal trajectories by a potential function. Optimization fa…
5192 or fabrics for short, can encode commonalities among optimization proble…
5193 reflect the structure of the space itself, enabling smooth optimization
5194 processes to intelligently navigate each problem even when the potential
5195 function is simple and relatively naive. Importantly, optimization over a
5196 fabric is asymptotically stable, so optimization fabrics constitute a bu…
5197 block for provably stable system design.
5198 &lt;/p&gt;
5199 </description>
5200 </item>
5201 <item>
5202 <title>On the Failure of the Smart Approach of the GPT Cryptosystem. (ar…
5203 <link>http://fr.arxiv.org/abs/2010.15678</link>
5204 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5205
5206 &lt;p&gt;This paper describes a new algorithm for breaking the smart app…
5207 GPT cryptosystem. We show that by puncturing the public code several tim…
5208 specific positions, we get a public code on which applying the Frobenius
5209 operator appropriately allows to build an alternative secret key.
5210 &lt;/p&gt;
5211 </description>
5212 </item>
5213 <item>
5214 <title>Lie-Trotter Splitting for the Nonlinear Stochastic Manakov System…
5215 <link>http://fr.arxiv.org/abs/2010.15679</link>
5216 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5217
5218 &lt;p&gt;This article analyses the convergence of the Lie-Trotter splitt…
5219 the stochastic Manakov equation, a system arising in the study of pulse
5220 propagation in randomly birefringent optical fibers. First, we prove tha…
5221 strong order of the numerical approximation is 1/2 if the nonlinear term…
5222 system is globally Lipschitz. Then, we show that the splitting scheme has
5223 convergence order 1/2 in probability and almost sure order 1/2- in the c…
5224 a cubic nonlinearity. We provide several numerical experiments illustrat…
5225 aforementioned results and the efficiency of the Lie-Trotter splitting s…
5226 Finally, we numerically investigate the possible blowup of solutions for…
5227 power-law nonlinearities.
5228 &lt;/p&gt;
5229 </description>
5230 </item>
5231 <item>
5232 <title>LSTM for Model-Based Anomaly Detection in Cyber-Physical Systems.…
5233 <link>http://fr.arxiv.org/abs/2010.15680</link>
5234 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5235
5236 &lt;p&gt;Anomaly detection is the task of detecting data which differs f…
5237 behaviour of a system in a given context. In order to approach this prob…
5238 data-driven models can be learned to predict current or future observati…
5239 Oftentimes, anomalous behaviour depends on the internal dynamics of the …
5240 and looks normal in a static context. To address this problem, the model…
5241 also operate depending on state. Long Short-Term Memory (LSTM) neural ne…
5242 have been shown to be particularly useful to learn time sequences with v…
5243 length of temporal dependencies and are therefore an interesting general
5244 purpose approach to learn the behaviour of arbitrarily complex Cyber-Phy…
5245 Systems. In order to perform anomaly detection, we slightly modify the s…
5246 norm 2 error to incorporate an estimate of model uncertainty. We analyse…
5247 approach on artificial and real data.
5248 &lt;/p&gt;
5249 </description>
5250 </item>
5251 <item>
5252 <title>Maximum a posteriori signal recovery for optical coherence tomogr…
5253 <link>http://fr.arxiv.org/abs/2010.15682</link>
5254 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5255
5256 &lt;p&gt;Optical coherence tomography angiography (OCTA) is a novel and …
5257 promising imaging modality to image retinal and sub-retinal vasculature.…
5258 on repeated optical coherence tomography (OCT) scans, intensity changes …
5259 observed over time and used to compute OCTA image data. OCTA data are pr…
5260 noise and artifacts caused by variations in flow speed and patient movem…
5261 propose a novel iterative maximum a posteriori signal recovery algorithm…
5262 order to generate OCTA volumes with reduced noise and increased image qu…
5263 This algorithm is based on previous work on probabilistic OCTA signal mo…
5264 and maximum likelihood estimates. Reconstruction results using total var…
5265 minimization and wavelet shrinkage for regularization were compared agai…
5266 OCTA ground truth volume, merged from six co-registered single OCTA volu…
5267 The results show a significant improvement in peak signal-to-noise ratio…
5268 structural similarity. The presented algorithm brings together OCTA image
5269 generation and Bayesian statistics and can be developed into new OCTA im…
5270 generation and denoising algorithms.
5271 &lt;/p&gt;
5272 </description>
5273 </item>
5274 <item>
5275 <title>Resilient Energy Efficient Healthcare Monitoring Infrastructure w…
5276 <link>http://fr.arxiv.org/abs/2010.15683</link>
5277 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5278
5279 &lt;p&gt;In this paper, a 1+1 server protection scheme is considered whe…
5280 servers, a primary and a secondary processing server are used to serve E…
5281 monitoring applications concurrently. The infrastructure is designed to …
5282 resilient against server failure under two scenarios related to the geog…
5283 location of primary and secondary servers and resilient against both ser…
5284 network failures. A Mixed Integer Linear Programming (MILP) model is use…
5285 optimise the number and locations of both primary and secondary processi…
5286 servers so that the energy consumption of the networking equipment and
5287 processing are minimised. The results show that considering a scenario f…
5288 server protection without geographical constraints compared to the
5289 non-resilient scenario has resulted in both network and processing energy
5290 penalty as the traffic is doubled. The results also reveal that increasi…
5291 level of resilience to consider geographical constraints compared to case
5292 without geographical constraints resulted in higher network energy penal…
5293 the demand is low as more nodes are utilised to place the processing ser…
5294 under the geographic constraints. Also, increasing the level of resilien…
5295 consider network protection with link and node disjoint selection has re…
5296 in a low network energy penalty at high demands due to the activation of…
5297 large part of the network in any case due to the demands. However, the r…
5298 show that the network energy penalty is reduced with the increasing numb…
5299 processing servers at each candidate node. Meanwhile, the same energy for
5300 processing is consumed regardless of the increasing level of resilience …
5301 same number of processing servers are utilised. A heuristic is developed…
5302 each resilience scenario for real-time implementation where the results …
5303 that the performance of the heuristic is approaching the results of the …
5304 model.
5305 &lt;/p&gt;
5306 </description>
5307 </item>
5308 <item>
5309 <title>Governance &amp; Autonomy: Towards a Governance-based Analysis of…
5310 <link>http://fr.arxiv.org/abs/2010.15684</link>
5311 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5312
5313 &lt;p&gt;One of the main challenges in integrating Cyber-Physical System…
5314 (CPSoS) to function as a single unified system is the autonomy of its
5315 Cyber-Physical Systems (CPSs), which may lead to a lack of coordination …
5316 CPSs and results in various kinds of conflicts. We advocate that to effi…
5317 integrate CPSs within the CPSoS, we may need to adjust the autonomy of s…
5318 CPSs in a way that allows them to coordinate their activities to avoid a…
5319 potential conflict among one another. To achieve that, we need to incorp…
5320 the notion of governance within the design of CPSoS, which defines rules…
5321 can be used for clearly specifying who and how can adjust the autonomy o…
5322 CPS. In this paper, we try to tackle this problem by proposing a new con…
5323 model that can be used for performing a governance-based analysis of aut…
5324 for CPSs within CPSoS. We illustrate the utility of the model with an ex…
5325 from the automotive domain.
5326 &lt;/p&gt;
5327 </description>
5328 </item>
5329 <item>
5330 <title>Deep Autofocus for Synthetic Aperture Sonar. (arXiv:2010.15687v1 …
5331 <link>http://fr.arxiv.org/abs/2010.15687</link>
5332 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5333
5334 &lt;p&gt;Synthetic aperture sonar (SAS) requires precise positional and …
5335 information to produce well-focused output during the image reconstructi…
5336 step. However, errors in these measurements are commonly present resulti…
5337 defocused imagery. To overcome these issues, an \emph{autofocus} algorit…
5338 employed as a post-processing step after image reconstruction for the pu…
5339 of improving image quality using the image content itself. These algorit…
5340 usually iterative and metric-based in that they seek to optimize an image
5341 sharpness metric. In this letter, we demonstrate the potential of machine
5342 learning, specifically deep learning, to address the autofocus problem. …
5343 formulate the problem as a self-supervised, phase error estimation task …
5344 deep network we call Deep Autofocus. Our formulation has the advantages …
5345 being non-iterative (and thus fast) and not requiring ground truth
5346 focused-defocused images pairs as often required by other deblurring deep
5347 learning methods. We compare our technique against a set of common sharp…
5348 metrics optimized using gradient descent over a real-world dataset. Our …
5349 demonstrate Deep Autofocus can produce imagery that is perceptually as g…
5350 benchmark iterative techniques but at a substantially lower computationa…
5351 We conclude that our proposed Deep Autofocus can provide a more favorable
5352 cost-quality trade-off than state-of-the-art alternatives with significa…
5353 potential of future research.
5354 &lt;/p&gt;
5355 </description>
5356 </item>
5357 <item>
5358 <title>Learning Deep Interleaved Networks with Asymmetric Co-Attention f…
5359 <link>http://fr.arxiv.org/abs/2010.15689</link>
5360 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5361
5362 &lt;p&gt;Recently, convolutional neural network (CNN) has demonstrated s…
5363 success for image restoration (IR) tasks (e.g., image super-resolution, …
5364 deblurring, rain streak removal, and dehazing). However, existing CNN ba…
5365 models are commonly implemented as a single-path stream to enrich feature
5366 representations from low-quality (LQ) input space for final predictions,…
5367 fail to fully incorporate preceding low-level contexts into later high-l…
5368 features within networks, thereby producing inferior results. In this pa…
5369 present a deep interleaved network (DIN) that learns how information at
5370 different states should be combined for high-quality (HQ) images
5371 reconstruction. The proposed DIN follows a multi-path and multi-branch p…
5372 allowing multiple interconnected branches to interleave and fuse at diff…
5373 states. In this way, the shallow information can guide deep representati…
5374 features prediction to enhance the feature expression ability. Furthermo…
5375 propose asymmetric co-attention (AsyCA) which is attached at each interl…
5376 node to model the feature dependencies. Such AsyCA can not only adaptive…
5377 emphasize the informative features from different states, but also impro…
5378 discriminative ability of networks. Our presented DIN can be trained end…
5379 and applied to various IR tasks. Comprehensive evaluations on public ben…
5380 and real-world datasets demonstrate that the proposed DIN perform favora…
5381 against the state-of-the-art methods quantitatively and qualitatively.
5382 &lt;/p&gt;
5383 </description>
5384 </item>
5385 <item>
5386 <title>Analyzing the tree-layer structure of Deep Forests. (arXiv:2010.1…
5387 <link>http://fr.arxiv.org/abs/2010.15690</link>
5388 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5389
5390 &lt;p&gt;Random forests on the one hand, and neural networks on the othe…
5391 met great success in the machine learning community for their predictive
5392 performance. Combinations of both have been proposed in the literature, …
5393 leading to the so-called deep forests (DF) [25]. In this paper, we inves…
5394 the mechanisms at work in DF and outline that DF architecture can genera…
5395 simplified into more simple and computationally efficient shallow forests
5396 networks. Despite some instability, the latter may outperform standard
5397 predictive tree-based methods. In order to precisely quantify the improv…
5398 achieved by these light network configurations over standard tree learne…
5399 theoretically study the performance of a shallow tree network made of two
5400 layers, each one composed of a single centered tree. We provide tight
5401 theoretical lower and upper bounds on its excess risk. These theoretical
5402 results show the interest of tree-network architectures for well-structu…
5403 data provided that the first layer, acting as a data encoder, is rich en…
5404 &lt;/p&gt;
5405 </description>
5406 </item>
5407 <item>
5408 <title>Unveiling process insights from refactoring practices. (arXiv:201…
5409 <link>http://fr.arxiv.org/abs/2010.15692</link>
5410 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5411
5412 &lt;p&gt;Context : Software comprehension and maintenance activities, su…
5413 refactoring, are said to be negatively impacted by software complexity. …
5414 methods used to measure software product and processes complexity have b…
5415 thoroughly debated in the literature. However, the discernment about the
5416 possible links between these two dimensions, particularly on the benefit…
5417 using the process perspective, has a long journey ahead. Objective: To i…
5418 the understanding of the liaison of developers&apos; activities and soft…
5419 complexity within a refactoring task, namely by evaluating if process me…
5420 gathered from the IDE, using process mining methods and tools, are suita…
5421 accurately classify different refactoring practices and the resulting so…
5422 complexity. Method: We mined source code metrics from a software product…
5423 a quality improvement task was given in parallel to (117) software devel…
5424 organized in (71) teams. Simultaneously, we collected events from their …
5425 work sessions (320) and used process mining to model their processes and
5426 extract the correspondent metrics. Results: Most teams using a plugin for
5427 refactoring (JDeodorant) reduced software complexity more effectively an…
5428 simpler processes than the ones that performed refactoring using only Ec…
5429 native features. We were able to find moderate correlations (43%) between
5430 software cyclomatic complexity and process cyclomatic complexity. The be…
5431 models found for the refactoring method and cyclomatic complexity level
5432 predictions, had an accuracy of 92.95% and 94.36%, respectively. Conclus…
5433 Our approach agnostic to programming languages, geographic location, or
5434 development practices. Initial findings are encouraging, and lead us to …
5435 practitioners may use our method in other development tasks, such as, de…
5436 analysis and unit or integration tests.
5437 &lt;/p&gt;
5438 </description>
5439 </item>
5440 <item>
5441 <title>Learning interaction kernels in mean-field equations of 1st-order…
5442 <link>http://fr.arxiv.org/abs/2010.15694</link>
5443 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5444
5445 &lt;p&gt;We introduce a nonparametric algorithm to learn interaction ker…
5446 mean-field equations for 1st-order systems of interacting particles. The…
5447 consist of discrete space-time observations of the solution. By least sq…
5448 with regularization, the algorithm learns the kernel on data-adaptive
5449 hypothesis spaces efficiently. A key ingredient is a probabilistic error
5450 functional derived from the likelihood of the mean-field equation&apos;s…
5451 process. The estimator converges, in a reproducing kernel Hilbert space …
5452 L2 space under an identifiability condition, at a rate optimal in the se…
5453 that it equals the numerical integrator&apos;s order. We demonstrate our…
5454 on three typical examples: the opinion dynamics with a piecewise linear …
5455 the granular media model with a quadratic kernel, and the aggregation-di…
5456 with a repulsive-attractive kernel.
5457 &lt;/p&gt;
5458 </description>
5459 </item>
5460 <item>
5461 <title>Generalized Insider Attack Detection Implementation using NetFlow…
5462 <link>http://fr.arxiv.org/abs/2010.15697</link>
5463 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5464
5465 &lt;p&gt;Insider Attack Detection in commercial networks is a critical p…
5466 does not have any good solutions at this current time. The problem is
5467 challenging due to the lack of visibility into live networks and a lack …
5468 standard feature set to distinguish between different attacks. In this p…
5469 we study an approach centered on using network data to identify attacks.…
5470 work builds on unsupervised machine learning techniques such as One-Clas…
5471 and bi-clustering as weak indicators of insider network attacks. We comb…
5472 these techniques to limit the number of false positives to an acceptable…
5473 required for real-world deployments by using One-Class SVM to check for
5474 anomalies detected by the proposed Bi-clustering algorithm. We present a
5475 prototype implementation in Python and associated results for two differ…
5476 real-world representative data sets. We show that our approach is a prom…
5477 tool for insider attack detection in realistic settings.
5478 &lt;/p&gt;
5479 </description>
5480 </item>
5481 <item>
5482 <title>Constrained Online Learning to Mitigate Distortion Effects in Pul…
5483 <link>http://fr.arxiv.org/abs/2010.15698</link>
5484 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5485
5486 &lt;p&gt;Pulse-agile radar systems have demonstrated favorable performan…
5487 electromagnetic scenarios. However, the use of non-identical waveforms w…
5488 radar&apos;s coherent processing interval may lead to harmful distortion…
5489 when pulse-Doppler processing is used. This paper presents an online lea…
5490 framework to optimize detection performance while mitigating harmful sid…
5491 levels. The radar waveform selection process is formulated as a linear
5492 contextual bandit problem, within which waveform adaptations which excee…
5493 tolerable level of expected distortion are eliminated. The constrained o…
5494 learning approach is effective and computationally feasible, evidenced by
5495 simulations in a radar-communication coexistence scenario and in the pre…
5496 of intentional adaptive jamming. This approach is applied to both stocha…
5497 and adversarial contextual bandit learning models and the detection perf…
5498 in dynamic scenarios is evaluated.
5499 &lt;/p&gt;
5500 </description>
5501 </item>
5502 <item>
5503 <title>Permute, Quantize, and Fine-tune: Efficient Compression of Neural…
5504 <link>http://fr.arxiv.org/abs/2010.15703</link>
5505 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5506
5507 &lt;p&gt;Compressing large neural networks is an important step for thei…
5508 in resource-constrained computational platforms. In this context, vector
5509 quantization is an appealing framework that expresses multiple parameter…
5510 a single code, and has recently achieved state-of-the-art network compre…
5511 on a range of core vision and natural language processing tasks. Key to …
5512 success of vector quantization is deciding which parameter groups should…
5513 compressed together. Previous work has relied on heuristics that group t…
5514 spatial dimension of individual convolutional filters, but a general sol…
5515 remains unaddressed. This is desirable for pointwise convolutions (which
5516 dominate modern architectures), linear layers (which have no notion of s…
5517 dimension), and convolutions (when more than one filter is compressed to…
5518 same codeword). In this paper we make the observation that the weights o…
5519 adjacent layers can be permuted while expressing the same function. We t…
5520 establish a connection to rate-distortion theory and search for permutat…
5521 that result in networks that are easier to compress. Finally, we rely on…
5522 annealed quantization algorithm to better compress the network and achie…
5523 higher final accuracy. We show results on image classification, object
5524 detection, and segmentation, reducing the gap with the uncompressed mode…
5525 to 70% with respect to the current state of the art.
5526 &lt;/p&gt;
5527 </description>
5528 </item>
5529 <item>
5530 <title>5W1H-based Expression for the Effective Sharing of Information in…
5531 <link>http://fr.arxiv.org/abs/2010.15711</link>
5532 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5533
5534 &lt;p&gt;Digital forensic investigation is used in various areas related…
5535 devices including the cyber crime. This is an investigative process usin…
5536 techniques, which have implemented as tools. The types of files covered …
5537 digital forensic investigation are wide and varied, however, there is no…
5538 express the results into a standardized format. The standardization are
5539 different by types of device, file system, or application. Different out…
5540 make it time-consuming and difficult to share information and to impleme…
5541 integration. In addition, it could weaken cyber security. Thus, it is im…
5542 to define normalization and to present data in the same format. In this …
5543 a 5W1H-based expression for information sharing for effective digital fo…
5544 investigation is proposed to analyze digital forensic information using …
5545 questions--what, who, where, when, why and how. Based on the 5W1H-based
5546 expression, digital information from different types of files is convert…
5547 represented in the same format of outputs. As the 5W1H is the basic writ…
5548 principle, application of the 5W1H-based expression on the case studies …
5549 that this expression enhances clarity and correctness for information sh…
5550 Furthermore, in the case of security incidents, this expression has an
5551 advantage in being compatible with STIX.
5552 &lt;/p&gt;
5553 </description>
5554 </item>
5555 <item>
5556 <title>Playing a Part: Speaker Verification at the Movies. (arXiv:2010.1…
5557 <link>http://fr.arxiv.org/abs/2010.15716</link>
5558 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5559
5560 &lt;p&gt;The goal of this work is to investigate the performance of popu…
5561 recognition models on speech segments from movies, where often actors
5562 intentionally disguise their voice to play a character. We make the foll…
5563 three contributions: (i) We collect a novel, challenging speaker recogni…
5564 dataset called VoxMovies, with speech for 856 identities from almost 400…
5565 clips. VoxMovies contains utterances with varying emotion, accents and
5566 background noise, and therefore comprises an entirely different domain t…
5567 interview-style, emotionally calm utterances in current speaker recognit…
5568 datasets such as VoxCeleb; (ii) We provide a number of domain adaptation
5569 evaluation sets, and benchmark the performance of state-of-the-art speak…
5570 recognition models on these evaluation pairs. We demonstrate that both s…
5571 verification and identification performance drops steeply on this new da…
5572 showing the challenge in transferring models across domains; and finally…
5573 We show that simple domain adaptation paradigms improve performance, but…
5574 is still large room for improvement.
5575 &lt;/p&gt;
5576 </description>
5577 </item>
5578 <item>
5579 <title>What can we learn from gradients?. (arXiv:2010.15718v1 [cs.CR])</…
5580 <link>http://fr.arxiv.org/abs/2010.15718</link>
5581 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5582
5583 &lt;p&gt;Recent work (\cite{zhu2019deep}) has shown that it is possible …
5584 the input (image) from the gradient of a neural network. In this paper, …
5585 is to better understand the limits to reconstruction and to speed up ima…
5586 reconstruction by imposing prior image information and improved initiali…
5587 Firstly, we show that for the \textbf{non-linear} neural network,
5588 gradient-based reconstruction approximates to solving a high-dimension
5589 \textbf{linear} equations for both fully-connected neural network and
5590 convolutional neural network. Exploring the theoretical limits of input
5591 reconstruction, we show that a fully-connected neural network with a
5592 \textbf{one} hidden node is enough to reconstruct a \textbf{single} input
5593 image, regardless of the number of nodes in the output layer. Then we
5594 generalize this result to a gradient averaged over mini-batches of size …
5595 this case, the full mini-batch can be reconstructed in a fully-connected
5596 network if the number of hidden units exceeds B. For a convolutional neu…
5597 network, the required number of filters in the first convolutional layer…
5598 is decided by the batch size B, however, in this case, input width d and…
5599 width after filter $d^{&apos;}$ also play the role $h=(\frac{d}{d^{&apos…
5600 C is channel number of input. Finally, we validate and underpin our theo…
5601 analysis on bio-medical data (fMRI, ECG signals, and cell images) and on
5602 benchmark data (MNIST, CIFAR100, and face images).
5603 &lt;/p&gt;
5604 </description>
5605 </item>
5606 <item>
5607 <title>Attentive Clustering Processes. (arXiv:2010.15727v1 [stat.ML])</t…
5608 <link>http://fr.arxiv.org/abs/2010.15727</link>
5609 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5610
5611 &lt;p&gt;Amortized approaches to clustering have recently received renew…
5612 thanks to novel objective functions that exploit the expressiveness of d…
5613 learning models. In this work we revisit a recent proposal for fast amor…
5614 probabilistic clustering, the Clusterwise Clustering Process (CCP), which
5615 yields samples from the posterior distribution of cluster labels for set…
5616 arbitrary size using only O(K) forward network evaluations, where K is an
5617 arbitrary number of clusters. While adequate in simple datasets, we show…
5618 the model can severely underfit complex datasets, and hypothesize that t…
5619 limitation can be traced back to the implicit assumption that the probab…
5620 of a point joining a cluster is equally sensitive to all the points avai…
5621 to join the same cluster. We propose an improved model, the Attentive
5622 Clustering Process (ACP), that selectively pays more attention to releva…
5623 points while preserving the invariance properties of the generative mode…
5624 illustrate the advantages of the new model in applications to spike-sort…
5625 multi-electrode arrays and community discovery in networks. The latter c…
5626 combines the ACP model with graph convolutional networks, and to our kno…
5627 is the first deep learning model that handles an arbitrary number of
5628 communities.
5629 &lt;/p&gt;
5630 </description>
5631 </item>
5632 <item>
5633 <title>Explainable Automated Coding of Clinical Notes using Hierarchical…
5634 <link>http://fr.arxiv.org/abs/2010.15728</link>
5635 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5636
5637 &lt;p&gt;Diagnostic or procedural coding of clinical notes aims to deriv…
5638 summary of disease-related information about patients. Such coding is us…
5639 done manually in hospitals but could potentially be automated to improve…
5640 efficiency and accuracy of medical coding. Recent studies on deep learni…
5641 automated medical coding achieved promising performances. However, the
5642 explainability of these models is usually poor, preventing them to be us…
5643 confidently in supporting clinical practice. Another limitation is that …
5644 models mostly assume independence among labels, ignoring the complex
5645 correlation among medical codes which can potentially be exploited to im…
5646 the performance. We propose a Hierarchical Label-wise Attention Network …
5647 which aimed to interpret the model by quantifying importance (as attenti…
5648 weights) of words and sentences related to each of the labels. Secondly,…
5649 propose to enhance the major deep learning models with a label embedding…
5650 initialisation approach, which learns a dense, continuous vector represe…
5651 and then injects the representation into the final layers and the label-…
5652 attention layers in the models. We evaluated the methods using three set…
5653 on the MIMIC-III discharge summaries: full codes, top-50 codes, and the …
5654 COVID-19 shielding codes. Experiments were conducted to compare HLAN and…
5655 initialisation to the state-of-the-art neural network based methods. HLAN
5656 achieved the best Micro-level AUC and $F_1$ on the top-50 code predictio…
5657 comparable results on the NHS COVID-19 shielding code prediction to other
5658 models. By highlighting the most salient words and sentences for each la…
5659 HLAN showed more meaningful and comprehensive model interpretation compa…
5660 its downgraded baselines and the CNN-based models. LE initialisation
5661 consistently boosted most deep learning models for automated medical cod…
5662 &lt;/p&gt;
5663 </description>
5664 </item>
5665 <item>
5666 <title>Fundamental limitations to key distillation from Gaussian states …
5667 <link>http://fr.arxiv.org/abs/2010.15729</link>
5668 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5669
5670 &lt;p&gt;We establish fundamental upper bounds on the amount of secret k…
5671 extracted from continuous variable quantum Gaussian states by using only…
5672 Gaussian operations, local classical processing, and public communicatio…
5673 one-way communication, we prove that the key is bounded by the R\&apos;e…
5674 Gaussian entanglement of formation $E_{F,2}^{\mathrm{\scriptscriptstyle …
5675 with the inequality being saturated for pure Gaussian states. The same i…
5676 if two-way public communication is allowed but Alice and Bob employ prot…
5677 that start with destructive local Gaussian measurements. In the most gen…
5678 setting of two-way communication and arbitrary interactive protocols, we…
5679 that $2 E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ is still a bound on the
5680 extractable key, although we conjecture that the factor of $2$ is superf…
5681 Finally, for a wide class of Gaussian states that includes all two-mode …
5682 we prove a recently proposed conjecture on the equality between
5683 $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ and the Gaussian intrinsic
5684 entanglement, thus endowing both measures with a more solid operational
5685 meaning.
5686 &lt;/p&gt;
5687 </description>
5688 </item>
5689 <item>
5690 <title>The Agile Coach Role: Coaching for Agile Performance Impact. (arX…
5691 <link>http://fr.arxiv.org/abs/2010.15738</link>
5692 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5693
5694 &lt;p&gt;It is increasingly common to introduce agile coaches to help ga…
5695 advantage in agile companies. Following the success of Spotify, the role…
5696 agile coach has branched out in terms of tasks and responsibilities, but…
5697 research has been conducted to examine how this role is practiced. This …
5698 examines the role of the agile coach through 19 semistructured interview…
5699 agile coaches from ten different companies. We describe the role in term…
5700 the tasks the coach has in agile projects, valuable traits, skills, tool…
5701 the enablers of agile coaching. Our findings indicate that agile coaches
5702 perform at the team and organizational levels. They affect effort, strat…
5703 knowledge, and skills of the agile teams. The most essential traits of a…
5704 coach are being emphatic, people-oriented, able to listen, diplomatic, a…
5705 persistent. We suggest empirically based advice for agile coaching, for …
5706 companies giving their agile coaches the authority to implement the requ…
5707 organizational changes within and outside the teams.
5708 &lt;/p&gt;
5709 </description>
5710 </item>
5711 <item>
5712 <title>Recurrent Neural Networks for video object detection. (arXiv:2010…
5713 <link>http://fr.arxiv.org/abs/2010.15740</link>
5714 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5715
5716 &lt;p&gt;There is lots of scientific work about object detection in imag…
5717 applications like for example autonomous driving the actual data on which
5718 classification has to be done are videos. This work compares different m…
5719 especially those which use Recurrent Neural Networks to detect objects in
5720 videos. We differ between feature-based methods, which feed feature maps…
5721 different frames into the recurrent units, box-level methods, which feed
5722 bounding boxes with class probabilities into the recurrent units and met…
5723 which use flow networks. This study indicates common outcomes of the com…
5724 methods like the benefit of including the temporal context into object
5725 detection and states conclusions and guidelines for video object detecti…
5726 networks.
5727 &lt;/p&gt;
5728 </description>
5729 </item>
5730 <item>
5731 <title>Causal variables from reinforcement learning using generalized Be…
5732 <link>http://fr.arxiv.org/abs/2010.15745</link>
5733 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5734
5735 &lt;p&gt;Many open problems in machine learning are intrinsically relate…
5736 causality, however, the use of causal analysis in machine learning is st…
5737 its early stage. Within a general reinforcement learning setting, we con…
5738 the problem of building a general reinforcement learning agent which uses
5739 experience to construct a causal graph of the environment, and use this …
5740 to inform its policy. Our approach has three characteristics: First, we …
5741 simple, coarse-grained causal graph, in which the variables reflect stat…
5742 many time instances, and the interventions happen at the level of polici…
5743 rather than individual actions. Secondly, we use mediation analysis to o…
5744 an optimization target. By minimizing this target, we define the causal
5745 variables. Thirdly, our approach relies on estimating conditional expect…
5746 rather the familiar expected return from reinforcement learning, and we
5747 therefore apply a generalization of Bellman&apos;s equations. We show th…
5748 learn a plausible causal graph in a grid-world environment, and the agent
5749 obtains an improvement in performance when using the causally informed p…
5750 To our knowledge, this is the first attempt to apply causal analysis in a
5751 reinforcement learning setting without strict restrictions on the number…
5752 states. We have observed that mediation analysis provides a promising av…
5753 for transforming the problem of causal acquisition into one of cost-func…
5754 minimization, but importantly one which involves estimating conditional
5755 expectations. This is a new challenge, and we think that causal reinforc…
5756 learning will involve development methods suited for online estimation o…
5757 conditional expectations. Finally, a benefit of our approach is the use …
5758 simple causal models, which are arguably a more natural model of human c…
5759 understanding.
5760 &lt;/p&gt;
5761 </description>
5762 </item>
5763 <item>
5764 <title>Gaussian Process Bandit Optimization of theThermodynamic Variatio…
5765 <link>http://fr.arxiv.org/abs/2010.15750</link>
5766 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5767
5768 &lt;p&gt;Achieving the full promise of the Thermodynamic Variational Obj…
5769 recently proposed variational lower bound on the log evidence involving a
5770 one-dimensional Riemann integral approximation, requires choosing a &quo…
5771 ofsorted discretization points. This paper introduces a bespoke Gaussian
5772 processbandit optimization method for automatically choosing these point…
5773 approach not only automates their one-time selection, but also dynamical…
5774 adaptstheir positions over the course of optimization, leading to improv…
5775 model learning and inference. We provide theoretical guarantees that our…
5776 optimizationconverges to the regret-minimizing choice of integration poi…
5777 Empirical validation of our algorithm is provided in terms of improved l…
5778 and inference inVariational Autoencoders and Sigmoid Belief Networks.
5779 &lt;/p&gt;
5780 </description>
5781 </item>
5782 <item>
5783 <title>A more Pragmatic Implementation of the Lock-free, Ordered, Linked…
5784 <link>http://fr.arxiv.org/abs/2010.15755</link>
5785 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5786
5787 &lt;p&gt;The lock-free, ordered, linked list is an important, standard e…
5788 concurrent data structure. An obvious, practical drawback of textbook
5789 implementations is that failed compare-and-swap (CAS) operations lead to
5790 retraversal of the entire list (retries), which is particularly harmful …
5791 such a linear-time data structure. We alleviate this drawback by first
5792 observing that failed CAS operations under some conditions do not requir…
5793 full retry, and second by maintaining approximate backwards pointers tha…
5794 used to find a closer starting position in the list for operation retry.
5795 Experiments with both a worst-case deterministic benchmark, and a standa…
5796 randomized, mixed-operation throughput benchmark on three shared-memory …
5797 (Intel Xeon, AMD EPYC, SPARC-T5) show practical improvements ranging from
5798 significant, to dramatic, several orders of magnitude.
5799 &lt;/p&gt;
5800 </description>
5801 </item>
5802 <item>
5803 <title>Identifying Transition States of Chemical Kinetic Systems using N…
5804 <link>http://fr.arxiv.org/abs/2010.15760</link>
5805 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5806
5807 &lt;p&gt;Using random walk sampling methods for feature learning on netw…
5808 develop a method for generating low-dimensional node embeddings for dire…
5809 graphs and identifying transition states of stochastic chemical reacting
5810 systems. We modified objective functions adopted in existing random walk…
5811 network embedding methods to handle directed graphs and neighbors of dif…
5812 degrees. Through optimization via gradient ascent, we embed the weighted…
5813 vertices into a low-dimensional vector space Rd while preserving the
5814 neighborhood of each node. We then demonstrate the effectiveness of the …
5815 on dimension reduction through several examples regarding identification…
5816 transition states of chemical reactions, especially for entropic systems.
5817 &lt;/p&gt;
5818 </description>
5819 </item>
5820 <item>
5821 <title>A Helmholtz equation solver using unsupervised learning: Applicat…
5822 <link>http://fr.arxiv.org/abs/2010.15761</link>
5823 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5824
5825 &lt;p&gt;Transcranial ultrasound therapy is increasingly used for the no…
5826 treatment of brain disorders. However, conventional numerical wave solve…
5827 currently too computationally expensive to be used online during treatme…
5828 predict the acoustic field passing through the skull (e.g., to account f…
5829 subject-specific dose and targeting variations). As a step towards real-…
5830 predictions, in the current work, a fast iterative solver for the hetero…
5831 Helmholtz equation in 2D is developed using a fully-learned optimizer. T…
5832 lightweight network architecture is based on a modified UNet that includ…
5833 learned hidden state. The network is trained using a physics-based loss
5834 function and a set of idealized sound speed distributions with fully
5835 unsupervised training (no knowledge of the true solution is required). T…
5836 learned optimizer shows excellent performance on the test set, and is ca…
5837 of generalization well outside the training examples, including to much …
5838 computational domains, and more complex source and sound speed distribut…
5839 for example, those derived from x-ray computed tomography images of the …
5840 &lt;/p&gt;
5841 </description>
5842 </item>
5843 <item>
5844 <title>Domain adaptation under structural causal models. (arXiv:2010.157…
5845 <link>http://fr.arxiv.org/abs/2010.15764</link>
5846 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5847
5848 &lt;p&gt;Domain adaptation (DA) arises as an important problem in statis…
5849 learning when the source data used to train a model is different from the
5850 target data used to test the model. Recent advances in DA have mainly be…
5851 application-driven and have largely relied on the idea of a common subsp…
5852 source and target data. To understand the empirical successes and failur…
5853 DA methods, we propose a theoretical framework via structural causal mod…
5854 that enables analysis and comparison of the prediction performance of DA
5855 methods. This framework also allows us to itemize the assumptions needed…
5856 the DA methods to have a low target error. Additionally, with insights f…
5857 theory, we propose a new DA method called CIRM that outperforms existing…
5858 methods when both the covariates and label distributions are perturbed i…
5859 target data. We complement the theoretical analysis with extensive simul…
5860 to show the necessity of the devised assumptions. Reproducible synthetic…
5861 real data experiments are also provided to illustrate the strengths and
5862 weaknesses of DA methods when parts of the assumptions of our theory are
5863 violated.
5864 &lt;/p&gt;
5865 </description>
5866 </item>
5867 <item>
5868 <title>A Single-Loop Smoothed Gradient Descent-Ascent Algorithm for Nonc…
5869 <link>http://fr.arxiv.org/abs/2010.15768</link>
5870 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5871
5872 &lt;p&gt;Nonconvex-concave min-max problem arises in many machine learni…
5873 applications including minimizing a pointwise maximum of a set of noncon…
5874 functions and robust adversarial training of neural networks. A popular
5875 approach to solve this problem is the gradient descent-ascent (GDA) algo…
5876 which unfortunately can exhibit oscillation in case of nonconvexity. In …
5877 paper, we introduce a &quot;smoothing&quot; scheme which can be combined…
5878 stabilize the oscillation and ensure convergence to a stationary solutio…
5879 prove that the stabilized GDA algorithm can achieve an $O(1/\epsilon^2)$
5880 iteration complexity for minimizing the pointwise maximum of a finite
5881 collection of nonconvex functions. Moreover, the smoothed GDA algorithm
5882 achieves an $O(1/\epsilon^4)$ iteration complexity for general
5883 nonconvex-concave problems. Extensions of this stabilized GDA algorithm …
5884 multi-block cases are presented. To the best of our knowledge, this is t…
5885 first algorithm to achieve $O(1/\epsilon^2)$ for a class of nonconvex-co…
5886 problem. We illustrate the practical efficiency of the stabilized GDA al…
5887 on robust training.
5888 &lt;/p&gt;
5889 </description>
5890 </item>
5891 <item>
5892 <title>Recursive Random Contraction Revisited. (arXiv:2010.15770v1 [cs.D…
5893 <link>http://fr.arxiv.org/abs/2010.15770</link>
5894 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5895
5896 &lt;p&gt;In this note, we revisit the recursive random contraction algor…
5897 and Stein for finding a minimum cut in a graph. Our revisit is occasione…
5898 paper of Fox, Panigrahi, and Zhang which gives an extension of the Karge…
5899 algorithm to minimum cuts and minimum $k$-cuts in hypergraphs. When spec…
5900 to the case of graphs, the algorithm is somewhat different than the orig…
5901 Karger-Stein algorithm. We show that the analysis becomes particularly c…
5902 this case: we can prove that the probability that a fixed minimum cut in…
5903 node graph is returned by the algorithm is bounded below by $1/(2H_n-2)$…
5904 $H_n$ is the $n$th harmonic number. We also consider other similar varia…
5905 the algorithm, and show that no such algorithm can achieve an asymptotic…
5906 better probability of finding a fixed minimum cut.
5907 &lt;/p&gt;
5908 </description>
5909 </item>
5910 <item>
5911 <title>GANs &amp; Reels: Creating Irish Music using a Generative Adversa…
5912 <link>http://fr.arxiv.org/abs/2010.15772</link>
5913 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5914
5915 &lt;p&gt;In this paper we present a method for algorithmic melody genera…
5916 generative adversarial network without recurrent components. Music gener…
5917 has been successfully done using recurrent neural networks, where the mo…
5918 learns sequence information that can help create authentic sounding melo…
5919 Here, we use DC-GAN architecture with dilated convolutions and towers to
5920 capture sequential information as spatial image information, and learn
5921 long-range dependencies in fixed-length melody forms such as Irish tradi…
5922 reel.
5923 &lt;/p&gt;
5924 </description>
5925 </item>
5926 <item>
5927 <title>WaveTransform: Crafting Adversarial Examples via Input Decomposit…
5928 <link>http://fr.arxiv.org/abs/2010.15773</link>
5929 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5930
5931 &lt;p&gt;Frequency spectrum has played a significant role in learning un…
5932 discriminating features for object recognition. Both low and high freque…
5933 information present in images have been extracted and learnt by a host of
5934 representation learning techniques, including deep learning. Inspired by…
5935 observation, we introduce a novel class of adversarial attacks, namely
5936 `WaveTransform&apos;, that creates adversarial noise corresponding to lo…
5937 and high-frequency subbands, separately (or in combination). The frequen…
5938 subbands are analyzed using wavelet decomposition; the subbands are corr…
5939 and then used to construct an adversarial example. Experiments are perfo…
5940 using multiple databases and CNN models to establish the effectiveness o…
5941 proposed WaveTransform attack and analyze the importance of a particular
5942 frequency component. The robustness of the proposed attack is also evalu…
5943 through its transferability and resiliency against a recent adversarial …
5944 algorithm. Experiments show that the proposed attack is effective agains…
5945 defense algorithm and is also transferable across CNNs.
5946 &lt;/p&gt;
5947 </description>
5948 </item>
5949 <item>
5950 <title>Understanding the Failure Modes of Out-of-Distribution Generaliza…
5951 <link>http://fr.arxiv.org/abs/2010.15775</link>
5952 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5953
5954 &lt;p&gt;Empirical studies suggest that machine learning models often re…
5955 features, such as the background, that may be spuriously correlated with…
5956 label only during training time, resulting in poor accuracy during test-…
5957 In this work, we identify the fundamental factors that give rise to this
5958 behavior, by explaining why models fail this way {\em even} in easy-to-l…
5959 tasks where one would expect these models to succeed. In particular, thr…
5960 theoretical study of gradient-descent-trained linear classifiers on some
5961 easy-to-learn tasks, we uncover two complementary failure modes. These m…
5962 arise from how spurious correlations induce two kinds of skews in the da…
5963 geometric in nature, and another, statistical in nature. Finally, we con…
5964 natural modifications of image classification datasets to understand whe…
5965 failure modes can arise in practice. We also design experiments to isola…
5966 two failure modes when training modern neural networks on these datasets.
5967 &lt;/p&gt;
5968 </description>
5969 </item>
5970 <item>
5971 <title>Quantum advantage for differential equation analysis. (arXiv:2010…
5972 <link>http://fr.arxiv.org/abs/2010.15776</link>
5973 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5974
5975 &lt;p&gt;Quantum algorithms for both differential equation solving and f…
5976 learning potentially offer an exponential speedup over all known classic…
5977 algorithms. However, there also exist obstacles to obtaining this potent…
5978 speedup in useful problem instances. The essential obstacle for quantum
5979 differential equation solving is that outputting useful information may …
5980 difficult post-processing, and the essential obstacle for quantum machine
5981 learning is that inputting the training set is a difficult task just by …
5982 In this paper, we demonstrate, when combined, these difficulties solve o…
5983 another. We show how the output of quantum differential equation solving…
5984 serve as the input for quantum machine learning, allowing dynamical anal…
5985 terms of principal components, power spectra, and wavelet decompositions…
5986 illustrate this, we consider continuous time Markov processes on
5987 epidemiological and social networks. These quantum algorithms provide an
5988 exponential advantage over existing classical Monte Carlo methods.
5989 &lt;/p&gt;
5990 </description>
5991 </item>
5992 <item>
5993 <title>Contextual BERT: Conditioning the Language Model Using a Global S…
5994 <link>http://fr.arxiv.org/abs/2010.15778</link>
5995 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
5996
5997 &lt;p&gt;BERT is a popular language model whose main pre-training task i…
5998 the blank, i.e., predicting a word that was masked out of a sentence, ba…
5999 the remaining words. In some applications, however, having an additional
6000 context can help the model make the right prediction, e.g., by taking the
6001 domain or the time of writing into account. This motivates us to advance…
6002 BERT architecture by adding a global state for conditioning on a fixed-s…
6003 context. We present our two novel approaches and apply them to an indust…
6004 use-case, where we complete fashion outfits with missing articles, condi…
6005 on a specific customer. An experimental comparison to other methods from…
6006 literature shows that our methods improve personalization significantly.
6007 &lt;/p&gt;
6008 </description>
6009 </item>
6010 <item>
6011 <title>Stable and efficient Petrov-Galerkin methods for a kinetic Fokker…
6012 <link>http://fr.arxiv.org/abs/2010.15784</link>
6013 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6014
6015 &lt;p&gt;We propose a stable Petrov-Galerkin discretization of a kinetic…
6016 equation constructed in such a way that uniform inf-sup stability can be
6017 inferred directly from the variational formulation. Inspired by well-pos…
6018 results for parabolic equations, we derive a lower bound for the dual in…
6019 constant of the Fokker-Planck bilinear form by means of stable pairs of …
6020 and test functions. The trial function of such a pair is constructed by
6021 applying the kinetic transport operator and the inverse velocity
6022 Laplace-Beltrami operator to a given test function. For the Petrov-Galer…
6023 projection we choose an arbitrary discrete test space and then define the
6024 discrete trial space using the same application of transport and inverse
6025 Laplace-Beltrami operator. As a result, the spaces replicate the stable …
6026 of the continuous level and we obtain a well-posed numerical method with…
6027 discrete inf-sup constant identical to the inf-sup constant of the conti…
6028 problem independently of the mesh size. We show how the specific basis
6029 functions can be efficiently computed by low-dimensional elliptic proble…
6030 confirm the practicability and performance of the method for a numerical
6031 example.
6032 &lt;/p&gt;
6033 </description>
6034 </item>
6035 <item>
6036 <title>Quickest detection of false data injection attack in remote state…
6037 <link>http://fr.arxiv.org/abs/2010.15785</link>
6038 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6039
6040 &lt;p&gt;In this paper, quickest detection of false data injection attac…
6041 state estimation is considered. A set of $N$ sensors make noisy linear
6042 observations of a discrete-time linear process with Gaussian noise, and …
6043 the observations to a remote estimator. The challenge is the presence of…
6044 potentially malicious sensors which can start strategically manipulating…
6045 observations at a random time in order to skew the estimates. The quicke…
6046 attack detection problem for a known linear attack scheme is posed as a
6047 constrained Markov decision process in order to minimise the expected de…
6048 delay subject to a false alarm constraint, with the state involving the
6049 probability belief at the estimator that the system is under attack. Sta…
6050 transition probabilities are derived in terms of system parameters, and …
6051 structure of the optimal policy is derived analytically. It turns out th…
6052 optimal policy amounts to checking whether the probability belief exceed…
6053 threshold. Numerical results demonstrate significant performance gain un…
6054 proposed algorithm against competing algorithms.
6055 &lt;/p&gt;
6056 </description>
6057 </item>
6058 <item>
6059 <title>Light-Weight DDoS Mitigation at Network Edge with Limited Resourc…
6060 <link>http://fr.arxiv.org/abs/2010.15786</link>
6061 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6062
6063 &lt;p&gt;The Internet of Things (IoT) has been growing rapidly in recent…
6064 the appearance of 5G, it is expected to become even more indispensable to
6065 people&apos;s lives. In accordance with the increase of Distributed
6066 Denial-of-Service (DDoS) attacks from IoT devices, DDoS defense has beco…
6067 hot research topic. DDoS detection mechanisms executed on routers and SDN
6068 environments have been intensely studied. However, these methods have the
6069 disadvantage of requiring the cost and performance of the devices. In ad…
6070 there is no existing DDoS mitigation algorithm on the network edge that …
6071 performed with the low-cost and low performance equipments. Therefore, t…
6072 paper proposes a light-weight DDoS mitigation scheme at the network edge…
6073 limited resources of inexpensive devices such as home gateways. The goal…
6074 proposed scheme is to simply detect and mitigate flooding attacks. It ut…
6075 unused queue resources to detect malicious flows by random shuffling of …
6076 allocation and discard the packets of the detected flows. The performanc…
6077 the proposed scheme was confirmed via theoretical analysis and computer
6078 simulation. The simulation results match the theoretical results and the
6079 proposed algorithm can efficiently detect malicious flows using limited
6080 resources.
6081 &lt;/p&gt;
6082 </description>
6083 </item>
6084 <item>
6085 <title>A Framework for Learning Predator-prey Agents from Simulation to …
6086 <link>http://fr.arxiv.org/abs/2010.15792</link>
6087 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6088
6089 &lt;p&gt;In this paper, we propose an evolutionary predatorprey robot sy…
6090 be generally implemented from simulation to the real world. We design the
6091 closed-loop robot system with camera and infrared sensors as inputs of
6092 controller. Both the predators and prey are co-evolved by NeuroEvolution…
6093 Augmenting Topologies (NEAT) to learn the expected behaviours. We design…
6094 framework that integrate Gym of OpenAI, Robot Operating System (ROS), Ga…
6095 In such a framework, users only need to focus on algorithms without being
6096 worried about the detail of manipulating robots in both simulation and t…
6097 world. Combining simulations, real-world evolution, and robustness analy…
6098 can be applied to develop the solutions for the predator-prey tasks. For…
6099 convenience of users, the source code and videos of the simulated and re…
6100 world are published on Github.
6101 &lt;/p&gt;
6102 </description>
6103 </item>
6104 <item>
6105 <title>A computational periporomechanics model for localized failure in …
6106 <link>http://fr.arxiv.org/abs/2010.15793</link>
6107 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6108
6109 &lt;p&gt;We implement a computational periporomechanics model for simula…
6110 failure in unsaturated porous media. The coupled periporomechanics model…
6111 based on the peridynamic state concept and the effective force state con…
6112 The coupled governing equations are integral-differential equations with…
6113 assuming the continuity of solid displacement and fluid pressures. The f…
6114 flow and effective force states are determined by nonlocal fluid pressur…
6115 deformation gradients through the recently formulated multiphase constit…
6116 correspondence principle. The coupled peri-poromechanics is implemented
6117 numerically for high-performance computing by an implicit multiphase mes…
6118 method utilizing the message passing interface. The numerical implementa…
6119 validated by simulating classical poromechanics problems and comparing t…
6120 numerical results with analytical solutions and experimental data. Numer…
6121 examples are presented to demonstrate the robustness of the fully coupled
6122 peri-poromechanics in modeling localized failures in unsaturated porous …
6123 &lt;/p&gt;
6124 </description>
6125 </item>
6126 <item>
6127 <title>Eccentricity queries and beyond using Hub Labels. (arXiv:2010.157…
6128 <link>http://fr.arxiv.org/abs/2010.15794</link>
6129 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6130
6131 &lt;p&gt;Hub labeling schemes are popular methods for computing distance…
6132 networks and other large complex networks, often answering to a query wi…
6133 few microseconds for graphs with millions of edges. In this work, we stu…
6134 their algorithmic applications beyond distance queries. We focus on
6135 eccentricity queries and distance-sum queries, for several versions of t…
6136 problems on directed weighted graphs, that is in part motivated by their
6137 importance in facility location problems. On the negative side, we show
6138 conditional lower bounds for these above problems on unweighted undirect…
6139 sparse graphs, via standard constructions from &quot;Fine-grained&quot; …
6140 However, things take a different turn when the hub labels have a subloga…
6141 size. Indeed, given a hub labeling of maximum label size $\leq k$, after
6142 pre-processing the labels in total $2^{{O}(k)} \cdot |V|^{1+o(1)}$ time,…
6143 compute both the eccentricity and the distance-sum of any vertex in $2^{…
6144 \cdot |V|^{o(1)}$ time. It can also be applied to the fast global comput…
6145 of some topological indices. Finally, as a by-product of our approach, o…
6146 fixed class of unweighted graphs with bounded expansion, we can decide w…
6147 the diameter of an $n$-vertex graph in the class is at most $k$ in $f(k)…
6148 n^{1+o(1)}$ time, for some &quot;explicit&quot; function $f$.
6149 &lt;/p&gt;
6150 </description>
6151 </item>
6152 <item>
6153 <title>Ray-marching Thurston geometries. (arXiv:2010.15801v1 [math.GT])<…
6154 <link>http://fr.arxiv.org/abs/2010.15801</link>
6155 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6156
6157 &lt;p&gt;We describe algorithms that produce accurate real-time interact…
6158 views of the eight Thurston geometries using ray-marching. We give a
6159 theoretical framework for our algorithms, independent of the geometry in…
6160 In addition to scenes within a geometry $X$, we also consider scenes wit…
6161 quotient manifolds and orbifolds $X / \Gamma$. We adapt the Phong lighti…
6162 model to non-euclidean geometries. The most difficult part of this is the
6163 calculation of light intensity, which relates to the area density of geo…
6164 spheres. We also give extensive practical details for each geometry.
6165 &lt;/p&gt;
6166 </description>
6167 </item>
6168 <item>
6169 <title>Isometric embeddings in trees and their use in the diameter probl…
6170 <link>http://fr.arxiv.org/abs/2010.15803</link>
6171 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6172
6173 &lt;p&gt;We prove that given a discrete space with $n$ points which is e…
6174 in a system of $k$ trees, or the Cartesian product of $k$ trees, we can …
6175 all eccentricities in ${\cal O}(2^{{\cal O}(k\log{k})}(N+n)^{1+o(1)})$ t…
6176 where $N$ is the cumulative total order over all these $k$ trees. This i…
6177 optimal under the Strong Exponential-Time Hypothesis, even in the very s…
6178 case of an $n$-vertex graph embedded in a system of $\omega(\log{n})$ sp…
6179 trees. However, given such an embedding in the strong product of $k$ tre…
6180 there is a much faster ${\cal O}(N + kn)$-time algorithm for this proble…
6181 our positive results can be turned into approximation algorithms for the…
6182 and finite spaces with a quasi isometric embedding in trees, if such emb…
6183 is given as input, where the approximation factor (resp., the approximat…
6184 constant) depends on the distortion of the embedding (resp., of its stre…
6185 The existence of embeddings in the Cartesian product of finitely many tr…
6186 been thoroughly investigated for cube-free median graphs. We give the
6187 first-known quasi linear-time algorithm for computing the diameter withi…
6188 graph class. It does not require an embedding in a product of trees to b…
6189 as part of the input. On our way, being given an $n$-node tree $T$, we p…
6190 a data structure with ${\cal O}(n\log{n})$ pre-processing time in order …
6191 compute in ${\cal O}(k\log^2{n})$ time the eccentricity of any subset of…
6192 nodes. We combine the latter technical contribution, of independent inte…
6193 with a recent distance-labeling scheme that was designed for cube-free m…
6194 graphs.
6195 &lt;/p&gt;
6196 </description>
6197 </item>
6198 <item>
6199 <title>A Local Search Framework for Experimental Design. (arXiv:2010.158…
6200 <link>http://fr.arxiv.org/abs/2010.15805</link>
6201 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6202
6203 &lt;p&gt;We present a local search framework to design and analyze both …
6204 algorithms and rounding algorithms for experimental design problems. This
6205 framework provides a unifying approach to match and improve all known re…
6206 in D/A/E-design and to obtain new results in previously unknown settings.
6207 &lt;/p&gt;
6208 &lt;p&gt;For combinatorial algorithms, we provide a new analysis of the …
6209 Fedorov&apos;s exchange method. We prove that this simple local search a…
6210 works well as long as there exists an almost optimal solution with good
6211 condition number. Moreover, we design a new combinatorial local search
6212 algorithm for E-design using the regret minimization framework.
6213 &lt;/p&gt;
6214 &lt;p&gt;For rounding algorithms, we provide a unified randomized exchan…
6215 to match and improve previous results for D/A/E-design. Furthermore, the
6216 algorithm works in the more general setting to approximately satisfy mul…
6217 knapsack constraints, which can be used for weighted experimental design…
6218 for incorporating fairness constraints into experimental design.
6219 &lt;/p&gt;
6220 </description>
6221 </item>
6222 <item>
6223 <title>The ins and outs of speaker recognition: lessons from VoxSRC 2020…
6224 <link>http://fr.arxiv.org/abs/2010.15809</link>
6225 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6226
6227 &lt;p&gt;The VoxCeleb Speaker Recognition Challenge (VoxSRC) at Interspe…
6228 offers a challenging evaluation for speaker recognition systems, which i…
6229 celebrities playing different parts in movies. The goal of this work is …
6230 speaker recognition of utterances recorded in these challenging environm…
6231 We utilise variants of the popular ResNet architecture for speaker recog…
6232 and perform extensive experiments using a range of loss functions and tr…
6233 parameters. To this end, we optimise an efficient training framework that
6234 allows powerful models to be trained with limited time and resources. Our
6235 trained models demonstrate improvements over most existing works with li…
6236 models and a simple pipeline. The paper shares the lessons learned from …
6237 participation in the challenge.
6238 &lt;/p&gt;
6239 </description>
6240 </item>
6241 <item>
6242 <title>Algorithmic pure states for the negative spherical perceptron. (a…
6243 <link>http://fr.arxiv.org/abs/2010.15811</link>
6244 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6245
6246 &lt;p&gt;We consider the spherical perceptron with Gaussian disorder. Th…
6247 $S$ of points $\sigma \in \mathbb{R}^N$ on the sphere of radius $\sqrt{N…
6248 satisfying $\langle g_a , \sigma \rangle \ge \kappa\sqrt{N}\,$ for all $…
6249 \le M$, where $(g_a)_{a=1}^M$ are independent standard gaussian vectors …
6250 $\kappa \in \mathbb{R}$ is fixed. Various characteristics of $S$ such as…
6251 surface measure and the largest $M$ for which it is non-empty, were comp…
6252 heuristically in statistical physics in the asymptotic regime $N \to \in…
6253 $M/N \to \alpha$. The case $\kappa&amp;lt;0$ is of special interest as $…
6254 conjectured to exhibit a hierarchical tree-like geometry known as &quot;…
6255 replica-symmetry breaking&quot; (FRSB) close to the satisfiability thres…
6256 $\alpha_{\text{SAT}}(\kappa)$, and whose characteristics are captured by…
6257 Parisi variational principle akin to the one appearing in the
6258 Sherrington-Kirkpatrick model. In this paper we design an efficient algo…
6259 which, given oracle access to the solution of the Parisi variational pri…
6260 exploits this conjectured FRSB structure for $\kappa&amp;lt;0$ and outpu…
6261 $\hat{\sigma}$ satisfying $\langle g_a , \hat{\sigma}\rangle \ge \kappa
6262 \sqrt{N}$ for all $1\le a \le M$ and lying on a sphere of non-trivial ra…
6263 $\sqrt{\bar{q} N}$, where $\bar{q} \in (0,1)$ is the right-end of the su…
6264 of the associated Parisi measure. We expect $\hat{\sigma}$ to be approxi…
6265 the barycenter of a pure state of the spherical perceptron. Moreover we …
6266 that $\bar{q} \to 1$ as $\alpha \to \alpha_{\text{SAT}}(\kappa)$, so that
6267 $\big\langle g_a,\hat{\sigma}/|\hat{\sigma}|\big\rangle \geq
6268 (\kappa-o(1))\sqrt{N}$ near criticality.
6269 &lt;/p&gt;
6270 </description>
6271 </item>
6272 <item>
6273 <title>Around the diameter of AT-free graphs. (arXiv:2010.15814v1 [cs.DS…
6274 <link>http://fr.arxiv.org/abs/2010.15814</link>
6275 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6276
6277 &lt;p&gt;A graph algorithm is truly subquadratic if it runs in ${\cal O}…
6278 connected $m$-edge graphs, for some positive $b &amp;lt; 2$. Roditty and…
6279 Williams (STOC&apos;13) proved that under plausible complexity assumptio…
6280 no truly subquadratic algorithm for computing the diameter of general gr…
6281 In this work, we present positive and negative results on the existence …
6282 algorithms for computing the diameter on some special graph classes.
6283 Specifically, three vertices in a graph form an asteroidal triple (AT) if
6284 between any two of them there exists a path that avoids the closed
6285 neighbourhood of the third one. We call a graph AT-free if it does not c…
6286 an AT. We first prove that for all $m$-edge AT-free graphs, one can comp…
6287 the eccentricities in truly subquadratic ${\cal O}(m^{3/2})$ time. Then,…
6288 extend our study to several subclasses of chordal graphs -- all of them
6289 generalizing interval graphs in various ways --, as an attempt to unders…
6290 which of the properties of AT-free graphs, or natural generalizations of…
6291 latter, can help in the design of fast algorithms for the diameter probl…
6292 broader graph classes. For instance, for all chordal graphs with a domin…
6293 shortest path, there is a linear-time algorithm for computing a diametra…
6294 if the diameter is at least four. However, already for split graphs with…
6295 dominating edge, under plausible complexity assumptions, there is no tru…
6296 subquadratic algorithm for deciding whether the diameter is either $2$ o…
6297 &lt;/p&gt;
6298 </description>
6299 </item>
6300 <item>
6301 <title>Tensor Completion via Tensor Networks with a Tucker Wrapper. (arX…
6302 <link>http://fr.arxiv.org/abs/2010.15819</link>
6303 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6304
6305 &lt;p&gt;In recent years, low-rank tensor completion (LRTC) has received…
6306 attention due to its applications in image/video inpainting, hyperspectr…
6307 recovery, etc. With different notions of tensor rank (e.g., CP, Tucker, …
6308 train/ring, etc.), various optimization based numerical methods are prop…
6309 LRTC. However, tensor network based methods have not been proposed yet. …
6310 paper, we propose to solve LRTC via tensor networks with a Tucker wrappe…
6311 by &quot;Tucker wrapper&quot; we mean that the outermost factor matrices…
6312 network are all orthonormal. We formulate LRTC as a problem of solving a…
6313 of nonlinear equations, rather than a constrained optimization problem. A
6314 two-level alternative least square method is then employed to update the
6315 unknown factors. The computation of the method is dominated by tensor ma…
6316 multiplications and can be efficiently performed. Also, under proper
6317 assumptions, it is shown that with high probability, the method converge…
6318 the exact solution at a linear rate. Numerical simulations show that the
6319 proposed algorithm is comparable with state-of-the-art methods.
6320 &lt;/p&gt;
6321 </description>
6322 </item>
6323 <item>
6324 <title>Down the bot hole: actionable insights from a 1-year analysis of …
6325 <link>http://fr.arxiv.org/abs/2010.15820</link>
6326 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6327
6328 &lt;p&gt;Nowadays, social media represent persuasive tools that have been
6329 progressively weaponized to affect people&apos;s beliefs, spread manipul…
6330 narratives, and sow conflicts along divergent factions. Software-control…
6331 accounts (i.e., bots) are one of the main actors associated with manipul…
6332 campaigns, especially in the political context. Uncovering the strategies
6333 behind bots&apos; activities is of paramount importance to detect and cu…
6334 campaigns. In this paper, we present a long term (one year) analysis of …
6335 activity on Twitter in the run-up to the 2018 U.S. Midterm Elections. We
6336 identify different classes of accounts based on their nature (bot vs. hu…
6337 and engagement within the online discussion and we observe that hyperact…
6338 bots played a pivotal role in the dissemination of conspiratorial narrat…
6339 while dominating the political debate since the year before the election…
6340 analysis, on the horizon of the upcoming U.S. 2020 Presidential Election,
6341 reveals both alarming findings of humans&apos; susceptibility to bots an…
6342 insights that can contribute to curbing coordinated campaigns.
6343 &lt;/p&gt;
6344 </description>
6345 </item>
6346 <item>
6347 <title>Cream of the Crop: Distilling Prioritized Paths For One-Shot Neur…
6348 <link>http://fr.arxiv.org/abs/2010.15821</link>
6349 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6350
6351 &lt;p&gt;One-shot weight sharing methods have recently drawn great atten…
6352 architecture search due to high efficiency and competitive performance.
6353 However, weight sharing across models has an inherent deficiency, i.e.,
6354 insufficient training of subnetworks in the hypernetwork. To alleviate t…
6355 problem, we present a simple yet effective architecture distillation met…
6356 The central idea is that subnetworks can learn collaboratively and teach…
6357 other throughout the training process, aiming to boost the convergence of
6358 individual models. We introduce the concept of prioritized path, which r…
6359 to the architecture candidates exhibiting superior performance during tr…
6360 Distilling knowledge from the prioritized paths is able to boost the tra…
6361 of subnetworks. Since the prioritized paths are changed on the fly depen…
6362 their performance and complexity, the final obtained paths are the cream…
6363 crop. We directly select the most promising one from the prioritized pat…
6364 the final architecture, without using other complex search methods, such…
6365 reinforcement learning or evolution algorithms. The experiments on Image…
6366 verify such path distillation method can improve the convergence ratio a…
6367 performance of the hypernetwork, as well as boosting the training of
6368 subnetworks. The discovered architectures achieve superior performance c…
6369 to the recent MobileNetV3 and EfficientNet families under aligned settin…
6370 Moreover, the experiments on object detection and more challenging searc…
6371 show the generality and robustness of the proposed method. Code and mode…
6372 available at https://github.com/microsoft/cream.git.
6373 &lt;/p&gt;
6374 </description>
6375 </item>
6376 <item>
6377 <title>Black-Box Optimization of Object Detector Scales. (arXiv:2010.158…
6378 <link>http://fr.arxiv.org/abs/2010.15823</link>
6379 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6380
6381 &lt;p&gt;Object detectors have improved considerably in the last years b…
6382 advanced CNN architectures. However, many detector hyper-parameters are
6383 generally manually tuned, or they are used with values set by the detect…
6384 authors. Automatic Hyper-parameter optimization has not been explored in
6385 improving CNN-based object detectors hyper-parameters. In this work, we …
6386 the use of Black-box optimization methods to tune the prior/default box …
6387 in Faster R-CNN and SSD, using Bayesian Optimization, SMAC, and CMA-ES. …
6388 that by tuning the input image size and prior box anchor scale on Faster…
6389 mAP increases by 2% on PASCAL VOC 2007, and by 3% with SSD. On the COCO …
6390 with SSD there are mAP improvement in the medium and large objects, but …
6391 decreases by 1% in small objects. We also perform a regression analysis …
6392 the significant hyper-parameters to tune.
6393 &lt;/p&gt;
6394 </description>
6395 </item>
6396 <item>
6397 <title>Passport-aware Normalization for Deep Model Protection. (arXiv:20…
6398 <link>http://fr.arxiv.org/abs/2010.15824</link>
6399 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6400
6401 &lt;p&gt;Despite tremendous success in many application scenarios, deep …
6402 serious intellectual property (IP) infringement threats. Considering the…
6403 of designing and training a good model, infringements will significantly
6404 infringe the interests of the original model owner. Recently, many impre…
6405 works have emerged for deep model IP protection. However, they either are
6406 vulnerable to ambiguity attacks, or require changes in the target network
6407 structure by replacing its original normalization layers and hence cause
6408 significant performance drops. To this end, we propose a new passport-aw…
6409 normalization formulation, which is generally applicable to most existing
6410 normalization layers and only needs to add another passport-aware branch…
6411 protection. This new branch is jointly trained with the target model but
6412 discarded in the inference stage. Therefore it causes no structure chang…
6413 the target model. Only when the model IP is suspected to be stolen by so…
6414 the private passport-aware branch is added back for ownership verificati…
6415 Through extensive experiments, we verify its effectiveness in both image…
6416 point recognition models. It is demonstrated to be robust not only to co…
6417 attack techniques like fine-tuning and model compression, but also to am…
6418 attacks. By further combining it with trigger-set based methods, both bl…
6419 and white-box verification can be achieved for enhanced security of deep
6420 learning models deployed in real systems. Code can be found at
6421 https://github.com/ZJZAC/Passport-aware-Normalization.
6422 &lt;/p&gt;
6423 </description>
6424 </item>
6425 <item>
6426 <title>RelationNet++: Bridging Visual Representations for Object Detecti…
6427 <link>http://fr.arxiv.org/abs/2010.15831</link>
6428 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6429
6430 &lt;p&gt;Existing object detection frameworks are usually built on a sin…
6431 object/part representation, i.e., anchor/proposal rectangle boxes in Ret…
6432 and Faster R-CNN, center points in FCOS and RepPoints, and corner points…
6433 CornerNet. While these different representations usually drive the frame…
6434 to perform well in different aspects, e.g., better classification or fin…
6435 localization, it is in general difficult to combine these representation…
6436 single framework to make good use of each strength, due to the heterogen…
6437 non-grid feature extraction by different representations. This paper pre…
6438 an attention-based decoder module similar as that in
6439 Transformer~\cite{vaswani2017attention} to bridge other representations …
6440 typical object detector built on a single representation format, in an
6441 end-to-end fashion. The other representations act as a set of \emph{key}
6442 instances to strengthen the main \emph{query} representation features in…
6443 vanilla detectors. Novel techniques are proposed towards efficient compu…
6444 of the decoder module, including a \emph{key sampling} approach and a
6445 \emph{shared location embedding} approach. The proposed module is named
6446 \emph{bridging visual representations} (BVR). It can perform in-place an…
6447 demonstrate its broad effectiveness in bridging other representations in…
6448 prevalent object detection frameworks, including RetinaNet, Faster R-CNN…
6449 and ATSS, where about $1.5\sim3.0$ AP improvements are achieved. In part…
6450 we improve a state-of-the-art framework with a strong backbone by about …
6451 AP, reaching $52.7$ AP on COCO test-dev. The resulting network is named
6452 RelationNet++. The code will be available at
6453 https://github.com/microsoft/RelationNet2.
6454 &lt;/p&gt;
6455 </description>
6456 </item>
6457 <item>
6458 <title>Proceedings 9th International Workshop on Theorem Proving Compone…
6459 <link>http://fr.arxiv.org/abs/2010.15832</link>
6460 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6461
6462 &lt;p&gt;The 9th International Workshop on Theorem-Proving Components fo…
6463 Software (ThEdu&apos;20) was scheduled to happen on June 29 as a satelli…
6464 IJCAR-FSCD 2020 joint meeting, in Paris. The COVID-19 pandemic came by
6465 surprise, though, and the main conference was virtualised. Fearing that …
6466 online meeting would not allow our community to fully reproduce the usual
6467 face-to-face networking opportunities of the ThEdu initiative, the Steer…
6468 Committee of ThEdu decided to cancel our workshop. Given that many of us…
6469 already planned and worked for that moment, we decided that ThEdu&apos;2…
6470 still live in the form of an EPTCS volume. The EPTCS concurred with us,
6471 recognising this very singular situation, and accepted our proposal of
6472 organising a special issue with papers submitted to ThEdu&apos;20. An op…
6473 papers was then issued, and attracted five submissions, all of which hav…
6474 accepted by our reviewers, who produced three careful reports on each of…
6475 contributions. The resulting revised papers are collected in the present
6476 volume. We, the volume editors, hope that this collection of papers will…
6477 further promoting the development of theorem-proving-based software, and…
6478 it will collaborate to improve the mutual understanding between computer
6479 mathematicians and stakeholders in education. With some luck, we would a…
6480 expect that the very special circumstances set up by the worst sanitary …
6481 in a century will happen to reinforce the need for the application of ce…
6482 components and of verification methods for the production of educational
6483 software that would be available even when the traditional on-site learn…
6484 experiences turn out not to be recommendable.
6485 &lt;/p&gt;
6486 </description>
6487 </item>
6488 <item>
6489 <title>Property Checking Without Invariant Generation. (arXiv:1602.05829…
6490 <link>http://fr.arxiv.org/abs/1602.05829</link>
6491 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6492
6493 &lt;p&gt;We introduce a procedure for proving safety properties. This pr…
6494 based on a technique called Partial Quantifier Elimination (PQE). In con…
6495 to complete quantifier elimination, in PQE, only a part of the formula i…
6496 out of the scope of quantifiers. So, PQE can be dramatically more effici…
6497 than complete quantifier elimination. The appeal of our procedure is two…
6498 First, it can prove a property without generating an inductive invariant.
6499 Second, it employs depth-first search and so can be used to find deep bu…
6500 &lt;/p&gt;
6501 </description>
6502 </item>
6503 <item>
6504 <title>Minimax Rate-Optimal Estimation of Divergences between Discrete D…
6505 <link>http://fr.arxiv.org/abs/1605.09124</link>
6506 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6507
6508 &lt;p&gt;We study the minimax estimation of $\alpha$-divergences between…
6509 distributions for integer $\alpha\ge 1$, which include the Kullback--Lei…
6510 divergence and the $\chi^2$-divergences as special examples. Dropping th…
6511 theoretical tricks to acquire independence, we construct the first minim…
6512 rate-optimal estimator which does not require any Poissonization, sample
6513 splitting, or explicit construction of approximating polynomials. The es…
6514 uses a hybrid approach which solves a problem-independent linear program…
6515 on moment matching in the non-smooth regime, and applies a problem-depen…
6516 bias-corrected plug-in estimator in the smooth regime, with a soft decis…
6517 boundary between these regimes.
6518 &lt;/p&gt;
6519 </description>
6520 </item>
6521 <item>
6522 <title>Sequence Graph Transform (SGT): A Feature Embedding Function for …
6523 <link>http://fr.arxiv.org/abs/1608.03533</link>
6524 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6525
6526 &lt;p&gt;Sequence feature embedding is a challenging task due to un-stru…
6527 sequences -- arbitrary strings of arbitrary length. Existing methods are
6528 efficient in extracting short-term dependencies but typically suffer from
6529 computation issues for the long-term. Sequence Graph Transform (SGT), a …
6530 embedding function, that can extract any amount of short- to long- term
6531 dependencies without increasing the computation -- proved theoretically …
6532 proposed. SGT features yield significantly superior results in sequence
6533 clustering and classification with higher accuracy and lower computation…
6534 compared to the existing methods, including the state-of-the-art
6535 sequence/string Kernels and LSTM.
6536 &lt;/p&gt;
6537 </description>
6538 </item>
6539 <item>
6540 <title>Time-Space Trade-Offs for Computing Euclidean Minimum Spanning Tr…
6541 <link>http://fr.arxiv.org/abs/1712.06431</link>
6542 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6543
6544 &lt;p&gt;We present time-space trade-offs for computing the Euclidean mi…
6545 tree of a set $S$ of $n$ point-sites in the plane. More precisely, we as…
6546 that $S$ resides in a random-access memory that can only be read. The ed…
6547 the Euclidean minimum spanning tree $\text{EMST}(S)$ have to be reported
6548 sequentially, and they cannot be accessed or modified afterwards. There …
6549 parameter $s \in \{1, \dots, n\}$ so that the algorithm may use $O(s)$ c…
6550 read-write memory (called the workspace) for its computations. Our goal …
6551 find an algorithm that has the best possible running time for any given …
6552 between $1$ and $n$.
6553 &lt;/p&gt;
6554 &lt;p&gt;We show how to compute $\text{EMST}(S)$ in $O\big((n^3/s^2)\log…
6555 with $O(s)$ cells of workspace, giving a smooth trade-off between the tw…
6556 known bounds $O(n^3)$ for $s = 1$ and $O(n \log n)$ for $s = n$. For thi…
6557 run Kruskal&apos;s algorithm on the relative neighborhood graph (RNG) of…
6558 a classic fact that the minimum spanning tree of $\text{RNG}(S)$ is exac…
6559 $\text{EMST}(S)$. To implement Kruskal&apos;s algorithm with $O(s)$ cell…
6560 workspace, we define $s$-nets, a compact representation of planar graphs…
6561 allows us to efficiently maintain and update the components of the curre…
6562 minimum spanning forest as the edges are being inserted.
6563 &lt;/p&gt;
6564 </description>
6565 </item>
6566 <item>
6567 <title>Type-two polynomial-time and restricted lookahead. (arXiv:1801.07…
6568 <link>http://fr.arxiv.org/abs/1801.07485</link>
6569 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6570
6571 &lt;p&gt;This paper provides an alternate characterization of type-two p…
6572 computability, with the goal of making second-order complexity theory mo…
6573 approachable. We rely on the usual oracle machines to model programs with
6574 subroutine calls. In contrast to previous results, the use of higher-ord…
6575 objects as running times is avoided, either explicitly or implicitly. In…
6576 regular polynomials are used. This is achieved by refining the notion of
6577 oracle-polynomial-time introduced by Cook. We impose a further restricti…
6578 the oracle interactions to force feasibility. Both the restriction as we…
6579 its purpose are very simple: it is well-known that Cook&apos;s model all…
6580 polynomial depth iteration of functional inputs with no restrictions on …
6581 and thus does not guarantee that polynomial-time computability is preser…
6582 mend this we restrict the number of lookahead revisions, that is the num…
6583 times a query can be asked that is bigger than any of the previous queri…
6584 prove that this leads to a class of feasible functionals and that all fe…
6585 problems can be solved within this class if one is allowed to separate a…
6586 into efficiently solvable subtasks. Formally put: the closure of our cla…
6587 under lambda-abstraction and application includes all feasible operation…
6588 also revisit the very similar class of strongly polynomial-time computab…
6589 operators previously introduced by Kawamura and Steinberg. We prove it t…
6590 strictly included in our class and, somewhat surprisingly, to have the s…
6591 closure property. This can be attributed to properties of the limited re…
6592 operator: It is not strongly polynomial-time computable but decomposes i…
6593 such operations and lies in our class.
6594 &lt;/p&gt;
6595 </description>
6596 </item>
6597 <item>
6598 <title>Comparing Type Systems for Deadlock Freedom. (arXiv:1810.00635v3 …
6599 <link>http://fr.arxiv.org/abs/1810.00635</link>
6600 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6601
6602 &lt;p&gt;Message-passing software systems exhibit non-trivial forms of c…
6603 distribution; they are expected to follow intended protocols among
6604 communicating services, but also to never &quot;get stuck&quot;. This in…
6605 requirement has been expressed by liveness properties such as progress or
6606 (dead)lock freedom and various type systems ensure these properties for
6607 concurrent processes. Unfortunately, very little is known about the prec…
6608 relationship between these type systems and the classes of typed process…
6609 induce.
6610 &lt;/p&gt;
6611 &lt;p&gt;This paper puts forward the first comparative study of differen…
6612 for message-passing processes that guarantee deadlock freedom. We compar…
6613 classes of deadlock-free typed processes, here denoted L and K. The clas…
6614 stands out for its canonicity: it results from Curry-Howard interpretati…
6615 linear logic propositions as session types. The class K, obtained by enc…
6616 session types into Kobayashi&apos;s linear types with usages, includes p…
6617 typable in other type systems. We show that L is strictly included in K,…
6618 identify the precise conditions under which they coincide. We also provi…
6619 type-preserving translations of processes in K into processes in L.
6620 &lt;/p&gt;
6621 </description>
6622 </item>
6623 <item>
6624 <title>AADS: Augmented Autonomous Driving Simulation using Data-driven A…
6625 <link>http://fr.arxiv.org/abs/1901.07849</link>
6626 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6627
6628 &lt;p&gt;Simulation systems have become an essential component in the de…
6629 validation of autonomous driving technologies. The prevailing state-of-t…
6630 approach for simulation is to use game engines or high-fidelity computer
6631 graphics (CG) models to create driving scenarios. However, creating CG m…
6632 and vehicle movements (e.g., the assets for simulation) remains a manual…
6633 that can be costly and time-consuming. In addition, the fidelity of CG i…
6634 still lacks the richness and authenticity of real-world images and using…
6635 images for training leads to degraded performance.
6636 &lt;/p&gt;
6637 &lt;p&gt;In this paper we present a novel approach to address these issu…
6638 Autonomous Driving Simulation (AADS). Our formulation augments real-world
6639 pictures with a simulated traffic flow to create photo-realistic simulat…
6640 images and renderings. More specifically, we use LiDAR and cameras to sc…
6641 street scenes. From the acquired trajectory data, we generate highly pla…
6642 traffic flows for cars and pedestrians and compose them into the backgro…
6643 The composite images can be re-synthesized with different viewpoints and…
6644 models. The resulting images are photo-realistic, fully annotated, and r…
6645 for end-to-end training and testing of autonomous driving systems from
6646 perception to planning. We explain our system design and validate our
6647 algorithms with a number of autonomous driving tasks from detection to
6648 segmentation and predictions.
6649 &lt;/p&gt;
6650 &lt;p&gt;Compared to traditional approaches, our method offers unmatched…
6651 and realism. Scalability is particularly important for AD simulation and…
6652 believe the complexity and diversity of the real world cannot be realist…
6653 captured in a virtual environment. Our augmented approach combines the
6654 flexibility in a virtual environment (e.g., vehicle movements) with the
6655 richness of the real world to allow effective simulation of anywhere on …
6656 &lt;/p&gt;
6657 </description>
6658 </item>
6659 <item>
6660 <title>Mockingbird: Defending Against Deep-Learning-Based Website Finger…
6661 <link>http://fr.arxiv.org/abs/1902.06626</link>
6662 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6663
6664 &lt;p&gt;Website Fingerprinting (WF) is a type of traffic analysis attac…
6665 a local passive eavesdropper to infer the victim&apos;s activity, even w…
6666 traffic is protected by a VPN or an anonymity system like Tor. Leveragin…
6667 deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor
6668 traffic. In this paper, we explore a novel defense, Mockingbird, based o…
6669 idea of adversarial examples that have been shown to undermine machine-l…
6670 classifiers in other domains. Since the attacker gets to design and trai…
6671 attack classifier based on the defense, we first demonstrate that at a
6672 straightforward technique for generating adversarial-example based trace…
6673 to protect against an attacker using adversarial training for robust
6674 classification. We then propose Mockingbird, a technique for generating …
6675 that resists adversarial training by moving randomly in the space of via…
6676 traces and not following more predictable gradients. The technique drops…
6677 accuracy of the state-of-the-art attack hardened with adversarial traini…
6678 98% to 42-58% while incurring only 58% bandwidth overhead. The attack ac…
6679 is generally lower than state-of-the-art defenses, and much lower when
6680 considering Top-2 accuracy, while incurring lower bandwidth overheads.
6681 &lt;/p&gt;
6682 </description>
6683 </item>
6684 <item>
6685 <title>Global Optimality Guarantees For Policy Gradient Methods. (arXiv:…
6686 <link>http://fr.arxiv.org/abs/1906.01786</link>
6687 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6688
6689 &lt;p&gt;Policy gradients methods apply to complex, poorly understood, c…
6690 problems by performing stochastic gradient descent over a parameterized …
6691 of polices. Unfortunately, even for simple control problems solvable by
6692 standard dynamic programming techniques, policy gradient algorithms face
6693 non-convex optimization problems and are widely understood to converge o…
6694 a stationary point. This work identifies structural properties -- shared…
6695 several classic control problems -- that ensure the policy gradient obje…
6696 function has no suboptimal stationary points despite being non-convex. W…
6697 these conditions are strengthened, this objective satisfies a
6698 Polyak-lojasiewicz (gradient dominance) condition that yields convergence
6699 rates. We also provide bounds on the optimality gap of any stationary po…
6700 when some of these conditions are relaxed.
6701 &lt;/p&gt;
6702 </description>
6703 </item>
6704 <item>
6705 <title>ATRW: A Benchmark for Amur Tiger Re-identification in the Wild. (…
6706 <link>http://fr.arxiv.org/abs/1906.05586</link>
6707 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6708
6709 &lt;p&gt;Monitoring the population and movements of endangered species i…
6710 task to wildlife conversation. Traditional tagging methods do not scale …
6711 large populations, while applying computer vision methods to camera sens…
6712 requires re-identification (re-ID) algorithms to obtain accurate counts …
6713 moving trajectory of wildlife. However, existing re-ID methods are large…
6714 targeted at persons and cars, which have limited pose variations and
6715 constrained capture environments. This paper tries to fill the gap by
6716 introducing a novel large-scale dataset, the Amur Tiger Re-identificatio…
6717 the Wild (ATRW) dataset. ATRW contains over 8,000 video clips from 92 Am…
6718 tigers, with bounding box, pose keypoint, and tiger identity annotations…
6719 contrast to typical re-ID datasets, the tigers are captured in a diverse…
6720 unconstrained poses and lighting conditions. We demonstrate with a set of
6721 baseline algorithms that ATRW is a challenging dataset for re-ID. Lastly…
6722 propose a novel method for tiger re-identification, which introduces pre…
6723 pose parts modeling in deep neural networks to handle large pose variati…
6724 tigers, and reaches notable performance improvement over existing re-ID
6725 methods. The dataset is public available at https://cvwc2019.github.io/ .
6726 &lt;/p&gt;
6727 </description>
6728 </item>
6729 <item>
6730 <title>A Simple Local Minimal Intensity Prior and An Improved Algorithm …
6731 <link>http://fr.arxiv.org/abs/1906.06642</link>
6732 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6733
6734 &lt;p&gt;Blind image deblurring is a long standing challenging problem i…
6735 processing and low-level vision. Recently, sophisticated priors such as …
6736 channel prior, extreme channel prior, and local maximum gradient prior, …
6737 shown promising effectiveness. However, these methods are computationally
6738 expensive. Meanwhile, since these priors involved subproblems cannot be …
6739 explicitly, approximate solution is commonly used, which limits the best
6740 exploitation of their capability. To address these problems, this work f…
6741 proposes a simplified sparsity prior of local minimal pixels, namely pat…
6742 minimal pixels (PMP). The PMP of clear images is much more sparse than t…
6743 blurred ones, and hence is very effective in discriminating between clea…
6744 blurred images. Then, a novel algorithm is designed to efficiently explo…
6745 sparsity of PMP in deblurring. The new algorithm flexibly imposes sparsi…
6746 inducing on the PMP under the MAP framework rather than directly uses th…
6747 quadratic splitting algorithm. By this, it avoids non-rigorous approxima…
6748 solution in existing algorithms, while being much more computationally
6749 efficient. Extensive experiments demonstrate that the proposed algorithm…
6750 achieve better practical stability compared with state-of-the-arts. In t…
6751 deblurring quality, robustness and computational efficiency, the new alg…
6752 is superior to state-of-the-arts. Code for reproducing the results of th…
6753 method is available at https://github.com/FWen/deblur-pmp.git.
6754 &lt;/p&gt;
6755 </description>
6756 </item>
6757 <item>
6758 <title>Multi-type Resource Allocation with Partial Preferences. (arXiv:1…
6759 <link>http://fr.arxiv.org/abs/1906.06836</link>
6760 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6761
6762 &lt;p&gt;We propose multi-type probabilistic serial (MPS) and multi-type…
6763 priority (MRP) as extensions of the well known PS and RP mechanisms to t…
6764 multi-type resource allocation problem (MTRA) with partial preferences. …
6765 setting, there are multiple types of divisible items, and a group of age…
6766 have partial order preferences over bundles consisting of one item of ea…
6767 type. We show that for the unrestricted domain of partial order preferen…
6768 mechanism satisfies both sd-efficiency and sd-envy-freeness. Notwithstan…
6769 this impossibility result, our main message is positive: When agents&apo…
6770 preferences are represented by acyclic CP-nets, MPS satisfies sd-efficie…
6771 sd-envy-freeness, ordinal fairness, and upper invariance, while MRP sati…
6772 ex-post-efficiency, sd-strategy-proofness, and upper invariance, recover…
6773 properties of PS and RP.
6774 &lt;/p&gt;
6775 </description>
6776 </item>
6777 <item>
6778 <title>Dimensional Reweighting Graph Convolutional Networks. (arXiv:1907…
6779 <link>http://fr.arxiv.org/abs/1907.02237</link>
6780 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6781
6782 &lt;p&gt;Graph Convolution Networks (GCNs) are becoming more and more po…
6783 learning node representations on graphs. Though there exist various
6784 developments on sampling and aggregation to accelerate the training proc…
6785 improve the performances, limited works focus on dealing with the dimens…
6786 information imbalance of node representations. To bridge the gap, we pro…
6787 method named Dimensional reweighting Graph Convolution Network (DrGCN). …
6788 theoretically prove that our DrGCN can guarantee to improve the stabilit…
6789 GCNs via mean field theory. Our dimensional reweighting method is very f…
6790 and can be easily combined with most sampling and aggregation techniques…
6791 GCNs. Experimental results demonstrate its superior performances on seve…
6792 challenging transductive and inductive node classification benchmark dat…
6793 Our DrGCN also outperforms existing models on an industrial-sized Alibaba
6794 recommendation dataset.
6795 &lt;/p&gt;
6796 </description>
6797 </item>
6798 <item>
6799 <title>Lexical Simplification with Pretrained Encoders. (arXiv:1907.0622…
6800 <link>http://fr.arxiv.org/abs/1907.06226</link>
6801 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6802
6803 &lt;p&gt;Lexical simplification (LS) aims to replace complex words in a …
6804 with their simpler alternatives of equivalent meaning. Recently unsuperv…
6805 lexical simplification approaches only rely on the complex word itself
6806 regardless of the given sentence to generate candidate substitutions, wh…
6807 will inevitably produce a large number of spurious candidates. We presen…
6808 simple LS approach that makes use of the Bidirectional Encoder Represent…
6809 from Transformers (BERT) which can consider both the given sentence and …
6810 complex word during generating candidate substitutions for the complex w…
6811 Specifically, we mask the complex word of the original sentence for feed…
6812 into the BERT to predict the masked token. The predicted results will be…
6813 as candidate substitutions. Despite being entirely unsupervised, experim…
6814 results show that our approach obtains obvious improvement compared with…
6815 baselines leveraging linguistic databases and parallel corpus, outperfor…
6816 the state-of-the-art by more than 12 Accuracy points on three well-known
6817 benchmarks.
6818 &lt;/p&gt;
6819 </description>
6820 </item>
6821 <item>
6822 <title>Cover and variable degeneracy. (arXiv:1907.06630v3 [math.CO] UPDA…
6823 <link>http://fr.arxiv.org/abs/1907.06630</link>
6824 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6825
6826 &lt;p&gt;Let $f$ be a nonnegative integer valued function on the vertex …
6827 graph. A graph is {\bf strictly $f$-degenerate} if each nonempty subgraph
6828 $\Gamma$ has a vertex $v$ such that $\mathrm{deg}_{\Gamma}(v) &amp;lt; f…
6829 paper, we define a new concept, strictly $f$-degenerate transversal, whi…
6830 generalizes list coloring, signed coloring, DP-coloring, $L$-forested-co…
6831 and $(f_{1}, f_{2}, \dots, f_{s})$-partition. A {\bf cover} of a graph $…
6832 graph $H$ with vertex set $V(H) = \bigcup_{v \in V(G)} X_{v}$, where $X_…
6833 \{(v, 1), (v, 2), \dots, (v, s)\}$; the edge set $\mathscr{M} = \bigcup_…
6834 E(G)}\mathscr{M}_{uv}$, where $\mathscr{M}_{uv}$ is a matching between $…
6835 and $X_{v}$. A vertex set $R \subseteq V(H)$ is a {\bf transversal} of $…
6836 $|R \cap X_{v}| = 1$ for each $v \in V(G)$. A transversal $R$ is a {\bf
6837 strictly $f$-degenerate transversal} if $H[R]$ is strictly $f$-degenerat…
6838 main result of this paper is a degree type result, which generalizes Bro…
6839 theorem, Gallai&apos;s theorem, degree-choosable result, signed degree-c…
6840 result, and DP-degree-colorable result. Similar to Borodin, Kostochka and
6841 Toft&apos;s variable degeneracy, this degree type result is also self-st…
6842 We also give some structural results on critical graphs with respect to
6843 strictly $f$-degenerate transversal. Using these results, we can uniform…
6844 prove many new and known results. In the final section, we pose some open
6845 problems.
6846 &lt;/p&gt;
6847 </description>
6848 </item>
6849 <item>
6850 <title>An Iterative Vertex Enumeration Method for Objective Space Based …
6851 <link>http://fr.arxiv.org/abs/1907.08813</link>
6852 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6853
6854 &lt;p&gt;An application area of vertex enumeration problem (VEP) is the …
6855 objective space based linear/convex {vector} optimization algorithms who…
6856 is to generate (an approximation of) the Pareto frontier. In such algori…
6857 VEP, which is defined in the objective space, is solved in each iteratio…
6858 it has a special structure. Namely, the recession cone of the polyhedron…
6859 generated is the {ordering} cone. We {consider and give a detailed descr…
6860 of} a vertex enumeration procedure, which iterates by calling a modified
6861 `double description (DD) method&apos; that works for such unbounded poly…
6862 employ this procedure as a function of an existing objective space based
6863 {vector} optimization algorithm (Algorithm 1); and test the performance …
6864 for randomly generated linear multiobjective optimization problems. We c…
6865 the efficiency of this procedure with another existing DD method as well…
6866 with the current vertex enumeration subroutine of Algorithm 1. We observ…
6867 the modified procedure excels the others especially as the dimension of …
6868 vertex enumeration problem (the number of objectives of the corresponding
6869 multiobjective problem) increases.
6870 &lt;/p&gt;
6871 </description>
6872 </item>
6873 <item>
6874 <title>Developing an Unsupervised Real-time Anomaly Detection Scheme for…
6875 <link>http://fr.arxiv.org/abs/1908.01146</link>
6876 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6877
6878 &lt;p&gt;On-line detection of anomalies in time series is a key techniqu…
6879 various event-sensitive scenarios such as robotic system monitoring, sma…
6880 sensor networks and data center security. However, the increasing divers…
6881 data sources and the variety of demands make this task more challenging …
6882 ever. Firstly, the rapid increase in unlabeled data means supervised lea…
6883 is becoming less suitable in many cases. Secondly, a large portion of ti…
6884 series data have complex seasonality features. Thirdly, on-line anomaly
6885 detection needs to be fast and reliable. In light of this, we have devel…
6886 prediction-driven, unsupervised anomaly detection scheme, which adopts a
6887 backbone model combining the decomposition and the inference of time ser…
6888 data. Further, we propose a novel metric, Local Trend Inconsistency (LTI…
6889 an efficient detection algorithm that computes LTI in a real-time manner…
6890 scores each data point robustly in terms of its probability of being ano…
6891 We have conducted extensive experimentation to evaluate our algorithm wi…
6892 several datasets from both public repositories and production environmen…
6893 experimental results show that our scheme outperforms existing represent…
6894 anomaly detection algorithms in terms of the commonly used metric, Area …
6895 Curve (AUC), while achieving the desired efficiency.
6896 &lt;/p&gt;
6897 </description>
6898 </item>
6899 <item>
6900 <title>Cluster-based Distributed Augmented Lagrangian Algorithm for a Cl…
6901 <link>http://fr.arxiv.org/abs/1908.06634</link>
6902 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6903
6904 &lt;p&gt;We propose a distributed solution for a constrained convex opti…
6905 problem over a network of clustered agents each consisted of a set of
6906 subagents. The communication range of the clustered agents is such that …
6907 can form a connected undirected graph topology. The total cost in this
6908 optimization problem is the sum of the local convex costs of the subagen…
6909 each cluster. We seek a minimizer of this cost subject to a set of affine
6910 equality constraints, and a set of affine inequality constraints specify…
6911 bounds on the decision variables if such bounds exist. We design our
6912 distributed algorithm in a cluster-based framework which results in a
6913 significant reduction in communication and computation costs. Our propos…
6914 distributed solution is a novel continuous-time algorithm that is linked…
6915 augmented Lagrangian approach. It converges asymptotically when the loca…
6916 functions are convex and exponentially when they are strongly convex and…
6917 Lipschitz gradients. Moreover, we use an $\epsilon$-exact penalty functi…
6918 address the inequality constraints and derive an explicit lower bound on…
6919 penalty function weight to guarantee convergence to $\epsilon$-neighborh…
6920 the global minimum value of the cost. A numerical example demonstrates o…
6921 results.
6922 &lt;/p&gt;
6923 </description>
6924 </item>
6925 <item>
6926 <title>Optimal Machine Intelligence at the Edge of Chaos. (arXiv:1909.05…
6927 <link>http://fr.arxiv.org/abs/1909.05176</link>
6928 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6929
6930 &lt;p&gt;It has long been suggested that the biological brain operates a…
6931 critical point between two different phases, possibly order and chaos. D…
6932 many indirect empirical evidence from the brain and analytical indicatio…
6933 simple neural networks, the foundation of this hypothesis on generic non…
6934 systems remains unclear. Here we develop a general theory that reveals t…
6935 exact edge of chaos is the boundary between the chaotic phase and the
6936 (pseudo)periodic phase arising from Neimark-Sacker bifurcation. This edg…
6937 analytically determined by the asymptotic Jacobian norm values of the
6938 non-linear operator and influenced by the dimensionality of the system. …
6939 optimality at the edge of chaos is associated with the highest informati…
6940 transfer between input and output at this point similar to that of the l…
6941 map. As empirical validations, our experiments on the various deep learn…
6942 models in computer vision demonstrate the optimality of the models near …
6943 edge of chaos, and we observe that the state-of-art training algorithms …
6944 the models towards such edge as they become more accurate. We further
6945 establishes the theoretical understanding of deep learning model general…
6946 through asymptotic stability.
6947 &lt;/p&gt;
6948 </description>
6949 </item>
6950 <item>
6951 <title>Inverse Kinematics for Serial Kinematic Chains via Sum of Squares…
6952 <link>http://fr.arxiv.org/abs/1909.09318</link>
6953 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6954
6955 &lt;p&gt;Inverse kinematics is a fundamental problem for articulated rob…
6956 accurate algorithms are needed for translating task-related workspace
6957 constraints and goals into feasible joint configurations. In general, in…
6958 kinematics for serial kinematic chains is a difficult nonlinear problem,…
6959 which closed form solutions cannot be easily obtained. Therefore,
6960 computationally efficient numerical methods that can be adapted to a gen…
6961 class of manipulators are of great importance. % to motion planning and
6962 workspace generation tasks. In this paper, we use convex optimization
6963 techniques to solve the inverse kinematics problem with joint limit cons…
6964 for highly redundant serial kinematic chains with spherical joints in tw…
6965 three dimensions. This is accomplished through a novel formulation of in…
6966 kinematics as a nearest point problem, and with a fast sum of squares so…
6967 that exploits the sparsity of kinematic constraints for serial manipulat…
6968 Our method has the advantages of post-hoc certification of global optima…
6969 and a runtime that scales polynomialy with the number of degrees of free…
6970 Additionally, we prove that our convex relaxation leads to a globally op…
6971 solution when certain conditions are met, and demonstrate empirically th…
6972 these conditions are common and represent many practical instances. Fina…
6973 provide an open source implementation of our algorithm.
6974 &lt;/p&gt;
6975 </description>
6976 </item>
6977 <item>
6978 <title>Noisy Batch Active Learning with Deterministic Annealing. (arXiv:…
6979 <link>http://fr.arxiv.org/abs/1909.12473</link>
6980 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6981
6982 &lt;p&gt;We study the problem of training machine learning models increm…
6983 batches of samples annotated with noisy oracles. We select each batch of
6984 samples that are important and also diverse via clustering and importance
6985 sampling. More importantly, we incorporate model uncertainty into the sa…
6986 probability to compensate for poor estimation of the importance scores w…
6987 training data is too small to build a meaningful model. Experiments on
6988 benchmark image classification datasets (MNIST, SVHN, CIFAR10, and EMNIS…
6989 improvement over existing active learning strategies. We introduce an ex…
6990 denoising layer to deep networks to make active learning robust to label…
6991 and show significant improvements.
6992 &lt;/p&gt;
6993 </description>
6994 </item>
6995 <item>
6996 <title>Subspace Estimation from Unbalanced and Incomplete Data Matrices:…
6997 <link>http://fr.arxiv.org/abs/1910.04267</link>
6998 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
6999
7000 &lt;p&gt;This paper is concerned with estimating the column space of an …
7001 low-rank matrix $\boldsymbol{A}^{\star}\in\mathbb{R}^{d_{1}\times d_{2}}…
7002 given noisy and partial observations of its entries. There is no shortag…
7003 scenarios where the observations -- while being too noisy to support fai…
7004 recovery of the entire matrix -- still convey sufficient information to …
7005 reliable estimation of the column space of interest. This is particularly
7006 evident and crucial for the highly unbalanced case where the column dime…
7007 $d_{2}$ far exceeds the row dimension $d_{1}$, which is the focal point …
7008 current paper. We investigate an efficient spectral method, which operat…
7009 the sample Gram matrix with diagonal deletion. While this algorithmic id…
7010 been studied before, we establish new statistical guarantees for this me…
7011 terms of both $\ell_{2}$ and $\ell_{2,\infty}$ estimation accuracy, which
7012 improve upon prior results if $d_{2}$ is substantially larger than $d_{1…
7013 illustrate the effectiveness of our findings, we derive matching minimax…
7014 bounds with respect to the noise levels, and develop consequences of our
7015 general theory for three applications of practical importance: (1) tensor
7016 completion from noisy data, (2) covariance estimation / principal compon…
7017 analysis with missing data, and (3) community recovery in bipartite grap…
7018 theory leads to improved performance guarantees for all three cases.
7019 &lt;/p&gt;
7020 </description>
7021 </item>
7022 <item>
7023 <title>ProxIQA: A Proxy Approach to Perceptual Optimization of Learned I…
7024 <link>http://fr.arxiv.org/abs/1910.08845</link>
7025 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7026
7027 &lt;p&gt;The use of $\ell_p$ $(p=1,2)$ norms has largely dominated the m…
7028 loss in neural networks due to their simplicity and analytical propertie…
7029 However, when used to assess the loss of visual information, these simpl…
7030 are not very consistent with human perception. Here, we describe a diffe…
7031 &quot;proximal&quot; approach to optimize image analysis networks agains…
7032 perceptual models. Specifically, we construct a proxy network, broadly t…
7033 ProxIQA, which mimics the perceptual model while serving as a loss layer…
7034 network. We experimentally demonstrate how this optimization framework c…
7035 applied to train an end-to-end optimized image compression network. By b…
7036 on top of an existing deep image compression model, we are able to demon…
7037 a bitrate reduction of as much as $31\%$ over MSE optimization, given a
7038 specified perceptual quality (VMAF) level.
7039 &lt;/p&gt;
7040 </description>
7041 </item>
7042 <item>
7043 <title>Federated Learning over Wireless Networks: Convergence Analysis a…
7044 <link>http://fr.arxiv.org/abs/1910.13067</link>
7045 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7046
7047 &lt;p&gt;There is an increasing interest in a fast-growing machine learn…
7048 called Federated Learning, in which the model training is distributed ov…
7049 mobile user equipments (UEs), exploiting UEs&apos; local computation and…
7050 data. Despite its advantages in data privacy-preserving, Federated Learn…
7051 (FL) still has challenges in heterogeneity across UEs&apos; data and phy…
7052 resources. We first propose a FL algorithm which can handle the heteroge…
7053 UEs&apos; data challenge without further assumptions except strongly con…
7054 smooth loss functions. We provide the convergence rate characterizing the
7055 trade-off between local computation rounds of UE to update its local mod…
7056 global communication rounds to update the FL global model. We then emplo…
7057 proposed FL algorithm in wireless networks as a resource allocation
7058 optimization problem that captures the trade-off between the FL converge…
7059 wall clock time and energy consumption of UEs with heterogeneous computi…
7060 power resources. Even though the wireless resource allocation problem of…
7061 non-convex, we exploit this problem&apos;s structure to decompose it int…
7062 sub-problems and analyze their closed-form solutions as well as insights…
7063 problem design. Finally, we illustrate the theoretical analysis for the …
7064 algorithm with Tensorflow experiments and extensive numerical results fo…
7065 wireless resource allocation sub-problems. The experiment results not on…
7066 verify the theoretical convergence but also show that our proposed algor…
7067 outperforms the vanilla FedAvg algorithm in terms of convergence rate and
7068 testing accuracy.
7069 &lt;/p&gt;
7070 </description>
7071 </item>
7072 <item>
7073 <title>Making the Best Use of Review Summary for Sentiment Analysis. (ar…
7074 <link>http://fr.arxiv.org/abs/1911.02711</link>
7075 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7076
7077 &lt;p&gt;Sentiment analysis provides a useful overview of customer revie…
7078 Many review websites allow a user to enter a summary in addition to a fu…
7079 review. Intuitively, summary information may give additional benefit for…
7080 sentiment analysis. In this paper, we conduct a study to exploit methods…
7081 better use of summary information. We start by finding out that the sent…
7082 signal distribution of a review and that of its corresponding summary ar…
7083 fact complementary to each other. We thus explore various architectures …
7084 better guide the interactions between the two and propose a
7085 hierarchically-refined review-centric attention model. Empirical results…
7086 that our review-centric model can make better use of user-written summar…
7087 review sentiment analysis, and is also more effective compared to existi…
7088 methods when the user summary is replaced with summary generated by an
7089 automatic summarization system.
7090 &lt;/p&gt;
7091 </description>
7092 </item>
7093 <item>
7094 <title>Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforc…
7095 <link>http://fr.arxiv.org/abs/1911.03849</link>
7096 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7097
7098 &lt;p&gt;Recent studies have revealed that neural network-based policies…
7099 fooled by adversarial examples. However, while most prior works analyze …
7100 effects of perturbing every pixel of every frame assuming white-box poli…
7101 access, in this paper we take a more restrictive view towards adversary
7102 generation - with the goal of unveiling the limits of a model&apos;s vul…
7103 In particular, we explore minimalistic attacks by defining three key set…
7104 (1) black-box policy access: where the attacker only has access to the i…
7105 (state) and output (action probability) of an RL policy; (2) fractional-…
7106 adversary: where only several pixels are perturbed, with the extreme cas…
7107 a single-pixel adversary; and (3) tactically-chanced attack: where only
7108 significant frames are tactically chosen to be attacked. We formulate the
7109 adversarial attack by accommodating the three key settings and explore t…
7110 potency on six Atari games by examining four fully trained state-of-the-…
7111 policies. In Breakout, for example, we surprisingly find that: (i) all p…
7112 showcase significant performance degradation by merely modifying 0.01% o…
7113 input state, and (ii) the policy trained by DQN is totally deceived by
7114 perturbation to only 1% frames.
7115 &lt;/p&gt;
7116 </description>
7117 </item>
7118 <item>
7119 <title>Rethinking Self-Attention: Towards Interpretability in Neural Par…
7120 <link>http://fr.arxiv.org/abs/1911.03875</link>
7121 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7122
7123 &lt;p&gt;Attention mechanisms have improved the performance of NLP tasks…
7124 allowing models to remain explainable. Self-attention is currently widel…
7125 however interpretability is difficult due to the numerous attention
7126 distributions. Recent work has shown that model representations can bene…
7127 from label-specific information, while facilitating interpretation of
7128 predictions. We introduce the Label Attention Layer: a new form of
7129 self-attention where attention heads represent labels. We test our novel…
7130 by running constituency and dependency parsing experiments and show our …
7131 model obtains new state-of-the-art results for both tasks on both the Pe…
7132 Treebank (PTB) and Chinese Treebank. Additionally, our model requires fe…
7133 self-attention layers compared to existing work. Finally, we find that t…
7134 Label Attention heads learn relations between syntactic categories and s…
7135 pathways to analyze errors.
7136 &lt;/p&gt;
7137 </description>
7138 </item>
7139 <item>
7140 <title>Privacy-Preserving Gradient Boosting Decision Trees. (arXiv:1911.…
7141 <link>http://fr.arxiv.org/abs/1911.04209</link>
7142 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7143
7144 &lt;p&gt;The Gradient Boosting Decision Tree (GBDT) is a popular machine…
7145 model for various tasks in recent years. In this paper, we study how to …
7146 model accuracy of GBDT while preserving the strong guarantee of differen…
7147 privacy. Sensitivity and privacy budget are two key design aspects for t…
7148 effectiveness of differential private models. Existing solutions for GBD…
7149 differential privacy suffer from the significant accuracy loss due to to…
7150 sensitivity bounds and ineffective privacy budget allocations (especially
7151 across different trees in the GBDT model). Loose sensitivity bounds lead…
7152 more noise to obtain a fixed privacy level. Ineffective privacy budget
7153 allocations worsen the accuracy loss especially when the number of trees…
7154 large. Therefore, we propose a new GBDT training algorithm that achieves
7155 tighter sensitivity bounds and more effective noise allocations. Specifi…
7156 by investigating the property of gradient and the contribution of each t…
7157 GBDTs, we propose to adaptively control the gradients of training data f…
7158 iteration and leaf node clipping in order to tighten the sensitivity bou…
7159 Furthermore, we design a novel boosting framework to allocate the privacy
7160 budget between trees so that the accuracy loss can be further reduced. O…
7161 experiments show that our approach can achieve much better model accurac…
7162 other baselines.
7163 &lt;/p&gt;
7164 </description>
7165 </item>
7166 <item>
7167 <title>A Continuous Teleoperation Subspace with Empirical and Algorithmi…
7168 <link>http://fr.arxiv.org/abs/1911.09565</link>
7169 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7170
7171 &lt;p&gt;Teleoperation is a valuable tool for robotic manipulators in hi…
7172 unstructured environments. However, finding an intuitive mapping between…
7173 human hand and a non-anthropomorphic robot hand can be difficult, due to…
7174 hands&apos; dissimilar kinematics. In this paper, we seek to create a ma…
7175 between the human hand and a fully actuated, non-anthropomorphic robot h…
7176 that is intuitive enough to enable effective real-time teleoperation, ev…
7177 novice users. To accomplish this, we propose a low-dimensional teleopera…
7178 subspace which can be used as an intermediary for mapping between hand p…
7179 spaces. We present two different methods to define the teleoperation sub…
7180 an empirical definition, which requires a person to define hand motions …
7181 intuitive, hand-specific way, and an algorithmic definition, which is
7182 kinematically independent, and uses objects to define the subspace. We u…
7183 of these definitions to create a teleoperation mapping for different han…
7184 of the main contributions of this paper is the validation of both the em…
7185 and algorithmic mappings with teleoperation experiments controlled by ten
7186 novices and performed on two kinematically distinct hands. The experimen…
7187 that the proposed subspace is relevant to teleoperation, intuitive enoug…
7188 enable control by novices, and can generalize to non-anthropomorphic han…
7189 different kinematics.
7190 &lt;/p&gt;
7191 </description>
7192 </item>
7193 <item>
7194 <title>QoS-Aware Joint Power Allocation and Task Offloading in a MEC/NFV…
7195 <link>http://fr.arxiv.org/abs/1912.00187</link>
7196 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7197
7198 &lt;p&gt;In this paper, we propose a novel resource management scheme th…
7199 allocates the transmission power and computational resources in a centra…
7200 radio access network architecture. The network comprises a set of comput…
7201 nodes to which the requested tasks of different users are offloaded. The
7202 optimization problem takes the transmission, execution, and propagation …
7203 of each task into account, with the aim to allocate the transmission pow…
7204 computational resources such that the user&apos;s maximum tolerable late…
7205 satisfied. Since the optimization problem is highly non-convex, we adopt…
7206 alternate search method (ASM) to divide it into smaller subproblems. A
7207 heuristic algorithm is proposed to jointly manage the allocated computat…
7208 resources and placement of the tasks derived by ASM. We also propose an
7209 admission control mechanism for finding the set of tasks that can be ser…
7210 the available resources. Furthermore, a disjoint method that separately
7211 allocates the transmission power and the computational resources is prop…
7212 the baseline of comparison. The optimal solution of the optimization pro…
7213 also derived based on exhaustive search over offloading decisions and ut…
7214 Karush-Kuhn-Tucker optimality conditions. The simulation results show th…
7215 joint method outperforms the disjoint task offloading and power allocati…
7216 Moreover, simulations show that the performance of the proposed method is
7217 almost equal to that of the optimal solution.
7218 &lt;/p&gt;
7219 </description>
7220 </item>
7221 <item>
7222 <title>Hierarchical Indian Buffet Neural Networks for Bayesian Continual…
7223 <link>http://fr.arxiv.org/abs/1912.02290</link>
7224 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7225
7226 &lt;p&gt;We place an Indian Buffet process (IBP) prior over the structur…
7227 Bayesian Neural Network (BNN), thus allowing the complexity of the BNN to
7228 increase and decrease automatically. We further extend this model such t…
7229 prior on the structure of each hidden layer is shared globally across all
7230 layers, using a Hierarchical-IBP (H-IBP). We apply this model to the pro…
7231 resource allocation in Continual Learning (CL) where new tasks occur and…
7232 network requires extra resources. Our model uses online variational infe…
7233 with reparameterisation of the Bernoulli and Beta distributions, which
7234 constitute the IBP and H-IBP priors. As we automatically learn the numbe…
7235 weights in each layer of the BNN, overfitting and underfitting problems …
7236 largely overcome. We show empirically that our approach offers a competi…
7237 edge over existing methods in CL.
7238 &lt;/p&gt;
7239 </description>
7240 </item>
7241 <item>
7242 <title>CoSimLex: A Resource for Evaluating Graded Word Similarity in Con…
7243 <link>http://fr.arxiv.org/abs/1912.05320</link>
7244 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7245
7246 &lt;p&gt;State of the art natural language processing tools are built on
7247 context-dependent word embeddings, but no direct method for evaluating t…
7248 representations currently exists. Standard tasks and datasets for intrin…
7249 evaluation of embeddings are based on judgements of similarity, but igno…
7250 context; standard tasks for word sense disambiguation take account of co…
7251 but do not provide continuous measures of meaning similarity. This paper
7252 describes an effort to build a new dataset, CoSimLex, intended to fill t…
7253 gap. Building on the standard pairwise similarity task of SimLex-999, it
7254 provides context-dependent similarity measures; covers not only discrete
7255 differences in word sense but more subtle, graded changes in meaning; and
7256 covers not only a well-resourced language (English) but a number of
7257 less-resourced languages. We define the task and evaluation metrics, out…
7258 the dataset collection methodology, and describe the status of the datas…
7259 far.
7260 &lt;/p&gt;
7261 </description>
7262 </item>
7263 <item>
7264 <title>What it Thinks is Important is Important: Robustness Transfers th…
7265 <link>http://fr.arxiv.org/abs/1912.05699</link>
7266 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7267
7268 &lt;p&gt;Adversarial perturbations are imperceptible changes to input pi…
7269 change the prediction of deep learning models. Learned weights of models…
7270 to such perturbations are previously found to be transferable across dif…
7271 tasks but this applies only if the model architecture for the source and…
7272 tasks is the same. Input gradients characterize how small changes at eac…
7273 pixel affect the model output. Using only natural images, we show here t…
7274 training a student model&apos;s input gradients to match those of a robu…
7275 model can gain robustness close to a strong baseline that is robustly tr…
7276 from scratch. Through experiments in MNIST, CIFAR-10, CIFAR-100 and
7277 Tiny-ImageNet, we show that our proposed method, input gradient adversar…
7278 matching, can transfer robustness across different tasks and even across
7279 different model architectures. This demonstrates that directly targeting…
7280 semantics of input gradients is a feasible way towards adversarial robus…
7281 &lt;/p&gt;
7282 </description>
7283 </item>
7284 <item>
7285 <title>ORCA: a Benchmark for Data Web Crawlers. (arXiv:1912.08026v2 [cs.…
7286 <link>http://fr.arxiv.org/abs/1912.08026</link>
7287 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7288
7289 &lt;p&gt;The number of RDF knowledge graphs available on the Web grows c…
7290 Gathering these graphs at large scale for downstream applications hence
7291 requires the use of crawlers. Although Data Web crawlers exist, and gene…
7292 crawlers could be adapted to focus on the Data Web, there is currently no
7293 benchmark to fairly evaluate their performance. Our work closes this gap…
7294 presenting the Orca benchmark. Orca generates a synthetic Data Web, whic…
7295 decoupled from the original Web and enables a fair and repeatable compar…
7296 Data Web crawlers. Our evaluations show that Orca can be used to reveal …
7297 different advantages and disadvantages of existing crawlers. The benchma…
7298 open-source and available at https://github.com/dice-group/orca.
7299 &lt;/p&gt;
7300 </description>
7301 </item>
7302 <item>
7303 <title>Deep Automodulators. (arXiv:1912.10321v4 [cs.LG] UPDATED)</title>
7304 <link>http://fr.arxiv.org/abs/1912.10321</link>
7305 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7306
7307 &lt;p&gt;We introduce a new category of generative autoencoders called a…
7308 These networks can faithfully reproduce individual real-world input imag…
7309 regular autoencoders, but also generate a fused sample from an arbitrary
7310 combination of several such images, allowing instantaneous &apos;style-m…
7311 other new applications. An automodulator decouples the data flow of deco…
7312 operations from statistical properties thereof and uses the latent vecto…
7313 modulate the former by the latter, with a principled approach for mutual
7314 disentanglement of decoder layers. Prior work has explored similar decod…
7315 architecture with GANs, but their focus has been on random sampling. A
7316 corresponding autoencoder could operate on real input images. For the fi…
7317 time, we show how to train such a general-purpose model with sharp outpu…
7318 high resolution, using novel training techniques, demonstrated on four i…
7319 data sets. Besides style-mixing, we show state-of-the-art results in
7320 autoencoder comparison, and visual image quality nearly indistinguishabl…
7321 state-of-the-art GANs. We expect the automodulator variants to become a …
7322 building block for image applications and other data domains.
7323 &lt;/p&gt;
7324 </description>
7325 </item>
7326 <item>
7327 <title>Statistical Limits of Supervised Quantum Learning. (arXiv:2001.10…
7328 <link>http://fr.arxiv.org/abs/2001.10477</link>
7329 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7330
7331 &lt;p&gt;Within the framework of statistical learning theory it is possi…
7332 the minimum number of samples required by a learner to reach a target ac…
7333 We show that if the bound on the accuracy is taken into account, quantum
7334 machine learning algorithms for supervised learning---for which statisti…
7335 guarantees are available---cannot achieve polylogarithmic runtimes in th…
7336 dimension. We conclude that, when no further assumptions on the problem …
7337 made, quantum machine learning algorithms for supervised learning can ha…
7338 most polynomial speedups over efficient classical algorithms, even in ca…
7339 where quantum access to the data is naturally available.
7340 &lt;/p&gt;
7341 </description>
7342 </item>
7343 <item>
7344 <title>Can Graph Neural Networks Count Substructures?. (arXiv:2002.04025…
7345 <link>http://fr.arxiv.org/abs/2002.04025</link>
7346 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7347
7348 &lt;p&gt;The ability to detect and count certain substructures in graphs…
7349 for solving many tasks on graph-structured data, especially in the conte…
7350 computational chemistry and biology as well as social network analysis.
7351 Inspired by this, we propose to study the expressive power of graph neur…
7352 networks (GNNs) via their ability to count attributed graph substructure…
7353 extending recent works that examine their power in graph isomorphism tes…
7354 and function approximation. We distinguish between two types of substruc…
7355 counting: induced-subgraph-count and subgraph-count, and establish both
7356 positive and negative answers for popular GNN architectures. Specificall…
7357 prove that Message Passing Neural Networks (MPNNs), 2-Weisfeiler-Lehman …
7358 and 2-Invariant Graph Networks (2-IGNs) cannot perform induced-subgraph-…
7359 of substructures consisting of 3 or more nodes, while they can perform
7360 subgraph-count of star-shaped substructures. As an intermediary step, we…
7361 that 2-WL and 2-IGNs are equivalent in distinguishing non-isomorphic gra…
7362 partly answering an open problem raised in Maron et al. (2019). We also …
7363 positive results for k-WL and k-IGNs as well as negative results for k-W…
7364 a finite number of iterations. We then conduct experiments that support …
7365 theoretical results for MPNNs and 2-IGNs. Moreover, motivated by substru…
7366 counting and inspired by Murphy et al. (2019), we propose the Local Rela…
7367 Pooling model and demonstrate that it is not only effective for substruc…
7368 counting but also able to achieve competitive performance on molecular
7369 prediction tasks.
7370 &lt;/p&gt;
7371 </description>
7372 </item>
7373 <item>
7374 <title>An implicit function learning approach for parametric modal regre…
7375 <link>http://fr.arxiv.org/abs/2002.06195</link>
7376 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7377
7378 &lt;p&gt;For multi-valued functions---such as when the conditional distr…
7379 targets given the inputs is multi-modal---standard regression approaches…
7380 not always desirable because they provide the conditional mean. Modal
7381 regression algorithms address this issue by instead finding the conditio…
7382 mode(s). Most, however, are nonparametric approaches and so can be diffi…
7383 scale. Further, parametric approximators, like neural networks, facilita…
7384 learning complex relationships between inputs and targets. In this work,…
7385 propose a parametric modal regression algorithm. We use the implicit fun…
7386 theorem to develop an objective, for learning a joint function over inpu…
7387 targets. We empirically demonstrate on several synthetic problems that o…
7388 method (i) can learn multi-valued functions and produce the conditional …
7389 (ii) scales well to high-dimensional inputs, and (iii) can even be more
7390 effective for certain uni-modal problems, particularly for high-frequency
7391 functions. We demonstrate that our method is competitive in a real-world…
7392 regression problem and two regular regression datasets.
7393 &lt;/p&gt;
7394 </description>
7395 </item>
7396 <item>
7397 <title>Learning Global Transparent Models Consistent with Local Contrast…
7398 <link>http://fr.arxiv.org/abs/2002.08247</link>
7399 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7400
7401 &lt;p&gt;There is a rich and growing literature on producing local
7402 contrastive/counterfactual explanations for black-box models (e.g. neural
7403 networks).
7404 &lt;/p&gt;
7405 &lt;p&gt;In these methods, for an input, an explanation is in the form o…
7406 point differing in very few features from the original input and lying i…
7407 different class. Other works try to build globally interpretable models …
7408 decision trees and rule lists based on the data using actual labels or b…
7409 the black-box models predictions. Although these interpretable global mo…
7410 can be useful, they may not be consistent with local explanations from a
7411 specific black-box of choice. In this work, we explore the question: Can…
7412 produce a transparent global model that is simultaneously accurate and
7413 consistent with the local (contrastive) explanations of the black-box mo…
7414 introduce a natural local consistency metric that quantifies if the local
7415 explanations and predictions of the black-box model are also consistent …
7416 the proxy global transparent model. Based on a key insight we propose a …
7417 method where we create custom boolean features from sparse local contras…
7418 explanations of the black-box model and then train a globally transparen…
7419 on just these, and showcase empirically that such models have higher loc…
7420 consistency compared with other known strategies, while still being clos…
7421 performance to models that are trained with access to the original data.
7422 &lt;/p&gt;
7423 </description>
7424 </item>
7425 <item>
7426 <title>A two-stage data-analysis method for total-reflection high-energy…
7427 <link>http://fr.arxiv.org/abs/2002.12165</link>
7428 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7429
7430 &lt;p&gt;Total-reflection high-energy positron diffraction (TRHEPD) is a…
7431 experimental method for the determination of surface structure, which ha…
7432 extensively developed at the Slow Positron Facility, Institute of Materi…
7433 Structure Science, High Energy Accelerator Research Organization (KEK). …
7434 paper, a two-stage data-analysis method is proposed. The data analysis i…
7435 on an inverse problem in which the atomic positions of a surface structu…
7436 determined from the experimental diffraction data (rocking curves). The
7437 relevant forward problem is solved by the numerical solution of the part…
7438 differential equation for quantum scattering of the positron. In the pre…
7439 two-stage method, the first stage is a grid-based global search and the …
7440 stage is a local search for the unique candidate for the atomic arrangem…
7441 The numerical problem is solved on a supercomputer
7442 &lt;/p&gt;
7443 </description>
7444 </item>
7445 <item>
7446 <title>Curriculum By Smoothing. (arXiv:2003.01367v3 [cs.LG] UPDATED)</ti…
7447 <link>http://fr.arxiv.org/abs/2003.01367</link>
7448 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7449
7450 &lt;p&gt;Convolutional Neural Networks (CNNs) have shown impressive perf…
7451 computer vision tasks such as image classification, detection, and
7452 segmentation. Moreover, recent work in Generative Adversarial Networks (…
7453 has highlighted the importance of learning by progressively increasing t…
7454 difficulty of a learning task [26]. When learning a network from scratch…
7455 information propagated within the network during the earlier stages of t…
7456 can contain distortion artifacts due to noise which can be detrimental to
7457 training. In this paper, we propose an elegant curriculum based scheme t…
7458 smoothes the feature embedding of a CNN using anti-aliasing or low-pass
7459 filters. We propose to augment the train-ing of CNNs by controlling the …
7460 of high frequency information propagated within the CNNs as training
7461 progresses, by convolving the output of a CNN feature map of each layer …
7462 Gaussian kernel. By decreasing the variance of the Gaussian kernel, we
7463 gradually increase the amount of high-frequency information available wi…
7464 the network for inference. As the amount of information in the feature m…
7465 increases during training, the network is able to progressively learn be…
7466 representations of the data. Our proposed augmented training scheme
7467 significantly improves the performance of CNNs on various vision tasks w…
7468 either adding additional trainable parameters or an auxiliary regulariza…
7469 objective. The generality of our method is demonstrated through empirical
7470 performance gains in CNN architectures across four different tasks: tran…
7471 learning, cross-task transfer learning, and generative models.
7472 &lt;/p&gt;
7473 </description>
7474 </item>
7475 <item>
7476 <title>Forgetting Outside the Box: Scrubbing Deep Networks of Informatio…
7477 <link>http://fr.arxiv.org/abs/2003.02960</link>
7478 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7479
7480 &lt;p&gt;We describe a procedure for removing dependency on a cohort of …
7481 from a trained deep network that improves upon and generalizes previous …
7482 to different readout functions and can be extended to ensure forgetting …
7483 activations of the network. We introduce a new bound on how much informa…
7484 can be extracted per query about the forgotten cohort from a black-box n…
7485 for which only the input-output behavior is observed. The proposed forge…
7486 procedure has a deterministic part derived from the differential equatio…
7487 linearized version of the model, and a stochastic part that ensures info…
7488 destruction by adding noise tailored to the geometry of the loss landsca…
7489 exploit the connections between the activation and weight dynamics of a …
7490 inspired by Neural Tangent Kernels to compute the information in the
7491 activations.
7492 &lt;/p&gt;
7493 </description>
7494 </item>
7495 <item>
7496 <title>No Surprises: Training Robust Lung Nodule Detection for Low-Dose …
7497 <link>http://fr.arxiv.org/abs/2003.03824</link>
7498 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7499
7500 &lt;p&gt;Detecting malignant pulmonary nodules at an early stage can all…
7501 interventions which may increase the survival rate of lung cancer patien…
7502 Using computer vision techniques to detect nodules can improve the sensi…
7503 and the speed of interpreting chest CT for lung cancer screening. Many s…
7504 have used CNNs to detect nodule candidates. Though such approaches have …
7505 shown to outperform the conventional image processing based methods rega…
7506 the detection accuracy, CNNs are also known to be limited to generalize …
7507 under-represented samples in the training set and prone to imperceptible…
7508 perturbations. Such limitations can not be easily addressed by scaling u…
7509 dataset or the models. In this work, we propose to add adversarial synth…
7510 nodules and adversarial attack samples to the training data to improve t…
7511 generalization and the robustness of the lung nodule detection systems. …
7512 generate hard examples of nodules from a differentiable nodule synthesiz…
7513 use projected gradient descent (PGD) to search the latent code within a …
7514 neighbourhood that would generate nodules to decrease the detector respo…
7515 make the network more robust to unanticipated noise perturbations, we us…
7516 to search for noise patterns that can trigger the network to give
7517 over-confident mistakes. By evaluating on two different benchmark datase…
7518 containing consensus annotations from three radiologists, we show that t…
7519 proposed techniques can improve the detection performance on real CT dat…
7520 understand the limitations of both the conventional networks and the pro…
7521 augmented networks, we also perform stress-tests on the false positive
7522 reduction networks by feeding different types of artificially produced p…
7523 We show that the augmented networks are more robust to both under-repres…
7524 nodules as well as resistant to noise perturbations.
7525 &lt;/p&gt;
7526 </description>
7527 </item>
7528 <item>
7529 <title>Wide-minima Density Hypothesis and the Explore-Exploit Learning R…
7530 <link>http://fr.arxiv.org/abs/2003.03977</link>
7531 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7532
7533 &lt;p&gt;Several papers argue that wide minima generalize better than na…
7534 In this paper, through detailed experiments that not only corroborate the
7535 generalization properties of wide minima, we also provide empirical evid…
7536 for a new hypothesis that the density of wide minima is likely lower tha…
7537 density of narrow minima. Further, motivated by this hypothesis, we desi…
7538 novel explore-exploit learning rate schedule. On a variety of image and …
7539 language datasets, compared to their original hand-tuned learning rate
7540 baselines, we show that our explore-exploit schedule can result in eithe…
7541 0.84% higher absolute accuracy using the original training budget or up …
7542 reduced training time while achieving the original reported accuracy. For
7543 example, we achieve state-of-the-art (SOTA) accuracy for IWSLT&apos;14 (…
7544 WMT&apos;14 (DE-EN) datasets by just modifying the learning rate schedul…
7545 performing model.
7546 &lt;/p&gt;
7547 </description>
7548 </item>
7549 <item>
7550 <title>Compressive Isogeometric Analysis. (arXiv:2003.06475v2 [math.NA] …
7551 <link>http://fr.arxiv.org/abs/2003.06475</link>
7552 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7553
7554 &lt;p&gt;This work is motivated by the difficulty in assembling the Gale…
7555 when solving Partial Differential Equations (PDEs) with Isogeometric Ana…
7556 (IGA) using B-splines of moderate-to-high polynomial degree. To mitigate…
7557 problem, we propose a novel methodology named CossIGA (COmpreSSive IsoGe…
7558 Analysis), which combines the IGA principle with CORSING, a recently int…
7559 sparse recovery approach for PDEs based on compressive sensing. CossIGA
7560 assembles only a small portion of a suitable IGA Petrov-Galerkin discret…
7561 and is effective whenever the PDE solution is sufficiently sparse or
7562 compressible, i.e., when most of its coefficients are zero or negligible…
7563 sparsity of the solution is promoted by employing a multilevel dictionar…
7564 B-splines as opposed to a basis. Thanks to sparsity and the fact that on…
7565 fraction of the full discretization matrix is assembled, the proposed te…
7566 has the potential to lead to significant computational savings. We show …
7567 effectiveness of CossIGA for the solution of the 2D and 3D Poisson equat…
7568 over nontrivial geometries by means of an extensive numerical investigat…
7569 &lt;/p&gt;
7570 </description>
7571 </item>
7572 <item>
7573 <title>Thermodynamic Cost of Edge Detection in Artificial Neural Network…
7574 <link>http://fr.arxiv.org/abs/2003.08196</link>
7575 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7576
7577 &lt;p&gt;Architecture-based heat dissipation analyses allow us to reveal…
7578 sources of inefficiency in a given processor and thereby provide us with
7579 road-maps to design less dissipative computing schemes independent of
7580 technology-base used to implement them. In this work, we study
7581 architectural-level contributions to energy dissipation in an Artificial…
7582 Network (ANN)-based processor that is trained to perform edge-detection …
7583 We compare the training and information processing cost of ANN to that of
7584 conventional architectures and algorithms using 64-pixel binary image. O…
7585 results reveal the inherent efficiency advantages of an ANN network trai…
7586 specific tasks over general-purpose processors based on von Neumann
7587 architecture. We also compare the proposed performance improvements to t…
7588 Cellular Array Processors (CAPs) and illustrate the reduction in dissipa…
7589 for special purpose processors. Lastly, we calculate the change in dissi…
7590 as a result of input data structure and show the effect of randomness on
7591 energetic cost of information processing. The results we obtained provid…
7592 basis for comparison for task-based fundamental energy efficiency analys…
7593 a range of processors and therefore contribute to the study of
7594 architecture-level descriptions of processors and thermodynamic cost
7595 calculations based on physics of computation.
7596 &lt;/p&gt;
7597 </description>
7598 </item>
7599 <item>
7600 <title>On Calibration of Mixup Training for Deep Neural Networks. (arXiv…
7601 <link>http://fr.arxiv.org/abs/2003.09946</link>
7602 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7603
7604 &lt;p&gt;Deep Neural Networks (DNN) represent the state of the art in ma…
7605 However, due to their overparameterization, their generalization capabil…
7606 are in doubt and still a field under study. Consequently, DNN can overfi…
7607 assign overconfident predictions -- effects that have been shown to affe…
7608 calibration of the confidences assigned to unseen data. Data Augmentatio…
7609 strategies have been proposed to regularize these models, being Mixup on…
7610 the most popular due to its ability to improve the accuracy, the uncerta…
7611 quantification and the calibration of DNN. In this work however we argue…
7612 provide empirical evidence that, due to its fundamentals, Mixup does not
7613 necessarily improve calibration. Based on our observations we propose a …
7614 loss function that improves the calibration, and also sometimes the accu…
7615 of DNN trained with this DA technique. Our loss is inspired by Bayes dec…
7616 theory and introduces a new training framework for designing losses for
7617 probabilistic modelling. We provide state-of-the-art accuracy with consi…
7618 improvements in calibration performance. Appendix and code are provided …
7619 https://github.com/jmaronas/calibration_MixupDNN_ARCLoss.pytorch.git
7620 &lt;/p&gt;
7621 </description>
7622 </item>
7623 <item>
7624 <title>Unique Chinese Linguistic Phenomena. (arXiv:2004.00499v3 [cs.CL] …
7625 <link>http://fr.arxiv.org/abs/2004.00499</link>
7626 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7627
7628 &lt;p&gt;Linguistics holds unique characteristics of generality, stabili…
7629 nationality, which will affect the formulation of extraction strategies …
7630 should be incorporated into the relation extraction. Chinese open relati…
7631 extraction is not well-established, because of the complexity of Chinese
7632 linguistics makes it harder to operate, and the methods for English are …
7633 compatible with that for Chinese. The diversities between Chinese and En…
7634 linguistics are mainly reflected in morphology and syntax.
7635 &lt;/p&gt;
7636 </description>
7637 </item>
7638 <item>
7639 <title>Is Graph Structure Necessary for Multi-hop Question Answering?. (…
7640 <link>http://fr.arxiv.org/abs/2004.03096</link>
7641 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7642
7643 &lt;p&gt;Recently, attempting to model texts as graph structure and intr…
7644 neural networks to deal with it has become a trend in many NLP research …
7645 In this paper, we investigate whether the graph structure is necessary f…
7646 multi-hop question answering. Our analysis is centered on HotpotQA. We
7647 construct a strong baseline model to establish that, with the proper use…
7648 pre-trained models, graph structure may not be necessary for multi-hop q…
7649 answering. We point out that both graph structure and adjacency matrix a…
7650 task-related prior knowledge, and graph-attention can be considered as a
7651 special case of self-attention. Experiments and visualized analysis demo…
7652 that graph-attention or the entire graph structure can be replaced by
7653 self-attention or Transformers.
7654 &lt;/p&gt;
7655 </description>
7656 </item>
7657 <item>
7658 <title>Risk-Constrained Linear-Quadratic Regulators. (arXiv:2004.04685v2…
7659 <link>http://fr.arxiv.org/abs/2004.04685</link>
7660 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7661
7662 &lt;p&gt;We propose a new risk-constrained reformulation of the standard…
7663 Quadratic Regulator (LQR) problem. Our framework is motivated by the fac…
7664 the classical (risk-neutral) LQR controller, although optimal in expecta…
7665 might be ineffective under relatively infrequent, yet statistically sign…
7666 (risky) events. To effectively trade between average and extreme event
7667 performance, we introduce a new risk constraint, which explicitly restri…
7668 total expected predictive variance of the state penalty by a user-prescr…
7669 level. We show that, under rather minimal conditions on the process noise
7670 (i.e., finite fourth-order moments), the optimal risk-aware controller c…
7671 evaluated explicitly and in closed form. In fact, it is affine relative …
7672 state, and is always internally stable regardless of parameter tuning. O…
7673 risk-aware controller: i) pushes the state away from directions where th…
7674 exhibits heavy tails, by exploiting the third-order moment (skewness) of…
7675 noise; ii) inflates the state penalty in riskier directions, where both …
7676 noise covariance and the state penalty are simultaneously large. The pro…
7677 of the proposed risk-aware LQR framework are also illustrated via indica…
7678 numerical examples.
7679 &lt;/p&gt;
7680 </description>
7681 </item>
7682 <item>
7683 <title>Supervised Contrastive Learning. (arXiv:2004.11362v2 [cs.LG] UPDA…
7684 <link>http://fr.arxiv.org/abs/2004.11362</link>
7685 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7686
7687 &lt;p&gt;Contrastive learning applied to self-supervised representation …
7688 seen a resurgence in recent years, leading to state of the art performan…
7689 the unsupervised training of deep image models. Modern batch contrastive
7690 approaches subsume or significantly outperform traditional contrastive l…
7691 such as triplet, max-margin and the N-pairs loss. In this work, we exten…
7692 self-supervised batch contrastive approach to the fully-supervised setti…
7693 allowing us to effectively leverage label information. Clusters of points
7694 belonging to the same class are pulled together in embedding space, while
7695 simultaneously pushing apart clusters of samples from different classes.…
7696 analyze two possible versions of the supervised contrastive (SupCon) los…
7697 identifying the best-performing formulation of the loss. On ResNet-200, …
7698 achieve top-1 accuracy of 81.4% on the ImageNet dataset, which is 0.8% a…
7699 the best number reported for this architecture. We show consistent
7700 outperformance over cross-entropy on other datasets and two ResNet varia…
7701 The loss shows benefits for robustness to natural corruptions and is more
7702 stable to hyperparameter settings such as optimizers and data augmentati…
7703 reduced data settings, it outperforms cross-entropy significantly. Our l…
7704 function is simple to implement, and reference TensorFlow code is releas…
7705 https://t.ly/supcon.
7706 &lt;/p&gt;
7707 </description>
7708 </item>
7709 <item>
7710 <title>An Epidemiological Modelling Approach for Covid19 via Data Assimi…
7711 <link>http://fr.arxiv.org/abs/2004.12130</link>
7712 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7713
7714 &lt;p&gt;The global pandemic of the 2019-nCov requires the evaluation of…
7715 interventions to mitigate future social and economic costs of quarantine
7716 measures worldwide. We propose an epidemiological model for forecasting …
7717 policy evaluation which incorporates new data in real-time through varia…
7718 data assimilation. We analyze and discuss infection rates in China, the …
7719 Italy. In particular, we develop a custom compartmental SIR model fit to
7720 variables related to the epidemic in Chinese cities, named SITR model. We
7721 compare and discuss model results which conducts updates as new observat…
7722 become available. A hybrid data assimilation approach is applied to make
7723 results robust to initial conditions. We use the model to do inference on
7724 infection numbers as well as parameters such as the disease transmissibi…
7725 rate or the rate of recovery. The parameterisation of the model is parsi…
7726 and extendable, allowing for the incorporation of additional data and
7727 parameters of interest. This allows for scalability and the extension of…
7728 model to other locations or the adaption of novel data sources.
7729 &lt;/p&gt;
7730 </description>
7731 </item>
7732 <item>
7733 <title>Holistic Privacy for Electricity, Water, and Natural Gas Metering…
7734 <link>http://fr.arxiv.org/abs/2004.13363</link>
7735 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7736
7737 &lt;p&gt;In smart electricity grids, high time granularity (HTG) power c…
7738 data can be decomposed into individual appliance load signatures via
7739 Nonintrusive Appliance Load Monitoring techniques to expose appliance us…
7740 profiles. Various methods ranging from load shaping to noise addition an…
7741 aggregation have been proposed to mitigate this problem. However, with t…
7742 growing scarcity of natural resources, utilities other than electricity …
7743 as water and natural gas) have also begun to be subject to HTG metering,…
7744 creates privacy issues similar to that of electricity. Therefore, employ…
7745 privacy protection countermeasures for only electricity usage is ineffec…
7746 for appliances that utilize additional/other metered resources. As such,
7747 existing privacy countermeasures and metrics need to be reevaluated to a…
7748 not only electricity, but also any other resource that is metered. Furth…
7749 a holistic privacy protection approach for all metered resources must be
7750 adopted as the information leak from any of the resources has a potentia…
7751 render the privacy preserving countermeasures for all the other resources
7752 futile. This paper introduces the privacy preservation problem for multi…
7753 metered resources and explores potential solutions for its mitigation.
7754 &lt;/p&gt;
7755 </description>
7756 </item>
7757 <item>
7758 <title>Geometric group testing. (arXiv:2004.14632v3 [cs.CG] UPDATED)</ti…
7759 <link>http://fr.arxiv.org/abs/2004.14632</link>
7760 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7761
7762 &lt;p&gt;Group testing is concerned with identifying $t$ defective items…
7763 $m$ items, where each test reports whether a specific subset of items co…
7764 at least one defective. In non-adaptive group testing, the subsets to be…
7765 are fixed in advance. By testing multiple items at once, the required nu…
7766 tests can be made much smaller than $m$. In fact, for $t \in \mathcal{O}…
7767 the optimal number of (non-adaptive) tests is known to be $\Theta(\log{m…
7768 &lt;/p&gt;
7769 &lt;p&gt;In this paper, we consider the problem of non-adaptive group te…
7770 geometric setting, where the items are points in $d$-dimensional Euclide…
7771 space and the tests are axis-parallel boxes (hyperrectangles). We presen…
7772 and lower bounds on the required number of tests under this geometric
7773 constraint. In contrast to the general, combinatorial case, the bounds i…
7774 geometric setting are polynomial in $m$. For instance, our results imply…
7775 identifying a defective pair in a set of $m$ points in the plane always
7776 requires $\Omega(m^{3/5})$ tests, and there exist configurations of $m$ …
7777 for which $\mathcal{O}(m^{2/3})$ tests are sufficient, whereas to identi…
7778 single defective point in the plane, $\Theta(m^{1/2})$ tests are always
7779 necessary and sometimes sufficient.
7780 &lt;/p&gt;
7781 </description>
7782 </item>
7783 <item>
7784 <title>Minimum Cuts in Geometric Intersection Graphs. (arXiv:2005.00858v…
7785 <link>http://fr.arxiv.org/abs/2005.00858</link>
7786 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7787
7788 &lt;p&gt;Let $\mathcal{D}$ be a set of $n$ disks in the plane. The disk …
7789 $G_\mathcal{D}$ for $\mathcal{D}$ is the undirected graph with vertex set
7790 $\mathcal{D}$ in which two disks are joined by an edge if and only if th…
7791 intersect. The directed transmission graph $G^{\rightarrow}_\mathcal{D}$…
7792 $\mathcal{D}$ is the directed graph with vertex set $\mathcal{D}$ in whi…
7793 there is an edge from a disk $D_1 \in \mathcal{D}$ to a disk $D_2 \in
7794 \mathcal{D}$ if and only if $D_1$ contains the center of $D_2$.
7795 &lt;/p&gt;
7796 &lt;p&gt;Given $\mathcal{D}$ and two non-intersecting disks $s, t \in \m…
7797 show that a minimum $s$-$t$ vertex cut in $G_\mathcal{D}$ or in
7798 $G^{\rightarrow}_\mathcal{D}$ can be found in $O(n^{3/2}\text{polylog} n…
7799 expected time. To obtain our result, we combine an algorithm for the max…
7800 flow problem in general graphs with dynamic geometric data structures to
7801 manipulate the disks.
7802 &lt;/p&gt;
7803 &lt;p&gt;As an application, we consider the barrier resilience problem i…
7804 rectangular domain. In this problem, we have a vertical strip $S$ bounde…
7805 two vertical lines, $L_\ell$ and $L_r$, and a collection $\mathcal{D}$ of
7806 disks. Let $a$ be a point in $S$ above all disks of $\mathcal{D}$, and l…
7807 a point in $S$ below all disks of $\mathcal{D}$. The task is to find a c…
7808 from $a$ to $b$ that lies in $S$ and that intersects as few disks of
7809 $\mathcal{D}$ as possible. Using our improved algorithm for minimum cuts…
7810 disk graphs, we can solve the barrier resilience problem in
7811 $O(n^{3/2}\text{polylog} n)$ expected time.
7812 &lt;/p&gt;
7813 </description>
7814 </item>
7815 <item>
7816 <title>Model Creation and Equivalence Proofs of Cellular Automata and Ar…
7817 <link>http://fr.arxiv.org/abs/2005.01192</link>
7818 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7819
7820 &lt;p&gt;Computational methods and mathematical models have invaded argu…
7821 scientific discipline forming its own field of research called computati…
7822 science. Mathematical models are the theoretical foundation of computati…
7823 science. Since Newton&apos;s time, differential equations in mathematica…
7824 have been widely and successfully used to describe the macroscopic or gl…
7825 behaviour of systems. With spatially inhomogeneous, time-varying, local
7826 element-specific, and often non-linear interactions, the dynamics of com…
7827 systems is in contrast more efficiently described by local rules and thu…
7828 algorithmic and local or microscopic manner. The theory of mathematical
7829 modelling taking into account these characteristics of complex systems h…
7830 be established still. We recently presented a so-called allagmatic method
7831 including a system metamodel to provide a framework for describing, mode…
7832 simulating, and interpreting complex systems. Implementations of cellular
7833 automata and artificial neural networks were described and created with …
7834 method. Guidance from philosophy were helpful in these first studies foc…
7835 on programming and feasibility. A rigorous mathematical formalism, howev…
7836 still missing. This would not only more precisely describe and define the
7837 system metamodel, it would also further generalise it and with that exte…
7838 reach to formal treatment in applied mathematics and theoretical aspects…
7839 computational science as well as extend its applicability to other mathe…
7840 and computational models such as agent-based models. Here, a mathematical
7841 definition of the system metamodel is provided. Based on the presented
7842 formalism, model creation and equivalence of cellular automata and artif…
7843 neural networks are proved. It thus provides a formal approach for study…
7844 creation of mathematical models as well as their structural and operatio…
7845 comparison.
7846 &lt;/p&gt;
7847 </description>
7848 </item>
7849 <item>
7850 <title>Analysis of the Symmetric Join the Shortest Orbit Queue. (arXiv:2…
7851 <link>http://fr.arxiv.org/abs/2005.02683</link>
7852 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7853
7854 &lt;p&gt;This work introduces the join the shortest queue policy in the …
7855 setting. We consider a Markovian single server retrial system with two i…
7856 capacity orbits. An arriving job finding the server busy, it is forwarde…
7857 the least loaded orbit. Otherwise, it is forwarded to an orbit randomly.
7858 Orbiting jobs of either type retry to access the server independently. We
7859 investigate the stability condition, the stationary tail decay rate, and…
7860 the equilibrium distribution by using the compensation method.
7861 &lt;/p&gt;
7862 </description>
7863 </item>
7864 <item>
7865 <title>Anonymized GCN: A Novel Robust Graph Embedding Method via Hiding …
7866 <link>http://fr.arxiv.org/abs/2005.03482</link>
7867 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7868
7869 &lt;p&gt;Graph convolution network (GCN) have achieved state-of-the-art …
7870 the task of node prediction in the graph structure. However, with the gr…
7871 various of graph attack methods, there are lack of research on the robus…
7872 of GCN. In this paper, we prove the reason why GCN is vulnerable to atta…
7873 only training another GCN model can find the vulnerability of the target…
7874 model. To solve that, we propose a GCN model which is robust to attacks.…
7875 hiding the node&apos;s position in the Gaussian noise, the attacker will…
7876 to modify the connection information of the graph node, thus immune to t…
7877 attack. Considering attackers usually modify the connection to interfere…
7878 prediction results of the target node, so, by hiding the connection of t…
7879 graph in the noise through adversarial training, accurate node predictio…
7880 be completed only by the node number rather than its specific position i…
7881 graph, thus let the nodes in the graph are no longer related to the graph
7882 itself, that is to say, make the node anonymous. Specifically, we first
7883 demonstrated the key to determine the embedding of a specific node: the …
7884 corresponding to the node of the eigenmatrix of the Laplace matrix, by t…
7885 it as the output of the generator, we take the corresponding noise as in…
7886 The generator will try to find the correct position of the node in the g…
7887 Then the encoder and decoder are spliced both in discriminator, so that …
7888 adversarial training, the generator and discriminator can cooperate to c…
7889 the node prediction. Finally, All node positions can generated by noise …
7890 same time, that is to say, the generator will hides all the connection
7891 information of the graph structure. The evaluation shows that we only ne…
7892 obtain the initial features and node numbers of the nodes to complete th…
7893 prediction, and the accuracy did not decrease, but increased by 0.0293.
7894 &lt;/p&gt;
7895 </description>
7896 </item>
7897 <item>
7898 <title>InterFaceGAN: Interpreting the Disentangled Face Representation L…
7899 <link>http://fr.arxiv.org/abs/2005.09635</link>
7900 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7901
7902 &lt;p&gt;Although Generative Adversarial Networks (GANs) have made signi…
7903 progress in face synthesis, there lacks enough understanding of what GAN…
7904 learned in the latent representation to map a random code to a photo-rea…
7905 image. In this work, we propose a framework called InterFaceGAN to inter…
7906 the disentangled face representation learned by the state-of-the-art GAN…
7907 and study the properties of the facial semantics encoded in the latent s…
7908 We first find that GANs learn various semantics in some linear subspaces…
7909 latent space. After identifying these subspaces, we can realistically
7910 manipulate the corresponding facial attributes without retraining the mo…
7911 then conduct a detailed study on the correlation between different seman…
7912 and manage to better disentangle them via subspace projection, resulting…
7913 more precise control of the attribute manipulation. Besides manipulating…
7914 gender, age, expression, and presence of eyeglasses, we can even alter t…
7915 pose and fix the artifacts accidentally made by GANs. Furthermore, we pe…
7916 an in-depth face identity analysis and a layer-wise analysis to evaluate…
7917 editing results quantitatively. Finally, we apply our approach to real f…
7918 editing by employing GAN inversion approaches and explicitly training
7919 feed-forward models based on the synthetic data established by InterFace…
7920 Extensive experimental results suggest that learning to synthesize faces
7921 spontaneously brings a disentangled and controllable face representation.
7922 &lt;/p&gt;
7923 </description>
7924 </item>
7925 <item>
7926 <title>Stochastic control liasons: Richard Sinkhorn meets Gaspard Monge …
7927 <link>http://fr.arxiv.org/abs/2005.10963</link>
7928 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7929
7930 &lt;p&gt;In 1931/32, Schroedinger studied a hot gas Gedankenexperiment, …
7931 large deviations of the empirical distribution and an early example of t…
7932 so-called maximum entropy inference method. This so-called Schroedinger …
7933 problem (SBP) was recently recognized as a regularization of the
7934 Monge-Kantorovich Optimal Mass Transport (OMT), leading to effective
7935 computation of the latter. Specifically, OMT with quadratic cost may be …
7936 as a zero-temperature limit of SBP, which amounts to minimization of the
7937 Helmholtz&apos;s free energy over probability distributions constrained …
7938 given marginals. The problem features a delicate compromise, mediated by…
7939 temperature parameter, between minimizing the internal energy and maximi…
7940 the entropy. These concepts are central to a rapidly expanding area of m…
7941 science dealing with the so-called {\em Sinkhorn algorithm} which appear…
7942 special case of an algorithm first studied by the French analyst Robert …
7943 in 1938/40 specifically for Schroedinger bridges. Due to the constraint …
7944 end-point distributions, dynamic programming is not a suitable tool to a…
7945 these problems. Instead, Fortet&apos;s iterative algorithm and its discr…
7946 counterpart, the Sinkhorn iteration, permit computation by iteratively s…
7947 the so-called {\em Schroedinger system}. In both the continuous as well …
7948 discrete-time and space settings, {\em stochastic control} provides a
7949 reformulation and dynamic versions of these problems. The formalism behi…
7950 these control problems have attracted attention as they lead to a variet…
7951 new applications in spacecraft guidance, control of robot or biological …
7952 sensing, active cooling, network routing as well as in computer and data
7953 science. This multifacet and versatile framework, intertwining SBP and O…
7954 provides the substrate for a historical and technical overview of the fi…
7955 taken up in this paper.
7956 &lt;/p&gt;
7957 </description>
7958 </item>
7959 <item>
7960 <title>Multivariate Quasi-tight Framelets with High Balancing Orders Der…
7961 <link>http://fr.arxiv.org/abs/2005.12451</link>
7962 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7963
7964 &lt;p&gt;Generalizing wavelets by adding desired redundancy and flexibil…
7965 are of interest and importance in many applications such as image proces…
7966 and numerical algorithms. Several key properties of framelets are high
7967 vanishing moments for sparse multiscale representation, fast framelet
7968 transforms for numerical efficiency, and redundancy for robustness. Howe…
7969 is a challenging problem to study and construct multivariate nonseparable
7970 framelets, mainly due to their intrinsic connections to factorization and
7971 syzygy modules of multivariate polynomial matrices. In this paper, we
7972 circumvent the above difficulties through the approach of quasi-tight
7973 framelets, which behave almost identically to tight framelets. Employing…
7974 popular oblique extension principle (OEP), from an arbitrary compactly
7975 supported $\dm$-refinable vector function $\phi$ with multiplicity great…
7976 one, we prove that we can always derive from $\phi$ a compactly supported
7977 multivariate quasi-tight framelet such that (i) all the framelet generat…
7978 have the highest possible order of vanishing moments;(ii) its associated…
7979 framelet transform is compact with the highest balancing order.For a ref…
7980 scalar function $\phi$, the above item (ii) often cannot be achieved
7981 intrinsically but we show that we can always construct a compactly suppo…
7982 OEP-based multivariate quasi-tight framelet derived from $\phi$ satisfyi…
7983 (i).This paper provides a comprehensive investigation on OEP-based multi…
7984 quasi-tight multiframelets and their associated framelet transforms with…
7985 balancing orders. This deepens our theoretical understanding of multivar…
7986 quasi-tight multiframelets and their associated fast multiframelet trans…
7987 &lt;/p&gt;
7988 </description>
7989 </item>
7990 <item>
7991 <title>Refining Implicit Argument Annotation for UCCA. (arXiv:2005.12889…
7992 <link>http://fr.arxiv.org/abs/2005.12889</link>
7993 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
7994
7995 &lt;p&gt;Predicate-argument structure analysis is a central component in…
7996 representations of text. The fact that some arguments are not explicitly
7997 mentioned in a sentence gives rise to ambiguity in language understandin…
7998 renders it difficult for machines to interpret text correctly. However, …
7999 few resources represent implicit roles for NLU, and existing studies in …
8000 only make coarse distinctions between categories of arguments omitted fr…
8001 linguistic form. This paper proposes a typology for fine-grained implicit
8002 argument annotation on top of Universal Conceptual Cognitive Annotation&…
8003 foundational layer. The proposed implicit argument categorisation is dri…
8004 theories of implicit role interpretation and consists of six types: Deic…
8005 Generic, Genre-based, Type-identifiable, Non-specific, and Iterated-set.…
8006 exemplify our design by revisiting part of the UCCA EWT corpus, providin…
8007 dataset annotated with the refinement layer, and making a comparative an…
8008 with other schemes.
8009 &lt;/p&gt;
8010 </description>
8011 </item>
8012 <item>
8013 <title>An Empirical Study of Bots in Software Development -- Characteris…
8014 <link>http://fr.arxiv.org/abs/2005.13969</link>
8015 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8016
8017 &lt;p&gt;Software engineering bots - automated tools that handle tedious…
8018 increasingly used by industrial and open source projects to improve deve…
8019 productivity. Current research in this area is held back by a lack of co…
8020 of what software engineering bots (DevBots) actually are, what character…
8021 distinguish them from other tools, and what benefits and challenges are
8022 associated with DevBot usage. In this paper we report on a mixed-method
8023 empirical study of DevBot usage in industrial practice. We report on fin…
8024 from interviewing 21 and surveying a total of 111 developers. We identif…
8025 different personas among DevBot users (focusing on autonomy, chat interf…
8026 and &quot;smartness&quot;), each with different definitions of what a De…
8027 developers use them, and what they struggle with. We conclude that future
8028 DevBot research should situate their work within our framework, to clear…
8029 identify what type of bot the work targets, and what advantages practiti…
8030 can expect. Further, we find that there currently is a lack of general p…
8031 &quot;smart&quot; bots that go beyond simple automation tools or chat in…
8032 problematic, as we have seen that such bots, if available, can have a
8033 transformative effect on the projects that use them.
8034 &lt;/p&gt;
8035 </description>
8036 </item>
8037 <item>
8038 <title>Sub-Band Knowledge Distillation Framework for Speech Enhancement.…
8039 <link>http://fr.arxiv.org/abs/2005.14435</link>
8040 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8041
8042 &lt;p&gt;In single-channel speech enhancement, methods based on full-ban…
8043 features have been widely studied. However, only a few methods pay atten…
8044 non-full-band spectral features. In this paper, we explore a knowledge
8045 distillation framework based on sub-band spectral mapping for single-cha…
8046 speech enhancement. Specifically, we divide the full frequency band into
8047 multiple sub-bands and pre-train an elite-level sub-band enhancement mod…
8048 (teacher model) for each sub-band. These teacher models are dedicated to
8049 processing their own sub-bands. Next, under the teacher models&apos; gui…
8050 train a general sub-band enhancement model (student model) that works fo…
8051 sub-bands. Without increasing the number of model parameters and computa…
8052 complexity, the student model&apos;s performance is further improved. To…
8053 our proposed method, we conducted a large number of experiments on an
8054 open-source data set. The final experimental results show that the guida…
8055 from the elite-level teacher models dramatically improves the student mo…
8056 performance, which exceeds the full-band model by employing fewer parame…
8057 &lt;/p&gt;
8058 </description>
8059 </item>
8060 <item>
8061 <title>SNR-Based Teachers-Student Technique for Speech Enhancement. (arX…
8062 <link>http://fr.arxiv.org/abs/2005.14441</link>
8063 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8064
8065 &lt;p&gt;It is very challenging for speech enhancement methods to achiev…
8066 performance under both high signal-to-noise ratio (SNR) and low SNR
8067 simultaneously. In this paper, we propose a method that integrates an SN…
8068 teachers-student technique and time-domain U-Net to deal with this probl…
8069 Specifically, this method consists of multiple teacher models and a stud…
8070 model. We first train the teacher models under multiple small-range SNRs…
8071 do not coincide with each other so that they can perform speech enhancem…
8072 well within the specific SNR range. Then, we choose different teacher mo…
8073 supervise the training of the student model according to the SNR of the
8074 training data. Eventually, the student model can perform speech enhancem…
8075 under both high SNR and low SNR. To evaluate the proposed method, we
8076 constructed a dataset with an SNR ranging from -20dB to 20dB based on the
8077 public dataset. We experimentally analyzed the effectiveness of the SNR-…
8078 teachers-student technique and compared the proposed method with several
8079 state-of-the-art methods.
8080 &lt;/p&gt;
8081 </description>
8082 </item>
8083 <item>
8084 <title>A mathematical model for automatic differentiation in machine lea…
8085 <link>http://fr.arxiv.org/abs/2006.02080</link>
8086 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8087
8088 &lt;p&gt;Automatic differentiation, as implemented today, does not have …
8089 mathematical model adapted to the needs of modern machine learning. In t…
8090 work we articulate the relationships between differentiation of programs…
8091 implemented in practice and differentiation of nonsmooth functions. To t…
8092 we provide a simple class of functions, a nonsmooth calculus, and show h…
8093 apply to stochastic approximation methods. We also evidence the issue of
8094 artificial critical points created by algorithmic differentiation and sh…
8095 usual methods avoid these points with probability one.
8096 &lt;/p&gt;
8097 </description>
8098 </item>
8099 <item>
8100 <title>Convolutional Neural Networks for Global Human Settlements Mappin…
8101 <link>http://fr.arxiv.org/abs/2006.03267</link>
8102 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8103
8104 &lt;p&gt;Spatially consistent and up-to-date maps of human settlements a…
8105 addressing policies related to urbanization and sustainability, especial…
8106 the era of an increasingly urbanized world.The availability of open and …
8107 Sentinel-2 data of the Copernicus Earth Observation program offers a new
8108 opportunity for wall-to-wall mapping of human settlements at a global
8109 scale.This paper presents a deep-learning-based framework for a fully au…
8110 extraction of built-up areas at a spatial resolution of 10 m from a glob…
8111 composite of Sentinel-2 imagery.A multi-neuro modeling methodology build…
8112 a simple Convolution Neural Networks architecture for pixel-wise image
8113 classification of built-up areas is developed.The core features of the p…
8114 model are the image patch of size 5 x 5 pixels adequate for describing b…
8115 areas from Sentinel-2 imagery and the lightweight topology with a total …
8116 of 1,448,578 trainable parameters and 4 2D convolutional layers and 2 fl…
8117 layers.The deployment of the model on the global Sentinel-2 image compos…
8118 provides the most detailed and complete map reporting about built-up are…
8119 reference year 2018. The validation of the results with an independent
8120 reference data-set of building footprints covering 277 sites across the …
8121 establishes the reliability of the built-up layer produced by the propos…
8122 framework and the model robustness.
8123 &lt;/p&gt;
8124 </description>
8125 </item>
8126 <item>
8127 <title>3D Self-Supervised Methods for Medical Imaging. (arXiv:2006.03829…
8128 <link>http://fr.arxiv.org/abs/2006.03829</link>
8129 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8130
8131 &lt;p&gt;Self-supervised learning methods have witnessed a recent surge …
8132 after proving successful in multiple application fields. In this work, we
8133 leverage these techniques, and we propose 3D versions for five different
8134 self-supervised methods, in the form of proxy tasks. Our methods facilit…
8135 neural network feature learning from unlabeled 3D images, aiming to redu…
8136 required cost for expert annotation. The developed algorithms are 3D
8137 Contrastive Predictive Coding, 3D Rotation prediction, 3D Jigsaw puzzles,
8138 Relative 3D patch location, and 3D Exemplar networks. Our experiments sh…
8139 pretraining models with our 3D tasks yields more powerful semantic
8140 representations, and enables solving downstream tasks more accurately and
8141 efficiently, compared to training the models from scratch and to pretrai…
8142 them on 2D slices. We demonstrate the effectiveness of our methods on th…
8143 downstream tasks from the medical imaging domain: i) Brain Tumor Segment…
8144 from 3D MRI, ii) Pancreas Tumor Segmentation from 3D CT, and iii) Diabet…
8145 Retinopathy Detection from 2D Fundus images. In each task, we assess the…
8146 in data-efficiency, performance, and speed of convergence. Interestingly…
8147 also find gains when transferring the learned representations, by our me…
8148 from a large unlabeled 3D corpus to a small downstream-specific dataset.…
8149 achieve results competitive to state-of-the-art solutions at a fraction …
8150 computational expense. We publish our implementations for the developed
8151 algorithms (both 3D and 2D versions) as an open-source library, in an ef…
8152 allow other researchers to apply and extend our methods on their dataset…
8153 &lt;/p&gt;
8154 </description>
8155 </item>
8156 <item>
8157 <title>Truthful Data Acquisition via Peer Prediction. (arXiv:2006.03992v…
8158 <link>http://fr.arxiv.org/abs/2006.03992</link>
8159 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8160
8161 &lt;p&gt;We consider the problem of purchasing data for machine learning…
8162 statistical estimation. The data analyst has a budget to purchase datase…
8163 multiple data providers. She does not have any test data that can be use…
8164 evaluate the collected data and can assign payments to data providers so…
8165 based on the collected datasets. We consider the problem in the standard
8166 Bayesian paradigm and in two settings: (1) data are only collected once;…
8167 data are collected repeatedly and each day&apos;s data are drawn indepen…
8168 the same distribution. For both settings, our mechanisms guarantee that
8169 truthfully reporting one&apos;s dataset is always an equilibrium by adop…
8170 techniques from peer prediction: pay each provider the mutual information
8171 between his reported data and other providers&apos; reported data. Depen…
8172 data distribution, the mechanisms can also discourage misreports that wo…
8173 lead to inaccurate predictions. Our mechanisms also guarantee individual
8174 rationality and budget feasibility for certain underlying distributions …
8175 first setting and for all distributions in the second setting.
8176 &lt;/p&gt;
8177 </description>
8178 </item>
8179 <item>
8180 <title>Self-consumption for energy communities in Spain: a regional anal…
8181 <link>http://fr.arxiv.org/abs/2006.06459</link>
8182 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8183
8184 &lt;p&gt;European climate polices acknowledge the role that energy commu…
8185 play in the energy transition. Self-consumption installations shared amo…
8186 those living in the same building are a good example of such energy
8187 communities. In this work, we perform a regional analysis of optimal
8188 self-consumption installations under the new legal framework recently pa…
8189 Spain. Results show that the optimal sizing of the installation leads to
8190 economic savings for self-consumers in all the territory, for both optio…
8191 and without remuneration for energy surplus. A sensitivity analysis on
8192 technology costs revealed that batteries still require noticeably cost
8193 reductions to be cost-effective in a behind the meter self-consumption
8194 environment. In addition, solar compensation mechanisms make batteries l…
8195 attractive in a scenario of low PV costs, since feeding PV surplus into …
8196 grid, yet less efficient, becomes more cost-effective. An improvement fo…
8197 current energy surplus remuneration policy was proposed and analysed. It
8198 consists in the inclusion of the economic value of the avoided power los…
8199 the remuneration.
8200 &lt;/p&gt;
8201 </description>
8202 </item>
8203 <item>
8204 <title>Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-G…
8205 <link>http://fr.arxiv.org/abs/2006.06648</link>
8206 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8207
8208 &lt;p&gt;Many practical graph problems, such as knowledge graph construc…
8209 drug-drug interaction prediction, require to handle multi-relational gra…
8210 However, handling real-world multi-relational graphs with Graph Neural N…
8211 (GNNs) is often challenging due to their evolving nature, as new entities
8212 (nodes) can emerge over time. Moreover, newly emerged entities often hav…
8213 links, which makes the learning even more difficult. Motivated by this
8214 challenge, we introduce a realistic problem of few-shot out-of-graph link
8215 prediction, where we not only predict the links between the seen and uns…
8216 nodes as in a conventional out-of-knowledge link prediction task but also
8217 between the unseen nodes, with only few edges per node. We tackle this p…
8218 with a novel transductive meta-learning framework which we refer to as G…
8219 Extrapolation Networks (GEN). GEN meta-learns both the node embedding ne…
8220 for inductive inference (seen-to-unseen) and the link prediction network…
8221 transductive inference (unseen-to-unseen). For transductive link predict…
8222 further propose a stochastic embedding layer to model uncertainty in the…
8223 prediction between unseen entities. We validate our model on multiple be…
8224 datasets for knowledge graph completion and drug-drug interaction predic…
8225 The results show that our model significantly outperforms relevant basel…
8226 for out-of-graph link prediction tasks.
8227 &lt;/p&gt;
8228 </description>
8229 </item>
8230 <item>
8231 <title>Frontiers in Mortar Methods for Isogeometric Analysis. (arXiv:200…
8232 <link>http://fr.arxiv.org/abs/2006.06677</link>
8233 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8234
8235 &lt;p&gt;Complex geometries as common in industrial applications consist…
8236 patches, if spline based parametrizations are used. The requirements for…
8237 generation of analysis-suitable models are increasing dramatically since
8238 isogeometric analysis is directly based on the spline parametrization and
8239 nowadays used for the calculation of higher-order partial differential
8240 equations. The computational, or more general, the engineering analysis
8241 necessitates suitable coupling techniques between the different patches.…
8242 methods have been successfully applied for coupling of patches and for c…
8243 mechanics in recent years to resolve the arising issues within the inter…
8244 We present here current achievements in the design of mortar technologie…
8245 isogeometric analysis within the Priority Program SPP 1748, Reliable Sim…
8246 Techniques in Solid Mechanics. Development of Non-standard Discretisation
8247 Methods, Mechanical and Mathematical Analysis.
8248 &lt;/p&gt;
8249 </description>
8250 </item>
8251 <item>
8252 <title>Sparse and Continuous Attention Mechanisms. (arXiv:2006.07214v3 […
8253 <link>http://fr.arxiv.org/abs/2006.07214</link>
8254 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8255
8256 &lt;p&gt;Exponential families are widely used in machine learning; they …
8257 distributions in continuous and discrete domains (e.g., Gaussian, Dirich…
8258 Poisson, and categorical distributions via the softmax transformation).
8259 Distributions in each of these families have fixed support. In contrast,…
8260 finite domains, there has been recent work on sparse alternatives to sof…
8261 (e.g. sparsemax and alpha-entmax), which have varying support, being abl…
8262 assign zero probability to irrelevant categories. This paper expands tha…
8263 in two directions: first, we extend alpha-entmax to continuous domains,
8264 revealing a link with Tsallis statistics and deformed exponential famili…
8265 Second, we introduce continuous-domain attention mechanisms, deriving ef…
8266 gradient backpropagation algorithms for alpha in {1,2}. Experiments on
8267 attention-based text classification, machine translation, and visual que…
8268 answering illustrate the use of continuous attention in 1D and 2D, showi…
8269 it allows attending to time intervals and compact regions.
8270 &lt;/p&gt;
8271 </description>
8272 </item>
8273 <item>
8274 <title>Neural Estimators for Conditional Mutual Information Using Neares…
8275 <link>http://fr.arxiv.org/abs/2006.07225</link>
8276 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8277
8278 &lt;p&gt;The estimation of mutual information (MI) or conditional mutual…
8279 (CMI) from a set of samples is a long-standing problem. A recent line of…
8280 in this area has leveraged the approximation power of artificial neural
8281 networks and has shown improvements over conventional methods. One impor…
8282 challenge in this new approach is the need to obtain, given the original
8283 dataset, a different set where the samples are distributed according to a
8284 specific product density function. This is particularly challenging when
8285 estimating CMI.
8286 &lt;/p&gt;
8287 &lt;p&gt;In this paper, we introduce a new technique, based on k nearest…
8288 (k-NN), to perform the resampling and derive high-confidence concentrati…
8289 bounds for the sample average. Then the technique is employed to train a…
8290 network classifier and the CMI is estimated accordingly. We propose three
8291 estimators using this technique and prove their consistency, make a comp…
8292 between them and similar approaches in the literature, and experimentall…
8293 improvements in estimating the CMI in terms of accuracy and variance of …
8294 estimators.
8295 &lt;/p&gt;
8296 </description>
8297 </item>
8298 <item>
8299 <title>Learning Latent Space Energy-Based Prior Model. (arXiv:2006.08205…
8300 <link>http://fr.arxiv.org/abs/2006.08205</link>
8301 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8302
8303 &lt;p&gt;We propose to learn energy-based model (EBM) in the latent spac…
8304 generator model, so that the EBM serves as a prior model that stands on …
8305 top-down network of the generator model. Both the latent space EBM and t…
8306 top-down network can be learned jointly by maximum likelihood, which inv…
8307 short-run MCMC sampling from both the prior and posterior distributions …
8308 latent vector. Due to the low dimensionality of the latent space and the
8309 expressiveness of the top-down network, a simple EBM in latent space can
8310 capture regularities in the data effectively, and MCMC sampling in laten…
8311 is efficient and mixes well. We show that the learned model exhibits str…
8312 performances in terms of image and text generation and anomaly detection…
8313 one-page code can be found in supplementary materials.
8314 &lt;/p&gt;
8315 </description>
8316 </item>
8317 <item>
8318 <title>Iterative regularization for convex regularizers. (arXiv:2006.098…
8319 <link>http://fr.arxiv.org/abs/2006.09859</link>
8320 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8321
8322 &lt;p&gt;We study iterative regularization for linear models, when the b…
8323 but not necessarily strongly convex. We characterize the stability prope…
8324 of a primal-dual gradient based approach, analyzing its convergence in t…
8325 presence of worst case deterministic noise. As a main example, we specia…
8326 and illustrate the results for the problem of robust sparse recovery. Ke…
8327 our analysis is a combination of ideas from regularization theory and
8328 optimization in the presence of errors. Theoretical results are compleme…
8329 experiments showing that state-of-the-art performances can be achieved w…
8330 considerable computational speed-ups.
8331 &lt;/p&gt;
8332 </description>
8333 </item>
8334 <item>
8335 <title>Socially Fair k-Means Clustering. (arXiv:2006.10085v2 [cs.LG] UPD…
8336 <link>http://fr.arxiv.org/abs/2006.10085</link>
8337 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8338
8339 &lt;p&gt;We show that the popular k-means clustering algorithm (Lloyd&ap…
8340 used for a variety of scientific data, can result in outcomes that are
8341 unfavorable to subgroups of data (e.g., demographic groups). Such biased
8342 clusterings can have deleterious implications for human-centric applicat…
8343 such as resource allocation. We present a fair k-means objective and alg…
8344 to choose cluster centers that provide equitable costs for different gro…
8345 The algorithm, Fair-Lloyd, is a modification of Lloyd&apos;s heuristic f…
8346 inheriting its simplicity, efficiency, and stability. In comparison with
8347 standard Lloyd&apos;s, we find that on benchmark datasets, Fair-Lloyd ex…
8348 unbiased performance by ensuring that all groups have equal costs in the…
8349 k-clustering, while incurring a negligible increase in running time, thus
8350 making it a viable fair option wherever k-means is currently used.
8351 &lt;/p&gt;
8352 </description>
8353 </item>
8354 <item>
8355 <title>Neutralizing Self-Selection Bias in Sampling for Sortition. (arXi…
8356 <link>http://fr.arxiv.org/abs/2006.10498</link>
8357 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8358
8359 &lt;p&gt;Sortition is a political system in which decisions are made by …
8360 randomly selected citizens. The process for selecting a sortition panel …
8361 traditionally thought of as uniform sampling without replacement, which …
8362 strong fairness properties. In practice, however, sampling without repla…
8363 is not possible since only a fraction of agents is willing to participat…
8364 panel when invited, and different demographic groups participate at diff…
8365 rates. In order to still produce panels whose composition resembles that…
8366 population, we develop a sampling algorithm that restores close-to-equal
8367 representation probabilities for all agents while satisfying meaningful
8368 demographic quotas. As part of its input, our algorithm requires probabi…
8369 indicating how likely each volunteer in the pool was to participate. Sin…
8370 these participation probabilities are not directly observable, we show h…
8371 learn them, and demonstrate our approach using data on a real sortition …
8372 combined with information on the general population in the form of publi…
8373 available survey data.
8374 &lt;/p&gt;
8375 </description>
8376 </item>
8377 <item>
8378 <title>ContraGAN: Contrastive Learning for Conditional Image Generation.…
8379 <link>http://fr.arxiv.org/abs/2006.12681</link>
8380 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8381
8382 &lt;p&gt;Conditional image generation is the task of generating diverse …
8383 class label information. Although many conditional Generative Adversarial
8384 Networks (GAN) have shown realistic results, such methods consider pairw…
8385 relations between the embedding of an image and the embedding of the
8386 corresponding label (data-to-class relations) as the conditioning losses…
8387 this paper, we propose ContraGAN that considers relations between multip…
8388 image embeddings in the same batch (data-to-data relations) as well as t…
8389 data-to-class relations by using a conditional contrastive loss. The
8390 discriminator of ContraGAN discriminates the authenticity of given sampl…
8391 minimizes a contrastive objective to learn the relations between training
8392 images. Simultaneously, the generator tries to generate realistic images…
8393 deceive the authenticity and have a low contrastive loss. The experiment…
8394 results show that ContraGAN outperforms state-of-the-art-models by 7.3% …
8395 7.7% on Tiny ImageNet and ImageNet datasets, respectively. Besides, we
8396 experimentally demonstrate that ContraGAN helps to relieve the overfitti…
8397 the discriminator. For a fair comparison, we re-implement twelve
8398 state-of-the-art GANs using the PyTorch library. The software package is
8399 available at https://github.com/POSTECH-CVLab/PyTorch-StudioGAN.
8400 &lt;/p&gt;
8401 </description>
8402 </item>
8403 <item>
8404 <title>Adversarial Soft Advantage Fitting: Imitation Learning without Po…
8405 <link>http://fr.arxiv.org/abs/2006.13258</link>
8406 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8407
8408 &lt;p&gt;Adversarial Imitation Learning alternates between learning a di…
8409 which tells apart expert&apos;s demonstrations from generated ones -- an…
8410 generator&apos;s policy to produce trajectories that can fool this discr…
8411 This alternated optimization is known to be delicate in practice since it
8412 compounds unstable adversarial training with brittle and sample-ineffici…
8413 reinforcement learning. We propose to remove the burden of the policy
8414 optimization steps by leveraging a novel discriminator formulation.
8415 Specifically, our discriminator is explicitly conditioned on two policie…
8416 one from the previous generator&apos;s iteration and a learnable policy.…
8417 optimized, this discriminator directly learns the optimal generator&apos…
8418 Consequently, our discriminator&apos;s update solves the generator&apos;…
8419 problem for free: learning a policy that imitates the expert does not re…
8420 an additional optimization loop. This formulation effectively cuts by ha…
8421 implementation and computational burden of Adversarial Imitation Learning
8422 algorithms by removing the Reinforcement Learning phase altogether. We s…
8423 a variety of tasks that our simpler approach is competitive to prevalent
8424 Imitation Learning methods.
8425 &lt;/p&gt;
8426 </description>
8427 </item>
8428 <item>
8429 <title>Relative Deviation Margin Bounds. (arXiv:2006.14950v2 [cs.LG] UPD…
8430 <link>http://fr.arxiv.org/abs/2006.14950</link>
8431 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8432
8433 &lt;p&gt;We present a series of new and more favorable margin-based lear…
8434 guarantees that depend on the empirical margin loss of a predictor. We g…
8435 types of learning bounds, both distribution-dependent and valid for gene…
8436 families, in terms of the Rademacher complexity or the empirical $\ell_\…
8437 covering number of the hypothesis set used. Furthermore, using our relat…
8438 deviation margin bounds, we derive distribution-dependent generalization…
8439 for unbounded loss functions under the assumption of a finite moment. We…
8440 briefly highlight several applications of these bounds and discuss their
8441 connection with existing results.
8442 &lt;/p&gt;
8443 </description>
8444 </item>
8445 <item>
8446 <title>Weighted hypersoft configuration model. (arXiv:2007.00124v2 [phys…
8447 <link>http://fr.arxiv.org/abs/2007.00124</link>
8448 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8449
8450 &lt;p&gt;Maximum entropy null models of networks come in different flavo…
8451 on the type of constraints under which entropy is maximized. If the cons…
8452 are on degree sequences or distributions, we are dealing with configurat…
8453 models. If the degree sequence is constrained exactly, the corresponding
8454 microcanonical ensemble of random graphs with a given degree sequence is…
8455 configuration model per se. If the degree sequence is constrained only on
8456 average, the corresponding grand-canonical ensemble of random graphs wit…
8457 given expected degree sequence is the soft configuration model. If the d…
8458 sequence is not fixed at all but randomly drawn from a fixed distributio…
8459 corresponding hypercanonical ensemble of random graphs with a given degr…
8460 distribution is the hypersoft configuration model, a more adequate descr…
8461 of dynamic real-world networks in which degree sequences are never fixed…
8462 degree distributions often stay stable. Here, we introduce the hypersoft
8463 configuration model of weighted networks. The main contribution is a par…
8464 version of the model with power-law degree and strength distributions, a…
8465 superlinear scaling of strengths with degrees, mimicking the properties …
8466 real-world networks. As a byproduct, we generalize the notions of sparse
8467 graphons and their entropy to weighted networks.
8468 &lt;/p&gt;
8469 </description>
8470 </item>
8471 <item>
8472 <title>Robustness against Relational Adversary. (arXiv:2007.00772v2 [cs.…
8473 <link>http://fr.arxiv.org/abs/2007.00772</link>
8474 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8475
8476 &lt;p&gt;Test-time adversarial attacks have posed serious challenges to …
8477 of machine-learning models, and in many settings the adversarial perturb…
8478 need not be bounded by small $\ell_p$-norms. Motivated by the
8479 semantics-preserving attacks in vision and security domain, we investiga…
8480 $\textit{relational adversaries}$, a broad class of attackers who create
8481 adversarial examples that are in a reflexive-transitive closure of a log…
8482 relation. We analyze the conditions for robustness and propose
8483 $\textit{normalize-and-predict}$ -- a learning framework with provable
8484 robustness guarantee. We compare our approach with adversarial training …
8485 derive an unified framework that provides benefits of both approaches. G…
8486 by our theoretical findings, we apply our framework to image classificat…
8487 malware detection. Results of both tasks show that attacks using relatio…
8488 adversaries frequently fool existing models, but our unified framework c…
8489 significantly enhance their robustness.
8490 &lt;/p&gt;
8491 </description>
8492 </item>
8493 <item>
8494 <title>Information Theoretic Lower Bounds for Feed-Forward Fully-Connect…
8495 <link>http://fr.arxiv.org/abs/2007.00796</link>
8496 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8497
8498 &lt;p&gt;In this paper, we study the sample complexity lower bounds for …
8499 recovery of parameters and for a positive excess risk of a feed-forward,
8500 fully-connected neural network for binary classification, using
8501 information-theoretic tools. We prove these lower bounds by the existenc…
8502 generative network characterized by a backwards data generating process,…
8503 the input is generated based on the binary output, and the network is
8504 parametrized by weight parameters for the hidden layers. The sample comp…
8505 lower bound for the exact recovery of parameters is $\Omega(d r \log(r) …
8506 and for a positive excess risk is $\Omega(r \log(r) + p )$, where $p$ is…
8507 dimension of the input, $r$ reflects the rank of the weight matrices and…
8508 the number of hidden layers. To the best of our knowledge, our results a…
8509 first information theoretic lower bounds.
8510 &lt;/p&gt;
8511 </description>
8512 </item>
8513 <item>
8514 <title>Not All Unlabeled Data are Equal: Learning to Weight Data in Semi…
8515 <link>http://fr.arxiv.org/abs/2007.01293</link>
8516 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8517
8518 &lt;p&gt;Existing semi-supervised learning (SSL) algorithms use a single…
8519 balance the loss of labeled and unlabeled examples, i.e., all unlabeled
8520 examples are equally weighted. But not all unlabeled data are equal. In …
8521 paper we study how to use a different weight for every unlabeled example.
8522 Manual tuning of all those weights -- as done in prior work -- is no lon…
8523 possible. Instead, we adjust those weights via an algorithm based on the
8524 influence function, a measure of a model&apos;s dependency on one traini…
8525 To make the approach efficient, we propose a fast and effective approxim…
8526 of the influence function. We demonstrate that this technique outperforms
8527 state-of-the-art methods on semi-supervised image and language classific…
8528 tasks.
8529 &lt;/p&gt;
8530 </description>
8531 </item>
8532 <item>
8533 <title>A Framework for Modelling, Verification and Transformation of Con…
8534 <link>http://fr.arxiv.org/abs/2007.02261</link>
8535 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8536
8537 &lt;p&gt;The paper gives a comprehensive presentation of a framework, em…
8538 the simply typed higher-order logic, and aimed at providing a sound assi…
8539 in formal reasoning about models of imperative programs with interleaved
8540 computations. As a case study, a model of the Peterson&apos;s mutual exc…
8541 algorithm will be scrutinised in the course of the paper illustrating
8542 applicability of the framework.
8543 &lt;/p&gt;
8544 </description>
8545 </item>
8546 <item>
8547 <title>Self-Supervised Graph Transformer on Large-Scale Molecular Data. …
8548 <link>http://fr.arxiv.org/abs/2007.02835</link>
8549 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8550
8551 &lt;p&gt;How to obtain informative representations of molecules is a cru…
8552 prerequisite in AI-driven drug design and discovery. Recent researches a…
8553 molecules as graphs and employ Graph Neural Networks (GNNs) for molecular
8554 representation learning. Nevertheless, two issues impede the usage of GN…
8555 real scenarios: (1) insufficient labeled molecules for supervised traini…
8556 poor generalization capability to new-synthesized molecules. To address …
8557 both, we propose a novel framework, GROVER, which stands for Graph
8558 Representation frOm self-superVised mEssage passing tRansformer. With ca…
8559 designed self-supervised tasks in node-, edge- and graph-level, GROVER c…
8560 learn rich structural and semantic information of molecules from enormous
8561 unlabelled molecular data. Rather, to encode such complex information, G…
8562 integrates Message Passing Networks into the Transformer-style architect…
8563 deliver a class of more expressive encoders of molecules. The flexibilit…
8564 GROVER allows it to be trained efficiently on large-scale molecular data…
8565 without requiring any supervision, thus being immunized to the two issues
8566 mentioned above. We pre-train GROVER with 100 million parameters on 10 m…
8567 unlabelled molecules -- the biggest GNN and the largest training dataset…
8568 molecular representation learning. We then leverage the pre-trained GROV…
8569 molecular property prediction followed by task-specific fine-tuning, whe…
8570 observe a huge improvement (more than 6% on average) from current
8571 state-of-the-art methods on 11 challenging benchmarks. The insights we g…
8572 are that well-designed self-supervision losses and largely-expressive
8573 pre-trained models enjoy the significant potential on performance boosti…
8574 &lt;/p&gt;
8575 </description>
8576 </item>
8577 <item>
8578 <title>BoxE: A Box Embedding Model for Knowledge Base Completion. (arXiv…
8579 <link>http://fr.arxiv.org/abs/2007.06267</link>
8580 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8581
8582 &lt;p&gt;Knowledge base completion (KBC) aims to automatically infer mis…
8583 exploiting information already present in a knowledge base (KB). A promi…
8584 approach for KBC is to embed knowledge into latent spaces and make predi…
8585 from learned embeddings. However, existing embedding models are subject …
8586 least one of the following limitations: (1) theoretical inexpressivity, …
8587 lack of support for prominent inference patterns (e.g., hierarchies), (3…
8588 of support for KBC over higher-arity relations, and (4) lack of support …
8589 incorporating logical rules. Here, we propose a spatio-translational emb…
8590 model, called BoxE, that simultaneously addresses all these limitations.…
8591 embeds entities as points, and relations as a set of hyper-rectangles (or
8592 boxes), which spatially characterize basic logical properties. This seem…
8593 simple abstraction yields a fully expressive model offering a natural en…
8594 for many desired logical properties. BoxE can both capture and inject ru…
8595 from rich classes of rule languages, going well beyond individual infere…
8596 patterns. By design, BoxE naturally applies to higher-arity KBs. We cond…
8597 detailed experimental analysis, and show that BoxE achieves state-of-the…
8598 performance, both on benchmark knowledge graphs and on more general KBs,…
8599 empirically show the power of integrating logical rules.
8600 &lt;/p&gt;
8601 </description>
8602 </item>
8603 <item>
8604 <title>RATT: Recurrent Attention to Transient Tasks for Continual Image …
8605 <link>http://fr.arxiv.org/abs/2007.06271</link>
8606 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8607
8608 &lt;p&gt;Research on continual learning has led to a variety of approach…
8609 mitigating catastrophic forgetting in feed-forward classification networ…
8610 Until now surprisingly little attention has been focused on continual le…
8611 of recurrent models applied to problems like image captioning. In this p…
8612 take a systematic look at continual learning of LSTM-based models for im…
8613 captioning. We propose an attention-based approach that explicitly accom…
8614 the transient nature of vocabularies in continual image captioning tasks…
8615 i.e. that task vocabularies are not disjoint. We call our method Recurre…
8616 Attention to Transient Tasks (RATT), and also show how to adapt continual
8617 learning approaches based on weight egularization and knowledge distilla…
8618 recurrent continual learning problems. We apply our approaches to increm…
8619 image captioning problem on two new continual learning benchmarks we def…
8620 using the MS-COCO and Flickr30 datasets. Our results demonstrate that RA…
8621 able to sequentially learn five captioning tasks while incurring no forg…
8622 of previously learned ones.
8623 &lt;/p&gt;
8624 </description>
8625 </item>
8626 <item>
8627 <title>Graph Neural Networks for Scalable Radio Resource Management: Arc…
8628 <link>http://fr.arxiv.org/abs/2007.07632</link>
8629 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8630
8631 &lt;p&gt;Deep learning has recently emerged as a disruptive technology t…
8632 challenging radio resource management problems in wireless networks. How…
8633 the neural network architectures adopted by existing works suffer from p…
8634 scalability, generalization, and lack of interpretability. A long-standi…
8635 approach to improve scalability and generalization is to incorporate the
8636 structures of the target task into the neural network architecture. In t…
8637 paper, we propose to apply graph neural networks (GNNs) to solve large-s…
8638 radio resource management problems, supported by effective neural network
8639 architecture design and theoretical analysis. Specifically, we first
8640 demonstrate that radio resource management problems can be formulated as…
8641 optimization problems that enjoy a universal permutation equivariance pr…
8642 We then identify a class of neural networks, named \emph{message passing…
8643 neural networks} (MPGNNs). It is demonstrated that they not only satisfy…
8644 permutation equivariance property, but also can generalize to large-scale
8645 problems while enjoying a high computational efficiency. For interpretab…
8646 and theoretical guarantees, we prove the equivalence between MPGNNs and …
8647 of distributed optimization algorithms, which is then used to analyze the
8648 performance and generalization of MPGNN-based methods. Extensive simulat…
8649 with power control and beamforming as two examples, will demonstrate tha…
8650 proposed method, trained in an unsupervised manner with unlabeled sample…
8651 matches or even outperforms classic optimization-based algorithms without
8652 domain-specific knowledge. Remarkably, the proposed method is highly sca…
8653 and can solve the beamforming problem in an interference channel with $1…
8654 transceiver pairs within $6$ milliseconds on a single GPU.
8655 &lt;/p&gt;
8656 </description>
8657 </item>
8658 <item>
8659 <title>Temporal Pointwise Convolutional Networks for Length of Stay Pred…
8660 <link>http://fr.arxiv.org/abs/2007.09483</link>
8661 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8662
8663 &lt;p&gt;The pressure of ever-increasing patient demand and budget restr…
8664 hospital bed management a daily challenge for clinical staff. Most criti…
8665 the efficient allocation of resource-heavy Intensive Care Unit (ICU) bed…
8666 the patients who need life support. Central to solving this problem is k…
8667 for how long the current set of ICU patients are likely to stay in the u…
8668 this work, we propose a new deep learning model based on the combination…
8669 temporal convolution and pointwise (1x1) convolution, to solve the lengt…
8670 stay prediction task on the eICU critical care dataset. The model - whic…
8671 refer to as Temporal Pointwise Convolution (TPC) - is specifically desig…
8672 mitigate for common challenges with Electronic Health Records, such as
8673 skewness, irregular sampling and missing data. In doing so, we have achi…
8674 significant performance benefits of 18-51% (metric dependent) over the c…
8675 used Long-Short Term Memory (LSTM) network, and the multi-head self-atte…
8676 network known as the Transformer.
8677 &lt;/p&gt;
8678 </description>
8679 </item>
8680 <item>
8681 <title>CovidDeep: SARS-CoV-2/COVID-19 Test Based on Wearable Medical Sen…
8682 <link>http://fr.arxiv.org/abs/2007.10497</link>
8683 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8684
8685 &lt;p&gt;The novel coronavirus (SARS-CoV-2) has led to a pandemic. The c…
8686 regime based on Reverse Transcription-Polymerase Chain Reaction for SARS…
8687 has been unable to keep up with testing demands, and also suffers from a
8688 relatively low positive detection rate in the early stages of the result…
8689 COVID-19 disease. Hence, there is a need for an alternative approach for
8690 repeated large-scale testing of SARS-CoV-2/COVID-19. We propose a framew…
8691 called CovidDeep that combines efficient DNNs with commercially availabl…
8692 for pervasive testing of the virus. We collected data from 87 individual…
8693 spanning three cohorts including healthy, asymptomatic, and symptomatic
8694 patients. We trained DNNs on various subsets of the features automatical…
8695 extracted from six WMS and questionnaire categories to perform ablation …
8696 to determine which subsets are most efficacious in terms of test accurac…
8697 three-way classification. The highest test accuracy obtained was 98.1%. …
8698 augmented the real training dataset with a synthetic training dataset dr…
8699 from the same probability distribution to impose a prior on DNN weights …
8700 leveraged a grow-and-prune synthesis paradigm to learn both DNN architec…
8701 and weights. This boosted the accuracy of the various DNNs further and
8702 simultaneously reduced their size and floating-point operations.
8703 &lt;/p&gt;
8704 </description>
8705 </item>
8706 <item>
8707 <title>The Complete Lasso Tradeoff Diagram. (arXiv:2007.11078v4 [math.ST…
8708 <link>http://fr.arxiv.org/abs/2007.11078</link>
8709 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8710
8711 &lt;p&gt;A fundamental problem in the high-dimensional regression is to …
8712 tradeoff between type I and type II errors or, equivalently, false disco…
8713 rate (FDR) and power in variable selection. To address this important pr…
8714 we offer the first complete tradeoff diagram that distinguishes all pair…
8715 FDR and power that can be asymptotically realized by the Lasso with some…
8716 of its penalty parameter from the remaining pairs, in a regime of linear
8717 sparsity under random designs. The tradeoff between the FDR and power
8718 characterized by our diagram holds no matter how strong the signals are.…
8719 particular, our results improve on the earlier Lasso tradeoff diagram of
8720 &lt;a href=&quot;/abs/1511.01957&quot;&gt;arXiv:1511.01957&lt;/a&gt; by …
8721 pairs of FDR and power. The improvement is more substantial when the reg…
8722 problem is above the Donoho--Tanner phase transition. Finally, we present
8723 extensive simulation studies to confirm the sharpness of the complete La…
8724 tradeoff diagram.
8725 &lt;/p&gt;
8726 </description>
8727 </item>
8728 <item>
8729 <title>Sifting Convolution on the Sphere. (arXiv:2007.12153v2 [cs.IT] UP…
8730 <link>http://fr.arxiv.org/abs/2007.12153</link>
8731 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8732
8733 &lt;p&gt;A novel spherical convolution is defined through the sifting pr…
8734 Dirac delta on the sphere. The so-called sifting convolution is defined …
8735 inner product of one function with a translated version of another, but …
8736 the adoption of an alternative translation operator on the sphere. This
8737 translation operator follows by analogy with the Euclidean translation w…
8738 viewed in harmonic space. The sifting convolution satisfies a variety of
8739 desirable properties that are lacking in alternate definitions, namely: …
8740 supports directional kernels; it has an output which remains on the sphe…
8741 is efficient to compute. An illustration of the sifting convolution on a
8742 topographic map of the Earth demonstrates that it supports directional k…
8743 to perform anisotropic filtering, while its output remains on the sphere.
8744 &lt;/p&gt;
8745 </description>
8746 </item>
8747 <item>
8748 <title>Revisiting Locality in Binary-Integer Representations. (arXiv:200…
8749 <link>http://fr.arxiv.org/abs/2007.12159</link>
8750 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8751
8752 &lt;p&gt;Mutation and recombination operators play a key role in determi…
8753 and quality of Genetic and Evolutionary Algorithms (GEAs). Prior work has
8754 analyzed the effects of these operators on genotypic variation, often us…
8755 locality metrics that measure the sensitivity and stability of
8756 genotype-phenotype representations to these operators.
8757 &lt;/p&gt;
8758 &lt;p&gt;In this paper, we focus on an important subset of representatio…
8759 nonredundant bitstring-to-integer representations, and analyze them thro…
8760 lens of Rothlauf&apos;s widely used locality metrics. We first define lo…
8761 metrics equivalent to Rothlauf&apos;s that are tailored to our domain: t…
8762 \textit{point locality} for single-bit mutation and \textit{general loca…
8763 for recombination. With these definitions, we derive tight bounds and a …
8764 form expected value for point locality. For general locality we show tha…
8765 asymptotically equivalent across all representations and operators. We a…
8766 recreate three established GEA experiments to understand the predictive …
8767 of point locality on GEA performance, focusing on two popular and often
8768 juxtaposed representations: standard binary and binary reflected Gray.
8769 &lt;/p&gt;
8770 &lt;p&gt;We show that standard binary has provably no worse locality tha…
8771 encoding, including binary reflected Gray. We discuss this result in the
8772 context of previous studies that found binary reflected Gray to outperfo…
8773 standard binary, and we argue that locality cannot be the explanation for
8774 strong performance. Finally, we provide empirical evidence that weak poi…
8775 locality representations can be beneficial to performance in the explora…
8776 phase of the GEA, while strong point locality representations are more
8777 beneficial in the exploitation phase.
8778 &lt;/p&gt;
8779 </description>
8780 </item>
8781 <item>
8782 <title>YOLOpeds: Efficient Real-Time Single-Shot Pedestrian Detection fo…
8783 <link>http://fr.arxiv.org/abs/2007.13404</link>
8784 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8785
8786 &lt;p&gt;Deep Learning-based object detectors can enhance the capabiliti…
8787 camera systems in a wide spectrum of machine vision applications includi…
8788 video surveillance, autonomous driving, robots and drones, smart factory…
8789 health monitoring. Pedestrian detection plays a key role in all these
8790 applications and deep learning can be used to construct accurate
8791 state-of-the-art detectors. However, such complex paradigms do not scale…
8792 and are not traditionally implemented in resource-constrained smart came…
8793 on-device processing which offers significant advantages in situations w…
8794 real-time monitoring and robustness are vital. Efficient neural networks…
8795 not only enable mobile applications and on-device experiences but can al…
8796 key enabler of privacy and security allowing a user to gain the benefits…
8797 neural networks without needing to send their data to the server to be
8798 evaluated. This work addresses the challenge of achieving a good trade-o…
8799 between accuracy and speed for efficient deployment of deep-learning-bas…
8800 pedestrian detection in smart camera applications. A computationally eff…
8801 architecture is introduced based on separable convolutions and proposes
8802 integrating dense connections across layers and multi-scale feature fusi…
8803 improve representational capacity while decreasing the number of paramet…
8804 operations. In particular, the contributions of this work are the follow…
8805 An efficient backbone combining multi-scale feature operations, 2) a more
8806 elaborate loss function for improved localization, 3) an anchor-less app…
8807 for detection, The proposed approach called YOLOpeds is evaluated using …
8808 PETS2009 surveillance dataset on 320x320 images. Overall, YOLOpeds provi…
8809 real-time sustained operation of over 30 frames per second with detectio…
8810 in the range of 86% outperforming existing deep learning models.
8811 &lt;/p&gt;
8812 </description>
8813 </item>
8814 <item>
8815 <title>Regularization by Denoising via Fixed-Point Projection (RED-PRO).…
8816 <link>http://fr.arxiv.org/abs/2008.00226</link>
8817 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8818
8819 &lt;p&gt;Inverse problems in image processing are typically cast as opti…
8820 tasks, consisting of data-fidelity and stabilizing regularization terms.…
8821 recent regularization strategy of great interest utilizes the power of
8822 denoising engines. Two such methods are the Plug-and-Play Prior (PnP) and
8823 Regularization by Denoising (RED). While both have shown state-of-the-art
8824 results in various recovery tasks, their theoretical justification is
8825 incomplete. In this paper, we aim to bridge between RED and PnP, enrichi…
8826 understanding of both frameworks. Towards that end, we reformulate RED a…
8827 convex optimization problem utilizing a projection (RED-PRO) onto the
8828 fixed-point set of demicontractive denoisers. We offer a simple iterative
8829 solution to this problem, by which we show that PnP proximal gradient me…
8830 a special case of RED-PRO, while providing guarantees for the convergenc…
8831 both frameworks to globally optimal solutions. In addition, we present
8832 relaxations of RED-PRO that allow for handling denoisers with limited
8833 fixed-point sets. Finally, we demonstrate RED-PRO for the tasks of image
8834 deblurring and super-resolution, showing improved results with respect t…
8835 original RED framework.
8836 &lt;/p&gt;
8837 </description>
8838 </item>
8839 <item>
8840 <title>A Matrix Chernoff Bound for Markov Chains and Its Application to …
8841 <link>http://fr.arxiv.org/abs/2008.02464</link>
8842 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8843
8844 &lt;p&gt;We prove a Chernoff-type bound for sums of matrix-valued random…
8845 sampled via a regular (aperiodic and irreducible) finite Markov chain.
8846 Specially, consider a random walk on a regular Markov chain and a Hermit…
8847 matrix-valued function on its state space. Our result gives exponentially
8848 decreasing bounds on the tail distributions of the extreme eigenvalues o…
8849 sample mean matrix. Our proof is based on the matrix expander (regular
8850 undirected graph) Chernoff bound [Garg et al. STOC &apos;18] and scalar
8851 Chernoff-Hoeffding bounds for Markov chains [Chung et al. STACS &apos;12…
8852 &lt;/p&gt;
8853 &lt;p&gt;Our matrix Chernoff bound for Markov chains can be applied to a…
8854 behavior of co-occurrence statistics for sequential data, which have been
8855 common and important data signals in machine learning. We show that give…
8856 regular Markov chain with $n$ states and mixing time $\tau$, we need a
8857 trajectory of length $O(\tau (\log{(n)}+\log{(\tau)})/\epsilon^2)$ to ac…
8858 an estimator of the co-occurrence matrix with error bound $\epsilon$. We
8859 conduct several experiments and the experimental results are consistent …
8860 the exponentially fast convergence rate from theoretical analysis. Our r…
8861 gives the first bound on the convergence rate of the co-occurrence matri…
8862 the first sample complexity analysis in graph representation learning.
8863 &lt;/p&gt;
8864 </description>
8865 </item>
8866 <item>
8867 <title>Integration of the 3D Environment for UAV Onboard Visual Object T…
8868 <link>http://fr.arxiv.org/abs/2008.02834</link>
8869 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8870
8871 &lt;p&gt;Single visual object tracking from an unmanned aerial vehicle (…
8872 fundamental challenges such as object occlusion, small-scale objects,
8873 background clutter, and abrupt camera motion. To tackle these difficulti…
8874 propose to integrate the 3D structure of the observed scene into a
8875 detection-by-tracking algorithm. We introduce a pipeline that combines a
8876 model-free visual object tracker, a sparse 3D reconstruction, and a state
8877 estimator. The 3D reconstruction of the scene is computed with an image-…
8878 Structure-from-Motion (SfM) component that enables us to leverage a state
8879 estimator in the corresponding 3D scene during tracking. By representing…
8880 position of the target in 3D space rather than in image space, we stabil…
8881 tracking during ego-motion and improve the handling of occlusions, backg…
8882 clutter, and small-scale objects. We evaluated our approach on prototypi…
8883 image sequences, captured from a UAV with low-altitude oblique views. Fo…
8884 purpose, we adapted an existing dataset for visual object tracking and
8885 reconstructed the observed scene in 3D. The experimental results demonst…
8886 that the proposed approach outperforms methods using plain visual cues a…
8887 as approaches leveraging image-space-based state estimations. We believe…
8888 our approach can be beneficial for traffic monitoring, video surveillanc…
8889 navigation.
8890 &lt;/p&gt;
8891 </description>
8892 </item>
8893 <item>
8894 <title>Lifted Multiplicity Codes. (arXiv:2008.04717v2 [cs.IT] UPDATED)</…
8895 <link>http://fr.arxiv.org/abs/2008.04717</link>
8896 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8897
8898 &lt;p&gt;Lifted Reed-Solomon codes and multiplicity codes are two classe…
8899 evaluation codes that allow for the design of high-rate codes that can r…
8900 every codeword or information symbol from many disjoint sets. Recently, …
8901 underlying approaches have been combined to construct lifted bi-variate
8902 multiplicity codes, that can further improve on the rate. We continue th…
8903 of these codes by providing lower bounds on the rate and distance for li…
8904 multiplicity codes obtained from polynomials in an arbitrary number of
8905 variables. Specifically, we investigate a subcode of a lifted multiplici…
8906 formed by the linear span of $m$-variate monomials whose restriction to …
8907 arbitrary line in $\mathbb{F}_q^m$ is equivalent to a low-degree uni-var…
8908 polynomial. We find the tight asymptotic behavior of the fraction of such
8909 monomials when the number of variables $m$ is fixed and the alphabet size
8910 $q=2^\ell$ is large. For some parameter regimes, lifted multiplicity cod…
8911 then shown to have a better trade-off between redundancy and the number …
8912 disjoint recovering sets for every codeword or information symbol than
8913 previously known constructions. Additionally, we present a local
8914 self-correction algorithm for lifted multiplicity codes.
8915 &lt;/p&gt;
8916 </description>
8917 </item>
8918 <item>
8919 <title>A Composable Specification Language for Reinforcement Learning Ta…
8920 <link>http://fr.arxiv.org/abs/2008.09293</link>
8921 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8922
8923 &lt;p&gt;Reinforcement learning is a promising approach for learning con…
8924 for robot tasks. However, specifying complex tasks (e.g., with multiple
8925 objectives and safety constraints) can be challenging, since the user mu…
8926 design a reward function that encodes the entire task. Furthermore, the …
8927 often needs to manually shape the reward to ensure convergence of the le…
8928 algorithm. We propose a language for specifying complex control tasks, a…
8929 with an algorithm that compiles specifications in our language into a re…
8930 function and automatically performs reward shaping. We implement our app…
8931 in a tool called SPECTRL, and show that it outperforms several state-of-…
8932 baselines.
8933 &lt;/p&gt;
8934 </description>
8935 </item>
8936 <item>
8937 <title>Gravilon: Applications of a New Gradient Descent Method to Machin…
8938 <link>http://fr.arxiv.org/abs/2008.11370</link>
8939 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8940
8941 &lt;p&gt;Gradient descent algorithms have been used in countless applica…
8942 the inception of Newton&apos;s method. The explosion in the number of ap…
8943 of neural networks has re-energized efforts in recent years to improve t…
8944 standard gradient descent method in both efficiency and accuracy. These …
8945 modify the effect of the gradient in updating the values of the paramete…
8946 These modifications often incorporate hyperparameters: additional variab…
8947 whose values must be specified at the outset of the program. We provide,…
8948 a novel gradient descent algorithm, called Gravilon, that uses the geome…
8949 the hypersurface to modify the length of the step in the direction of the
8950 gradient. Using neural networks, we provide promising experimental resul…
8951 comparing the accuracy and efficiency of the Gravilon method against com…
8952 used gradient descent algorithms on MNIST digit classification.
8953 &lt;/p&gt;
8954 </description>
8955 </item>
8956 <item>
8957 <title>On the model-based stochastic value gradient for continuous reinf…
8958 <link>http://fr.arxiv.org/abs/2008.12775</link>
8959 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8960
8961 &lt;p&gt;Model-based reinforcement learning approaches add explicit doma…
8962 to agents in hopes of improving the sample-efficiency in comparison to
8963 model-free agents. However, in practice model-based methods are unable to
8964 achieve the same asymptotic performance on challenging continuous contro…
8965 due to the complexity of learning and controlling an explicit world mode…
8966 this paper we investigate the stochastic value gradient (SVG), which is a
8967 well-known family of methods for controlling continuous systems which in…
8968 model-based approaches that distill a model-based value expansion into a
8969 model-free policy. We consider a variant of the model-based SVG that sca…
8970 larger systems and uses 1) an entropy regularization to help with explor…
8971 2) a learned deterministic world model to improve the short-horizon value
8972 estimate, and 3) a learned model-free value estimate after the model&apo…
8973 This SVG variation captures the model-free soft actor-critic method as an
8974 instance when the model rollout horizon is zero, and otherwise uses
8975 short-horizon model rollouts to improve the value estimate for the policy
8976 update. We surpass the asymptotic performance of other model-based metho…
8977 the proprioceptive MuJoCo locomotion tasks from the OpenAI gym, includin…
8978 humanoid. We notably achieve these results with a simple deterministic w…
8979 model without requiring an ensemble.
8980 &lt;/p&gt;
8981 </description>
8982 </item>
8983 <item>
8984 <title>Introduction to logistic regression. (arXiv:2008.13567v2 [stat.ME…
8985 <link>http://fr.arxiv.org/abs/2008.13567</link>
8986 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
8987
8988 &lt;p&gt;For random field theory based multiple comparison corrections I…
8989 imaging, it is often necessary to compute the distribution of the suprem…
8990 random field. Unfortunately, computing the distribution of the supremum …
8991 random field is not easy and requires satisfying many distributional
8992 assumptions that may not be true in real data. Thus, there is a need to …
8993 with a different framework that does not use the traditional statistical
8994 hypothesis testing paradigm that requires to compute p-values. With this…
8995 motivation, we can use a different approach called the logistic regressi…
8996 does not require computing the p-value and still be able to localize the
8997 regions of brain network differences. Unlike other discriminant and
8998 classification techniques that tried to classify preselected feature vec…
8999 the method here does not require any preselected feature vectors and per…
9000 the classification at each edge level.
9001 &lt;/p&gt;
9002 </description>
9003 </item>
9004 <item>
9005 <title>Individuation and Adaptation in Complex Systems. (arXiv:2009.0011…
9006 <link>http://fr.arxiv.org/abs/2009.00110</link>
9007 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9008
9009 &lt;p&gt;Complex systems have certain characteristics such as network st…
9010 large number of individual elements, adaptation, and emergence. While th…
9011 characteristics have been studied and described, it is often not so clea…
9012 they exactly come from. There is a focus on concrete system states rathe…
9013 the emergence of the computer models themselves used to study these syst…
9014 better understand typical characteristics of complex systems and their
9015 emergence, we recently presented a system metamodel based on which compu…
9016 models can be created from abstract building blocks. In this study we ex…
9017 our system metamodel with the concept of adaption in order to integrate
9018 adaptive computation in our so-called allagmatic method - a framework
9019 consisting of the system metamodel but also a way to study the creation …
9020 computer model itself. Running experiments with cellular automata and
9021 artificial neural networks, we find that the system metamodel integrates
9022 adaptation with an additional operation called adaptation function that
9023 operates on the update function, which encodes the system&apos;s dynamic…
9024 the creation of adaptive computations by providing an abstract template …
9025 adaptation and guidance for implementation. Further, the object-oriented…
9026 template meta-programming leads to a creation of computer models compara…
9027 the individuation of observed systems. It therefore allows to study not …
9028 the behaviour of a running model but also its creation. The development …
9029 system metamodel was first inspired by concepts of the philosophy of
9030 individuation of Gilbert Simondon. The theoretical background for the co…
9031 of adaptation is taken from the philosophy of organism of Alfred North
9032 Whitehead. In general, through the possibility to follow individuation, …
9033 allagmatic method allows to better understand the emergence of typical
9034 characteristics of complex systems.
9035 &lt;/p&gt;
9036 </description>
9037 </item>
9038 <item>
9039 <title>Distance Encoding: Design Provably More Powerful Neural Networks …
9040 <link>http://fr.arxiv.org/abs/2009.00142</link>
9041 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9042
9043 &lt;p&gt;Learning representations of sets of nodes in a graph is crucial…
9044 applications ranging from node-role discovery to link prediction and mol…
9045 classification. Graph Neural Networks (GNNs) have achieved great success…
9046 graph representation learning. However, expressive power of GNNs is limi…
9047 the 1-Weisfeiler-Lehman (WL) test and thus GNNs generate identical
9048 representations for graph substructures that may in fact be very differe…
9049 More powerful GNNs, proposed recently by mimicking higher-order-WL tests…
9050 focus on representing entire graphs and they are computationally ineffic…
9051 they cannot utilize sparsity of the underlying graph. Here we propose and
9052 mathematically analyze a general class of structure-related features, te…
9053 Distance Encoding (DE). DE assists GNNs in representing any set of nodes…
9054 providing strictly more expressive power than the 1-WL test. DE captures…
9055 distance between the node set whose representation is to be learned and …
9056 node in the graph. To capture the distance DE can apply various graph-di…
9057 measures such as shortest path distance or generalized PageRank scores. …
9058 propose two ways for GNNs to use DEs (1) as extra node features, and (2)…
9059 controllers of message aggregation in GNNs. Both approaches can utilize …
9060 sparse structure of the underlying graph, which leads to computational
9061 efficiency and scalability. We also prove that DE can distinguish node s…
9062 embedded in almost all regular graphs where traditional GNNs always fail…
9063 evaluate DE on three tasks over six real networks: structural role predi…
9064 link prediction, and triangle prediction. Results show that our models
9065 outperform GNNs without DE by up-to 15\% in accuracy and AUROC. Furtherm…
9066 our models also significantly outperform other state-of-the-art methods
9067 especially designed for the above tasks.
9068 &lt;/p&gt;
9069 </description>
9070 </item>
9071 <item>
9072 <title>Accelerated reactive transport simulations in heterogeneous porou…
9073 <link>http://fr.arxiv.org/abs/2009.01194</link>
9074 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9075
9076 &lt;p&gt;This work investigates the performance of the on-demand machine…
9077 (ODML) algorithm introduced in Leal et al. (2020) when applied to differ…
9078 reactive transport problems in heterogeneous porous media. ODML was devi…
9079 accelerate the computationally expensive geochemical reaction calculatio…
9080 reactive transport simulations. We demonstrate that the ODML algorithm s…
9081 up these calculations by one to three orders of magnitude. Such accelera…
9082 in turn, significantly accelerates the entire reactive transport simulat…
9083 The numerical experiments are performed by implementing the coupling of …
9084 open-source software packages: Reaktoro (Leal, 2015) and Firedrake (Rath…
9085 et al., 2016).
9086 &lt;/p&gt;
9087 </description>
9088 </item>
9089 <item>
9090 <title>Analysis of Uplink IRS-Assisted NOMA under Nakagami-m Fading via …
9091 <link>http://fr.arxiv.org/abs/2009.03133</link>
9092 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9093
9094 &lt;p&gt;This letter investigates the uplink outage performance of intel…
9095 reflecting surface (IRS)-assisted non-orthogonal multiple access (NOMA).…
9096 consider the general case where all users have both direct and reflection
9097 links, and all links undergo Nakagami-m fading. We approximate the recei…
9098 powers of the NOMA users as Gamma random variables via moments matching.…
9099 allows for tractable expressions of the outage under interference cancel…
9100 (IC), while being flexible in modeling various propagation environments.…
9101 analysis shows that under certain conditions, the presence of an IRS mig…
9102 degrade the performance of users that have dominant line-of-sight (LOS) …
9103 base station (BS), while users dominated by non-line-of-sight (NLOS) will
9104 always benefit from it.
9105 &lt;/p&gt;
9106 </description>
9107 </item>
9108 <item>
9109 <title>Physically Embedded Planning Problems: New Challenges for Reinfor…
9110 <link>http://fr.arxiv.org/abs/2009.05524</link>
9111 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9112
9113 &lt;p&gt;Recent work in deep reinforcement learning (RL) has produced al…
9114 capable of mastering challenging games such as Go, chess, or shogi. In t…
9115 works the RL agent directly observes the natural state of the game and c…
9116 that state directly with its actions. However, when humans play such gam…
9117 they do not just reason about the moves but also interact with their phy…
9118 environment. They understand the state of the game by looking at the phy…
9119 board in front of them and modify it by manipulating pieces using touch …
9120 fine-grained motor control. Mastering complicated physical systems with
9121 abstract goals is a central challenge for artificial intelligence, but it
9122 remains out of reach for existing RL algorithms. To encourage progress t…
9123 this goal we introduce a set of physically embedded planning problems an…
9124 them publicly available. We embed challenging symbolic tasks (Sokoban,
9125 tic-tac-toe, and Go) in a physics engine to produce a set of tasks that …
9126 perception, reasoning, and motor control over long time horizons. Althou…
9127 existing RL algorithms can tackle the symbolic versions of these tasks, …
9128 that they struggle to master even the simplest of their physically embed…
9129 counterparts. As a first step towards characterizing the space of soluti…
9130 these tasks, we introduce a strong baseline that uses a pre-trained expe…
9131 player to provide hints in the abstract space to an RL agent&apos;s poli…
9132 training it on the full sensorimotor control task. The resulting agent s…
9133 many of the tasks, underlining the need for methods that bridge the gap …
9134 abstract planning and embodied control. See illustrating video at
9135 https://youtu.be/RwHiHlym_1k.
9136 &lt;/p&gt;
9137 </description>
9138 </item>
9139 <item>
9140 <title>Beyond Individualized Recourse: Interpretable and Interactive Sum…
9141 <link>http://fr.arxiv.org/abs/2009.07165</link>
9142 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9143
9144 &lt;p&gt;As predictive models are increasingly being deployed in high-st…
9145 decision-making, there has been a lot of interest in developing algorith…
9146 which can provide recourses to affected individuals. While developing su…
9147 tools is important, it is even more critical to analyse and interpret a
9148 predictive model, and vet it thoroughly to ensure that the recourses it …
9149 are meaningful and non-discriminatory before it is deployed in the real …
9150 To this end, we propose a novel model agnostic framework called Actionab…
9151 Recourse Summaries (AReS) to construct global counterfactual explanation…
9152 provide an interpretable and accurate summary of recourses for the entire
9153 population. We formulate a novel objective which simultaneously optimize…
9154 correctness of the recourses and interpretability of the explanations, w…
9155 minimizing overall recourse costs across the entire population. More
9156 specifically, our objective enables us to learn, with optimality guarant…
9157 recourse correctness, a small number of compact rule sets each of which …
9158 recourses for well defined subpopulations within the data. We also demon…
9159 theoretically that several of the prior approaches proposed to generate
9160 recourses for individuals are special cases of our framework. Experiment…
9161 evaluation with real world datasets and user studies demonstrate that our
9162 framework can provide decision makers with a comprehensive overview of
9163 recourses corresponding to any black box model, and consequently help de…
9164 undesirable model biases and discrimination.
9165 &lt;/p&gt;
9166 </description>
9167 </item>
9168 <item>
9169 <title>CorDEL: A Contrastive Deep Learning Approach for Entity Linkage. …
9170 <link>http://fr.arxiv.org/abs/2009.07203</link>
9171 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9172
9173 &lt;p&gt;Entity linkage (EL) is a critical problem in data cleaning and …
9174 In the past several decades, EL has typically been done by rule-based sy…
9175 or traditional machine learning models with hand-curated features, both …
9176 which heavily depend on manual human inputs. With the ever-increasing gr…
9177 new data, deep learning (DL) based approaches have been proposed to alle…
9178 the high cost of EL associated with the traditional models. Existing
9179 exploration of DL models for EL strictly follows the well-known twin-net…
9180 architecture. However, we argue that the twin-network architecture is
9181 sub-optimal to EL, leading to inherent drawbacks of existing models. In …
9182 to address the drawbacks, we propose a novel and generic contrastive DL
9183 framework for EL. The proposed framework is able to capture both syntact…
9184 semantic matching signals and pays attention to subtle but critical
9185 differences. Based on the framework, we develop a contrastive DL approac…
9186 EL, called CorDEL, with three powerful variants. We evaluate CorDEL with
9187 extensive experiments conducted on both public benchmark datasets and a
9188 real-world dataset. CorDEL outperforms previous state-of-the-art models …
9189 on public benchmark datasets. Moreover, CorDEL yields a 2.4% improvement…
9190 the current best DL model on the real-world dataset, while reducing the …
9191 of training parameters by 97.6%.
9192 &lt;/p&gt;
9193 </description>
9194 </item>
9195 <item>
9196 <title>Autoregressive Knowledge Distillation through Imitation Learning.…
9197 <link>http://fr.arxiv.org/abs/2009.07253</link>
9198 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9199
9200 &lt;p&gt;The performance of autoregressive models on natural language ge…
9201 has dramatically improved due to the adoption of deep, self-attentive
9202 architectures. However, these gains have come at the cost of hindering
9203 inference speed, making state-of-the-art models cumbersome to deploy in
9204 real-world, time-sensitive settings. We develop a compression technique …
9205 autoregressive models that is driven by an imitation learning perspectiv…
9206 knowledge distillation. The algorithm is designed to address the exposur…
9207 problem. On prototypical language generation tasks such as translation a…
9208 summarization, our method consistently outperforms other distillation
9209 algorithms, such as sequence-level knowledge distillation. Student models
9210 trained with our method attain 1.4 to 4.8 BLEU/ROUGE points higher than …
9211 trained from scratch, while increasing inference speed by up to 14 times…
9212 comparison to the teacher model.
9213 &lt;/p&gt;
9214 </description>
9215 </item>
9216 <item>
9217 <title>Video based real-time positional tracker. (arXiv:2009.08276v3 [cs…
9218 <link>http://fr.arxiv.org/abs/2009.08276</link>
9219 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9220
9221 &lt;p&gt;We propose a system that uses video as the input to track the p…
9222 objects relative to their surrounding environment in real-time. The neur…
9223 network employed is trained on a 100% synthetic dataset coming from our …
9224 automated generator. The positional tracker relies on a range of 1 to n …
9225 cameras placed around an arena of choice.
9226 &lt;/p&gt;
9227 &lt;p&gt;The system returns the positions of the tracked objects relativ…
9228 broader world by understanding the overlapping matrices formed by the ca…
9229 and therefore these can be extrapolated into real world coordinates.
9230 &lt;/p&gt;
9231 &lt;p&gt;In most cases, we achieve a higher update rate and positioning …
9232 any of the existing GPS-based systems, in particular for indoor objects …
9233 those occluded from clear sky.
9234 &lt;/p&gt;
9235 </description>
9236 </item>
9237 <item>
9238 <title>An Embedded Index Code Construction Using Sub-packetization. (arX…
9239 <link>http://fr.arxiv.org/abs/2009.11329</link>
9240 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9241
9242 &lt;p&gt;A variant of the index coding problem (ICP), the embedded index…
9243 problem (EICP) was introduced in [A. Porter and M. Wootters, &quot;Embed…
9244 coding,&quot; ITW, Sweden, 2019] which was motivated by its application …
9245 distributed computing where every user can act as sender for other users…
9246 algorithm for code construction was reported. The constructions depends …
9247 computation of minrank of a matrix, which is computationally intensive. …
9248 Mahesh, N. Sageer Karat and B. S. Rajan, &quot;Min-rank of Embedded Inde…
9249 Problems,&quot; ISIT, 2020], for EICP, a notion of side-information matr…
9250 introduced and it was proved that the length of an optimal scalar linear…
9251 code is equal to the min-rank of the side-information matrix. The author…
9252 provided an explicit code construction for a class of EICP -
9253 \textit{Consecutive and Symmetric Embedded Index Coding Problem (CS-EICP…
9254 introduce the idea of sub-packetization of the messages in index coding
9255 problems to provide a novel code construction for CS-EICP in contrast to…
9256 scalar linear solutions provided in the prior works. For CS-EICP, the
9257 normalized rate, which is defined as the number of bits transmitted by a…
9258 users together normalized by the total number of bits of all the message…
9259 our construction is lesser than the normalized rate achieved by Mahesh et
9260 al.,for scalar linear codes.
9261 &lt;/p&gt;
9262 </description>
9263 </item>
9264 <item>
9265 <title>Multi-scale Deep Neural Network (MscaleDNN) Methods for Oscillato…
9266 <link>http://fr.arxiv.org/abs/2009.12729</link>
9267 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9268
9269 &lt;p&gt;In this paper, we study a multi-scale deep neural network (Msca…
9270 meshless numerical method for computing oscillatory Stokes flows in comp…
9271 domains. The MscaleDNN employs a multi-scale structure in the design of …
9272 using radial scalings to convert the approximation of high frequency com…
9273 of the highly oscillatory Stokes solution to one of lower frequencies. T…
9274 MscaleDNN solution to the Stokes problem is obtained by minimizing a loss
9275 function in terms of L2 normof the residual of the Stokes equation. Thre…
9276 of loss functions are investigated based on vorticity-velocity-pressure,
9277 velocity-stress-pressure, and velocity-gradient of velocity-pressure
9278 formulations of the Stokes equation. We first conduct a systematic study…
9279 MscaleDNN methods with various loss functions on the Kovasznay flow in
9280 comparison with normal fully connected DNNs. Then, Stokes flows with hig…
9281 oscillatory solutions in a 2-D domain with six randomly placed holes are
9282 simulated by the MscaleDNN. The results show that MscaleDNN has faster
9283 convergence and consistent error decays in the simulation of Kovasznay f…
9284 all four tested loss functions. More importantly, the MscaleDNN is capab…
9285 learning highly oscillatory solutions when the normal DNNs fail to conve…
9286 &lt;/p&gt;
9287 </description>
9288 </item>
9289 <item>
9290 <title>Domain Generalization for Medical Imaging Classification with Lin…
9291 <link>http://fr.arxiv.org/abs/2009.12829</link>
9292 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9293
9294 &lt;p&gt;Recently, we have witnessed great progress in the field of medi…
9295 classification by adopting deep neural networks. However, the recent adv…
9296 models still require accessing sufficiently large and representative dat…
9297 for training, which is often unfeasible in clinically realistic environm…
9298 When trained on limited datasets, the deep neural network is lack of
9299 generalization capability, as the trained deep neural network on data wi…
9300 certain distribution (e.g. the data captured by a certain device vendor …
9301 patient population) may not be able to generalize to the data with anoth…
9302 distribution.
9303 &lt;/p&gt;
9304 &lt;p&gt;In this paper, we introduce a simple but effective approach to …
9305 generalization capability of deep neural networks in the field of medical
9306 imaging classification. Motivated by the observation that the domain
9307 variability of the medical images is to some extent compact, we propose …
9308 learn a representative feature space through variational encoding with a…
9309 linear-dependency regularization term to capture the shareable informati…
9310 among medical data collected from different domains. As a result, the tr…
9311 neural network is expected to equip with better generalization capabilit…
9312 the &quot;unseen&quot; medical data. Experimental results on two challen…
9313 imaging classification tasks indicate that our method can achieve better
9314 cross-domain generalization capability compared with state-of-the-art
9315 baselines.
9316 &lt;/p&gt;
9317 </description>
9318 </item>
9319 <item>
9320 <title>Dual Attention Model for Citation Recommendation. (arXiv:2010.001…
9321 <link>http://fr.arxiv.org/abs/2010.00182</link>
9322 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9323
9324 &lt;p&gt;Based on an exponentially increasing number of academic article…
9325 and citing comprehensive and appropriate resources has become a non-triv…
9326 task. Conventional citation recommender methods suffer from severe infor…
9327 loss. For example, they do not consider the section of the paper that th…
9328 is writing and for which they need to find a citation, the relatedness b…
9329 the words in the local context (the text span that describes a citation)…
9330 the importance on each word from the local context. These shortcomings m…
9331 such methods insufficient for recommending adequate citations to academic
9332 manuscripts. In this study, we propose a novel embedding-based neural ne…
9333 called &quot;dual attention model for citation recommendation (DACR)&quo…
9334 citations during manuscript preparation. Our method adapts embedding of …
9335 dimensions of semantic information: words in the local context, structur…
9336 contexts, and the section on which a user is working. A neural network is
9337 designed to maximize the similarity between the embedding of the three i…
9338 (local context words, section and structural contexts) and the target ci…
9339 appearing in the context. The core of the neural network is composed of
9340 self-attention and additive attention, where the former aims to capture …
9341 relatedness between the contextual words and structural context, and the…
9342 aims to learn the importance of them. The experiments on real-world data…
9343 demonstrate the effectiveness of the proposed approach.
9344 &lt;/p&gt;
9345 </description>
9346 </item>
9347 <item>
9348 <title>Pretrained Language Model Embryology: The Birth of ALBERT. (arXiv…
9349 <link>http://fr.arxiv.org/abs/2010.02480</link>
9350 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9351
9352 &lt;p&gt;While behaviors of pretrained language models (LMs) have been t…
9353 examined, what happened during pretraining is rarely studied. We thus
9354 investigate the developmental process from a set of randomly initialized
9355 parameters to a totipotent language model, which we refer to as the embr…
9356 of a pretrained language model. Our results show that ALBERT learns to
9357 reconstruct and predict tokens of different parts of speech (POS) in dif…
9358 learning speeds during pretraining. We also find that linguistic knowled…
9359 world knowledge do not generally improve as pretraining proceeds, nor do
9360 downstream tasks&apos; performance. These findings suggest that knowledg…
9361 pretrained model varies during pretraining, and having more pretrain ste…
9362 not necessarily provide a model with more comprehensive knowledge. We wi…
9363 provide source codes and pretrained models to reproduce our results at
9364 https://github.com/d223302/albert-embryology.
9365 &lt;/p&gt;
9366 </description>
9367 </item>
9368 <item>
9369 <title>Investigating African-American Vernacular English in Transformer-…
9370 <link>http://fr.arxiv.org/abs/2010.02510</link>
9371 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9372
9373 &lt;p&gt;The growth of social media has encouraged the written use of Af…
9374 Vernacular English (AAVE), which has traditionally been used only in oral
9375 contexts. However, NLP models have historically been developed using dom…
9376 English varieties, such as Standard American English (SAE), due to text …
9377 availability. We investigate the performance of GPT-2 on AAVE text by cr…
9378 a dataset of intent-equivalent parallel AAVE/SAE tweet pairs, thereby is…
9379 syntactic structure and AAVE- or SAE-specific language for each pair. We
9380 evaluate each sample and its GPT-2 generated text with pretrained sentim…
9381 classifiers and find that while AAVE text results in more classification…
9382 negative sentiment than SAE, the use of GPT-2 generally increases occurr…
9383 of positive sentiment for both. Additionally, we conduct human evaluatio…
9384 AAVE and SAE text generated with GPT-2 to compare contextual rigor and o…
9385 quality.
9386 &lt;/p&gt;
9387 </description>
9388 </item>
9389 <item>
9390 <title>Improved Analysis of Clipping Algorithms for Non-convex Optimizat…
9391 <link>http://fr.arxiv.org/abs/2010.02519</link>
9392 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9393
9394 &lt;p&gt;Gradient clipping is commonly used in training deep neural netw…
9395 due to its practicability in relieving the exploding gradient problem.
9396 Recently, \citet{zhang2019gradient} show that clipped (stochastic) Gradi…
9397 Descent (GD) converges faster than vanilla GD/SGD via introducing a new
9398 assumption called $(L_0, L_1)$-smoothness, which characterizes the viole…
9399 fluctuation of gradients typically encountered in deep neural networks.
9400 However, their iteration complexities on the problem-dependent parameter…
9401 rather pessimistic, and theoretical justification of clipping combined w…
9402 other crucial techniques, e.g. momentum acceleration, are still lacking.…
9403 this paper, we bridge the gap by presenting a general framework to study…
9404 clipping algorithms, which also takes momentum methods into consideratio…
9405 provide convergence analysis of the framework in both deterministic and
9406 stochastic setting, and demonstrate the tightness of our results by comp…
9407 them with existing lower bounds. Our results imply that the efficiency of
9408 clipping methods will not degenerate even in highly non-smooth regions o…
9409 landscape. Experiments confirm the superiority of clipping-based methods…
9410 deep learning tasks.
9411 &lt;/p&gt;
9412 </description>
9413 </item>
9414 <item>
9415 <title>Improving Local Identifiability in Probabilistic Box Embeddings. …
9416 <link>http://fr.arxiv.org/abs/2010.04831</link>
9417 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9418
9419 &lt;p&gt;Geometric embeddings have recently received attention for their…
9420 ability to represent transitive asymmetric relations via containment. Box
9421 embeddings, where objects are represented by n-dimensional hyperrectangl…
9422 a particularly promising example of such an embedding as they are closed…
9423 intersection and their volume can be calculated easily, allowing them to
9424 naturally represent calibrated probability distributions. The benefits of
9425 geometric embeddings also introduce a problem of local identifiability,
9426 however, where whole neighborhoods of parameters result in equivalent lo…
9427 which impedes learning. Prior work addressed some of these issues by usi…
9428 approximation to Gaussian convolution over the box parameters, however, …
9429 intersection operation also increases the sparsity of the gradient. In t…
9430 work, we model the box parameters with min and max Gumbel distributions,…
9431 were chosen such that space is still closed under the operation of the
9432 intersection. The calculation of the expected intersection volume involv…
9433 parameters, and we demonstrate experimentally that this drastically impr…
9434 the ability of such models to learn.
9435 &lt;/p&gt;
9436 </description>
9437 </item>
9438 <item>
9439 <title>Neural-Symbolic Reasoning on Knowledge Graphs. (arXiv:2010.05446v…
9440 <link>http://fr.arxiv.org/abs/2010.05446</link>
9441 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9442
9443 &lt;p&gt;Knowledge graph reasoning is the fundamental component to suppo…
9444 learning applications such as information extraction, information retrie…
9445 recommendation. Since knowledge graph can be viewed as the discrete symb…
9446 representations of knowledge, reasoning on knowledge graphs can naturally
9447 leverage the symbolic techniques. However, symbolic reasoning is intoler…
9448 the ambiguous and noisy data. On the contrary, the recent advances of de…
9449 learning promote neural reasoning on knowledge graphs, which is robust t…
9450 ambiguous and noisy data, but lacks interpretability compared to symbolic
9451 reasoning. Considering the advantages and disadvantages of both methodol…
9452 recent efforts have been made on combining the two reasoning methods. In…
9453 survey, we take a thorough look at the development of the symbolic reaso…
9454 neural reasoning and the neural-symbolic reasoning on knowledge graphs. …
9455 survey two specific reasoning tasks, knowledge graph completion and ques…
9456 answering on knowledge graphs, and explain them in a unified reasoning
9457 framework. We also briefly discuss the future directions for knowledge g…
9458 reasoning.
9459 &lt;/p&gt;
9460 </description>
9461 </item>
9462 <item>
9463 <title>On lattice point counting in $\Delta$-modular polyhedra. (arXiv:2…
9464 <link>http://fr.arxiv.org/abs/2010.05768</link>
9465 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9466
9467 &lt;p&gt;Let a polyhedron $P$ be defined by one of the following ways:
9468 &lt;/p&gt;
9469 &lt;p&gt;(i) $P = \{x \in R^n \colon A x \leq b\}$, where $A \in Z^{(n+k…
9470 $b \in Z^{(n+k)}$ and $rank\, A = n$;
9471 &lt;/p&gt;
9472 &lt;p&gt;(ii) $P = \{x \in R_+^n \colon A x = b\}$, where $A \in Z^{k \t…
9473 \in Z^{k}$ and $rank\, A = k$.
9474 &lt;/p&gt;
9475 &lt;p&gt;And let all rank order minors of $A$ be bounded by $\Delta$ in …
9476 values. We show that the short rational generating function for the power
9477 series $$ \sum\limits_{m \in P \cap Z^n} x^m $$ can be computed with the
9478 arithmetic complexity $ O\left(T_{SNF}(d) \cdot d^{k} \cdot d^{\log_2
9479 \Delta}\right), $ where $k$ and $\Delta$ are fixed, $d = \dim P$, and
9480 $T_{SNF}(m)$ is the complexity to compute the Smith Normal Form for $m \…
9481 m$ integer matrix. In particular, $d = n$ for the case (i) and $d = n-k$…
9482 the case (ii).
9483 &lt;/p&gt;
9484 &lt;p&gt;The simplest examples of polyhedra that meet conditions (i) or …
9485 simplicies, the subset sum polytope and the knapsack or multidimensional
9486 knapsack polytopes.
9487 &lt;/p&gt;
9488 &lt;p&gt;We apply these results to parametric polytopes, and show that t…
9489 polynomial representation of the function $c_P(y) = |P_{y} \cap Z^n|$, w…
9490 $P_{y}$ is parametric polytope, can be computed by a polynomial time eve…
9491 varying dimension if $P_{y}$ has a close structure to the cases (i) or (…
9492 another consequence, we show that the coefficients $e_i(P,m)$ of the Ehr…
9493 quasi-polynomial $$ \left| mP \cap Z^n\right| = \sum\limits_{j = 0}^n
9494 e_i(P,m)m^j $$ can be computed by a polynomial time algorithm for fixed …
9495 $\Delta$.
9496 &lt;/p&gt;
9497 </description>
9498 </item>
9499 <item>
9500 <title>CAPT: Contrastive Pre-Training for Learning Denoised Sequence Rep…
9501 <link>http://fr.arxiv.org/abs/2010.06351</link>
9502 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9503
9504 &lt;p&gt;Pre-trained self-supervised models such as BERT have achieved s…
9505 success in learning sequence representations, especially for natural lan…
9506 processing. These models typically corrupt the given sequences with cert…
9507 types of noise, such as masking, shuffling, or substitution, and then tr…
9508 recover the original input. However, such pre-training approaches are pr…
9509 learning representations that are covariant with the noise, leading to t…
9510 discrepancy between the pre-training and fine-tuning stage. To remedy th…
9511 present ContrAstive Pre-Training (CAPT) to learn noise invariant sequence
9512 representations. The proposed CAPT encourages the consistency between
9513 representations of the original sequence and its corrupted version via
9514 unsupervised instance-wise training signals. In this way, it not only
9515 alleviates the pretrain-finetune discrepancy induced by the noise of
9516 pre-training, but also aids the pre-trained model in better capturing gl…
9517 semantics of the input via more effective sentence-level supervision. Di…
9518 from most prior work that focuses on a particular modality, comprehensive
9519 empirical evidence on 11 natural language understanding and cross-modal …
9520 illustrates that CAPT is applicable for both language and vision-language
9521 tasks, and obtains surprisingly consistent improvement, including 0.6% a…
9522 gain on GLUE benchmarks and 0.8% absolute increment on NLVR.
9523 &lt;/p&gt;
9524 </description>
9525 </item>
9526 <item>
9527 <title>Spherical Knowledge Distillation. (arXiv:2010.07485v2 [cs.LG] UPD…
9528 <link>http://fr.arxiv.org/abs/2010.07485</link>
9529 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9530
9531 &lt;p&gt;Knowledge distillation aims at obtaining a small but effective …
9532 transferring knowledge from a much larger one. The previous approaches t…
9533 reach this goal by simply &quot;logit-supervised&quot; information trans…
9534 the teacher and student, which somehow can be subsequently decomposed as…
9535 transfer of normalized logits and $l^2$ norm. We argue that the norm of …
9536 is actually interference, which damages the efficiency in the transfer p…
9537 To address this problem, we propose Spherical Knowledge Distillation (SK…
9538 Specifically, we project the teacher and the student&apos;s logits into …
9539 sphere, and then we can efficiently perform knowledge distillation on the
9540 sphere. We verify our argument via theoretical analysis and ablation stu…
9541 Extensive experiments have demonstrated the superiority and scalability …
9542 method over the SOTAs.
9543 &lt;/p&gt;
9544 </description>
9545 </item>
9546 <item>
9547 <title>Measuring the Dynamic Impact of High-Speed Railways on Urban Inte…
9548 <link>http://fr.arxiv.org/abs/2010.08182</link>
9549 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9550
9551 &lt;p&gt;High-speed rail (HSR) has become an important mode of inter-city
9552 transportation between large cities. Inter-city interaction facilitated …
9553 tends to play a more prominent role in promoting urban and regional econ…
9554 integration and development. Quantifying the impact of HSR&apos;s intera…
9555 cities and people is therefore crucial for long-term urban and regional
9556 development planning and policy making. We develop an evaluation framewo…
9557 using toponym information from social media as a proxy to estimate the d…
9558 of such interactions. This paper adopts two types of spatial information:
9559 toponyms from social media posts, and the geographical location informat…
9560 embedded in social media posts. The framework highlights the asymmetric …
9561 of social interaction among cities, and proposes a series of metrics to
9562 quantify such impact from multiple perspectives, including interaction
9563 strength, spatial decay, and channel effect. The results show that HSRs …
9564 only greatly expand the uneven distribution of inter-city connections, b…
9565 significantly reshape the interactions that occur along HSR routes throu…
9566 channel effect.
9567 &lt;/p&gt;
9568 </description>
9569 </item>
9570 <item>
9571 <title>Learning Accurate Entropy Model with Global Reference for Image C…
9572 <link>http://fr.arxiv.org/abs/2010.08321</link>
9573 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9574
9575 &lt;p&gt;In recent deep image compression neural networks, the entropy m…
9576 critical role in estimating the prior distribution of deep image encodin…
9577 Existing methods combine hyperprior with local context in the entropy
9578 estimation function. This greatly limits their performance due to the ab…
9579 of a global vision. In this work, we propose a novel Global Reference Mo…
9580 image compression to effectively leverage both the local and the global …
9581 information, leading to an enhanced compression rate. The proposed metho…
9582 decoded latents and then finds the most relevant latent to assist the
9583 distribution estimating of the current latent. A by-product of this work…
9584 innovation of a mean-shifting GDN module that further improves the perfo…
9585 Experimental results demonstrate that the proposed model outperforms the
9586 rate-distortion performance of most of the state-of-the-art methods in t…
9587 industry.
9588 &lt;/p&gt;
9589 </description>
9590 </item>
9591 <item>
9592 <title>A Grid-based Representation for Human Action Recognition. (arXiv:…
9593 <link>http://fr.arxiv.org/abs/2010.08841</link>
9594 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9595
9596 &lt;p&gt;Human action recognition (HAR) in videos is a fundamental resea…
9597 computer vision. It consists mainly in understanding actions performed by
9598 humans based on a sequence of visual observations. In recent years, HAR …
9599 witnessed significant progress, especially with the emergence of deep le…
9600 models. However, most of existing approaches for action recognition rely…
9601 information that is not always relevant for this task, and are limited i…
9602 way they fuse the temporal information. In this paper, we propose a novel
9603 method for human action recognition that encodes efficiently the most
9604 discriminative appearance information of an action with explicit attenti…
9605 representative pose features, into a new compact grid representation. Ou…
9606 (Grid-based Representation for Action Recognition) method is tested on s…
9607 benchmark datasets demonstrating that our model can accurately recognize…
9608 actions, despite intra-class appearance variations and occlusion challen…
9609 &lt;/p&gt;
9610 </description>
9611 </item>
9612 <item>
9613 <title>What breach? Measuring online awareness of security incidents by …
9614 <link>http://fr.arxiv.org/abs/2010.09843</link>
9615 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9616
9617 &lt;p&gt;Awareness about security and privacy risks is important for dev…
9618 security habits. Learning about real-world security incidents and data b…
9619 can alert people to the ways in which their information is vulnerable on…
9620 thus playing a significant role in encouraging safe security behavior. T…
9621 paper examines 1) how often people read about security incidents online,…
9622 those people, whether and to what extent they follow up with an action, …
9623 by trying to read more about the incident, and 3) what influences the
9624 likelihood that they will read about an incident and take some action. W…
9625 this by quantitatively examining real-world internet-browsing data from …
9626 participants.
9627 &lt;/p&gt;
9628 &lt;p&gt;Our findings present a bleak view of awareness of security inci…
9629 17% of participants visited any web pages related to six widely publiciz…
9630 large-scale security incidents; few read about one even when an incident…
9631 likely to have affected them (e.g., the Equifax breach almost universally
9632 affected people with Equifax credit reports). We further found that more…
9633 incidents as well as articles that constructively spoke about the incide…
9634 inspired more action. We conclude with recommendations for specific futu…
9635 research and for enabling useful security incident information to reach …
9636 people.
9637 &lt;/p&gt;
9638 </description>
9639 </item>
9640 <item>
9641 <title>VarGrad: A Low-Variance Gradient Estimator for Variational Infere…
9642 <link>http://fr.arxiv.org/abs/2010.10436</link>
9643 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9644
9645 &lt;p&gt;We analyse the properties of an unbiased gradient estimator of …
9646 variational inference, based on the score function method with leave-one…
9647 control variates. We show that this gradient estimator can be obtained u…
9648 new loss, defined as the variance of the log-ratio between the exact pos…
9649 and the variational approximation, which we call the $\textit{log-varian…
9650 loss}$. Under certain conditions, the gradient of the log-variance loss …
9651 the gradient of the (negative) ELBO. We show theoretically that this gra…
9652 estimator, which we call $\textit{VarGrad}$ due to its connection to the
9653 log-variance loss, exhibits lower variance than the score function metho…
9654 certain settings, and that the leave-one-out control variate coefficient…
9655 close to the optimal ones. We empirically demonstrate that VarGrad offer…
9656 favourable variance versus computation trade-off compared to other
9657 state-of-the-art estimators on a discrete VAE.
9658 &lt;/p&gt;
9659 </description>
9660 </item>
9661 <item>
9662 <title>A Coarse-To-Fine (C2F) Representation for End-To-End 6-DoF Grasp …
9663 <link>http://fr.arxiv.org/abs/2010.10695</link>
9664 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9665
9666 &lt;p&gt;We proposed an end-to-end grasp detection network, Grasp Detect…
9667 (GDN), cooperated with a novel coarse-to-fine (C2F) grasp representation…
9668 to detect diverse and accurate 6-DoF grasps based on point clouds. Compa…
9669 previous two-stage approaches which sample and evaluate multiple grasp
9670 candidates, our architecture is at least 20 times faster. It is also 8% …
9671 more accurate in terms of the success rate in single object scenes and t…
9672 complete rate in clutter scenes, respectively. Our method shows superior
9673 results among settings with different number of views and input points.
9674 Moreover, we propose a new AP-based metric which considers both rotation…
9675 transition errors, making it a more comprehensive evaluation tool for gr…
9676 detection models.
9677 &lt;/p&gt;
9678 </description>
9679 </item>
9680 <item>
9681 <title>Model selection in reconciling hierarchical time series. (arXiv:2…
9682 <link>http://fr.arxiv.org/abs/2010.10742</link>
9683 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9684
9685 &lt;p&gt;Model selection has been proven an effective strategy for impro…
9686 in time series forecasting applications. However, when dealing with
9687 hierarchical time series, apart from selecting the most appropriate fore…
9688 model, forecasters have also to select a suitable method for reconciling…
9689 base forecasts produced for each series to make sure they are coherent.
9690 Although some hierarchical forecasting methods like minimum trace are st…
9691 supported both theoretically and empirically for reconciling the base
9692 forecasts, there are still circumstances under which they might not prod…
9693 most accurate results, being outperformed by other methods. In this pape…
9694 propose an approach for dynamically selecting the most appropriate hiera…
9695 forecasting method and succeeding better forecasting accuracy along with
9696 coherence. The approach, to be called conditional hierarchical forecasti…
9697 based on Machine Learning classification methods and uses time series fe…
9698 as leading indicators for performing the selection for each hierarchy ex…
9699 considering a variety of alternatives. Our results suggest that conditio…
9700 hierarchical forecasting leads to significantly more accurate forecasts …
9701 standard approaches, especially at lower hierarchical levels.
9702 &lt;/p&gt;
9703 </description>
9704 </item>
9705 <item>
9706 <title>Emformer: Efficient Memory Transformer Based Acoustic Model For L…
9707 <link>http://fr.arxiv.org/abs/2010.10759</link>
9708 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9709
9710 &lt;p&gt;This paper proposes an efficient memory transformer Emformer fo…
9711 streaming speech recognition. In Emformer, the long-range history contex…
9712 distilled into an augmented memory bank to reduce self-attention&apos;s …
9713 complexity. A cache mechanism saves the computation for the key and valu…
9714 self-attention for the left context. Emformer applies a parallelized blo…
9715 processing in training to support low latency models. We carry out exper…
9716 on benchmark LibriSpeech data. Under average latency of 960 ms, Emformer…
9717 WER $2.50\%$ on test-clean and $5.62\%$ on test-other. Comparing with a …
9718 baseline augmented memory transformer (AM-TRF), Emformer gets $4.6$ folds
9719 training speedup and $18\%$ relative real-time factor (RTF) reduction in
9720 decoding with relative WER reduction $17\%$ on test-clean and $9\%$ on
9721 test-other. For a low latency scenario with an average latency of 80 ms,
9722 Emformer achieves WER $3.01\%$ on test-clean and $7.09\%$ on test-other.
9723 Comparing with the LSTM baseline with the same latency and model size, E…
9724 gets relative WER reduction $9\%$ and $16\%$ on test-clean and test-othe…
9725 respectively.
9726 &lt;/p&gt;
9727 </description>
9728 </item>
9729 <item>
9730 <title>Large-Scale High PV Power Grid Dynamic Model Development -- A Cas…
9731 <link>http://fr.arxiv.org/abs/2010.11150</link>
9732 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9733
9734 &lt;p&gt;Power systems are undergoing a transformation toward a low-carb…
9735 non-synchronous generation portfolio. A major concern for system planner…
9736 operators is the system dynamics in the high renewable penetration futur…
9737 Because of the scale of the system and numerous components involved, it …
9738 extremely difficult to develop high PV dynamic models based upon actual …
9739 system models. The main contribution of this paper is providing an examp…
9740 developing high PV penetration models based on the validated dynamic mod…
9741 an actual large-scale power grid - the U.S. Eastern Interconnection syst…
9742 displacement of conventional generators by PV is realized by optimizatio…
9743 Combining the PV distribution optimization and the validated dynamic mod…
9744 information, this approach avoids the uncertainties brought about by
9745 transmission planning. As the existing dynamic models can be validated by
9746 measurements, this approach improves the credibility of the high PV mode…
9747 representing future power grids. This generic approach can be applied to
9748 develop high PV dynamic models for other actual large-scale systems.
9749 &lt;/p&gt;
9750 </description>
9751 </item>
9752 <item>
9753 <title>Build Smart Grids on Artificial Intelligence -- A Real-world Exam…
9754 <link>http://fr.arxiv.org/abs/2010.11175</link>
9755 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9756
9757 &lt;p&gt;Power grid data are going big with the deployment of various se…
9758 data in power grids creates huge opportunities for applying artificial
9759 intelligence technologies to improve resilience and reliability. This pa…
9760 introduces multiple real-world applications based on artificial intellig…
9761 improve power grid situational awareness and resilience. These applicati…
9762 include event identification, inertia estimation, event location and mag…
9763 estimation, data authentication, control, and stability assessment. These
9764 applications are operating on a real-world system called FNET-GridEye, w…
9765 a wide-area measurement network and arguably the world-largest cyber-phy…
9766 system that collects power grid big data. These applications showed much…
9767 performance compared with conventional approaches and accomplished new t…
9768 that are impossible to realized using conventional technologies. These
9769 encouraging results demonstrate that combining power grid big data and
9770 artificial intelligence can uncover and capture the non-linear correlati…
9771 between power grid data and its stabilities indices and will potentially…
9772 many advanced applications that can significantly improve power grid
9773 resilience.
9774 &lt;/p&gt;
9775 </description>
9776 </item>
9777 <item>
9778 <title>NightOwl: Robotic Platform for Wheeled Service Robot. (arXiv:2010…
9779 <link>http://fr.arxiv.org/abs/2010.11505</link>
9780 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9781
9782 &lt;p&gt;NightOwl is a robotic platform designed exclusively for a wheel…
9783 robot. The robot navigates autonomously in omnidirectional fashion movem…
9784 equipped with LIDAR to sense the surrounding area. The platform itself w…
9785 built using the Robot Operating System (ROS) and written in two different
9786 programming languages (C++ and Python). NightOwl is composed of several …
9787 programs, namely hardware controller, light detection and ranging (LIDAR…
9788 simultaneous localization and mapping (SLAM), world model, path planning…
9789 control, communication, and behaviour. The programs run in parallel and
9790 communicate reciprocally to share various information. This paper explai…
9791 role of modular programs in the term of input, process, and output. In
9792 addition, NightOwl provides simulation visualized in both Gazebo and RVi…
9793 robot in its environment is visualized by Gazebo. Sensor data from LIDAR…
9794 results from SLAM will be visualized by RViz.
9795 &lt;/p&gt;
9796 </description>
9797 </item>
9798 <item>
9799 <title>Label-Aware Neural Tangent Kernel: Toward Better Generalization a…
9800 <link>http://fr.arxiv.org/abs/2010.11775</link>
9801 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9802
9803 &lt;p&gt;As a popular approach to modeling the dynamics of training over…
9804 neural networks (NNs), the neural tangent kernels (NTK) are known to fall
9805 behind real-world NNs in generalization ability. This performance gap is…
9806 part due to the \textit{label agnostic} nature of the NTK, which renders…
9807 resulting kernel not as \textit{locally elastic} as NNs~\citep{he2019loc…
9808 this paper, we introduce a novel approach from the perspective of
9809 \emph{label-awareness} to reduce this gap for the NTK. Specifically, we …
9810 two label-aware kernels that are each a superimposition of a label-agnos…
9811 part and a hierarchy of label-aware parts with increasing complexity of …
9812 dependence, using the Hoeffding decomposition. Through both theoretical …
9813 empirical evidence, we show that the models trained with the proposed ke…
9814 better simulate NNs in terms of generalization ability and local elastic…
9815 &lt;/p&gt;
9816 </description>
9817 </item>
9818 <item>
9819 <title>The Polynomial Method is Universal for Distribution-Free Correlat…
9820 <link>http://fr.arxiv.org/abs/2010.11925</link>
9821 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9822
9823 &lt;p&gt;We consider the problem of distribution-free learning for Boole…
9824 classes in the PAC and agnostic models. Generalizing a recent beautiful …
9825 Malach and Shalev-Shwartz (2020) who gave the first tight correlational …
9826 (CSQ) lower bounds for learning DNF formulas, we show that lower bounds …
9827 threshold or approximate degree of any function class directly imply CSQ…
9828 bounds for PAC or agnostic learning respectively. These match correspond…
9829 positive results using upper bounds on the threshold or approximate degr…
9830 the SQ model for PAC or agnostic learning. Many of these results were im…
9831 in earlier works of Feldman and Sherstov.
9832 &lt;/p&gt;
9833 </description>
9834 </item>
9835 <item>
9836 <title>Escape saddle points faster on manifolds via perturbed Riemannian…
9837 <link>http://fr.arxiv.org/abs/2010.12191</link>
9838 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9839
9840 &lt;p&gt;In this paper, we propose a variant of Riemannian stochastic re…
9841 gradient method that can achieve second-order convergence guarantee and …
9842 saddle points using simple perturbation. The idea is to perturb the iter…
9843 when gradient is small and carry out stochastic recursive gradient updat…
9844 tangent space. This avoids the complication of exploiting Riemannian geo…
9845 We show that under finite-sum setting, our algorithm requires
9846 $\widetilde{\mathcal{O}}\big( \frac{ \sqrt{n}}{\epsilon^2} + \frac{\sqrt…
9847 }{\delta^4} + \frac{n}{\delta^3}\big)$ stochastic gradient queries to fi…
9848 $(\epsilon, \delta)$-second-order critical point. This strictly improves…
9849 complexity of perturbed Riemannian gradient descent and is superior to
9850 perturbed Riemannian accelerated gradient descent under large-sample set…
9851 We also provide a complexity of $\widetilde{\mathcal{O}} \big(
9852 \frac{1}{\epsilon^3} + \frac{1}{\delta^3 \epsilon^2} + \frac{1}{\delta^4
9853 \epsilon} \big)$ for online optimization, which is novel on Riemannian m…
9854 in terms of second-order convergence using only first-order information.
9855 &lt;/p&gt;
9856 </description>
9857 </item>
9858 <item>
9859 <title>On the mechanical contribution of head stabilization to passive d…
9860 <link>http://fr.arxiv.org/abs/2010.12234</link>
9861 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9862
9863 &lt;p&gt;During the steady gait, humans stabilize their head around the …
9864 orientation. While there are sensori-cognitive explanations for this
9865 phenomenon, its mechanical e fect on the body dynamics remains un-explor…
9866 this study, we take profit from the similarities that human steady gait …
9867 with the locomotion of passive dynamics robots. We introduce a simplified
9868 anthropometric D model to reproduce a broad walking dynamics. In a previ…
9869 study, we showed heuristically that the presence of a stabilized head-ne…
9870 system significantly influences the dynamics of walking. This paper give…
9871 insights that lead to understanding this mechanical e fect. In particula…
9872 introduce an original cart upper-body model that allows to better unders…
9873 the mechanical interest of head stabilization when walking, and we study…
9874 this e fect is sensitive to the choice of control parameters.
9875 &lt;/p&gt;
9876 </description>
9877 </item>
9878 <item>
9879 <title>Exploring task-based query expansion at the TREC-COVID track. (ar…
9880 <link>http://fr.arxiv.org/abs/2010.12674</link>
9881 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9882
9883 &lt;p&gt;We explore how to generate effective queries based on search ta…
9884 approach has three main steps: 1) identify search tasks based on research
9885 goals, 2) manually classify search queries according to those tasks, and…
9886 compare three methods to improve search rankings based on the task conte…
9887 most promising approach is based on expanding the user&apos;s query term…
9888 terms, which slightly improved the NDCG@20 scores over a BM25 baseline. …
9889 improvements might be gained if we can identify more specific search tas…
9890 &lt;/p&gt;
9891 </description>
9892 </item>
9893 <item>
9894 <title>Adaptive In-network Collaborative Caching for Enhanced Ensemble D…
9895 <link>http://fr.arxiv.org/abs/2010.12899</link>
9896 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9897
9898 &lt;p&gt;To enhance the quality and speed of data processing and protect…
9899 and security of the data, edge computing has been extensively applied to
9900 support data-intensive intelligent processing services at edge. Among th…
9901 data-intensive services, ensemble learning-based services can in natural
9902 leverage the distributed computation and storage resources at edge devic…
9903 achieve efficient data collection, processing, analysis.
9904 &lt;/p&gt;
9905 &lt;p&gt;Collaborative caching has been applied in edge computing to sup…
9906 close to the data source, in order to take the limited resources at edge
9907 devices to support high-performance ensemble learning solutions. To achi…
9908 this goal, we propose an adaptive in-network collaborative caching schem…
9909 ensemble learning at edge. First, an efficient data representation struc…
9910 proposed to record cached data among different nodes. In addition, we de…
9911 collaboration scheme to facilitate edge nodes to cache valuable data for…
9912 ensemble learning, by scheduling local caching according to a summarizat…
9913 data representations from different edge nodes. Our extensive simulations
9914 demonstrate the high performance of the proposed collaborative caching s…
9915 which significantly reduces the learning latency and the transmission ov…
9916 &lt;/p&gt;
9917 </description>
9918 </item>
9919 <item>
9920 <title>Lightning-Fast Gravitational Wave Parameter Inference through Neu…
9921 <link>http://fr.arxiv.org/abs/2010.12931</link>
9922 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9923
9924 &lt;p&gt;Gravitational waves from compact binaries measured by the LIGO …
9925 detectors are routinely analyzed using Markov Chain Monte Carlo sampling
9926 algorithms. Because the evaluation of the likelihood function requires
9927 evaluating millions of waveform models that link between signal shapes a…
9928 source parameters, running Markov chains until convergence is typically
9929 expensive and requires days of computation. In this extended abstract, we
9930 provide a proof of concept that demonstrates how the latest advances in …
9931 simulation-based inference can speed up the inference time by up to three
9932 orders of magnitude -- from days to minutes -- without impairing the
9933 performance. Our approach is based on a convolutional neural network mod…
9934 the likelihood-to-evidence ratio and entirely amortizes the computation …
9935 posterior. We find that our model correctly estimates credible intervals…
9936 the parameters of simulated gravitational waves.
9937 &lt;/p&gt;
9938 </description>
9939 </item>
9940 <item>
9941 <title>A Survey on Churn Analysis. (arXiv:2010.13119v2 [cs.LG] UPDATED)<…
9942 <link>http://fr.arxiv.org/abs/2010.13119</link>
9943 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9944
9945 &lt;p&gt;In this paper, I present churn prediction techniques that have …
9946 so far. Churn prediction is used in the fields of Internet services, gam…
9947 insurance, and management. However, since it has been used intensively to
9948 increase the predictability of various industry/academic fields, there i…
9949 difference in its definition and utilization. In this paper, I collected…
9950 definitions of churn used in the fields of business administration, mark…
9951 IT, telecommunications, newspapers, insurance and psychology, and descri…
9952 their differences. Based on this, I classified and explained churn loss,
9953 feature engineering, and prediction models. Our study can be used to sel…
9954 definition of churn and its associated models suitable for the service f…
9955 that researchers are most interested in by integrating fragmented churn …
9956 in industry/academic fields.
9957 &lt;/p&gt;
9958 </description>
9959 </item>
9960 <item>
9961 <title>Geometric Exploration for Online Control. (arXiv:2010.13178v2 [cs…
9962 <link>http://fr.arxiv.org/abs/2010.13178</link>
9963 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9964
9965 &lt;p&gt;We study the control of an \emph{unknown} linear dynamical syst…
9966 general convex costs. The objective is minimizing regret vs. the class of
9967 disturbance-feedback-controllers, which encompasses all stabilizing
9968 linear-dynamical-controllers. In this work, we first consider the case o…
9969 cost functions, for which we design the first polynomial-time algorithm …
9970 $n^3\sqrt{T}$-regret, where $n$ is the dimension of the state plus the
9971 dimension of control input. The $\sqrt{T}$-horizon dependence is optimal…
9972 improves upon the previous best known bound of $T^{2/3}$. The main compo…
9973 our algorithm is a novel geometric exploration strategy: we adaptively
9974 construct a sequence of barycentric spanners in the policy space. Second…
9975 consider the case of bandit feedback, for which we give the first
9976 polynomial-time algorithm with $poly(n)\sqrt{T}$-regret, building on Sto…
9977 Bandit Convex Optimization.
9978 &lt;/p&gt;
9979 </description>
9980 </item>
9981 <item>
9982 <title>Efficient Joinable Table Discovery in Data Lakes: A High-Dimensio…
9983 <link>http://fr.arxiv.org/abs/2010.13273</link>
9984 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
9985
9986 &lt;p&gt;Finding joinable tables in data lakes is key procedure in many …
9987 such as data integration, data augmentation, data analysis, and data mar…
9988 Traditional approaches that find equi-joinable tables are unable to deal…
9989 misspellings and different formats, nor do they capture any semantic joi…
9990 this paper, we propose PEXESO, a framework for joinable table discovery …
9991 lakes. We embed textual values as high-dimensional vectors and join colu…
9992 under similarity predicates on high-dimensional vectors, hence to addres…
9993 limitations of equi-join approaches and identify more meaningful results…
9994 efficiently find joinable tables with similarity, we propose a block-and…
9995 method that utilizes pivot-based filtering. A partitioning technique is
9996 developed to cope with the case when the data lake is large and the index
9997 cannot fit in main memory. An experimental evaluation on real datasets s…
9998 that our solution identifies substantially more tables than equi-joins a…
9999 outperforms other similarity-based options, and the join results are use…
10000 data enrichment for machine learning tasks. The experiments also demonst…
10001 the efficiency of the proposed method.
10002 &lt;/p&gt;
10003 </description>
10004 </item>
10005 <item>
10006 <title>Malicious Requests Detection with Improved Bidirectional Long Sho…
10007 <link>http://fr.arxiv.org/abs/2010.13285</link>
10008 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10009
10010 &lt;p&gt;Detecting and intercepting malicious requests are one of the mo…
10011 ways against attacks in the network security. Most existing detecting
10012 approaches, including matching blacklist characters and machine learning
10013 algorithms have all shown to be vulnerable to sophisticated attacks. To …
10014 the above issues, a more general and rigorous detection method is requir…
10015 this paper, we formulate the problem of detecting malicious requests as a
10016 temporal sequence classification problem, and propose a novel deep learn…
10017 model namely Convolutional Neural Network-Bidirectional Long Short-term
10018 Memory-Convolutional Neural Network (CNN-BiLSTM-CNN). By connecting the …
10019 and deep feature maps of the convolutional layers, the malicious feature
10020 extracting ability is improved on more detailed functionality. Experimen…
10021 results on HTTP dataset CSIC 2010 have demonstrated the effectiveness of…
10022 proposed method when compared with the state-of-the-arts.
10023 &lt;/p&gt;
10024 </description>
10025 </item>
10026 <item>
10027 <title>Recent Developments on ESPnet Toolkit Boosted by Conformer. (arXi…
10028 <link>http://fr.arxiv.org/abs/2010.13956</link>
10029 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10030
10031 &lt;p&gt;In this study, we present recent developments on ESPnet: End-to…
10032 Processing toolkit, which mainly involves a recently proposed architectu…
10033 called Conformer, Convolution-augmented Transformer. This paper shows the
10034 results for a wide range of end-to-end speech processing applications, s…
10035 automatic speech recognition (ASR), speech translations (ST), speech sep…
10036 (SS) and text-to-speech (TTS). Our experiments reveal various training t…
10037 significant performance benefits obtained with the Conformer on different
10038 tasks. These results are competitive or even outperform the current
10039 state-of-art Transformer models. We are preparing to release all-in-one …
10040 using open source and publicly available corpora for all the above tasks…
10041 pre-trained models. Our aim for this work is to contribute to our resear…
10042 community by reducing the burden of preparing state-of-the-art research
10043 environments usually requiring high resources.
10044 &lt;/p&gt;
10045 </description>
10046 </item>
10047 <item>
10048 <title>Simultaenous Sieves: A Deterministic Streaming Algorithm for Non-…
10049 <link>http://fr.arxiv.org/abs/2010.14367</link>
10050 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10051
10052 &lt;p&gt;In this work, we present a combinatorial, deterministic single-…
10053 algorithm for the problem of maximizing a submodular function, not neces…
10054 monotone, with respect to a cardinality constraint (SMCC). In the case t…
10055 function is monotone, our algorithm reduces to the optimal streaming alg…
10056 of Badanidiyuru et al. (2014). In general, our algorithm achieves ratio …
10057 / (1 + \alpha) - \varepsilon$, for any $\varepsilon &amp;gt; 0$, where $…
10058 ratio of an offline (deterministic) algorithm for SMCC used for
10059 post-processing. Thus, if exponential computation time is allowed, our
10060 algorithm deterministically achieves nearly the optimal $1/2$ ratio. The…
10061 results nearly match those of a recently proposed, randomized streaming
10062 algorithm that achieves the same ratios in expectation. For a determinis…
10063 single-pass streaming algorithm, our algorithm achieves in polynomial ti…
10064 improvement of the best approximation factor from $1/9$ of previous lite…
10065 to $\approx 0.2689$.
10066 &lt;/p&gt;
10067 </description>
10068 </item>
10069 <item>
10070 <title>Memory Optimization for Deep Networks. (arXiv:2010.14501v2 [cs.LG…
10071 <link>http://fr.arxiv.org/abs/2010.14501</link>
10072 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10073
10074 &lt;p&gt;Deep learning is slowly, but steadily, hitting a memory bottlen…
10075 tensor computation in top-of-the-line GPUs increased by 32x over the las…
10076 years, the total available memory only grew by 2.5x. This prevents resea…
10077 from exploring larger architectures, as training large networks requires…
10078 memory for storing intermediate outputs. In this paper, we present MONeT…
10079 automatic framework that minimizes both the memory footprint and computa…
10080 overhead of deep networks. MONeT jointly optimizes the checkpointing sch…
10081 and the implementation of various operators. MONeT is able to outperform…
10082 prior hand-tuned operations as well as automated checkpointing. MONeT re…
10083 the overall memory requirement by 3x for various PyTorch models, with a …
10084 overhead in computation. For the same computation cost, MONeT requires 1…
10085 less memory than current state-of-the-art automated checkpointing framew…
10086 Our code is available at https://github.com/utsaslab/MONeT.
10087 &lt;/p&gt;
10088 </description>
10089 </item>
10090 <item>
10091 <title>Language ID in the Wild: Unexpected Challenges on the Path to a T…
10092 <link>http://fr.arxiv.org/abs/2010.14571</link>
10093 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10094
10095 &lt;p&gt;Large text corpora are increasingly important for a wide variet…
10096 Language Processing (NLP) tasks, and automatic language identification (…
10097 is a core technology needed to collect such datasets in a multilingual c…
10098 LangID is largely treated as solved in the literature, with models repor…
10099 that achieve over 90% average F1 on as many as 1,366 languages. We train…
10100 models on up to 1,629 languages with comparable quality on held-out test…
10101 but find that human-judged LangID accuracy for web-crawl text corpora cr…
10102 using these models is only around 5% for many lower-resource languages,
10103 suggesting a need for more robust evaluation. Further analysis revealed a
10104 variety of error modes, arising from domain mismatch, class imbalance, l…
10105 similarity, and insufficiently expressive models. We propose two classes…
10106 techniques to mitigate these errors: wordlist-based tunable-precision fi…
10107 (for which we release curated lists in about 500 languages) and
10108 transformer-based semi-supervised LangID models, which increase median d…
10109 precision from 5.5% to 71.2%. These techniques enable us to create an in…
10110 data set covering 100K or more relatively clean sentences in each of 500+
10111 languages, paving the way towards a 1,000-language web text corpus.
10112 &lt;/p&gt;
10113 </description>
10114 </item>
10115 <item>
10116 <title>Predicting Themes within Complex Unstructured Texts: A Case Study…
10117 <link>http://fr.arxiv.org/abs/2010.14584</link>
10118 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10119
10120 &lt;p&gt;The task of text and sentence classification is associated with…
10121 large amounts of labelled training data. The acquisition of high volumes…
10122 labelled datasets can be expensive or unfeasible, especially for
10123 highly-specialised domains for which documents are hard to obtain. Resea…
10124 the application of supervised classification based on small amounts of t…
10125 data is limited. In this paper, we address the combination of state-of-t…
10126 deep learning and classification methods and provide an insight into what
10127 combination of methods fit the needs of small, domain-specific, and
10128 terminologically-rich corpora. We focus on a real-world scenario related…
10129 collection of safeguarding reports comprising learning experiences and
10130 reflections on tackling serious incidents involving children and vulnera…
10131 adults. The relatively small volume of available reports and their use of
10132 highly domain-specific terminology makes the application of automated
10133 approaches difficult. We focus on the problem of automatically identifyi…
10134 main themes in a safeguarding report using supervised classification
10135 approaches. Our results show the potential of deep learning models to si…
10136 subject-expert behaviour even for complex tasks with limited labelled da…
10137 &lt;/p&gt;
10138 </description>
10139 </item>
10140 <item>
10141 <title>Batch Reinforcement Learning with a Nonparametric Off-Policy Poli…
10142 <link>http://fr.arxiv.org/abs/2010.14771</link>
10143 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10144
10145 &lt;p&gt;Off-policy Reinforcement Learning (RL) holds the promise of bet…
10146 efficiency as it allows sample reuse and potentially enables safe intera…
10147 with the environment. Current off-policy policy gradient methods either …
10148 from high bias or high variance, delivering often unreliable estimates. …
10149 price of inefficiency becomes evident in real-world scenarios such as
10150 interaction-driven robot learning, where the success of RL has been rath…
10151 limited, and a very high sample cost hinders straightforward application…
10152 this paper, we propose a nonparametric Bellman equation, which can be so…
10153 closed form. The solution is differentiable w.r.t the policy parameters …
10154 gives access to an estimation of the policy gradient. In this way, we av…
10155 high variance of importance sampling approaches, and the high bias of
10156 semi-gradient methods. We empirically analyze the quality of our gradient
10157 estimate against state-of-the-art methods, and show that it outperforms …
10158 baselines in terms of sample efficiency on classical control tasks.
10159 &lt;/p&gt;
10160 </description>
10161 </item>
10162 <item>
10163 <title>Transferable Universal Adversarial Perturbations Using Generative…
10164 <link>http://fr.arxiv.org/abs/2010.14919</link>
10165 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10166
10167 &lt;p&gt;Deep neural networks tend to be vulnerable to adversarial pertu…
10168 which by adding to a natural image can fool a respective model with high
10169 confidence. Recently, the existence of image-agnostic perturbations, als…
10170 as universal adversarial perturbations (UAPs), were discovered. However,
10171 existing UAPs still lack a sufficiently high fooling rate, when being ap…
10172 to an unknown target model. In this paper, we propose a novel deep learn…
10173 technique for generating more transferable UAPs. We utilize a perturbati…
10174 generator and some given pretrained networks so-called source models to
10175 generate UAPs using the ImageNet dataset. Due to the similar feature
10176 representation of various model architectures in the first layer, we pro…
10177 loss formulation that focuses on the adversarial energy only in the resp…
10178 first layer of the source models. This supports the transferability of o…
10179 generated UAPs to any other target model. We further empirically analyze…
10180 generated UAPs and demonstrate that these perturbations generalize very …
10181 towards different target models. Surpassing the current state of the art…
10182 both, fooling rate and model-transferability, we can show the superiorit…
10183 our proposed approach. Using our generated non-targeted UAPs, we obtain …
10184 average fooling rate of 93.36% on the source models (state of the art: 8…
10185 Generating our UAPs on the deep ResNet-152, we obtain about a 12% absolu…
10186 fooling rate advantage vs. cutting-edge methods on VGG-16 and VGG-19 tar…
10187 models.
10188 &lt;/p&gt;
10189 </description>
10190 </item>
10191 <item>
10192 <title>Estimating Multiplicative Relations in Neural Networks. (arXiv:20…
10193 <link>http://fr.arxiv.org/abs/2010.15003</link>
10194 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10195
10196 &lt;p&gt;Universal approximation theorem suggests that a shallow neural …
10197 approximate any function. The input to neurons at each layer is a weight…
10198 of previous layer neurons and then an activation is applied. These activ…
10199 functions perform very well when the output is a linear combination of i…
10200 data. When trying to learn a function which involves product of input da…
10201 neural networks tend to overfit the data to approximate the function. In…
10202 paper we will use properties of logarithmic functions to propose a pair …
10203 activation functions which can translate products into linear expression…
10204 learn using backpropagation. We will try to generalize this approach for…
10205 complex arithmetic functions and test the accuracy on a disjoint distrib…
10206 with the training set.
10207 &lt;/p&gt;
10208 </description>
10209 </item>
10210 <item>
10211 <title>Benchmarking Parallelism in FaaS Platforms. (arXiv:2010.15032v2 […
10212 <link>http://fr.arxiv.org/abs/2010.15032</link>
10213 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10214
10215 &lt;p&gt;Serverless computing has seen a myriad of work exploring its po…
10216 systems tackle Function-as-a-Service (FaaS) properties on automatic elas…
10217 and scale to run highly-parallel computing jobs. However, they focus on
10218 specific platforms and convey that their ideas can be extrapolated to an…
10219 runtime.
10220 &lt;/p&gt;
10221 &lt;p&gt;An important question arises: do all FaaS platforms fit parallel
10222 computations? In this paper, we argue that not all of them provide the
10223 necessary means to host highly-parallel applications. To validate our
10224 hypothesis, we create a comparative framework and categorize the archite…
10225 of four cloud FaaS offerings, with emphasis on parallel performance. We …
10226 and extend this description with an empirical experiment that consists in
10227 plotting in deep detail the evolution of a parallel computing job on each
10228 service.
10229 &lt;/p&gt;
10230 &lt;p&gt;The analysis of our results evinces that FaaS is not inherently…
10231 parallel computations and architectural differences across platforms are
10232 decisive to categorize their performance. A key insight is the importanc…
10233 virtualization technologies and the scheduling approach of FaaS platform…
10234 Parallelism improves with lighter virtualization and proactive schedulin…
10235 to finer resource allocation and faster elasticity. This causes some pla…
10236 like AWS and IBM to perform well for highly-parallel computations, while…
10237 such as Azure present difficulties to achieve the required parallelism d…
10238 Consequently, the information in this paper becomes of special interest …
10239 users choose the most adequate infrastructure for their parallel applica…
10240 &lt;/p&gt;
10241 </description>
10242 </item>
10243 <item>
10244 <title>Measuring non-trivial compositionality in emergent communication.…
10245 <link>http://fr.arxiv.org/abs/2010.15058</link>
10246 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10247
10248 &lt;p&gt;Compositionality is an important explanatory target in emergent…
10249 and language evolution. The vast majority of computational models of
10250 communication account for the emergence of only a very basic form of
10251 compositionality: trivial compositionality. A compositional protocol is
10252 trivially compositional if the meaning of a complex signal (e.g. blue ci…
10253 boils down to the intersection of meanings of its constituents (e.g. the
10254 intersection of the set of blue objects and the set of circles). A proto…
10255 non-trivially compositional (NTC) if the meaning of a complex signal (e.…
10256 biggest apple) is a more complex function of the meanings of their
10257 constituents. In this paper, we review several metrics of compositionali…
10258 in emergent communication and experimentally show that most of them fail…
10259 detect NTC - i.e. they treat non-trivial compositionality as a failure of
10260 compositionality. The one exception is tree reconstruction error, a metr…
10261 motivated by formal accounts of compositionality. These results emphasise
10262 important limitations of emergent communication research that could hamp…
10263 progress on modelling the emergence of NTC.
10264 &lt;/p&gt;
10265 </description>
10266 </item>
10267 <item>
10268 <title>The fundamental equations of change in statistical ensembles and …
10269 <link>http://fr.arxiv.org/abs/2010.14544</link>
10270 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10271
10272 &lt;p&gt;A recent article in Nature Physics unified key results from the…
10273 statistics, and information theory. The unification arose from a general
10274 equation for the rate of change in the information content of a system. …
10275 general equation describes the change in the moments of an observable qu…
10276 over a probability distribution. One term in the equation describes the …
10277 in the probability distribution. The other term describes the change in …
10278 observable values for a given state. We show the equivalence of this gen…
10279 equation for moment dynamics with the widely known Price equation from
10280 evolutionary theory, named after George Price. We introduce the Price eq…
10281 from its biological roots, review a mathematically abstract form of the
10282 equation, and discuss the potential for this equation to unify diverse
10283 mathematical theories from different disciplines. The new work in Nature
10284 Physics and many applications in biology show that this equation also pr…
10285 the basis for deriving many novel theoretical results within each discip…
10286 &lt;/p&gt;
10287 </description>
10288 </item>
10289 <item>
10290 <title>Generalized eigen, singular value, and partial least squares deco…
10291 <link>http://fr.arxiv.org/abs/2010.14734</link>
10292 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10293
10294 &lt;p&gt;The generalized singular value decomposition (GSVD, a.k.a. &quo…
10295 &quot;duality diagram&quot; approach) provides a unified strategy and ba…
10296 nearly all of the most common multivariate analyses (e.g., principal
10297 components, correspondence analysis, multidimensional scaling, canonical
10298 correlation, partial least squares). Though the GSVD is ubiquitous, powe…
10299 and flexible, it has very few implementations. Here I introduce the GSVD
10300 package for R. The general goal of GSVD is to provide a small set of acc…
10301 functions to perform the GSVD and two other related decompositions (gene…
10302 eigenvalue decomposition, generalized partial least squares-singular val…
10303 decomposition). Furthermore, GSVD helps provide a more unified conceptual
10304 approach and nomenclature to many techniques. I first introduce the conc…
10305 the GSVD, followed by a formal definition of the generalized decompositi…
10306 Next I provide some key decisions made during development, and then a nu…
10307 examples of how to use GSVD to implement various statistical techniques.…
10308 examples also illustrate one of the goals of GSVD: how others can (or sh…
10309 build analysis packages that depend on GSVD. Finally, I discuss the poss…
10310 future of GSVD.
10311 &lt;/p&gt;
10312 </description>
10313 </item>
10314 <item>
10315 <title>Continuous Chaotic Nonlinear System and Lyapunov controller Optim…
10316 <link>http://fr.arxiv.org/abs/2010.14746</link>
10317 <description>&lt;p&gt;Authors: &lt;a href=&quot;http://fr.arxiv.org/fin…
10318
10319 &lt;p&gt;The introduction of unexpected system disturbances and new syst…
10320 does not allow initially selected static system and controller parameter…
10321 guarantee continued system stability and performance. In this research we
10322 present a novel approach for detecting early failure indicators of non-l…
10323 highly chaotic system and accordingly predict the best parameter calibra…
10324 to offset such instability using deep machine learning regression model.…
10325 approach proposed continuously monitors the system and controller signal…
10326 Re-calibration of the system and controller parameters is triggered acco…
10327 to a set of conditions designed to maintain system stability without com…
10328 to the system speed, intended outcome or required processing power. The …
10329 neural model predicts the parameter values that would best counteract the
10330 expected system in-stability. To demonstrate the effectiveness of the pr…
10331 approach, it is applied to the non-linear complex combination of Duffing…
10332 der pol oscillators. The approach is also tested under different scenari…
10333 system and controller parameters are initially chosen incorrectly or the…
10334 parameters are changed while running or new system dynamics are introduc…
10335 while running to measure effectiveness and reaction time.
10336 &lt;/p&gt;
10337 </description>
10338 </item>
10339 </channel>
10340
You are viewing proxied material from codemadness.org. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.