text
stringlengths 70
7.94k
| __index_level_0__
int64 105
711k
|
---|---|
Title: Dirac-type theorems in random hypergraphs
Abstract: For positive integers d<k and n divisible by k, let md(k,n) be the minimum d-degree ensuring the existence of a perfect matching in a k-uniform hypergraph. In the graph case (where k=2), a classical theorem of Dirac says that m1(2,n)=⌈n/2⌉. However, in general, our understanding of the values of md(k,n) is still very limited, and it is an active topic of research to determine or approximate these values. In this paper we prove a “transference” theorem for Dirac-type results relative to random hypergraphs. Specifically, for any d<k, any ε>0 and any “not too small” p, we prove that a random k-uniform hypergraph G with n vertices and edge probability p typically has the property that every spanning subgraph of G with minimum d-degree at least (1+ε)md(k,n)p has a perfect matching. One interesting aspect of our proof is a “non-constructive” application of the absorbing method, which allows us to prove a bound in terms of md(k,n) without actually knowing its value. | 124,585 |
Title: Mc2g: An Efficient Algorithm for Matrix Completion With Social and Item Similarity Graphs
Abstract: In this paper, we design and analyze Mc2g (Matrix Completion with 2 Graphs), an efficient algorithm that performs matrix completion in the presence of social and item similarity graphs. Mc2g runs in quasilinear time and is parameter free. It is based on spectral clustering and local refinement steps. For the matrix completion problem which possesses additional block structures in its rows and columns, we derive the expected number of sampled entries required for Mc2g to succeed, and further show that it matches an information-theoretic lower bound up to a constant factor for a wide range of parameters. We perform extensive experiments on both synthetic datasets and a semi-real dataset inspired by real graphs. The experimental results show that Mc2g outperforms other state-of-the-art matrix completion algorithms. | 124,586 |
Title: A Comparison of Self-Play Algorithms Under a Generalized Framework
Abstract: The notion of self-play, albeit often cited in multiagent reinforcement learning as a process by which to train agent policies from scratch, has received little efforts to be taxonomized within a formal model. We present a formalized framework, with clearly defined assumptions, which encapsulates the meaning of self-play as abstracted from various existing self-play algorithms. This framework is framed as an approximation to a theoretical solution concept for multiagent training. Through a novel qualitative visualization metric, on a simple environment, we show that different self-play algorithms generate different distributions of episode trajectories, leading to different explorations of the policy space by the learning agents. Quantitatively, on two environments, we analyze the learning dynamics of policies trained under different self-play algorithms captured under our framework and perform cross self-play performance comparisons. Our results indicate that, throughout training, various widely used self-play algorithms exhibit cyclic policy evolutions and that the choice of self-play algorithm significantly affects the final performance of trained agents. | 124,603 |
Title: Softwarization, Virtualization, and Machine Learning for Intelligent and Effective Vehicle-to-Everything Communications
Abstract: The concept of the 5G mobile network system has emerged in recent years as telecommunication operators and service providers look to upgrade their infrastructure and delivery modes to meet the growing demand. Concepts such as softwarization, virtualization, and machine learning will be key components as innovative and flexible enablers of such networks. In particular, paradigms such as software-de... | 124,619 |
Title: Graph-Based Visual-Semantic Entanglement Network for Zero-Shot Image Recognition
Abstract: Zero-shot learning uses semantic attributes to connect the search space of unseen objects. In recent years, although the deep convolutional network brings powerful visual modeling capabilities to the ZSL task, its visual features have severe pattern inertia and lack of representation of semantic relationships, which leads to severe bias and ambiguity. In response to this, we propose the Graph-based Visual-Semantic Entanglement Network to conduct graph modeling of visual features, which is mapped to semantic attributes by using a knowledge graph, it contains several novel designs: 1. it establishes a multi-path entangled network with the convolutional neural network (CNN) and the graph convolutional network (GCN), which input the visual features from CNN to GCN to model the implicit semantic relations, then GCN feedback the graph modeled information to CNN features; 2. it uses attribute word vectors as the target for the graph semantic modeling of GCN, which forms a self-consistent regression for graph modeling and supervise GCN to learn more personalized attribute relations; 3. it fuses and supplements the hierarchical visual-semantic features refined by graph modeling into visual embedding. Our method outperforms state-of-the-art approaches on multiple representative ZSL datasets: AwA2, CUB, and SUN by promoting the semantic linkage modelling of visual features. | 124,631 |
Title: Distributed Event-Triggered Control for Cooperative Output Regulation of Multiagent Systems With an Online Estimation Algorithm
Abstract: In this article, the cooperative output regulation problem of heterogeneous multiagent systems has been investigated. It is assumed that only a few agents could know the system matrix of the exosystem and no agent knows the topological information. Under these conditions, a novel distributed online algorithm is proposed to estimate the information relevant to the topology. Based on this algorithm,... | 124,953 |
Title: Robust Subspace Clustering With Low-Rank Structure Constraint
Abstract: In this paper, a novel low-rank structural model is proposed for segmenting data drawn from a high-dimensional space. Our method is based on the fact that all groups clustered from a high-dimensional dataset are distributed in multiple low-rank subspaces. In general, it’s a very difficult task to find the low-rank structures hidden in data. Different from the classical sparse subspace clustering (SSC) and low-rank representation (LRR) which all take two steps including building the affinity matrix and spectral clustering, we introduce a new rank constraint into our model. This constraint allows our model to learn a subspace indicator which can capture different clusters directly from the data without any postprocessing. To further approximate the rank constraint, a piecewise function is utilized as the relaxing item for the proposed model. Besides, under the subspace indicator constraints, the integer programming problem is avoided, which makes our algorithm more efficient and scalable. In addition, we prove the convergence of the proposed algorithm in theory and further discuss the general case in which subspaces don’t pass through the origin. Experiment results on both synthetic and real-world datasets demonstrate that our algorithm significantly outperforms the state-of-the-art methods. | 124,996 |
Title: Fuzzy K-Means Clustering With Discriminative Embedding
Abstract: Fuzzy K-Means (FKM) clustering is of great importance for analyzing unlabeled data. FKM algorithms assign each data point to multiple clusters with some degree of certainty measured by the membership function. In these methods, the fuzzy membership degree matrix is obtained based on the calculation of the distance between data points in the original space. However, this operation may lead to suboptimal results because of the influence of noises and redundant features. Besides, some FKM clustering methods ignore the importance of the weighting exponent. In this paper, we propose a novel FKM method called Fuzzy K-Means Clustering With Discriminative Embedding. Within this method, we simultaneously conduct dimensionality reduction along with fuzzy membership degree learning. To retain most information in the embedding subspace and improve the robustness of this method, principal component analysis is incorporated into our framework. An iterative optimization algorithm is proposed to solve the model. To validate the efficacy of the proposed method, we perform comprehensive analyses, including convergence behavior, parameter determination and computational complexity. Moreover, we also match a appropriate weighting exponent for each data set. Experimental results on benchmark data sets show that the proposed method is more discriminative and effective for clustering tasks. | 124,997 |
Title: Inner-Imaging Networks: Put Lenses Into Convolutional Structure
Abstract: Despite the tremendous success in computer vision, deep convolutional networks suffer from serious computation costs and redundancies. Although previous works address that by enhancing the diversities of filters, they have not considered the complementarity and the completeness of the internal convolutional structure. To respond to this problem, we propose a novel inner-imaging (InI) architecture, which allows relationships between channels to meet the above requirement. Specifically, we organize the channel signal points in groups using convolutional kernels to model both the intragroup and intergroup relationships simultaneously. A convolutional filter is a powerful tool for modeling spatial relations and organizing grouped signals, so the proposed methods map the channel signals onto a pseudoimage, like putting a lens into the internal convolution structure. Consequently, not only is the diversity of channels increased but also the complementarity and completeness can be explicitly enhanced. The proposed architecture is lightweight and easy to be implement. It provides an efficient self-organization strategy for convolutional networks to improve their performance. Extensive experiments are conducted on multiple benchmark datasets, including CIFAR, SVHN, and ImageNet. Experimental results verify the effectiveness of the InI mechanism with the most popular convolutional networks as the backbones. | 125,013 |
Title: A note on the Screaming Toes game
Abstract: We investigate properties of random mappings whose core is composed of derangements as opposed to permutations. Such mappings arise as the natural framework for studying the Screaming Toes game described, for example, by Peter Cameron. This mapping differs from the classical case primarily in the behaviour of the small components, and a number of explicit results are provided to illustrate these differences. | 125,260 |
Title: A novel navigation system for an autonomous mobile robot in an uncertain environment
Abstract: In this paper, we developed a new navigation system, called ATCM, which detects obstacles in a sliding window with an adaptive threshold clustering algorithm, classifies the detected obstacles with a decision tree, heuristically predicts potential collision and finds optimal path with a simplified Morphin algorithm. This system has the merits of optimal free-collision path, small memory size and less computing complexity, compared with the state of the arts in robot navigation. The modular design of 6-steps navigation provides a holistic methodology to implement and verify the performance of a robot's navigation system. The experiments on simulation and a physical robot for the eight scenarios demonstrate that the robot can effectively and efficiently avoid potential collisions with any static or dynamic obstacles in its surrounding environment. Compared with the particle swarm optimisation, the dynamic window approach and the traditional Morphin algorithm for the autonomous navigation of a mobile robot in a static environment, ATCM achieved the shortest path with higher efficiency. | 125,265 |
Title: A Survey on Generative Adversarial Networks: Variants, Applications, and Training
Abstract: AbstractThe Generative Models have gained considerable attention in unsupervised learning via a new and practical framework called Generative Adversarial Networks (GAN) due to their outstanding data generation capability. Many GAN models have been proposed, and several practical applications have emerged in various domains of computer vision and machine learning. Despite GANs excellent success, there are still obstacles to stable training. The problems are Nash equilibrium, internal covariate shift, mode collapse, vanishing gradient, and lack of proper evaluation metrics. Therefore, stable training is a crucial issue in different applications for the success of GANs. Herein, we survey several training solutions proposed by different researchers to stabilize GAN training. We discuss (I) the original GAN model and its modified versions, (II) a detailed analysis of various GAN applications in different domains, and (III) a detailed study about the various GAN training obstacles as well as training solutions. Finally, we reveal several issues as well as research outlines to the topic. | 125,278 |
Title: A pseudo-spectral Strang splitting method for linear dispersive problems with transparent boundary conditions
Abstract: The present work proposes a second-order time splitting scheme for a linear dispersive equation with a variable advection coefficient subject to transparent boundary conditions. For its spatial discretization, a dual Petrov-Galerkin method is considered which gives spectral accuracy. The main difficulty in constructing a second-order splitting scheme in such a situation lies in the compatibility condition at the boundaries of the sub-problems. In particular, the presence of an inflow boundary condition in the advection part results in order reduction. To overcome this issue a modified Strang splitting scheme is introduced that retains second-order accuracy. For this numerical scheme a stability analysis is conducted. In addition, numerical results are shown to support the theoretical derivations. | 125,281 |
Title: Adaptive Gradient Coding
Abstract: AbstractThis paper focuses on mitigating the impact of stragglers in distributed learning system. Unlike the existing results designated for a fixed number of stragglers, we develop a new scheme called Adaptive Gradient Coding (AGC) with flexible communication cost for varying number of stragglers. Our scheme gives an optimal tradeoff between computation load, straggler tolerance and communication cost by allowing workers to send multiple signals sequentially to the master. In particular, it can minimize the communication cost according to the unknown real-time number of stragglers in practical environments. In addition, we present a Group AGC (G-AGC) by combining the group idea with AGC to resist more stragglers in some situations. The numerical and simulation results demonstrate that our adaptive schemes can achieve the smallest average running time. | 125,288 |
Title: A graph-based modeling abstraction for optimization: concepts and implementation in Plasmo.jl
Abstract: We present a general graph-based modeling abstraction for optimization that we call an OptiGraph. Under this abstraction, any optimization problem is treated as a hierarchical hypergraph in which nodes represent optimization subproblems and edges represent connectivity between such subproblems. The abstraction enables the modular construction of complex models in an intuitive manner, facilitates the use of graph analysis tools (to perform partitioning, aggregation, and visualization tasks), and facilitates communication of structures to decomposition algorithms. We provide an open-source implementation of the abstraction in the Julia-based package Plasmo.jl. We provide tutorial examples and large application case studies to illustrate the capabilities. | 125,308 |
Title: Scalability in Computing and Robotics
Abstract: Efficient engineered systems require scalability. A scalable system has increasing performance with increasing system size. In an ideal situation, the increase in performance (e.g., speedup) corresponds to the number of units (e.g., processors, robots, users) that are added to the system (e.g., three times the number of processors in a computer would lead to three times faster computations). Howev... | 125,314 |
Title: Fluid Antenna Multiple Access
Abstract: Fluid antenna system represents an emerging technology that enables an antenna to switch its physical location in a predefined space. This paper explores the potential of using a single fluid antenna at each mobile user for multiple access, which we refer to it as fluid antenna multiple access (FAMA). FAMA exploits spatial moments of deep fade suffered by the interference to achieve a favourable channel condition for the desired signal, without requiring sophisticated signal processing. We analyze the FAMA network by first deriving the outage probability of the signal-to-interference ratio (SIR) in a double integral form. We then obtain an outage probability upper bound in closed form and an average outage rate lower bound for the FAMA system, with an arbitrary number of interferers, from which the multiplexing gain of FAMA is characterized. We also estimate how large the number of locations is required to achieve a given multiplexing gain using fluid antennas with a given size. Results show that it is possible for FAMA to support hundreds of users using only one fluid antenna of a few wavelengths of space at each user, giving rise to significant gain in the average network outage rate. | 125,326 |
Title: Making Convolutions Resilient Via Algorithm-Based Error Detection Techniques
Abstract: Convolutional Neural Networks (CNNs) are being increasingly used in safety-critical and high-performance computing systems. As such systems require high levels of resilience to errors, CNNs must execute correctly in the presence of hardware faults. Full duplication provides the needed assurance but incurs a prohibitive 100 percent overhead. In this article, we focus on algorithmically verifying convolutions, the most resource-demanding operations in CNNs. We use checksums to verify convolutions. We identify the feasibility and performance related challenges that arise in algorithmically detecting errors in convolutions in optimized CNN inference deployment platforms (e.g., TensorFlow or TensorRT on GPUs) that fuse multiple network layers and use reduced-precision operations, and demonstrate how to overcome them. We propose and evaluate variations of the algorithm-based error detection (ABED) techniques that offer implementation complexity, runtime overhead, and coverage trade-offs. Results show that ABED can detect all transient hardware errors that might otherwise corrupt output with low runtime overheads (6-23 percent). Only about 1.4 percent of the total computations in a CNN are not protected by ABED, which can be duplicated for full CNN protection. ABED for the compute-intensive convolutions and duplicating the rest can offer at least 1.6× throughput compared to full duplication. | 125,336 |
Title: CLAIMED: A CLAssification-Incorporated Minimum Energy Design to Explore a Multivariate Response Surface With Feasibility Constraints
Abstract: Motivated by the problem of optimization of force-field systems in physics using large-scale computer simulations, we consider exploration of a deterministic complex multivariate response surface. The objective is to find input combinations that generate output close to some desired or “target” vector. Despite reducing the problem to exploration of the input space with respect to a 1-D loss function, the search is nontrivial and challenging due to infeasible input combinations, high dimensionalities of the input and output space and multiple “desirable” regions in the input space, and the difficulty of emulating the objective function well with a surrogate model. We propose an approach that is based on combining machine learning techniques with smart experimental design ideas to locate multiple good regions in the input space. Note to Practitioners—ReaxFF is a force field that incorporates complex functions with associated inputs in order to describe the inter- and intra-atomic interactions in materials systems. A typical ReaxFF force field consists of hundreds of parameters (inputs) per element type. During the development of a force field for a molecular system of interest, using computer simulations, these parameters are optimized to reproduce hundreds of material properties close to some benchmark reference values. Finding “good” combinations of hundreds of parameters that produce hundreds of reference values close to their gold standards is a challenging problem because there may be several parameter combinations that may be “almost equally good” or “equally desirable.” To add to the complication, several input combinations simply lead to a system crash, not producing any output at all. Standard global optimization methods do not address such a problem. We propose a novel framework that can address this problem. Beyond the ReaxFF optimization, it can be applied to multiobjective optimization in engineering and the physical sciences, where there are unknown constraints and the focus is on obtaining several good points that can serve as alternatives to a single global optimum. | 125,342 |
Title: Online Page Migration with ML Advice
Abstract: We consider online algorithms for the page migration problem that use predictions, potentially imperfect, to improve their performance. The best known online algorithms for this problem, due to Westbrook'94 and Bienkowski et al'17, have competitive ratios strictly bounded away from 1. In contrast, we show that if the algorithm is given a prediction of the input sequence, then it can achieve a competitive ratio that tends to 1 as the prediction error rate tends to 0. Specifically, the competitive ratio is equal to 1+O(q), where q is the prediction error rate. We also design a "fallback option" that ensures that the competitive ratio of the algorithm for any input sequence is at most O(1/q). Our result adds to the recent body of work that uses machine learning to improve the performance of \classic" algorithms. | 125,345 |
Title: Neuron Circuits for Low-Power Spiking Neural Networks Using Time-To-First-Spike Encoding
Abstract: Hardware-based Spiking Neural Networks (SNNs) are regarded as promising candidates for the cognitive computing system due to its low power consumption and highly parallel operation. In this paper, we train the SNN in which the firing time carries information using temporal backpropagation. The temporally encoded SNN with 512 hidden neurons achieved an accuracy of 96.90% for the MNIST test set. Furthermore, the effect of the device variation on the accuracy in temporally encoded SNN is investigated and compared with that of the rate-encoded network. In a hardware configuration of our SNN, NOR-type analog memory having an asymmetric floating gate is used as a synaptic device. In addition, we propose a neuron circuit including a refractory period generator for temporally encoded SNN. The performance of the 2-layer neural network composed of synapses and proposed neurons is evaluated through circuit simulation using SPICE based on the BSIM3v3 model with 0.35 mu m technology. The network with 128 hidden neurons achieved an accuracy of 94.9%, a 0.1% reduction compared to that of the system simulation of the MNIST dataset. Finally, each block's latency and power consumption constituting the temporal network is analyzed and compared with those of the rate-encoded network depending on the total time step. Assuming that the network has 256 total time steps, the temporal network consumes 15.12 times less power than the rate-encoded network and makes decisions 5.68 times faster. | 125,347 |
Title: Provably Robust Verification of Dissipativity Properties from Data
Abstract: Dissipativity properties have proven to be very valuable for systems analysis and controller design. With the rising amount of available data, there has, therefore, been an increasing interest in determining dissipativity properties from (measured) trajectories directly, while an explicit model of the system remains undisclosed. Most existing approaches for data-driven dissipativity, however, guarantee the dissipativity condition only over a finite-time horizon and provide weak or no guarantees on robustness in the presence of noise. In this article, we present a framework for verifying dissipativity properties from measured data with desirable guarantees. We first consider the case of input-state measurements, where we provide computationally attractive conditions in the presence of process noise. We extend this approach to input–output data, where similar results hold in the noise-free case, and finally provide results for the case of noisy input–output trajectories. | 125,370 |
Title: An Analytic Center Cutting Plane Method to Determine Complete Positivity of a Matrix
Abstract: We propose an analytic center cutting plane method to determine whether a matrix is completely positive and return a cut that separates it from the completely positive cone if not. This was stated as an open (computational) problem by Berman et al. [Berman A, Dur M, Shaked-Monderer N (2015) Open problems in the theory of completely positive and copositive matrices. Electronic 1. Linear Algebra 29(1):46-58]. Our method optimizes over the intersection of a ball and the copositive cone, where membership is determined by solving a mixed-integer linear program suggested by Xia et al. [Xia W, Vera JC, Zuluaga LF (2020) Globally solving nonconvex quadratic programs via linear integer programming techniques. INFORMS J. Comput 32(1):40-561 Thus, our algorithm can, more generally, be used to solve any copositive optimization problem, provided one knows the radius of a ball containing an optimal solution. Numerical experiments show that the number of oracle calls (matrix copositivity checks) for our implementation scales well with the matrix size, growing roughly like O(d(2)) for d x d matrices. The method is implemented in Julia and available at https://github.com/rileybadenbroek/CopositiveAnalyticCenter.jl. Summary of Contribution: Completely positive matrices play an important role in operations research. They allow many NP-hard problems to be formulated as optimization problems over a proper cone, which enables them to benefit from the duality theory of convex programming. We propose an analytic center cutting plane method to determine whether a matrix is completely positive by solving an optimization problem over the copositive cone. In fact, we can use our method to solve any copositive optimization problem, provided we know the radius of a ball containing an optimal solution. We emphasize numerical performance and stability in developing this method. A software implementation in Julia is provided. | 125,396 |
Title: Geometric Solutions for General Actuator Routing on Inflated-Beam Soft Growing Robots
Abstract: Continuum and soft robots can leverage complex actuator shapes to take onuseful shapes while actuating only a few of their many degrees of freedom. Continuum robotsthat alsogrow increasethe range of potential shapes that can be actuated and enable easier access to constrained environments. Existing models for describing the complex kinematics involved in general actuation of continuum robots rely on simulation or well-behaved stress–strain relationships, but the nonlinear behavior of the thin-walled inflated-beams used in growing robots makes these techniques difficult to apply. Here, we derive kinematic models of single, generally routed tendon paths on a soft pneumatic backbone of inextensible but flexible material from geometric relationships alone. This allows for forward modeling of the resulting shapes with only knowledge of the geometry of the system. We show that this model can accurately predict the shape of the whole robot body and how the model changes with actuation type. We also demonstrate the use of this kinematic model for inverse design, where actuator designs are found based on desired final robot shapes. We deploy these designed actuators on soft pneumatic growing robots to show the benefits of simultaneous growth and shape change. | 125,404 |
Title: Sovereign: Self-Contained Smart Home With Data-Centric Network and Security
Abstract: Recent years have witnessed the rapid deployment of smart homes; most of them are controlled by remote servers in the cloud. Such designs raise security and privacy concerns for end users. In this article, we describe the design of Sovereign, a home Internet of Things (IoT) system framework that provides end users complete control of their home IoT systems. Sovereign lets home IoT devices and applications communicate via application-named data and secures data directly. This approach enables direct, secure, one-to-one, and one-to-many Device-to-Device communication over wireless broadcast media. Sovereign utilizes semantic names to construct usable security solutions. We implement Sovereign as a publish–subscribe-based development platform together with a prototype home IoT controller. Our preliminary evaluation shows that Sovereign provides a systematic, easy-to-use solution to user-controlled, self-contained smart homes running on existing IoT hardware without imposing noticeable overhead. | 125,405 |
Title: Boundary element methods for the wave equation based on hierarchical matrices and adaptive cross approximation
Abstract: Time-domain Boundary Element Methods (BEM) have been successfully used in acoustics, optics and elastodynamics to solve transient problems numerically. However, the storage requirements are immense, since the fully populated system matrices have to be computed for a large number of time steps or frequencies. In this article, we propose a new approximation scheme for the Convolution Quadrature Method powered BEM, which we apply to scattering problems governed by the wave equation. We use H-2-matrix compression in the spatial domain and employ an adaptive cross approximation algorithm in the frequency domain. In this way, the storage and computational costs are reduced significantly, while the accuracy of the method is preserved. | 125,414 |
Title: An ontological metamodel for cyber-physical system safety, security, and resilience coengineering
Abstract: Cyber-physical systems are complex systems that require the integration of diverse software, firmware, and hardware to be practical and useful. This increased complexity is impacting the management of models necessary for designing cyber-physical systems that are able to take into account a number of "-ilities", such that they are safe and secure and ultimately resilient to disruption of service. We propose an ontological metamodel for system design that augments an already existing industry metamodel to capture the relationships between various model elements (requirements, interfaces, physical, and functional) and safety, security, and resilient considerations. Employing this metamodel leads to more cohesive and structured modeling efforts with an overall increase in scalability, usability, and unification of already existing models. In turn, this leads to a mission-oriented perspective in designing security defenses and resilience mechanisms to combat undesirable behaviors. We illustrate this metamodel in an open-source GraphQL implementation, which can interface with a number of modeling languages. We support our proposed metamodel with a detailed demonstration using an oil and gas pipeline model. | 125,416 |
Title: Random Van der Waerden Theorem
Abstract: In this paper, we prove a sparse random analogue of the Van der Waerden Theorem. We show that, for all r > 2 and all q(1) >= q(2) >= ... >= q(r) >= 3 is an element of N, n(-q2/q1(q2-1)) is a threshold for the following property: For every r-coloring of the p-random subset of {1, ..., n}, there exists a monochromatic q(i)-term arithmetic progression colored i, for some i. This extends the results of Rodl and Rucinski for the symmetric case q(1) = q(2) = ... = q(r). The proof of the 1-statement is based on the Hypergraph Container Method by Balogh, Morris and Samotij and Saxton and Thomason. The proof of the 0-statement is an extension of Rodl and Rucinski's argument for the symmetric case. | 125,447 |
Title: Retqss: A Novel Methodology For Efficient Modeling And Simulation Of Particle Systems In Reticulated Geometries
Abstract: This work presents retQSS, a novel methodology for efficient modeling and simulation of particle systems in reticulated meshed geometries. On the simulation side, retQSS profits from the discrete-event nature of Quantized State System (QSS) methods, which enable efficient particle tracking algorithms that are agnostic of the application domain. On the modeling side, retQSS relies on the standardized Modelica modeling language, yielding compact and elegant specifications of hybrid (continuous/discrete) dynamic systems. Combined together, these features offer a sound, general-purpose framework for modeling and simulation of particle systems. We show how the state-events that arise when particles interact with a reticulated mesh are seamlessly translated into easily tractable time-events. The latter can substantially improve simulation performance in scenarios where discontinuities dominate the computational demand. We showcase the flexibility of our approach by addressing four case studies arising from different application domains. Performance studies revealed that retQSS can perform similarly to, and even outperform, well-known domain-specific particle simulation toolkits while offering a clear and sound accuracy control interface. (c) 2021 Elsevier B.V. All rights reserved. | 125,458 |
Title: Exploiting the Solar Energy Surplus for Edge Computing
Abstract: In the context of the global energy ecosystem transformation, we introduce a new approach to reduce the carbon emissions of the cloud-computing sector and, at the same time, foster the deployment of small-scale private photovoltaic plants. We consider the opportunity cost of moving some cloud services to private, distributed, solar-powered computing facilities. To this end, we compare the potential revenue of leasing computing resources to a cloud pool with the revenue obtained by selling the surplus energy to the grid. We first estimate the consumption of virtualized cloud computing instances, establishing a metric of computational efficiency per nominal photovoltaic power installed. Based on this metric and characterizing the site’s annual solar production, we estimate the total return and payback. The results show that the model is economically viable and technically feasible. We finally depict the still many questions open, such as security, and the fundamental barriers to address, mainly related with a cloud model ruled by a few big players. | 125,466 |
Title: A Separation-Based Methodology to Consensus Tracking of Switched High-Order Nonlinear Multiagent Systems
Abstract: This work investigates a reduced-complexity adaptive methodology to consensus tracking for a team of uncertain high-order nonlinear systems with switched (possibly asynchronous) dynamics. It is well known that high-order nonlinear systems are intrinsically challenging as feedback linearization and backstepping methods successfully developed for low-order systems fail to work. Even the adding-one-power-integrator methodology, well explored for the single-agent high-order case, presents some complexity issues and is unsuited for distributed control. At the core of the proposed distributed methodology is a newly proposed definition for separable functions: this definition allows the formulation of a separation-based lemma to handle the high-order terms with reduced complexity in the control design. Complexity is reduced in a twofold sense: the control gain of each virtual control law does not have to be incorporated in the next virtual control law iteratively, thus leading to a simpler expression of the control laws; the power of the virtual and actual control laws increases only proportionally (rather than exponentially) with the order of the systems, dramatically reducing high-gain issues. | 125,469 |
Title: Embed2Detect: temporally clustered embedded words for event detection in social media
Abstract: Social media is becoming a primary medium to discuss what is happening around the world. Therefore, the data generated by social media platforms contain rich information which describes the ongoing events. Further, the timeliness associated with these data is capable of facilitating immediate insights. However, considering the dynamic nature and high volume of data production in social media data streams, it is impractical to filter the events manually and therefore, automated event detection mechanisms are invaluable to the community. Apart from a few notable exceptions, most previous research on automated event detection have focused only on statistical and syntactical features in data and lacked the involvement of underlying semantics which are important for effective information retrieval from text since they represent the connections between words and their meanings. In this paper, we propose a novel method termed Embed2Detect for event detection in social media by combining the characteristics in word embeddings and hierarchical agglomerative clustering. The adoption of word embeddings gives Embed2Detect the capability to incorporate powerful semantical features into event detection and overcome a major limitation inherent in previous approaches. We experimented our method on two recent real social media data sets which represent the sports and political domain and also compared the results to several state-of-the-art methods. The obtained results show that Embed2Detect is capable of effective and efficient event detection and it outperforms the recent event detection methods. For the sports data set, Embed2Detect achieved 27% higher F-measure than the best-performed baseline and for the political data set, it was an increase of 29%. | 125,493 |
Title: ON THE TURAN NUMBER OF THE BLOW-UP OF THE HEXAGON
Abstract: The r-blowup of a graph F, denoted by F[r], is the graph obtained by replacing the vertices and edges of F with independent sets of size r and copies of Kr,r, respectively. For bipartite graphs F, very little is known about the order of magnitude of the Tur??n number of F[r]. In this paper we prove that ex(n, C6[2]) = O(n5/3) and, more generally, for any positive integer t, ex(n, \theta 3,t[2]) = O(n5/3). This is tight when t is sufficiently large. | 125,516 |
Title: Robust Grouped Variable Selection Using Distributionally Robust Optimization
Abstract: We propose a distributionally robust optimization formulation with a Wasserstein-based uncertainty set for selecting grouped variables under perturbations on the data for both linear regression and classification problems. The resulting model offers robustness explanations for grouped least absolute shrinkage and selection operator algorithms and highlights the connection between robustness and regularization. We prove probabilistic bounds on the out-of-sample loss and the estimation bias, and establish the grouping effect of our estimator, showing that coefficients in the same group converge to the same value as the sample correlation between covariates approaches 1. Based on this result, we propose to use the spectral clustering algorithm with the Gaussian similarity function to perform grouping on the predictors, which makes our approach applicable without knowing the grouping structure a priori. We compare our approach to an array of alternatives and provide extensive numerical results on both synthetic data and a real large dataset of surgery-related medical records, showing that our formulation produces an interpretable and parsimonious model that encourages sparsity at a group level and is able to achieve better prediction and estimation performance in the presence of outliers. | 125,522 |
Title: RATES OF CONVERGENCE FOR THE CONTINUUM LIMIT OF NONDOMINATED SORTING
Abstract: Nondominated sorting is a discrete process that sorts points in Euclidean space according to the coordinatewise partial order and is used to rank feasible solutions to multiobjective optimization problems. It was previously shown that nondominated sorting of random points has a Hamilton-Jacobi equation continuum limit. We prove quantitative error estimates for the convergence of nondominated sorting to its continuum limit Hamilton-Jacobi equation. Our proof uses the maximum principle and viscosity solution machinery, along with new semiconvexity estimates for domains with corner singularities. | 125,532 |
Title: Analysis of Trade-offs in Fair Principal Component Analysis Based on Multi-objective Optimization
Abstract: In dimensionality reduction problems, the adopted technique may produce disparities between the representation errors of different groups. For instance, in the projected space, a specific class can be better represented in comparison with another one. In some situations, this unfair result may introduce ethical concerns. Aiming at overcoming this inconvenience, a fairness measure can be considered when performing dimensionality reduction through Principal Component Analysis. However, a solution that increases fairness tends to increase the overall re-construction error. In this context, this paper proposes to address this trade-off by means of a multi-objective-based approach. For this purpose, we adopt a fairness measure associated with the disparity between the representation errors of different groups. Moreover, we investigate if the solution of a classical Principal Component Analysis can be used to find a fair projection. Numerical experiments attest that a fairer result can be achieved with a very small loss in the overall reconstruction error. | 125,535 |
Title: Wide and Deep Graph Neural Network With Distributed Online Learning
Abstract: Graph neural networks (GNNs) are naturally distributed architectures for learning representations from network data. This renders them suitable candidates for decentralized tasks. In these scenarios, the underlying graph often changes with time due to link failures or topology variations, creating a mismatch between the graphs on which GNNs were trained and the ones on which they are tested. Online learning can be leveraged to retrain GNNs at testing time to overcome this issue. However, most online algorithms are centralized and usually offer guarantees only on convex problems, which GNNs rarely lead to. This paper develops the Wide and Deep GNN (WD-GNN), a novel architecture that can be updated with distributed online learning mechanisms. The WD-GNN consists of two components: the wide part is a linear graph filter and the deep part is a nonlinear GNN. At training time, the joint wide and deep architecture learns nonlinear representations from data. At testing time, the wide, linear part is retrained, while the deep, nonlinear one remains fixed. This often leads to a convex formulation. We further propose a distributed online learning algorithm that can be implemented in a decentralized setting. We also show the stability of the WD-GNN to changes of the underlying graph and analyze the convergence of the proposed online learning procedure. Experiments on movie recommendation, source localization and robot swarm control corroborate theoretical findings and show the potential of the WD-GNN for distributed online learning. | 125,582 |
Title: Upper bounding rainbow connection number by forest number
Abstract: & nbsp;A path in an edge-colored graph is rainbow if no two edges of it are colored the same, and the graph is rainbow-connected if there is a rainbow path between each pair of its vertices. The minimum number of colors needed to rainbow-connect a graph G is the rainbow connection number of G, denoted by rc(G).& nbsp;A simple way to rainbow-connect a graph G is to color the edges of a spanning tree with distinct colors and then re-use any of these colors to color the remaining edges of G. This proves that rc(G) <= |V (G)|-1. We ask whether there is a stronger connection between tree-like structures and rainbow coloring than that is implied by the above trivial argument. For instance, is it possible to find an upper bound of t(G)-1 for rc(G), where t(G) is the number of vertices in the largest induced tree of G? The answer turns out to be negative, as there are counter-examples that show that even c .t(G) is not an upper bound for rc(G) for any given constant c.& nbsp;In this work we show that if we consider the forest number f(G), the number of vertices in a maximum induced forest of G, instead of t(G), then surprisingly we do get an upper bound. More specifically, we prove that rc(G) <= f(G) + 2. Our result indicates a stronger connection between rainbow connection and tree-like structures than that was suggested by the simple spanning tree based upper bound. (C)& nbsp;2022 Elsevier B.V. All rights reserved. | 125,606 |
Title: The backbone method for ultra-high dimensional sparse machine learning
Abstract: We present the backbone method, a general framework that enables sparse and interpretable supervised machine learning methods to scale to ultra-high dimensional problems. We solve sparse regression problems with
$$10^7$$
features in minutes and
$$10^8$$
features in hours, as well as decision tree problems with
$$10^5$$
features in minutes. The proposed method operates in two phases: we first determine the backbone set, consisting of potentially relevant features, by solving a number of tractable subproblems; then, we solve a reduced problem, considering only the backbone features. For the sparse regression problem, our theoretical analysis shows that, under certain assumptions and with high probability, the backbone set consists of the truly relevant features. Numerical experiments on both synthetic and real-world datasets demonstrate that our method outperforms or competes with state-of-the-art methods in ultra-high dimensional problems, and competes with optimal solutions in problems where exact methods scale, both in terms of recovering the truly relevant features and in its out-of-sample predictive performance. | 125,613 |
Title: Toward Expedited Impedance Tuning of a Robotic Prosthesis for Personalized Gait Assistance by Reinforcement Learning Control
Abstract: Personalizing medical devices such as lower limb wearable robots is challenging. While the initial feasibility of automating the process of knee prosthesis control parameter tuning has been demonstrated in a principled way, the next critical issue is to improve tuning efficiency and speed it up for the human user, in clinic settings, while maintaining human safety. We, therefore, propose a policy iteration with constraint embedded (PICE) method as an innovative solution to the problem under the framework of reinforcement learning. Central to PICE is the use of a projected Bellman equation with a constraint of assuring positive semidefiniteness of performance values during policy evaluation. Additionally, we developed both online and offline PICE implementations that provide additional flexibility for the designer to fully utilize measurement data, either from on-policy or off-policy, to further improve PICE tuning efficiency. Our human subject testing showed that the PICE provided effective policies with significantly reduced tuning time. For the first time, we also experimentally evaluated and demonstrated the robustness of the deployed policies by applying them to different tasks and users. Putting it together, our new way of problem solving has been effective as PICE has demonstrated its potential toward truly automating the process of control parameter tuning for robotic knee prosthesis users. | 125,615 |
Title: Attentive WaveBlock: Complementarity-Enhanced Mutual Networks for Unsupervised Domain Adaptation in Person Re-Identification and Beyond
Abstract: Unsupervised domain adaptation (UDA) for person re-identification is challenging because of the huge gap between the source and target domain. A typical self-training method is to use pseudo-labels generated by clustering algorithms to iteratively optimize the model on the target domain. However, a drawback to this is that noisy pseudo-labels generally cause trouble in learning. To address this problem, a mutual learning method by dual networks has been developed to produce reliable soft labels. However, as the two neural networks gradually converge, their complementarity is weakened and they likely become biased towards the same kind of noise. This paper proposes a novel light-weight module, the Attentive WaveBlock (AWB), which can be integrated into the dual networks of mutual learning to enhance the complementarity and further depress noise in the pseudo-labels. Specifically, we first introduce a parameter-free module, the WaveBlock, which creates a difference between features learned by two networks by waving blocks of feature maps differently. Then, an attention mechanism is leveraged to enlarge the difference created and discover more complementary features. Furthermore, two kinds of combination strategies, i.e. pre-attention and post-attention, are explored. Experiments demonstrate that the proposed method achieves state-of-the-art performance with significant improvements on multiple UDA person re-identification tasks. We also prove the generality of the proposed method by applying it to vehicle re-identification and image classification tasks. Our codes and models are available at: AWB. | 125,618 |
Title: Online Learning in Iterated Prisoner's Dilemma to Mimic Human Behavior.
Abstract: As an important psychological and social experiment, the Iterated Prisoner's Dilemma (IPD) treats the choice to cooperate or defect as an atomic action. We propose to study the behaviors of online learning algorithms in the Iterated Prisoner's Dilemma (IPD) game, where we investigate the full spectrum of reinforcement learning agents: multi-armed bandits, contextual bandits and reinforcement learning. We evaluate them based on a tournament of iterated prisoner's dilemma where multiple agents can compete in a sequential fashion. This allows us to analyze the dynamics of policies learned by multiple self-interested independent reward-driven agents, and also allows us study the capacity of these algorithms to fit the human behaviors. Results suggest that considering the current situation to make decision is the worst in this kind of social dilemma game. Multiples discoveries on online learning behaviors and clinical validations are stated, as an effort to connect artificial intelligence algorithms with human behaviors and their abnormal states in neuropsychiatric conditions. | 125,622 |
Title: A device-independent protocol for XOR oblivious transfer
Abstract: Oblivious transfer is a cryptographic primitive where Alice has two bits and Bob wishes to learn some function of them. Ideally, Alice should not learn Bob's desired function choice and Bob should not learn any more than what is logically implied by the function value. While decent quantum protocols for this task are known, many become completely insecure if an adversary were to control the quantum devices used in the implementation of the protocol. In this work we give a fully device-independent quantum protocol for XOR oblivious transfer. | 125,636 |
Title: Reliable Vision-Based Grasping Target Recognition for Upper Limb Prostheses
Abstract: Computer vision has shown promising potential in wearable robotics applications (e.g., human grasping target prediction and context understanding). However, in practice, the performance of computer vision algorithms is challenged by insufficient or biased training, observation noise, cluttered background, etc. By leveraging Bayesian deep learning (BDL), we have developed a novel, reliable vision-b... | 125,702 |
Title: ECML: An Ensemble Cascade Metric-Learning Mechanism Toward Face Verification
Abstract: Face verification can be regarded as a two-class fine-grained visual-recognition problem. Enhancing the feature’s discriminative power is one of the key problems to improve its performance. Metric-learning technology is often applied to address this need while achieving a good tradeoff between underfitting, and overfitting plays a vital role in metric learning. Hence, we propose a novel ensemble c... | 125,727 |
Title: Personalized Image Aesthetics Assessment via Meta-Learning With Bilevel Gradient Optimization
Abstract: Typical image aesthetics assessment (IAA) is modeled for the generic aesthetics perceived by an “average” user. However, such generic aesthetics models neglect the fact that users’ aesthetic preferences vary significantly depending on their unique preferences. Therefore, it is essential to tackle the issue for personalized IAA (PIAA). Since PIAA is a typical small sample learning (SSL) problem, ex... | 125,775 |
Title: Link Weight Prediction Using Weight Perturbation and Latent Factor
Abstract: Link weight prediction is an important subject in network science and machine learning. Its applications to social network analysis, network modeling, and bioinformatics are ubiquitous. Although this subject has attracted considerable attention recently, the performance and interpretability of existing prediction models have not been well balanced. This article focuses on an unsupervised mixed str... | 125,776 |
Title: Gradient Descent Learning With Floats
Abstract: The gradient learning descent method is the main workhorse of training tasks in artificial intelligence and machine-learning research. Current theoretical studies of gradient descent only use the continuous domains, which is unreal since electronic computers use the float point numbers to store and deal with data. Although existing results are sufficient for the extremely tiny errors in high-preci... | 125,777 |
Title: Efficient Unsupervised Dimension Reduction for Streaming Multiview Data
Abstract: Multiview learning has received substantial attention over the past decade due to its powerful capacity in integrating various types of information. Conventional unsupervised multiview dimension reduction (UMDR) methods are usually conducted in an offline manner and may fail in many real-world applications, where data arrive sequentially and the data distribution changes periodically. Moreover, sa... | 125,778 |
Title: Tree/Endofunction Bijections and Concentration Inequalities
Abstract: We demonstrate a method for proving precise concentration inequalities in uniformly random trees on n vertices, where n >= 1 is a fixed positive integer. The method uses a bijection between mappings f : {1, ..., n} -> {1, ..., n} and doubly rooted trees on n vertices. The main application is a concentration inequality for the number of vertices connected to an independent set in a uniformly random tree, which is then used to prove partial unimodality of its independent set sequence. While inequalities for random trees often use combinatorial arguments, our argument is perhaps more probabilistic. | 126,196 |
Title: Randomized consensus with regular registers
Abstract: •The randomized consensus algorithm of Aspnes and Herlihy, which was shown to work with atomic registers, works even with regular registers.•This result shows that this algorithm works if the atomic registers that it uses are replaced with linearizable register implementations.•This is perhaps surprising because it is known that randomized consensus algorithms may require strongly linearizable registers to work. | 126,207 |
Title: Higher Kiss terms
Abstract: We show that the modular term condition higher commutator is equal to the modular hypercommutator. As a consequence, we arrive at a new proof that HC8 holds for modular varieties. Next, we develop a procedure for a modular variety for producing the higher dimensional congruences that characterize the hypercommutator. This procedure allows us to demonstrate that every modular variety has an infinite sequence of what we call higher dimensional Kiss terms. We use these results to extend the scope of a theorem of Oprsal from permutable varieties to modular varieties. | 126,220 |
Title: Patterns in Shi Tableaux and Dyck Paths
Abstract: Shi tableaux are special binary fillings of certain Young diagrams which arise in the study of Shi hyperplane arrangements related to classical root systems. For type A, the set
$\mathcal {T}$
of Shi tableaux naturally coincides with the set of Dyck paths, for which various notions of patterns have been introduced and studied over the years. In this paper we define a notion of pattern occurrence in
$\mathcal {T}$
which, although it can be regarded as a pattern on Dyck paths, it is motivated by the underlying geometric structure of the tableaux. Our main goal in this work is to study the poset of Shi tableaux defined by pattern-containment. More precisely, we determine explicit formulas for upper and lower covers for each
$T\in \mathcal {T}$
, we consider pattern avoidance for the smallest non-trivial tableaux (size 2) and generalize these results to certain tableau of larger size. We conclude with open problems and possible future directions. | 126,251 |
Title: Enumerating teams in first-order team logics
Abstract: We start the study of the enumeration complexity of different satisfiability problems in first-order team logics. Since many of our problems go beyond DelP, we use a framework for hard enumeration analogous to the polynomial hierarchy, which was recently introduced by Creignou et al. (Discret. Appl. Math. 2019). We show that the problem to enumerate all satisfying teams of a fixed formula in a given first-order structure is DelNP-complete for certain formulas of dependence logic and independence logic. For inclusion logic formulas, this problem is even in DelP. Furthermore, we study the variants of this problem where only maximal or minimal solutions, with respect to cardinality or inclusion, are considered. For the most part these share the same complexity as the original problem. One exception is the cardinality minimum-variant for inclusion logic, which is DelNP-complete, the other is the inclusion maximal-variant for dependence and independence logic, which is in Del(+)NP and DelNP-hard. (c) 2022 Elsevier B.V. All rights reserved. | 126,253 |
Title: Doubly random polytopes
Abstract: A two-step model for generating random polytopes is considered. For parameters d, m, and p, the first step is to generate a simple polytope P whose facets are given by m uniform random hyperplanes tangent to the unit sphere in Double-struck capital Rd, and the second step is to sample each vertex of P independently with probability p and let Q be the convex hull of the sampled vertices. We establish results on how well Q approximates the unit sphere in terms of m and p as well as asymptotics on the combinatorial complexity of Q for certain regimes of p. | 126,265 |
Title: Disentangled Representation Learning and Generation With Manifold Optimization
Abstract: Disentanglement is a useful property in representation learning, which increases the interpretability of generative models such as variational autoencoders (VAE), generative adversarial models, and their many variants. Typically in such models, an increase in disentanglement performance is traded off with generation quality. In the context of latent space models, this work presents a representation learning framework that explicitly promotes disentanglement by encouraging orthogonal directions of variations. The proposed objective is the sum of an autoencoder error term along with a principal component analysis reconstruction error in the feature space. This has an interpretation of a restricted kernel machine with the eigenvector matrix valued on the Stiefel manifold. Our analysis shows that such a construction promotes disentanglement by matching the principal directions in the latent space with the directions of orthogonal variation in data space. In an alternating minimization scheme, we use the Cayley ADAM algorithm, a stochastic optimization method on the Stiefel manifold along with the Adam optimizer. Our theoretical discussion and various experiments show that the proposed model is an improvement over many VAE variants in terms of both generation quality and disentangled representation learning. | 126,271 |
Title: Parametric solutions of turbulent incompressible flows in OpenFOAM via the proper generalised decomposition
Abstract: An a priori reduced order method based on the proper generalised decomposition (PGD) is proposed to compute parametric solutions involving turbulent incompressible flows of interest in an industrial context, using OpenFOAM. The PGD framework is applied for the first time to the incompressible Navier-Stokes equations in the turbulent regime, to compute a generalised solution for velocity, pressure and turbulent viscosity, explicitly depending on the design parameters of the problem. In order to simulate flows of industrial interest, a minimally intrusive implementation based on OpenFOAM SIMPLE algorithm applied to the Reynolds-averaged Navier-Stokes equations with the Spalart-Allmaras turbulence model is devised. The resulting PGD strategy is applied to parametric flow control problems and achieves both qualitative and quantitative agreement with the full order OpenFOAM solution for convection-dominated fully-developed turbulent incompressible flows, with Reynolds number up to one million. | 126,278 |
Title: NAS-Bench-NLP: Neural Architecture Search Benchmark for Natural Language Processing
Abstract: Neural Architecture Search (NAS) is a promising and rapidly evolving research area. Training a large number of neural networks requires an exceptional amount of computational power, which makes NAS unreachable for those researchers who have limited or no access to high-performance clusters and supercomputers. A few benchmarks with precomputed neural architectures performances have been recently introduced to overcome this problem and ensure reproducible experiments. However, these benchmarks are only for the computer vision domain and, thus, are built from the image datasets and convolution-derived architectures. In this work, we step outside the computer vision domain by leveraging the language modeling task, which is the core of natural language processing (NLP). Our main contribution is as follows: we have provided search space of recurrent neural networks on the text datasets and trained 14k architectures within it; we have conducted both intrinsic and extrinsic evaluation of the trained models using datasets for semantic relatedness and language understanding evaluation; finally, we have tested several NAS algorithms to demonstrate how the precomputed results can be utilized. We consider that the benchmark will provide more reliable empirical findings in the community and stimulate progress in developing new NAS methods well suited for recurrent architectures. | 126,285 |
Title: A Praise for Defensive Programming: Leveraging Uncertainty for Effective Malware Mitigation
Abstract: A promising avenue for improving the effectiveness of behavioral-based malware detectors is to leverage two-phase detection mechanisms. Existing problem in two-phase detection is that after the first phase produces borderline decision, suspicious behaviors are not well contained before the second phase completes. This article improves
<sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Chameleon</small>
, a framework to realize the uncertain environment.
<sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Chameleon</small>
offers two environments: standard—for software identified as benign by the first phase, and uncertain—for software received borderline classification from the first phase. The uncertain environment adds obstacles to software execution through random perturbations applied probabilistically. We introduce a dynamic perturbation threshold that can target malware disproportionately more than benign software. We analyzed the effects of the uncertain environment by manually studying 113 software and 100 malware, and found that 92 percent malware and 10 percent benign software disrupted during execution. The results were then corroborated by an extended dataset (5,679 Linux malware samples) on a newer system. Finally, a careful inspection of the benign software crashes revealed some software bugs, highlighting
<sc xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Chameleon</small>
's potential as a practical complementary anti-malware solution. | 126,395 |
Title: Defect Reduction Planning (Using TimeLIME)
Abstract: Software comes in releases. An implausible change to software is something that has never been changed in prior releases. When planning how to reduce defects, it is better to use plausible changes, i.e., changes with some precedence in the prior releases. To demonstrate these points, this paper compares several defect reduction planning tools. LIME is a local sensitivity analysis tool that can report the fewest changes needed to alter the classification of some code module (e.g., from “defective” to “non-defective”). TimeLIME is a new tool, introduced in this paper, that improves LIME by restricting its plans to just those attributes which change the most within a project. In this study, we compared the performance of LIME and TimeLIME and several other defect reduction planning algorithms. The generated plans were assessed via (a) the similarity scores between the proposed code changes and the real code changes made by developers; and (b) the improvement scores seen within projects that followed the plans. For nine project trails, we found that TimeLIME outperformed all other algorithms (in 8 out of 9 trials). Hence, we strongly recommend using past releases as a source of knowledge for computing fixes for new releases (using TimeLIME). Apart from these specific results, the other lesson from this paper is that our community might be more careful about using off-the-shelf AI tools, without first applying SE knowledge (e.g., that past releases are a good source of knowledge for planning defect reductions). As shown here, once that SE knowledge is applied, this can result in dramatically better reasoning. | 126,399 |
Title: Tensor-Krylov method for computing eigenvalues of parameter-dependent matrices
Abstract: In this paper we extend the Residual Arnoldi method for calculating an extreme eigenvalue (e.g. largest real part, dominant, etc.) to the case where the matrices depend on parameters. The difference between this Arnoldi method and the classical Arnoldi algorithm is that in the former the residual is added to the subspace. We develop a Tensor-Krylov method that can be interpreted as an application of the Residual Arnoldi algorithm to a set of matrices obtained by evaluating a parameter-dependent matrix in parameter values on a grid. The subspace contains an approximate Krylov space for all these points. Instead of adding the residuals for all parameter values to the subspace we create a low-rank approximation of the matrix consisting of these residuals and add only the column space to the subspace. In order to keep the computations efficient, it is needed to limit the dimension of the subspace and to restart once the subspace has reached the prescribed maximal dimension. The novelty of this approach is twofold. Firstly, we observed that a large error in the low-rank approximations is allowed without slowing down the convergence, which implies that we can do more iterations before restarting. Secondly, we pay particular attention to the way the subspace is restarted, since classical restarting techniques give a too large subspace in our case. We motivate why it is good enough to just keep the approximation of the searched eigenvector. At the end of the paper we extend this algorithm to shift-and-invert Residual Arnoldi method to calculate the eigenvalue close to a shift σ for a specific parameter dependency. We provide theoretical results and report numerical experiments. The Matlab code is publicly available. | 126,411 |
Title: PLVER: Joint Stable Allocation and Content Replication for Edge-Assisted Live Video Delivery
Abstract: Live streaming services have gained extreme popularity in recent years. Due to the spiky traffic patterns of live videos, utilizing distributed edge servers to improve viewers' quality of experience (QoE) has become a common practice nowadays. Nevertheless, the current client-driven content caching mechanism does not support pre-caching from the cloud to the edge, resulting in a considerable amount of cache misses in live video delivery. By jointly considering the features of live videos and edge servers, we propose PLVER, a proactive live video push scheme to address the cache miss problem in live video delivery. Specifically, PLVER first conducts a one-to-multiple stable allocation between edge clusters and user groups to balance the load of live traffic over the edge servers. It then adopts proactive video replication algorithms to speed up video replication among the edge servers. We conduct extensive trace-driven evaluation, covering 0.3 million Twitch viewers and more than 300 Twitch channels. The results demonstrate that with PLVER, edge servers can carry 28 and 82 percent more traffic than the auction-based replication (ABR) method and the caching on requested time (CORT) method, respectively. | 126,419 |
Title: Better Parameter-Free Stochastic Optimization with ODE Updates for Coin-Betting.
Abstract: Parameter-free stochastic gradient descent (PFSGD) algorithms do not require setting learning rates while achieving optimal theoretical performance. In practical applications, however, there remains an empirical gap between tuned stochastic gradient descent (SGD) and PFSGD. In this paper, we close the empirical gap with a new parameter-free algorithm based on continuous-time Coin-Betting on truncated models. The new update is derived through the solution of an Ordinary Differential Equation (ODE) and solved in a closed form. We show empirically that this new parameter-free algorithm outperforms algorithms with the ``best default'' learning rates and almost matches the performance of finely tuned baselines without anything to tune. | 126,421 |
Title: Stability Analysis Using Quadratic Constraints for Systems With Neural Network Controllers
Abstract: A method is presented to analyze the stability of feedback systems with neural network controllers. Two stability theorems are given to prove asymptotic stability and to compute an ellipsoidal innerapproximation to the region of attraction (ROA). The first theorem addresses linear time-invariant systems, and merges Lyapunov theory with local (sector) quadratic constraints to bound the nonlinear ac... | 126,436 |
Title: Will Dependency Conflicts Affect My Program's Semantics?
Abstract: Java projects are often built on top of various third-party libraries. If multiple versions of a library exist on the classpath, JVM will only load one version and shadow the others, which we refer to as
<i>dependency conflicts</i>
. This would give rise to
<i>semantic conflict</i>
(SC) issues, if the library APIs referenced by a project have identical method signatures but inconsistent semantics across the loaded and shadowed versions of libraries. SC issues are difficult for developers to diagnose in practice, since understanding them typically requires domain knowledge. Although adapting the existing test generation technique for dependency conflict issues,
<small>Riddle</small>
, to detect SC issues is feasible, its effectiveness is greatly compromised. This is mainly because
<small>Riddle</small>
randomly generates test inputs, while the SC issues typically require specific arguments in the tests to be exposed. To address that, we conducted an empirical study of 316 real SC issues to understand the characteristics of such specific arguments in the test cases that can capture the SC issues. Inspired by our empirical findings, we propose an automated testing technique
<small>Sensor</small>
, which synthesizes test cases using ingredients from the project under test to trigger inconsistent behaviors of the APIs with the same signatures in conflicting library versions. Our evaluation results show that
<small>Sensor</small>
is effective and useful: it achieved a
<inline-formula><tex-math notation="LaTeX">$Precision$</tex-math></inline-formula>
of 0.898 and a
<inline-formula><tex-math notation="LaTeX">$Recall$</tex-math></inline-formula>
of 0.725 on open-source projects and a
<inline-formula><tex-math notation="LaTeX">$Precision$</tex-math></inline-formula>
of 0.821 on industrial projects; it detected 306 semantic conflict issues in 50 projects, 70.4 percent of which had been confirmed as real bugs, and 84.2 percent of the confirmed issues have been fixed quickly. | 126,450 |
Title: Faster MCMC for Gaussian latent position network models
Abstract: Latent position network models are a versatile tool in network science; applications include clustering entities, controlling for causal confounders, and defining priors over unobserved graphs. Estimating each node's latent position is typically framed as a Bayesian inference problem, with Metropolis within Gibbs being the most popular tool for approximating the posterior distribution. However, it is well-known that Metropolis within Gibbs is inefficient for large networks; the acceptance ratios are expensive to compute, and the resultant posterior draws are highly correlated. In this article, we propose an alternative Markov chain Monte Carlo strategy-defined using a combination of split Hamiltonian Monte Carlo and Firefly Monte Carlo-that leverages the posterior distribution's functional form for more efficient posterior computation. We demonstrate that these strategies outperform Metropolis within Gibbs and other algorithms on synthetic networks, as well as on real information-sharing networks of teachers and staff in a school district. | 126,459 |
Title: Optimal attention management: A tractable framework
Abstract: A well-intentioned principal provides information to a rationally inattentive agent without internalizing the agent's cost of processing information. Whatever information the principal makes available, the agent may choose to ignore some. We study optimal information provision in a tractable model with quadratic payoffs where full disclosure is not optimal. We characterize incentive-compatible information policies, that is, those to which the agent willingly pays full attention. In a leading example with three states, optimal disclosure involves information distortion at intermediate costs of attention. As the cost increases, optimal information changes from downplaying the state to exaggerating the state. | 126,465 |
Title: 3DFCNN: real-time action recognition using 3D deep neural networks with raw depth information
Abstract: This work describes an end-to-end approach for real-time human action recognition from raw depth image-sequences. The proposal is based on a 3D fully convolutional neural network, named 3DFCNN, which automatically encodes spatio-temporal patterns from raw depth sequences. The described 3D-CNN allows actions classification from the spatial and temporal encoded information of depth sequences. The use of depth data ensures that action recognition is carried out protecting people’s privacy, since their identities can not be recognized from these data. The proposed 3DFCNN has been optimized to reach a good performance in terms of accuracy while working in real-time. Then, it has been evaluated and compared with other state-of-the-art systems in three widely used public datasets with different characteristics, demonstrating that 3DFCNN outperforms all the non-DNN-based state-of-the-art methods with a maximum accuracy of 83.6% and obtains results that are comparable to the DNN-based approaches, while maintaining a much lower computational cost of 1.09 seconds, what significantly increases its applicability in real-world environments. | 126,468 |
Title: DEFECT RESONANCES OF TRUNCATED CRYSTAL STRUCTURES
Abstract: Defects in the atomic structure of crystalline materials may spawn electronic bound states, known as defect states, which decay rapidly away from the defect. Simplified models of defect states typically assume the defect is surrounded on all sides by an infinite perfectly crystalline material. In reality the surrounding structure must be finite, and in certain contexts the structure can be small enough that edge effects are significant. In this work we investigate these edge effects and prove the following result. Suppose that a one-dimensional infinite crystalline material hosting a positive energy defect state is truncated a distance M from the defect. Then, for sufficiently large M, there exists a resonance exponentially close (in M) to the bound state eigenvalue. It follows that the truncated structure hosts a metastable state with an exponentially long lifetime. Our methods allow both the resonance frequency and associated resonant state to be computed to all orders in e -M. We expect this result to be of particular interest in the context of photonic crystals, where defect states are used for wave-guiding and structures are relatively small. Finally, under a mild additional assumption we prove that if the defect state has negative energy, then the truncated structure hosts a bound state with exponentially close energy. | 126,471 |
Title: Few-Shot Object Detection on Remote Sensing Images
Abstract: In this article, we deal with the problem of object detection on remote sensing images. Previous researchers have developed numerous deep convolutional neural network (CNN)-based methods for object detection on remote sensing images, and they have reported remarkable achievements in detection performance and efficiency. However, current CNN-based methods often require a large number of annotated samples to train deep neural networks and tend to have limited generalization abilities for unseen object categories. In this article, we introduce a metalearning-based method for few-shot object detection on remote sensing images where only a few annotated samples are needed for the unseen object categories. More specifically, our model contains three main components: a metafeature extractor that learns to extract metafeature maps from input images, a feature reweighting module that learns class-specific reweighting vectors from the support images and use them to recalibrate the metafeature maps, and a bounding box prediction module that carries out object detection on the reweighted feature maps. We build our few-shot object detection model upon the YOLOv3 architecture and develop a multiscale object detection framework. Experiments on two benchmark data sets demonstrate that with only a few annotated samples, our model can still achieve a satisfying detection performance on remote sensing images, and the performance of our model is significantly better than the well-established baseline models. | 126,483 |
Title: PCA-AE: Principal Component Analysis Autoencoder for Organising the Latent Space of Generative Networks
Abstract: Autoencoders and generative models produce some of the most spectacular deep learning results to date. However, understanding and controlling the latent space of these models presents a considerable challenge. Drawing inspiration from principal component analysis and autoencoders, we propose the principal component analysis autoencoder (PCA-AE). This is a novel autoencoder whose latent space verifies two properties. Firstly, the dimensions are organised in decreasing importance with respect to the data at hand. Secondly, the components of the latent space are statistically independent. We achieve this by progressively increasing the latent space during training, and with a covariance loss applied to the latent codes. The resulting autoencoder produces a latent space which separates the intrinsic attributes of the data into different components of the latent space, in a completely unsupervised manner. We also describe an extension of our approach to the case of powerful, pre-trained GANs. We show results on both synthetic examples of shapes and on a state-of-the-art GAN. For example, we are able to separate the colour shade scale of hair, pose of faces and gender, without accessing any labels. We compare the PCA-AE with other state-of-the-art approaches, in particular with respect to the ability to disentangle attributes in the latent space. We hope that this approach will contribute to better understanding of the intrinsic latent spaces of powerful deep generative models. | 126,484 |
Title: Reticulation of a quantale, pure elements and new transfer properties
Abstract: We know from a previous paper that the reticulation of a coherent quantale A is a bounded distributive lattice L(A) whose prime spectrum is homeomorphic to m-prime spectrum of A. This paper studies how the reticulation can be used for transferring some properties of bounded distributive lattices to quantales and vice versa. We shall illustrate this thesis by proving several results on the pure and w–pure elements of the quantale A by means of the reticulation L(A). In particular, we shall investigate how the properties of σ–ideals of L(A) can be transferred to pure and w–pure elements of A. Then the obtained transfer properties are used to prove new algebraic and topological results and characterization theorems for some important classes of quantales: normal quantales, mp–quantales, PF–quantales, purified quantales and PP–quantales. | 126,485 |
Title: The OARF Benchmark Suite: Characterization and Implications for Federated Learning Systems
Abstract: This article presents and characterizes an Open Application Repository for Federated Learning (OARF), a benchmark suite for federated machine learning systems. Previously available benchmarks for federated learning (FL) have focused mainly on synthetic datasets and use a limited number of applications. OARF mimics more realistic application scenarios with publicly available datasets as different data silos in image, text, and structured data. Our characterization shows that the benchmark suite is diverse in data size, distribution, feature distribution, and learning task complexity. The extensive evaluations with reference implementations show the future research opportunities for important aspects of FL systems. We have developed reference implementations, and evaluated the important aspects of FL, including model accuracy, communication cost, throughput, and convergence time. Through these evaluations, we discovered some interesting findings such as FL can effectively increase end-to-end throughput. The code of OARF is publicly available on GitHub.(1) | 126,491 |
Title: Vehicle Redistribution in Ride-Sourcing Markets Using Convex Minimum Cost Flows
Abstract: Ride-sourcing platforms often face imbalances in the demand and supply of rides across areas in their operating road-networks. As such, dynamic pricing methods have been used to mediate these demand asymmetries through surge price multipliers, thus incentivising higher driver participation in the market. However, the anticipated commercialisation of autonomous vehicles could transform the current ride-sourcing platforms to fleet operators. The absence of human drivers fosters the need for empty vehicle management to address any vehicle supply deficiencies. Proactive redistribution using integer programming and demand predictive models have been proposed in research to address this problem. A shortcoming of existing models, however, is that they ignore the market structure and underlying customer choice behaviour. As such, current models do not capture the real value of redistribution. To resolve this, we formulate the vehicle redistribution problem as a non-linear minimum cost flow problem which accounts for the relationship of supply and demand of rides, by assuming a customer discrete choice model and a market structure. We demonstrate that this model can have a convex domain, and we introduce an edge splitting algorithm to solve a transformed convex minimum cost flow problem for vehicle redistribution. By testing our model using simulation, we show that our redistribution algorithm can decrease wait times by more than 50%, increase profit up to 10% with less than 20% increase in vehicle mileage. Our findings outline that the value of redistribution is contingent on localised market structure and customer behaviour. | 126,501 |
Title: About essential spectra of unbounded Jacobi matrices
Abstract: We study spectral properties of unbounded Jacobi matrices with periodically modulated or blended entries. Our approach is based on uniform asymptotic analysis of generalized eigenvectors. We determine when the studied operators are self-adjoint. We identify regions where the point spectrum has no accumulation points. This allows us to completely describe the essential spectrum of these operators. | 126,509 |
Title: Meta Approach to Data Augmentation Optimization
Abstract: Data augmentation policies drastically improve the performance of image recognition tasks, especially when the policies are optimized for the target data and tasks. In this paper, we propose to optimize image recognition models and data augmentation policies simultaneously to improve the performance using gradient descent. Unlike prior methods, our approach avoids using proxy tasks or reducing search space, and can directly improve the validation performance. Our method achieves efficient and scalable training by approximating the gradient of policies by implicit gradient with Neumann series approximation. We demonstrate that our approach can improve the performance of various image classification tasks, including fine-grained image recognition, without using dataset-specific hyperparameter tuning. | 126,510 |
Title: Internal Enriched Categories
Abstract: We introduce the theory of enrichment over an internal monoidal category as a common generalization of both the standard theories of enriched and internal categories. Then, we contextualize the new notion by comparing it to another known generalization of enrichment: that of enrichment for indexed categories. It turns out that the two notions are closely related. | 126,519 |
Title: Optimal Transport for Stationary Markov Chains via Policy Iteration
Abstract: We study the optimal transport problem for pairs of stationary finite-state Markov chains, with an emphasis on the computation of optimal transition couplings. Transition couplings are a constrained family of transport plans that capture the dynamics of Markov chains. Solutions of the optimal transition coupling (OTC) problem correspond to alignments of the two chains that minimize long-term average cost. We establish a connection between the OTC problem and Markov decision processes, and show that solutions of the OTC problem can be obtained via an adaptation of policy iteration. For settings with large state spaces, we develop a fast approximate algorithm based on an entropy-regularized version of the OTC problem, and provide bounds on its per-iteration complexity. We establish a stability result for both the regularized and unregularized algorithms, from which a statistical consistency result follows as a corollary. We validate our theoretical results empirically through a simulation study, demonstrating that the approximate algorithm exhibits faster overall runtime with low error. Finally, we extend the setting and application of our methods to hidden Markov models, and illustrate the potential use of the proposed algorithms in practice with an application to computer-generated music. | 126,520 |
Title: LOWER BOUND ON QUANTUM TUNNELING FOR STRONG MAGNETIC FIELDS
Abstract: We consider a particle bound to a two-dimensional plane and a double-well potential, subject to a perpendicular uniform magnetic field. The energy difference between the lowest two eigenvalues-the eigenvalue splitting-is related to the tunneling probability between the two wells. We obtain upper and lower bounds on this splitting in the regime where both the magnetic field strength and the depth of the wells are large. The main step is a lower bound on the hopping amplitude between the wells, a key parameter in tight binding models of solid state physics, given by an oscillatory integral, whose phase has no critical point and which is exponentially small. | 126,525 |
Title: Multiple Video Frame Interpolation via Enhanced Deformable Separable Convolution
Abstract: Generating non-existing frames from a consecutive video sequence has been an interesting and challenging problem in the video processing field. Typical kernel-based interpolation methods predict pixels with a single convolution process that convolves source frames with spatially adaptive local kernels, which circumvents the time-consuming, explicit motion estimation in the form of optical flow. However, when scene motion is larger than the pre-defined kernel size, these methods are prone to yield less plausible results. In addition, they cannot directly generate a frame at an arbitrary temporal position because the learned kernels are tied to the midpoint in time between the input frames. In this paper, we try to solve these problems and propose a novel non-flow kernel-based approach that we refer to as enhanced deformable separable convolution (EDSC) to estimate not only adaptive kernels, but also offsets, masks and biases to make the network obtain information from non-local neighborhood. During the learning process, different intermediate time step can be involved as a control variable by means of an extension of coord-conv trick, allowing the estimated components to vary with different input temporal information. This makes our method capable to produce multiple in-between frames. Furthermore, we investigate the relationships between our method and other typical kernel- and flow-based methods. Experimental results show that our method performs favorably against the state-of-the-art methods across a broad range of datasets. Code will be publicly available on URL:
<uri xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">https://github.com/Xianhang/EDSC-pytorch</uri>
. | 126,536 |
Title: Suffocating Fire Sales
Abstract: Fire sales are among the major drivers of market instability in modern financial systems. Due to iterated distressed selling and the associated price impact, initial shocks to some institutions can be amplified dramatically through the network induced by portfolio overlaps. In this paper, we develop a mathematical framework that allows us to investigate central characteristics that drive or hinder the propagation of distress. We investigate single systems as well as ensembles of systems that are alike, where similarity is measured in terms of the empirical distribution of all defining properties of a system. This asymptotic approach ensures a great deal of robustness to statistical uncertainty and temporal fluctuations. A characterization of those systems that are resilient to small shocks emerges, and we provide criteria that regulators might exploit in order to assess the stability of a financial system. We illustrate the application of these criteria for some exemplary configurations in the context of capital requirements and test the applicability of our results for systems of moderate size by Monte Carlo simulations. | 126,545 |
Title: ForMIC: Foraging via Multiagent RL With Implicit Communication
Abstract: Multi-agent foraging (MAF) involves distributing a team of agents to search an environment and extract resources from it. Nature provides several examples of highly effective foragers, where individuals within the foraging collective use biological markers (e.g., pheromones) to communicate critical information to others via the environment. In this work, we propose ForMIC, a distributed reinforcement learning MAF approach that endows agents with implicit communication abilities via their shared environment. However, learning efficient policies with stigmergic interactions is highly nontrivial, since agents need to perform well to send each other useful signals, but also need to sense others' signals to perform well. In this work, we develop several key learning techniques for training policies with stigmergic interactions, where such a circular dependency is present. By relying on clever curriculum learning design, action filtering, and the introduction of non-learning agents to increase the agent density at training time at low computational cost, we develop a minimal learning framework that leads to the stable training of efficient stigmergic policies. We present simulation results which demonstrate that our learned policy outperforms existing state-of-the-art MAF algorithms in a set of experiments that vary team size, number and placement of resources, and key environmental dynamics not seen at training time. | 126,554 |
Title: Improved complexities for stochastic conditional gradient methods under interpolation-like conditions
Abstract: We analyze stochastic conditional gradient methods for constrained optimization problems arising in over-parametrized machine learning. We show that one could leverage the interpolation-like conditions satisfied by such models to obtain improved oracle complexities. Specifically, when the objective function is convex, we show that the conditional gradient method requires O(ϵ−2) calls to the stochastic gradient oracle to find an ϵ-optimal solution. Furthermore, by including a gradient sliding step, we show that the number of calls reduces to O(ϵ−1.5). | 126,556 |
Title: A Generalized Gaussian Extension to the Rician Distribution for SAR Image Modeling
Abstract: We present a novel statistical model, the generalized-Gaussianx2013;Rician (GG-Rician) distribution, for the characterization of synthetic aperture radar (SAR) images. Since accurate statistical models lead to better results in applications such as target tracking, classification, or despeckling, characterizing SAR images of various scenes including urban, sea surface, or agricultural is essential. The proposed statistical model is based on the Rician distribution to model the amplitude of a complex SAR signal, the in-phase and quadrature components of which are assumed to be generalized-Gaussian (GG) distributed. The proposed amplitude GG-Rician model is further extended to cover the intensity of SAR signals. In the experimental analysis, the GG-Rician model is investigated for amplitude and intensity SAR images of various frequency bands and scenes in comparison to state-of-the-art statistical models that include Weibull, $\mathcal {G}_{0}$ , Generalized gamma, and the lognormal distribution. The statistical significance analysis and goodness-of-fit test results demonstrate the superior performance and flexibility of the proposed model for all frequency bands and scenes, and its applicability on both amplitude and intensity SAR images. | 126,579 |
Title: An Approximation Algorithm for Joint Caching and Recommendations in Cache Networks
Abstract: Streaming platforms, like Netflix and YouTube, strive to offer high streaming quality (SQ), in terms of bitrate, delays, etc., to their users. Meanwhile, a significant share of content consumption of these platforms is heavily influenced by recommendations. In this setting, the user’s overall experience is a product of both the user’s interest in a recommended content,
<italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">i.e.</i>
, the recommendation quality (RQ), and the SQ of this content. However, network decisions (like caching) that affect the SQ are usually made without considering the recommender’s actions. Likewise, recommendations are chosen independently of the potential delivery quality. In this paper, we define a metric of streaming experience (MoSE) that captures the fundamental tradeoff between the SQ and RQ. We aim to jointly optimize caching and recommendations in a generic network of caches, with the objective of maximizing this metric. This is in line with the recent trend for content providers to simultaneously act as Content Delivery Network owners, implying that the same entity may handle both caching and recommendation decisions. We formulate this joint optimization problem and prove that it can be approximated up to a constant factor. To the best of our knowledge, this is the first polynomial algorithm to achieve a constant approximation ratio for the joint problem. Moreover, our numerical experiments show important performance gains of our algorithm over baseline schemes and existing algorithms in the literature. | 126,593 |
Title: Efficient Prediction of Human Motion for Real-Time Robotics Applications With Physics-Inspired Neural Networks
Abstract: Generating accurate and efficient predictions for the motion of the humans present in the scene is key to the development of effective motion planning algorithms for robots moving in promiscuous areas, where wrong planning decisions could generate safety hazard or simply make the presence of the robot "socially" unacceptable. Our approach to predict human motion is based on a neural network of a peculiar kind. Contrary to conventional deep neural networks, our network embeds in its structure the popular Social Force Model, a dynamic equation describing the motion in physical terms. This choice allows us to concentrate the learning phase in the aspects which are really unknown (i.e., the model's parameters) and to keep the structure of the network simple and manageable. As a result, we are able to obtain a good prediction accuracy even by using a small and synthetically generated training set. Importantly, the prediction accuracy remains acceptable even when the network is applied in scenarios radically different from those for which it was trained. Finally, the choices of the network are "explainable", as they can be interpreted in physical terms. Comparative and experimental results prove the effectiveness of the proposed approach. | 126,595 |
Title: Evolution of group-theoretic cryptology attacks using hyper-heuristics
Abstract: In previous work, we developed a single evolutionary algorithm (EA) to solve random instances of the Anshel-Anshel-Goldfeld (AAG) key exchange protocol over polycyclic groups. The EA consisted of six simple heuristics which manipulated strings. The present work extends this by exploring the use of hyperheuristics in group-theoretic cryptology for the first time. Hyper-heuristics are a way to generate new algorithms from existing algorithm components (in this case, simple heuristics), with EAs being one example of the type of algorithm which can be generated by our hyper-heuristic framework. We take as a starting point the above EA and allow hyper-heuristics to build on it by making small tweaks to it. This adaptation is through a process of taking the EA and injecting chains of heuristics built from the simple heuristics. We demonstrate we can create novel heuristic chains, which when placed in the EA create algorithms that out perform the existing EA. The new algorithms solve a greater number of random AAG instances than the EA. This suggests the approach may be applied to many of the same kinds of problems, providing a framework for the solution of cryptology problems over groups. The contribution of this article is thus a framework to automatically build algorithms to attack cryptology problems given an applicable group. | 126,598 |
Title: Diversity Policy Gradient for Sample Efficient Quality-Diversity Optimization
Abstract: A fascinating aspect of nature lies in its ability to produce a large and diverse collection of organisms that are all high-performing in their niche. By contrast, most AI algorithms focus on finding a single efficient solution to a given problem. Aiming for diversity in addition to performance is a convenient way to deal with the exploration-exploitation trade-off that plays a central role in learning. It also allows for increased robustness when the returned collection contains several working solutions to the considered | 126,608 |
Title: Work from home during the COVID-19 pandemic: An observational study based on a large geo-tagged COVID-19 Twitter dataset (UsaGeoCov19)
Abstract: As COVID-19 swept over the world, people discussed facts, expressed opinions, and shared sentiments about the pandemic on social media. Since policies such as travel restriction and lockdown in reaction to COVID-19 were made at different levels of the society (e.g., schools and employers) and the government, we build a large geo-tagged Twitter dataset titled UsaGeoCov19 and perform an exploratory analysis by geographic location. Specifically, we collect 650,563 unique geo-tagged tweets across the United States covering the date range from January 25 to May 10, 2020. Tweet locations enable us to conduct region-specific studies such as tweeting volumes and sentiment, sometimes in response to local regulations and reported COVID-19 cases. During this period, many people started working from home. The gap between workdays and weekends in hourly tweet volumes inspire us to propose algorithms to estimate work engagement during the COVID-19 crisis. This paper also summarizes themes and topics of tweets in our dataset using both social media exclusive tools (i.e., #hashtags, @mentions) and the latent Dirichlet allocation model. We welcome requests for data sharing and conversations for more insights. | 126,623 |
Title: Minimal invariant regions and minimal globally attracting regions for toric differential inclusions
Abstract: Toric differential inclusions occur as key dynamical systems in the context of the Global Attractor Conjecture. We introduce the notions of minimal invariant regions and minimal globally attracting regions for toric differential inclusions. We describe a procedure for explicitly constructing the minimal invariant and minimal globally attracting regions for two-dimensional toric differential inclusions. In particular, we obtain invariant regions and globally attracting regions for two-dimensional weakly reversible or endotactic dynamical systems (even if they have time-dependent parameters). | 126,650 |
Title: Optimizing Variational Representations of Divergences and Accelerating Their Statistical Estimation
Abstract: Variational representations of divergences and distances between high-dimensional probability distributions offer significant theoretical insights and practical advantages in numerous research areas. Recently, they have gained popularity in machine learning as a tractable and scalable approach for training probabilistic models and for statistically differentiating between data distributions. Their advantages include: 1) They can be estimated from data as statistical averages. 2) Such representations can leverage the ability of neural networks to efficiently approximate optimal solutions in function spaces. However, a systematic and practical approach to improving the tightness of such variational formulas, and accordingly accelerate statistical learning and estimation from data, is currently lacking. Here we develop such a methodology for building new, tighter variational representations of divergences. Our approach relies on improved objective functionals constructed via an auxiliary optimization problem. Furthermore, the calculation of the functional Hessian of objective functionals unveils the local curvature differences around the common optimal variational solution; this quantifies and orders the tightness gains between different variational representations. Finally, numerical simulations utilizing neural network optimization demonstrate that tighter representations can result in significantly faster learning and more accurate estimation of divergences in both synthetic and real datasets (of more than 1000 dimensions), often accelerated by nearly an order of magnitude. | 126,666 |
Title: Augmented Sliced Wasserstein Distances
Abstract: While theoretically appealing, the application of the Wasserstein distance to large-scale machine learning problems has been hampered by its prohibitive computational cost. The sliced Wasserstein distance and its variants improve the computational efficiency through random projection, yet they suffer from low projection efficiency because the majority of projections result in trivially small values. In this work, we propose a new family of distance metrics, called augmented sliced Wasserstein distances (ASWDs), constructed by first mapping samples to higher-dimensional hypersurfaces parameterized by neural networks. It is derived from a key observation that (random) linear projections of samples residing on these hypersurfaces would translate to much more flexible projections in the original sample space, so they can capture complex structures of the data distribution. We show that the hypersurfaces can be optimized by gradient ascent efficiently. We provide the condition under which the ASWD is a valid metric and show that this can be obtained by an injective neural network architecture. Numerical results demonstrate that the ASWD significantly outperforms other Wasserstein variants for both synthetic and real-world problems. | 126,672 |
Title: Online Reinforcement Learning Control by Direct Heuristic Dynamic Programming: From Time-Driven to Event-Driven
Abstract: In this work, time-driven learning refers to the machine learning method that updates parameters in a prediction model continuously as new data arrives. Among existing approximate dynamic programming (ADP) and reinforcement learning (RL) algorithms, the direct heuristic dynamic programming (dHDP) has been shown an effective tool as demonstrated in solving several complex learning control problems. It continuously updates the control policy and the critic as system states continuously evolve. It is therefore desirable to prevent the time-driven dHDP from updating due to insignificant system event such as noise. Toward this goal, we propose a new event-driven dHDP. By constructing a Lyapunov function candidate, we prove the uniformly ultimately boundedness (UUB) of the system states and the weights in the critic and the control policy networks. Consequently, we show the approximate control and cost-to-go function approaching Bellman optimality within a finite bound. We also illustrate how the event-driven dHDP algorithm works in comparison to the original time-driven dHDP. | 126,705 |
Title: CONSTRUCTING ABELIAN EXTENSIONS WITH PRESCRIBED NORMS
Abstract: Given a number field K, a finite abelian group G and finitely many elements alpha(1), ..., alpha(t) is an element of K, we construct abelian extensions L/K with Galois group G that realise all of the elements alpha(1), ..., alpha(t) as norms of elements in L. In particular, this shows existence of such extensions for any given parameters. Our approach relies on class field theory and a recent formulation of Tate's characterisation of the Hasse norm principle, a local-global principle for norms. The constructions are sufficiently explicit to be implemented on a computer, and we illustrate them with concrete examples. | 126,713 |
Title: Relational Fusion Networks: Graph Convolutional Networks for Road Networks
Abstract: The application of machine learning techniques in the setting of road networks holds the potential to facilitate many important intelligent transportation applications. Graph Convolutional Networks (GCNs) are neural networks that are capable of leveraging the structure of a network. However, many implicit assumptions of GCNs do not apply to road networks. We introduce the Relational Fusion... | 126,720 |
Title: Identifying the BLE Advertising Channel for Reliable Distance Estimation on Smartphones
Abstract: Estimating the distance between two smartphones plays an important role in a host of applications. For this purpose, smartphones emit and scan for Bluetooth Low Energy (BLE) signals. When a device is detected, the distance is estimated by evaluating the received strength of these signals. The main insight that is exploited for distance estimation is that the attenuation of a signal increases with the distance along which it has traveled. However, besides distance, there are multiple additional factors that impact the attenuation and hence disturb the distance estimation procedure. Among them, frequency-selective hardware and signal propagation belong to the most significant ones. For example, a BLE device transmits packets on three different frequencies (channels), while the transmit power and the receiver sensitivity depend on the frequency. As a result, the received signal strength varies for each channel, even when the distance remains constant. However, the information on which wireless channel a packet has been received is not made available to a smartphone. Hence, this error cannot be compensated, e.g. by calibration. In this paper, we for the first time provide a solution to detect the wireless channel on which a packet has been received by a smartphone application. We experimentally evaluate our proposed technique on multiple different smartphone models. Our results help to make distance estimation on smartphones more robust and accurate. | 126,731 |
Title: Model Explanations with Differential Privacy.
Abstract: Black-box machine learning models are used in critical decision-making domains, giving rise to several calls for more algorithmic transparency. The drawback is that model explanations can leak information about the training data and the explanation data used to generate them, thus undermining data privacy. To address this issue, we propose differentially private algorithms to construct feature-based model explanations. We design an adaptive differentially private gradient descent algorithm, that finds the minimal privacy budget required to produce accurate explanations. It reduces the overall privacy loss on explanation data, by adaptively reusing past differentially private explanations. It also amplifies the privacy guarantees with respect to the training data. We evaluate the implications of differentially private models and our privacy mechanisms on the quality of model explanations. | 126,737 |
Title: AlphaGAN: Fully Differentiable Architecture Search for Generative Adversarial Networks
Abstract: Generative Adversarial Networks (GANs) are formulated as minimax game problems that generative networks attempt to approach real data distributions by adversarial learning against discriminators which learn to distinguish generated samples from real ones, of which the intrinsic problem complexity poses challenges to performance and robustness. In this work, we aim to boost model learning from the perspective of network architectures, by incorporating recent progress on automated architecture search into GANs. Specially we propose a fully differentiable search framework, dubbed
<i>alphaGAN</i>
, where the searching process is formalized as solving a bi-level minimax optimization problem. The outer-level objective aims for seeking an optimal network architecture towards pure Nash Equilibrium conditioned on the network parameters of generators and discriminators optimized with a traditional adversarial loss within inner level. The entire optimization performs a first-order approach by alternately minimizing the two-level objective in a fully differentiable manner that enables obtaining a suitable architecture efficiently from an enormous search space. Extensive experiments on CIFAR-10 and STL-10 datasets show that our algorithm can obtain high-performing architectures only with 3-GPU hours on a single GPU in the search space comprised of approximate
<inline-formula><tex-math notation="LaTeX">$2\times 10^{11}$</tex-math></inline-formula>
possible configurations. We further validate the method on the state-of-the-art network StyleGAN2, and push the score of Fréchet Inception Distance (FID) further, i.e., achieving 1.94 on CelebA, 2.86 on LSUN-church and 2.75 on FFHQ, with relative improvements
<inline-formula><tex-math notation="LaTeX">$3\%{\sim} 26\%$</tex-math></inline-formula>
over the baseline architecture. We also provide a comprehensive analysis of the behavior of the searching process and the properties of searched architectures, which would benefit further research on architectures for generative models. Codes and models are available at
<uri>https://github.com/yuesongtian/AlphaGAN</uri>
. | 126,739 |
Title: TIME DISCRETIZATIONS OF WASSERSTEIN-HAMILTONIAN FLOWS
Abstract: We study discretizations of Hamiltonian systems on the probability density manifold equipped with the L-2-Wasserstein metric. Based on discrete optimal transport theory, several Hamiltonian systems on a graph (lattice) with different weights are derived, which can be viewed as spatial discretizations of the original Hamiltonian systems. We prove consistency of these discretizations. Furthermore, by regularizing the system using the Fisher information, we deduce an explicit lower bound for the density function, which guarantees that symplectic schemes can be used to discretize in time. Moreover, we show desirable long time behavior of these symplectic schemes, and demonstrate their performance on several numerical examples. Finally, we compare the present approach with the standard viscosity methodology. | 126,744 |
Title: FCOS: A Simple and Strong Anchor-Free Object Detector
Abstract: In computer vision, object detection is one of most important tasks, which underpins a few instance-level recognition tasks and many downstream applications. Recently one-stage methods have gained much attention over two-stage approaches due to their simpler design and competitive performance. Here we propose a fully convolutional one-stage object detector (FCOS) to solve object detection in a per... | 126,748 |