id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
2201.00968
Thomas Watson
Md Lutfar Rahman and Thomas Watson
Erd\H{o}s-Selfridge Theorem for Nonmonotone CNFs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an influential paper, Erd\H{o}s and Selfridge introduced the Maker-Breaker game played on a hypergraph, or equivalently, on a monotone CNF. The players take turns assigning values to variables of their choosing, and Breaker's goal is to satisfy the CNF, while Maker's goal is to falsify it. The Erd\H{o}s-Selfridge Theorem says that the least number of clauses in any monotone CNF with $k$ literals per clause where Maker has a winning strategy is $\Theta(2^k)$. We study the analogous question when the CNF is not necessarily monotone. We prove bounds of $\Theta(\sqrt{2}\,^k)$ when Maker plays last, and $\Omega(1.5^k)$ and $O(r^k)$ when Breaker plays last, where $r=(1+\sqrt{5})/2\approx 1.618$ is the golden ratio.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 04:15:11 GMT" } ]
2022-01-05T00:00:00
[ [ "Rahman", "Md Lutfar", "" ], [ "Watson", "Thomas", "" ] ]
new_dataset
0.971482
2201.00987
Yongchun Zhu
Qiong Nan, Juan Cao, Yongchun Zhu, Yanyan Wang, Jintao Li
MDFEND: Multi-domain Fake News Detection
CIKM 2021 short paper. 5 pages
null
10.1145/3459637.3482139
null
cs.CL cs.AI cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fake news spread widely on social media in various domains, which lead to real-world threats in many aspects like politics, disasters, and finance. Most existing approaches focus on single-domain fake news detection (SFND), which leads to unsatisfying performance when these methods are applied to multi-domain fake news detection. As an emerging field, multi-domain fake news detection (MFND) is increasingly attracting attention. However, data distributions, such as word frequency and propagation patterns, vary from domain to domain, namely domain shift. Facing the challenge of serious domain shift, existing fake news detection techniques perform poorly for multi-domain scenarios. Therefore, it is demanding to design a specialized model for MFND. In this paper, we first design a benchmark of fake news dataset for MFND with domain label annotated, namely Weibo21, which consists of 4,488 fake news and 4,640 real news from 9 different domains. We further propose an effective Multi-domain Fake News Detection Model (MDFEND) by utilizing a domain gate to aggregate multiple representations extracted by a mixture of experts. The experiments show that MDFEND can significantly improve the performance of multi-domain fake news detection. Our dataset and code are available at https://github.com/kennqiang/MDFEND-Weibo21.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 05:28:25 GMT" } ]
2022-01-05T00:00:00
[ [ "Nan", "Qiong", "" ], [ "Cao", "Juan", "" ], [ "Zhu", "Yongchun", "" ], [ "Wang", "Yanyan", "" ], [ "Li", "Jintao", "" ] ]
new_dataset
0.999724
2201.01031
Madhu Raka
Swati Bhardwaj and Madhu Raka
Multi-dimensional Constacyclic Codes of Arbitrary Length over Finite Fields
21 pages. arXiv admin note: text overlap with arXiv:2007.14921
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/4.0/
Multi-dimensional cyclic code is a natural generalization of cyclic code. In an earlier paper we explored two-dimensional constacyclic codes over finite fields. Following the same technique, here we characterize the algebraic structure of multi-dimensional constacyclic codes, in particular three-dimensional $(\alpha,\beta,\gamma)$- constacyclic codes of arbitrary length $s\ell k$ and their duals over a finite field $\mathbb{F}_q$, where $\alpha,\beta,\gamma$ are non zero elements of $\mathbb{F}_q$. We give necessary and sufficient conditions for a three-dimensional $(\alpha,\beta,\gamma)$- constacyclic code to be self-dual.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 08:15:25 GMT" } ]
2022-01-05T00:00:00
[ [ "Bhardwaj", "Swati", "" ], [ "Raka", "Madhu", "" ] ]
new_dataset
0.999097
2201.01069
Damien Chablat
Liang Ma, Damien Chablat (ReV, LS2N), Fouad Bennis, Wei Zhang
A new simple dynamic muscle fatigue model and its validation
arXiv admin note: substantial text overlap with arXiv:0901.0222
International Journal of Industrial Ergonomics, Elsevier, 2009, 39 (1), pp.211-220
10.1016/j.ergon.2008.04.004
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Musculoskeletal disorder (MSD) is one of the major health problems in physical work especially in manual handling jobs. In several literatures, muscle fatigue is considered to be closely related to MSD, especially for muscle related disorders. In addition to many existing analysis techniques for muscle fatigue assessment and MSD risk analysis, in this paper, a new muscle fatigue model was proposed. The new proposed model reflects the influence of external load, workload history, and individual differences. This model is simple in mathematics and can be easily applied in realtime calculation, such as the application in realtime virtual work simulation and evaluation. The new model was mathematically validated with 24 existing static models by comparing the calculated METs, and qualitatively or quantitatively validated with 3 existing dynamic models. The proposed model shows high or moderate similarities in predicting the METs with all the 24 static models. Validation results with the three dynamic models were also promising. The main limitation of the model is that it still lacks experimental validation for more dynamic situations. Relevance to industry Muscle fatigue is one of the main reasons causing MSDs in industry, especially for physical work. Correct evaluation of muscle fatigue is necessary to determine work-rest regimens and reduce the risks of MSD.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 10:09:42 GMT" } ]
2022-01-05T00:00:00
[ [ "Ma", "Liang", "", "ReV, LS2N" ], [ "Chablat", "Damien", "", "ReV, LS2N" ], [ "Bennis", "Fouad", "" ], [ "Zhang", "Wei", "" ] ]
new_dataset
0.996437
2201.01095
Mostafa Faraji
Mostafa Faraji, Alexander Seitz, Christoph Meier, Wolfgang A. Wall
A Mortar Finite Element Formulation for Large Deformation Lubricated Contact Problems with Smooth Transition Between Mixed, Elasto-Hydrodynamic and Full Hydrodynamic Lubrication
31 pages, 15 figures
null
null
null
cs.CE cs.NA math.NA physics.app-ph physics.flu-dyn
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes a novel model and numerical formulation for lubricated contact problems describing the mutual interaction between two deformable 3D solid bodies and an interposed fluid film. The solid bodies are consistently described based on nonlinear continuum mechanics allowing for finite deformations and arbitrary constitutive laws. The fluid film is modelled as a quasi-2D flow problem on the interface between the solids governed by the averaged Reynolds equation. The averaged Reynolds equation accounts for surface roughness utilizing spatially homogenized, effective fluid parameters and for cavitation through a positivity constraint imposed on the pressure field. In contrast to existing approaches, the proposed model accounts for the co-existence of frictional contact tractions and hydrodynamic fluid tractions at every local point on the contact surface of the interacting bodies and covers the entire range from boundary lubrication to mixed, elastohydrodynamic, and eventually to full film hydrodynamic lubrication in one unified modelling framework with smooth transition between these different regimes. Critically, the model relies on a recently proposed regularization scheme for the mechanical contact constraint combining the advantages of classical penalty and Lagrange multiplier approaches by expressing the mechanical contact pressure as a function of the effective gap between the solid bodies while at the same time limiting the minimal gap value occurring at the (theoretical) limit of infinitely high contact pressures. From a physical point of view, this approach can be considered as a model for the elastic deformation of surface asperities, with a bounded magnitude depending on the interacting solids' surface roughness. A consistent and accurate model behavior is demonstrated and validated by employing several challenging and practically relevant benchmark test cases.
[ { "version": "v1", "created": "Tue, 4 Jan 2022 11:43:00 GMT" } ]
2022-01-05T00:00:00
[ [ "Faraji", "Mostafa", "" ], [ "Seitz", "Alexander", "" ], [ "Meier", "Christoph", "" ], [ "Wall", "Wolfgang A.", "" ] ]
new_dataset
0.996625
2201.01275
Soumendu Chakraborty
Soumendu Chakraborty, Satish Kumar Singh, and Pavan Chakraborty
Local Quadruple Pattern: A Novel Descriptor for Facial Image Recognition and Retrieval
arXiv admin note: substantial text overlap with arXiv:2201.00504, arXiv:2201.00511
Computers & Electrical Engineering, vol-62, pp. 92-104, (2017). (Elsevier) ISSN/ISBN: 0045-7906
null
null
cs.CV cs.MM
http://creativecommons.org/licenses/by-nc-sa/4.0/
In this paper a novel hand crafted local quadruple pattern (LQPAT) is proposed for facial image recognition and retrieval. Most of the existing hand-crafted descriptors encodes only a limited number of pixels in the local neighbourhood. Under unconstrained environment the performance of these descriptors tends to degrade drastically. The major problem in increasing the local neighbourhood is that, it also increases the feature length of the descriptor. The proposed descriptor try to overcome these problems by defining an efficient encoding structure with optimal feature length. The proposed descriptor encodes relations amongst the neighbours in quadruple space. Two micro patterns are computed from the local relationships to form the descriptor. The retrieval and recognition accuracies of the proposed descriptor has been compared with state of the art hand crafted descriptors on bench mark databases namely; Caltech-face, LFW, Colour-FERET, and CASIA-face-v5. Result analysis shows that the proposed descriptor performs well under uncontrolled variations in pose, illumination, background and expressions.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 08:04:38 GMT" } ]
2022-01-05T00:00:00
[ [ "Chakraborty", "Soumendu", "" ], [ "Singh", "Satish Kumar", "" ], [ "Chakraborty", "Pavan", "" ] ]
new_dataset
0.998387
1801.00540
Apoorve Mohan
Apoorve Mohan, Ata Turk, Ravi S. Gudimetla, Sahil Tikale, Jason Hennessey, Ugur Kaynar, Gene Cooperman, Peter Desnoyers, and Orran Krieger
M2: Malleable Metal as a Service
IEEE International Conference on Cloud Engineering 2018
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing bare-metal cloud services that provide users with physical nodes have a number of serious disadvantage over their virtual alternatives, including slow provisioning times, difficulty for users to release nodes and then reuse them to handle changes in demand, and poor tolerance to failures. We introduce M2, a bare-metal cloud service that uses network-mounted boot drives to overcome these disadvantages. We describe the architecture and implementation of M2 and compare its agility, scalability, and performance to existing systems. We show that M2 can reduce provisioning time by over 50% while offering richer functionality, and comparable run-time performance with respect to tools that provision images into local disks. M2 is open source and available at https://github.com/CCI-MOC/ims.
[ { "version": "v1", "created": "Tue, 2 Jan 2018 03:25:28 GMT" } ]
2022-01-04T00:00:00
[ [ "Mohan", "Apoorve", "" ], [ "Turk", "Ata", "" ], [ "Gudimetla", "Ravi S.", "" ], [ "Tikale", "Sahil", "" ], [ "Hennessey", "Jason", "" ], [ "Kaynar", "Ugur", "" ], [ "Cooperman", "Gene", "" ], [ "Desnoyers", "Peter", "" ], [ "Krieger", "Orran", "" ] ]
new_dataset
0.996048
1811.04333
Ye Zhao
Ye Zhao and Yinan Li and Luis Sentis and Ufuk Topcu and Jun Liu
Reactive Task and Motion Planning for Robust Whole-Body Dynamic Locomotion in Constrained Environments
49 pages, 23 figures, 1 table
null
null
null
cs.RO cs.FL cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contact-based decision and planning methods are becoming increasingly important to endow higher levels of autonomy for legged robots. Formal synthesis methods derived from symbolic systems have great potential for reasoning about high-level locomotion decisions and achieving complex maneuvering behaviors with correctness guarantees. This study takes a first step toward formally devising an architecture composed of task planning and control of whole-body dynamic locomotion behaviors in constrained and dynamically changing environments. At the high level, we formulate a two-player temporal logic game between the multi-limb locomotion planner and its dynamic environment to synthesize a winning strategy that delivers symbolic locomotion actions. These locomotion actions satisfy the desired high-level task specifications expressed in a fragment of temporal logic. Those actions are sent to a robust finite transition system that synthesizes a locomotion controller that fulfills state reachability constraints. This controller is further executed via a low-level motion planner that generates feasible locomotion trajectories. We construct a set of dynamic locomotion models for legged robots to serve as a template library for handling diverse environmental events. We devise a replanning strategy that takes into consideration sudden environmental changes or large state disturbances to increase the robustness of the resulting locomotion behaviors. We formally prove the correctness of the layered locomotion framework guaranteeing a robust implementation by the motion planning layer. Simulations of reactive locomotion behaviors in diverse environments indicate that our framework has the potential to serve as a theoretical foundation for intelligent locomotion behaviors.
[ { "version": "v1", "created": "Sun, 11 Nov 2018 02:19:27 GMT" }, { "version": "v2", "created": "Sat, 1 Jan 2022 18:34:15 GMT" } ]
2022-01-04T00:00:00
[ [ "Zhao", "Ye", "" ], [ "Li", "Yinan", "" ], [ "Sentis", "Luis", "" ], [ "Topcu", "Ufuk", "" ], [ "Liu", "Jun", "" ] ]
new_dataset
0.99356
2004.10506
Galymzhan Nauryzbayev
Leila Tlebaldiyeva, Galymzhan Nauryzbayev, Sultangali Arzykulov, Yerassyl Akhmetkaziyev, Mohammad S. Hashmi, and Ahmed M. Eltawil
A Non-Ideal NOMA-based mmWave D2D Networks with Hardware and CSI Imperfections
4 pages, 3 figures
null
10.1109/ICTC52510.2021.9621035
null
cs.IT cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter investigates a non-orthogonal multiple access (NOMA) assisted millimeter-wave device-to-device (D2D) network practically limited by multiple interference noises, transceiver hardware impairments, imperfect successive interference cancellation, and channel state information mismatch. Generalized outage probability expressions for NOMA-D2D users are deduced and achieved results, validated by Monte Carlo simulations, are compared with the orthogonal multiple access to show the superior performance of the proposed network model
[ { "version": "v1", "created": "Wed, 22 Apr 2020 11:41:33 GMT" } ]
2022-01-04T00:00:00
[ [ "Tlebaldiyeva", "Leila", "" ], [ "Nauryzbayev", "Galymzhan", "" ], [ "Arzykulov", "Sultangali", "" ], [ "Akhmetkaziyev", "Yerassyl", "" ], [ "Hashmi", "Mohammad S.", "" ], [ "Eltawil", "Ahmed M.", "" ] ]
new_dataset
0.991293
2008.11356
Sultangali Arzykulov
Sultangali Arzykulov, Abdulkadir Celik, Galymzhan Nauryzbayev, Ahmed M. Eltawil
UAV-Assisted Cooperative & Cognitive NOMA: Deployment, Clustering, and Resource Allocation
null
null
10.1109/TCCN.2021.3105133
null
cs.IT eess.SP math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative and cognitive non-orthogonal multiple access (CCR-NOMA) has been recognized as a promising technique to overcome issues of spectrum scarcity and support massive connectivity envisioned in next-generation wireless networks. In this paper, we investigate the deployment of an unmanned aerial vehicle (UAV) as a relay that fairly serves a large number of secondary users in a hot-spot region. The UAV deployment algorithm must jointly account for user clustering, channel assignment, and resource allocation sub-problems. We propose a solution methodology that obtains user clustering and channel assignment based on the optimal resource allocations for a given UAV location. To this end, we derive closed-form optimal power and time allocations and show it delivers optimal max-min fair throughput by consuming less energy and time than geometric programming. Based on optimal resource allocation, the optimal coverage probability is also provided in closed-form, which takes channel estimation errors, hardware impairments, and primary network interference into account. The optimal coverage probabilities are used by the proposed max-min fair user clustering and channel assignment approaches. The results show that the proposed method achieves 100% accuracy in more than five orders of magnitude less time than the optimal benchmark.
[ { "version": "v1", "created": "Wed, 26 Aug 2020 03:08:28 GMT" } ]
2022-01-04T00:00:00
[ [ "Arzykulov", "Sultangali", "" ], [ "Celik", "Abdulkadir", "" ], [ "Nauryzbayev", "Galymzhan", "" ], [ "Eltawil", "Ahmed M.", "" ] ]
new_dataset
0.984602
2101.05324
Pratap Tokekar
Deniz Ozsoyeller and Pratap Tokekar
Multi-robot Symmetric Rendezvous Search on the Line
null
null
10.1109/LRA.2021.3126350
null
cs.RO cs.DM
http://creativecommons.org/licenses/by/4.0/
We study the Symmetric Rendezvous Search Problem for a multi-robot system. There are $n>2$ robots arbitrarily located on a line. Their goal is to meet somewhere on the line as quickly as possible. The robots do not know the initial location of any of the other robots or their own positions on the line. The symmetric version of the problem requires the robots to execute the same search strategy to achieve rendezvous. Therefore, we solve the problem in an online fashion with a randomized strategy. In this paper, we present a symmetric rendezvous algorithm which achieves a constant competitive ratio for the total distance traveled by the robots. We validate our theoretical results through simulations.
[ { "version": "v1", "created": "Wed, 13 Jan 2021 20:00:18 GMT" }, { "version": "v2", "created": "Wed, 27 Jan 2021 12:24:03 GMT" }, { "version": "v3", "created": "Thu, 28 Jan 2021 17:57:01 GMT" } ]
2022-01-04T00:00:00
[ [ "Ozsoyeller", "Deniz", "" ], [ "Tokekar", "Pratap", "" ] ]
new_dataset
0.982339
2103.01009
Charlie Blake
Charlie Blake, Vitaly Kurin, Maximilian Igl, Shimon Whiteson
Snowflake: Scaling GNNs to High-Dimensional Continuous Control via Parameter Freezing
20 pages, 14 figures, published at NeurIPS 2021
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent research has shown that graph neural networks (GNNs) can learn policies for locomotion control that are as effective as a typical multi-layer perceptron (MLP), with superior transfer and multi-task performance (Wang et al., 2018; Huang et al., 2020). Results have so far been limited to training on small agents, with the performance of GNNs deteriorating rapidly as the number of sensors and actuators grows. A key motivation for the use of GNNs in the supervised learning setting is their applicability to large graphs, but this benefit has not yet been realised for locomotion control. We identify the weakness with a common GNN architecture that causes this poor scaling: overfitting in the MLPs within the network that encode, decode, and propagate messages. To combat this, we introduce Snowflake, a GNN training method for high-dimensional continuous control that freezes parameters in parts of the network that suffer from overfitting. Snowflake significantly boosts the performance of GNNs for locomotion control on large agents, now matching the performance of MLPs, and with superior transfer properties.
[ { "version": "v1", "created": "Mon, 1 Mar 2021 13:56:10 GMT" }, { "version": "v2", "created": "Fri, 1 Oct 2021 09:35:48 GMT" }, { "version": "v3", "created": "Mon, 3 Jan 2022 16:58:14 GMT" } ]
2022-01-04T00:00:00
[ [ "Blake", "Charlie", "" ], [ "Kurin", "Vitaly", "" ], [ "Igl", "Maximilian", "" ], [ "Whiteson", "Shimon", "" ] ]
new_dataset
0.979106
2103.04205
Shaddin Dughmi
Shaddin Dughmi
Matroid Secretary Is Equivalent to Contention Resolution
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the matroid secretary problem is equivalent to correlated contention resolution in the online random-order model. Specifically, the matroid secretary conjecture is true if and only if every matroid admits an online random-order contention resolution scheme which, given an arbitrary (possibly correlated) prior distribution over subsets of the ground set, matches the balance ratio of the best offline scheme for that distribution up to a constant. We refer to such a scheme as universal. Our result indicates that the core challenge of the matroid secretary problem lies in resolving contention for positively correlated inputs, in particular when the positive correlation is benign in as much as offline contention resolution is concerned. Our result builds on our previous work which establishes one direction of this equivalence, namely that the secretary conjecture implies universal random-order contention resolution, as well as a weak converse, which derives a matroid secretary algorithm from a random-order contention resolution scheme with only partial knowledge of the distribution. It is this weak converse that we strengthen in this paper: We show that universal random-order contention resolution for matroids, in the usual setting of a fully known prior distribution, suffices to resolve the matroid secretary conjecture in the affirmative. Our proof is the composition of three reductions. First, we use duality arguments to reduce the matroid secretary problem to the matroid prophet secretary problem with arbitrarily correlated distributions. Second, we introduce a generalization of contention resolution we term labeled contention resolution, to which we reduce the correlated matroid prophet secretary problem. Finally, we combine duplication of elements with limiting arguments to reduce labeled contention resolution to classical contention resolution.
[ { "version": "v1", "created": "Sat, 6 Mar 2021 22:46:29 GMT" }, { "version": "v2", "created": "Wed, 2 Jun 2021 00:31:59 GMT" }, { "version": "v3", "created": "Mon, 3 Jan 2022 09:32:03 GMT" } ]
2022-01-04T00:00:00
[ [ "Dughmi", "Shaddin", "" ] ]
new_dataset
0.999588
2104.09379
Yihang Yin
Yihang Yin, Siyu Huang, Xiang Zhang
BM-NAS: Bilevel Multimodal Neural Architecture Search
Accepted by AAAI 2022
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deep neural networks (DNNs) have shown superior performances on various multimodal learning problems. However, it often requires huge efforts to adapt DNNs to individual multimodal tasks by manually engineering unimodal features and designing multimodal feature fusion strategies. This paper proposes Bilevel Multimodal Neural Architecture Search (BM-NAS) framework, which makes the architecture of multimodal fusion models fully searchable via a bilevel searching scheme. At the upper level, BM-NAS selects the inter/intra-modal feature pairs from the pretrained unimodal backbones. At the lower level, BM-NAS learns the fusion strategy for each feature pair, which is a combination of predefined primitive operations. The primitive operations are elaborately designed and they can be flexibly combined to accommodate various effective feature fusion modules such as multi-head attention (Transformer) and Attention on Attention (AoA). Experimental results on three multimodal tasks demonstrate the effectiveness and efficiency of the proposed BM-NAS framework. BM-NAS achieves competitive performances with much less search time and fewer model parameters in comparison with the existing generalized multimodal NAS methods.
[ { "version": "v1", "created": "Mon, 19 Apr 2021 15:09:49 GMT" }, { "version": "v2", "created": "Sun, 2 Jan 2022 16:06:43 GMT" } ]
2022-01-04T00:00:00
[ [ "Yin", "Yihang", "" ], [ "Huang", "Siyu", "" ], [ "Zhang", "Xiang", "" ] ]
new_dataset
0.950767
2105.06162
Lev Tauz
Lev Tauz, Lara Dolecek
Variable Coded Batch Matrix Multiplication
35 pages, 8 figures, a part of this manuscript was published at IEEE Global Communications Conference (GLOBECOM) 2021
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A majority of coded matrix-matrix computation literature has broadly focused in two directions: matrix partitioning for computing a single computation task and batch processing of multiple distinct computation tasks. While these works provide codes with good straggler resilience and fast decoding for their problem spaces, these codes would not be able to take advantage of the natural redundancy of re-using matrices across batch jobs. In this paper, we introduce the Variable Coded Distributed Batch Matrix Multiplication (VCDBMM) problem which tasks a distributed system to perform batch matrix multiplication where matrices are not necessarily distinct among batch jobs. Inspired in part by Cross-Subspace Alignment codes, we develop Flexible Cross-Subspace Alignments (FCSA) codes that are flexible enough to utilize this redundancy. We provide a full characterization of FCSA codes which allow for a wide variety of system complexities including good straggler resilience and fast decoding. We theoretically demonstrate that, under certain practical conditions, FCSA codes are within a factor of 2 of the optimal solution when it comes to straggler resilience. Furthermore, our simulations demonstrate that our codes can achieve even better optimality gaps in practice, even going as low as 1.7.
[ { "version": "v1", "created": "Thu, 13 May 2021 09:39:32 GMT" }, { "version": "v2", "created": "Fri, 28 May 2021 00:20:39 GMT" }, { "version": "v3", "created": "Tue, 14 Sep 2021 21:02:05 GMT" }, { "version": "v4", "created": "Sat, 1 Jan 2022 01:18:33 GMT" } ]
2022-01-04T00:00:00
[ [ "Tauz", "Lev", "" ], [ "Dolecek", "Lara", "" ] ]
new_dataset
0.998948
2112.12946
Qizhen Zhang
Qizhen Zhang, Philip A. Bernstein, Daniel S. Berger, Badrish Chandramouli
Redy: Remote Dynamic Memory Cache
This is the extended report of Redy (accepted at VLDB 2022)
null
null
null
cs.DC cs.DB
http://creativecommons.org/licenses/by-nc-nd/4.0/
Redy is a cloud service that provides high performance caches using RDMA-accessible remote memory. An application can customize the performance of each cache with a service level objective (SLO) for latency and throughput. By using remote memory, it can leverage stranded memory and spot VM instances to reduce the cost of its caches and improve data center resource utilization. Redy automatically customizes the resource configuration for the given SLO, handles the dynamics of remote memory regions, and recovers from failures. The experimental evaluation shows that Redy can deliver its promised performance and robustness under remote memory dynamics in the cloud. We augment a production key-value store, FASTER, with a Redy cache. When the working set exceeds local memory, using Redy is significantly faster than spilling to SSDs.
[ { "version": "v1", "created": "Fri, 24 Dec 2021 05:13:18 GMT" }, { "version": "v2", "created": "Sat, 1 Jan 2022 06:21:02 GMT" } ]
2022-01-04T00:00:00
[ [ "Zhang", "Qizhen", "" ], [ "Bernstein", "Philip A.", "" ], [ "Berger", "Daniel S.", "" ], [ "Chandramouli", "Badrish", "" ] ]
new_dataset
0.998994
2201.00059
Junyi Geng
Xinke Deng, Junyi Geng, Timothy Bretl, Yu Xiang and Dieter Fox
iCaps: Iterative Category-level Object Pose and Shape Estimation
null
null
null
null
cs.CV cs.RO
http://creativecommons.org/licenses/by/4.0/
This paper proposes a category-level 6D object pose and shape estimation approach iCaps, which allows tracking 6D poses of unseen objects in a category and estimating their 3D shapes. We develop a category-level auto-encoder network using depth images as input, where feature embeddings from the auto-encoder encode poses of objects in a category. The auto-encoder can be used in a particle filter framework to estimate and track 6D poses of objects in a category. By exploiting an implicit shape representation based on signed distance functions, we build a LatentNet to estimate a latent representation of the 3D shape given the estimated pose of an object. Then the estimated pose and shape can be used to update each other in an iterative way. Our category-level 6D object pose and shape estimation pipeline only requires 2D detection and segmentation for initialization. We evaluate our approach on a publicly available dataset and demonstrate its effectiveness. In particular, our method achieves comparably high accuracy on shape estimation.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 21:15:05 GMT" } ]
2022-01-04T00:00:00
[ [ "Deng", "Xinke", "" ], [ "Geng", "Junyi", "" ], [ "Bretl", "Timothy", "" ], [ "Xiang", "Yu", "" ], [ "Fox", "Dieter", "" ] ]
new_dataset
0.979306
2201.00080
Xiaotong Chen
Xiaotong Chen, Seyed Mehdi Iranmanesh, Kuo-Chin Lien
PatchTrack: Multiple Object Tracking Using Frame Patches
11 pages, 4 figures, 2 tables
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Object motion and object appearance are commonly used information in multiple object tracking (MOT) applications, either for associating detections across frames in tracking-by-detection methods or direct track predictions for joint-detection-and-tracking methods. However, not only are these two types of information often considered separately, but also they do not help optimize the usage of visual information from the current frame of interest directly. In this paper, we present PatchTrack, a Transformer-based joint-detection-and-tracking system that predicts tracks using patches of the current frame of interest. We use the Kalman filter to predict the locations of existing tracks in the current frame from the previous frame. Patches cropped from the predicted bounding boxes are sent to the Transformer decoder to infer new tracks. By utilizing both object motion and object appearance information encoded in patches, the proposed method pays more attention to where new tracks are more likely to occur. We show the effectiveness of PatchTrack on recent MOT benchmarks, including MOT16 (MOTA 73.71%, IDF1 65.77%) and MOT17 (MOTA 73.59%, IDF1 65.23%). The results are published on https://motchallenge.net/method/MOT=4725&chl=10.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 00:16:45 GMT" } ]
2022-01-04T00:00:00
[ [ "Chen", "Xiaotong", "" ], [ "Iranmanesh", "Seyed Mehdi", "" ], [ "Lien", "Kuo-Chin", "" ] ]
new_dataset
0.998847
2201.00096
Mohamed Amine Kerkouri
Mohamed Amine Kerkouri, Marouane Tliba, Aladine Chetouani, Mohamed Sayeh
SalyPath360: Saliency and Scanpath Prediction Framework for Omnidirectional Images
Accepted at Electornic Imaging Sympotium 2022
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
This paper introduces a new framework to predict visual attention of omnidirectional images. The key setup of our architecture is the simultaneous prediction of the saliency map and a corresponding scanpath for a given stimulus. The framework implements a fully encoder-decoder convolutional neural network augmented by an attention module to generate representative saliency maps. In addition, an auxiliary network is employed to generate probable viewport center fixation points through the SoftArgMax function. The latter allows to derive fixation points from feature maps. To take advantage of the scanpath prediction, an adaptive joint probability distribution model is then applied to construct the final unbiased saliency map by leveraging the encoder decoder-based saliency map and the scanpath-based saliency heatmap. The proposed framework was evaluated in terms of saliency and scanpath prediction, and the results were compared to state-of-the-art methods on Salient360! dataset. The results showed the relevance of our framework and the benefits of such architecture for further omnidirectional visual attention prediction tasks.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 02:37:33 GMT" } ]
2022-01-04T00:00:00
[ [ "Kerkouri", "Mohamed Amine", "" ], [ "Tliba", "Marouane", "" ], [ "Chetouani", "Aladine", "" ], [ "Sayeh", "Mohamed", "" ] ]
new_dataset
0.990184
2201.00112
Andrew Luo
Andrew Luo, Tianqin Li, Wen-Hao Zhang, Tai Sing Lee
SurfGen: Adversarial 3D Shape Synthesis with Explicit Surface Discriminators
ICCV 2021. Project page: https://github.com/aluo-x/NeuralRaycaster
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent advances in deep generative models have led to immense progress in 3D shape synthesis. While existing models are able to synthesize shapes represented as voxels, point-clouds, or implicit functions, these methods only indirectly enforce the plausibility of the final 3D shape surface. Here we present a 3D shape synthesis framework (SurfGen) that directly applies adversarial training to the object surface. Our approach uses a differentiable spherical projection layer to capture and represent the explicit zero isosurface of an implicit 3D generator as functions defined on the unit sphere. By processing the spherical representation of 3D object surfaces with a spherical CNN in an adversarial setting, our generator can better learn the statistics of natural shape surfaces. We evaluate our model on large-scale shape datasets, and demonstrate that the end-to-end trained model is capable of generating high fidelity 3D shapes with diverse topology.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 04:44:42 GMT" } ]
2022-01-04T00:00:00
[ [ "Luo", "Andrew", "" ], [ "Li", "Tianqin", "" ], [ "Zhang", "Wen-Hao", "" ], [ "Lee", "Tai Sing", "" ] ]
new_dataset
0.990029
2201.00132
Thanh Le-Cong Le-Cong Thanh
Bao Hieu Tran, Thanh Le-Cong, Huu Manh Nguyen, Duc Anh Le, Thanh Hung Nguyen, Phi Le Nguyen
SAFL: A Self-Attention Scene Text Recognizer with Focal Loss
Accepted to ICMLA 2020
2020 19th IEEE International Conference on Machine Learning and Applications (ICMLA)
10.1109/ICMLA51294.2020.00223
null
cs.CV cs.LG
http://creativecommons.org/licenses/by-nc-sa/4.0/
In the last decades, scene text recognition has gained worldwide attention from both the academic community and actual users due to its importance in a wide range of applications. Despite achievements in optical character recognition, scene text recognition remains challenging due to inherent problems such as distortions or irregular layout. Most of the existing approaches mainly leverage recurrence or convolution-based neural networks. However, while recurrent neural networks (RNNs) usually suffer from slow training speed due to sequential computation and encounter problems as vanishing gradient or bottleneck, CNN endures a trade-off between complexity and performance. In this paper, we introduce SAFL, a self-attention-based neural network model with the focal loss for scene text recognition, to overcome the limitation of the existing approaches. The use of focal loss instead of negative log-likelihood helps the model focus more on low-frequency samples training. Moreover, to deal with the distortions and irregular texts, we exploit Spatial TransformerNetwork (STN) to rectify text before passing to the recognition network. We perform experiments to compare the performance of the proposed model with seven benchmarks. The numerical results show that our model achieves the best performance.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 06:51:03 GMT" } ]
2022-01-04T00:00:00
[ [ "Tran", "Bao Hieu", "" ], [ "Le-Cong", "Thanh", "" ], [ "Nguyen", "Huu Manh", "" ], [ "Le", "Duc Anh", "" ], [ "Nguyen", "Thanh Hung", "" ], [ "Nguyen", "Phi Le", "" ] ]
new_dataset
0.999482
2201.00199
Radostin Cholakov
Radostin Cholakov and Todor Kolev
The GatedTabTransformer. An enhanced deep learning architecture for tabular modeling
10 pages, 6 figures
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by-sa/4.0/
There is an increasing interest in the application of deep learning architectures to tabular data. One of the state-of-the-art solutions is TabTransformer which incorporates an attention mechanism to better track relationships between categorical features and then makes use of a standard MLP to output its final logits. In this paper we propose multiple modifications to the original TabTransformer performing better on binary classification tasks for three separate datasets with more than 1% AUROC gains. Inspired by gated MLP, linear projections are implemented in the MLP block and multiple activation functions are tested. We also evaluate the importance of specific hyper parameters during training.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 14:52:04 GMT" } ]
2022-01-04T00:00:00
[ [ "Cholakov", "Radostin", "" ], [ "Kolev", "Todor", "" ] ]
new_dataset
0.986928
2201.00220
Dani Kiyasseh
Dani Kiyasseh, Rasheed El-Bouri
Turath-150K: Image Database of Arab Heritage
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Large-scale image databases remain largely biased towards objects and activities encountered in a select few cultures. This absence of culturally-diverse images, which we refer to as the hidden tail, limits the applicability of pre-trained neural networks and inadvertently excludes researchers from under-represented regions. To begin remedying this issue, we curate Turath-150K, a database of images of the Arab world that reflect objects, activities, and scenarios commonly found there. In the process, we introduce three benchmark databases, Turath Standard, Art, and UNESCO, specialised subsets of the Turath dataset. After demonstrating the limitations of existing networks pre-trained on ImageNet when deployed on such benchmarks, we train and evaluate several networks on the task of image classification. As a consequence of Turath, we hope to engage machine learning researchers in under-represented regions, and to inspire the release of additional culture-focused databases. The database can be accessed here: danikiyasseh.github.io/Turath.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 17:36:25 GMT" } ]
2022-01-04T00:00:00
[ [ "Kiyasseh", "Dani", "" ], [ "El-Bouri", "Rasheed", "" ] ]
new_dataset
0.999091
2201.00242
Martin T\"orngren
Martin T\"orngren, Haydn Thompson, Erik Herzog, Rafia Inam, James Gross and Gy\"orgy D\'an
Industrial Edge-based Cyber-Physical Systems -- Application Needs and Concerns for Realization
7 pages, 1 figure
null
10.1145/3453142.3493507
null
cs.DC cs.SY eess.SY
http://creativecommons.org/licenses/by-nc-nd/4.0/
Industry is moving towards advanced Cyber-Physical Systems (CPS), with trends in smartness, automation, connectivity and collaboration. We examine the drivers and requirements for the use of edge computing in critical industrial applications. Our purpose is to provide a better understanding of industrial needs and to initiate a discussion on what role edge computing could take, complementing current industrial and embedded systems, and the cloud. Four domains are chosen for analysis with representative use-cases; manufacturing, transportation, the energy sector and networked applications in the defense domain. We further discuss challenges, open issues and suggested directions that are needed to pave the way for the use of edge computing in industrial CPS.
[ { "version": "v1", "created": "Sat, 1 Jan 2022 20:54:25 GMT" } ]
2022-01-04T00:00:00
[ [ "Törngren", "Martin", "" ], [ "Thompson", "Haydn", "" ], [ "Herzog", "Erik", "" ], [ "Inam", "Rafia", "" ], [ "Gross", "James", "" ], [ "Dán", "György", "" ] ]
new_dataset
0.973226
2201.00277
Balsam Alkouz
Balsam Alkouz, Babar Shahzaad, Athman Bouguettaya
Service-Based Drone Delivery
9 pages, 7 figures. This is an accepted paper and it is going to appear in the Proceedings of the 2021 IEEE International Conference on Collaboration and Internet Computing (CIC 2021)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service delivery is set to experience a major paradigm shift with fast advances in drone technologies coupled with higher expectations from customers and increased competition. We propose a novel service-oriented approach to enable the ubiquitous delivery of packages in a drone-operated skyway network. We discuss the benefits, framework and architecture, contemporary approaches, open challenges and future visioned directions of service-based drone deliveries.
[ { "version": "v1", "created": "Sun, 2 Jan 2022 02:34:10 GMT" } ]
2022-01-04T00:00:00
[ [ "Alkouz", "Balsam", "" ], [ "Shahzaad", "Babar", "" ], [ "Bouguettaya", "Athman", "" ] ]
new_dataset
0.994569
2201.00290
Luis Jose Alarcon Aneiva
Luis Alarcon and Job Ledezma
Develop of a Pneumatic Force Sensor Prototype
in Spanish
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
One of the difficulties of applying a SEA force control is the complexity that exists when implementing its three main components, which must work together one after the other. To facilitate the implementation of a force control by SEA, in this thesis the pneumatic force sensor is developed. A pneumatic force sensor differs from other force sensors in that it can work as a force sensor and as an elastic element. These features facilitate the implementation of force control by SEA, by reducing the number of components required. On the other hand, the pneumatic force sensor has reduced proportions to facilitate its installation in manipulator robots and biomechatronic prostheses. The first step that was made for the development of the pneumatic force sensor was the construction of the mathematical model of the sensor, to later use the MATLAB / Simulink software to simulate it. With the data obtained from the simulation of the mathematical model, the CAD model and the sensor planes were developed in SolidWorks software. Subsequently, the prototype of the pneumatic force sensor was built based on the plans made in the SolidWorks software. Once the stage of construction of the pneumatic force sensor was completed, the calibration and classification of the force sensor was carried out based on the UNE-EN ISO 376 standard, and the experimental tests were carried out to validate the sensor. Once the classification of the pneumatic force sensor was obtained, the results of the simulation of the mathematical model were compared with the results of the experimental test. vi In the comparison, it was possible to show a graphic coherence in the results obtained, validating the pneumatic force sensor system.
[ { "version": "v1", "created": "Sun, 2 Jan 2022 05:03:10 GMT" } ]
2022-01-04T00:00:00
[ [ "Alarcon", "Luis", "" ], [ "Ledezma", "Job", "" ] ]
new_dataset
0.997222
2201.00377
Jo\~ao Morais
Jo\~ao Morais, Kaushal Rathi, Bhuvaneshwar Mohan, Shantanu Rajesh
Parkour Spot ID: Feature Matching in Satellite and Street view images using Deep Learning
null
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
How to find places that are not indexed by Google Maps? We propose an intuitive method and framework to locate places based on their distinctive spatial features. The method uses satellite and street view images in machine vision approaches to classify locations. If we can classify locations, we just need to repeat for non-overlapping locations in our area of interest. We assess the proposed system in finding Parkour spots in the campus of Arizona State University. The results are very satisfactory, having found more than 25 new Parkour spots, with a rate of true positives above 60%.
[ { "version": "v1", "created": "Sun, 2 Jan 2022 16:55:00 GMT" } ]
2022-01-04T00:00:00
[ [ "Morais", "João", "" ], [ "Rathi", "Kaushal", "" ], [ "Mohan", "Bhuvaneshwar", "" ], [ "Rajesh", "Shantanu", "" ] ]
new_dataset
0.973201
2201.00455
Bejan Sadeghian
Bejan Sadeghian
Actor-Critic Network for Q&A in an Adversarial Environment
6 pages, 3 figures, 3 tables
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Significant work has been placed in the Q&A NLP space to build models that are more robust to adversarial attacks. Two key areas of focus are in generating adversarial data for the purposes of training against these situations or modifying existing architectures to build robustness within. This paper introduces an approach that joins these two ideas together to train a critic model for use in an almost reinforcement learning framework. Using the Adversarial SQuAD "Add One Sent" dataset we show that there are some promising signs for this method in protecting against Adversarial attacks.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 02:35:58 GMT" } ]
2022-01-04T00:00:00
[ [ "Sadeghian", "Bejan", "" ] ]
new_dataset
0.999451
2201.00467
Constantine Roros
Constantine J. Roros, Avinash C. Kak
maskGRU: Tracking Small Objects in the Presence of Large Background Motions
12 pages, 3 figures
null
null
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a recurrent neural network-based spatio-temporal framework named maskGRU for the detection and tracking of small objects in videos. While there have been many developments in the area of object tracking in recent years, tracking a small moving object amid other moving objects and actors (such as a ball amid moving players in sports footage) continues to be a difficult task. Existing spatio-temporal networks, such as convolutional Gated Recurrent Units (convGRUs), are difficult to train and have trouble accurately tracking small objects under such conditions. To overcome these difficulties, we developed the maskGRU framework that uses a weighted sum of the internal hidden state produced by a convGRU and a 3-channel mask of the tracked object's predicted bounding box as the hidden state to be used at the next time step of the underlying convGRU. We believe the technique of incorporating a mask into the hidden state through a weighted sum has two benefits: controlling the effect of exploding gradients and introducing an attention-like mechanism into the network by indicating where in the previous video frame the object is located. Our experiments show that maskGRU outperforms convGRU at tracking objects that are small relative to the video resolution even in the presence of other moving objects.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 04:10:02 GMT" } ]
2022-01-04T00:00:00
[ [ "Roros", "Constantine J.", "" ], [ "Kak", "Avinash C.", "" ] ]
new_dataset
0.960527
2201.00486
Kshitija Taywade
Kshitija Taywade, Brent Harrison, Judy Goldsmith
Using Non-Stationary Bandits for Learning in Repeated Cournot Games with Non-Stationary Demand
13 pages
null
null
null
cs.LG cs.GT cs.MA econ.GN q-fin.EC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many past attempts at modeling repeated Cournot games assume that demand is stationary. This does not align with real-world scenarios in which market demands can evolve over a product's lifetime for a myriad of reasons. In this paper, we model repeated Cournot games with non-stationary demand such that firms/agents face separate instances of non-stationary multi-armed bandit problem. The set of arms/actions that an agent can choose from represents discrete production quantities; here, the action space is ordered. Agents are independent and autonomous, and cannot observe anything from the environment; they can only see their own rewards after taking an action, and only work towards maximizing these rewards. We propose a novel algorithm 'Adaptive with Weighted Exploration (AWE) $\epsilon$-greedy' which is remotely based on the well-known $\epsilon$-greedy approach. This algorithm detects and quantifies changes in rewards due to varying market demand and varies learning rate and exploration rate in proportion to the degree of changes in demand, thus enabling agents to better identify new optimal actions. For efficient exploration, it also deploys a mechanism for weighing actions that takes advantage of the ordered action space. We use simulations to study the emergence of various equilibria in the market. In addition, we study the scalability of our approach in terms number of total agents in the system and the size of action space. We consider both symmetric and asymmetric firms in our models. We found that using our proposed method, agents are able to swiftly change their course of action according to the changes in demand, and they also engage in collusive behavior in many simulations.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 05:51:47 GMT" } ]
2022-01-04T00:00:00
[ [ "Taywade", "Kshitija", "" ], [ "Harrison", "Brent", "" ], [ "Goldsmith", "Judy", "" ] ]
new_dataset
0.992002
2201.00598
Harveen Singh Chadha
Manan Jhaveri, Devanshu Ramaiya, Harveen Singh Chadha
Toxicity Detection for Indic Multilingual Social Media Content
It was meant for IEEE BigM conference
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Toxic content is one of the most critical issues for social media platforms today. India alone had 518 million social media users in 2020. In order to provide a good experience to content creators and their audience, it is crucial to flag toxic comments and the users who post that. But the big challenge is identifying toxicity in low resource Indic languages because of the presence of multiple representations of the same text. Moreover, the posts/comments on social media do not adhere to a particular format, grammar or sentence structure; this makes the task of abuse detection even more challenging for multilingual social media platforms. This paper describes the system proposed by team 'Moj Masti' using the data provided by ShareChat/Moj in \emph{IIIT-D Multilingual Abusive Comment Identification} challenge. We focus on how we can leverage multilingual transformer based pre-trained and fine-tuned models to approach code-mixed/code-switched classification tasks. Our best performing system was an ensemble of XLM-RoBERTa and MuRIL which achieved a Mean F-1 score of 0.9 on the test data/leaderboard. We also observed an increase in the performance by adding transliterated data. Furthermore, using weak metadata, ensembling and some post-processing techniques boosted the performance of our system, thereby placing us 1st on the leaderboard.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 12:01:47 GMT" } ]
2022-01-04T00:00:00
[ [ "Jhaveri", "Manan", "" ], [ "Ramaiya", "Devanshu", "" ], [ "Chadha", "Harveen Singh", "" ] ]
new_dataset
0.998847
2201.00613
Cristobal A. Navarro
Felipe A. Quezada, Crist\'obal A. Navarro, Nancy Hitschfeld, Benjamin Bustos
Squeeze: Efficient Compact Fractals for Tensor Core GPUs
null
null
null
null
cs.DC cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work presents Squeeze, an efficient compact fractal processing scheme for tensor core GPUs. By combining discrete-space transformations between compact and expanded forms, one can do data-parallel computation on a fractal with neighborhood access without needing to expand the fractal in memory. The space transformations are formulated as two GPU tensor-core accelerated thread maps, $\lambda(\omega)$ and $\nu(\omega)$, which act as compact-to-expanded and expanded-to-compact space functions, respectively. The cost of the maps is $\mathcal{O}(\log_2 \log_s(n))$ time, with $n$ being the side of a $n \times n$ embedding for the fractal in its expanded form, and $s$ the linear scaling factor. The proposed approach works for any fractal that belongs to the Non-overlapping-Bounding-Boxes (NBB) class of discrete fractals, and can be extended to three dimensions as well. Experimental results using a discrete Sierpinski Triangle as a case study shows up to $\sim12\times$ of speedup and a memory reduction factor of up to $\sim 315\times$ with respect to a GPU-based expanded-space bounding box approach. These results show that the proposed compact approach will allow the scientific community to efficiently tackle problems that up to now could not fit into GPU memory.
[ { "version": "v1", "created": "Mon, 3 Jan 2022 13:03:05 GMT" } ]
2022-01-04T00:00:00
[ [ "Quezada", "Felipe A.", "" ], [ "Navarro", "Cristóbal A.", "" ], [ "Hitschfeld", "Nancy", "" ], [ "Bustos", "Benjamin", "" ] ]
new_dataset
0.996341
2201.00618
Natanael Arndt
Natanael Arndt, Sebastian Z\"anker, Gezim Sejdiu, Sebastian Tramp
Jekyll RDF: Template-Based Linked Data Publication with Minimized Effort and Maximum Scalability
16 pages, 8 figures, 2 tables, 2 listings, Conference: ICWE 2019, Daejeon, South Korea
Web Engineering. ICWE 2019. Lecture Notes in Computer Science, vol 11496. Springer, Cham
10.1007/978-3-030-19274-7_24
null
cs.DB cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the last decades the Web has evolved from a human-human communication network to a network of complex human-machine interactions. An increasing amount of data is available as Linked Data which allows machines to "understand" the data, but RDF is not meant to be understood by humans. With Jekyll RDF we present a method to close the gap between structured data and human accessible exploration interfaces by publishing RDF datasets as customizable static HTML sites. It consists of an RDF resource mapping system to serve the resources under their respective IRI, a template mapping based on schema classes, and a markup language to define templates to render customized resource pages. Using the template system, it is possible to create domain specific browsing interfaces for RDF data next to the Linked Data resources. This enables content management and knowledge management systems to serve datasets in a highly customizable, low effort, and scalable way to be consumed by machines as well as humans.
[ { "version": "v1", "created": "Fri, 10 Dec 2021 14:55:51 GMT" } ]
2022-01-04T00:00:00
[ [ "Arndt", "Natanael", "" ], [ "Zänker", "Sebastian", "" ], [ "Sejdiu", "Gezim", "" ], [ "Tramp", "Sebastian", "" ] ]
new_dataset
0.982321
1907.00457
Julian Salazar
Shaoshi Ling, Julian Salazar, Yuzong Liu, Katrin Kirchhoff
BERTphone: Phonetically-Aware Encoder Representations for Utterance-Level Speaker and Language Recognition
Odyssey 2020 camera-ready (presented Nov. 2020)
Proc. the Speaker and Language Recognition Workshop (Odyssey 2020), 9-16
10.21437/Odyssey.2020-2
null
cs.CL cs.LG cs.SD eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce BERTphone, a Transformer encoder trained on large speech corpora that outputs phonetically-aware contextual representation vectors that can be used for both speaker and language recognition. This is accomplished by training on two objectives: the first, inspired by adapting BERT to the continuous domain, involves masking spans of input frames and reconstructing the whole sequence for acoustic representation learning; the second, inspired by the success of bottleneck features from ASR, is a sequence-level CTC loss applied to phoneme labels for phonetic representation learning. We pretrain two BERTphone models (one on Fisher and one on TED-LIUM) and use them as feature extractors into x-vector-style DNNs for both tasks. We attain a state-of-the-art $C_{\text{avg}}$ of 6.16 on the challenging LRE07 3sec closed-set language recognition task. On Fisher and VoxCeleb speaker recognition tasks, we see an 18% relative reduction in speaker EER when training on BERTphone vectors instead of MFCCs. In general, BERTphone outperforms previous phonetic pretraining approaches on the same data. We release our code and models at https://github.com/awslabs/speech-representations.
[ { "version": "v1", "created": "Sun, 30 Jun 2019 20:54:21 GMT" }, { "version": "v2", "created": "Wed, 29 Dec 2021 19:30:41 GMT" } ]
2022-01-03T00:00:00
[ [ "Ling", "Shaoshi", "" ], [ "Salazar", "Julian", "" ], [ "Liu", "Yuzong", "" ], [ "Kirchhoff", "Katrin", "" ] ]
new_dataset
0.994076
2007.07047
Jianjun Zhao
Jianjun Zhao
Quantum Software Engineering: Landscapes and Horizons
null
null
null
null
cs.SE cs.PL quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum software plays a critical role in exploiting the full potential of quantum computing systems. As a result, it has been drawing increasing attention recently. This paper defines the term "quantum software engineering" and introduces a quantum software life cycle. The paper also gives a generic view of quantum software engineering and discusses the quantum software engineering processes, methods, and tools. Based on these, the paper provides a comprehensive survey of the current state of the art in the field and presents the challenges and opportunities we face. The survey summarizes the technology available in the various phases of the quantum software life cycle, including quantum software requirements analysis, design, implementation, test, and maintenance. It also covers the crucial issues of quantum software reuse and measurement.
[ { "version": "v1", "created": "Tue, 14 Jul 2020 14:13:44 GMT" }, { "version": "v2", "created": "Fri, 31 Dec 2021 15:13:00 GMT" } ]
2022-01-03T00:00:00
[ [ "Zhao", "Jianjun", "" ] ]
new_dataset
0.975393
2010.00975
Zhizhe Liu
Zhizhe Liu, Xingxing Zhang, Zhenfeng Zhu, Shuai Zheng, Yao Zhao and Jian Cheng
Taking Modality-free Human Identification as Zero-shot Learning
This manuscript has been accepted by IEEE Transactions on Circuits and Systems for Video Technology
null
10.1109/TCSVT.2021.3137216
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human identification is an important topic in event detection, person tracking, and public security. There have been numerous methods proposed for human identification, such as face identification, person re-identification, and gait identification. Typically, existing methods predominantly classify a queried image to a specific identity in an image gallery set (I2I). This is seriously limited for the scenario where only a textual description of the query or an attribute gallery set is available in a wide range of video surveillance applications (A2I or I2A). However, very few efforts have been devoted towards modality-free identification, i.e., identifying a query in a gallery set in a scalable way. In this work, we take an initial attempt, and formulate such a novel Modality-Free Human Identification (named MFHI) task as a generic zero-shot learning model in a scalable way. Meanwhile, it is capable of bridging the visual and semantic modalities by learning a discriminative prototype of each identity. In addition, the semantics-guided spatial attention is enforced on visual modality to obtain representations with both high global category-level and local attribute-level discrimination. Finally, we design and conduct an extensive group of experiments on two common challenging identification tasks, including face identification and person re-identification, demonstrating that our method outperforms a wide variety of state-of-the-art methods on modality-free human identification.
[ { "version": "v1", "created": "Fri, 2 Oct 2020 13:08:27 GMT" }, { "version": "v2", "created": "Thu, 30 Dec 2021 08:35:12 GMT" } ]
2022-01-03T00:00:00
[ [ "Liu", "Zhizhe", "" ], [ "Zhang", "Xingxing", "" ], [ "Zhu", "Zhenfeng", "" ], [ "Zheng", "Shuai", "" ], [ "Zhao", "Yao", "" ], [ "Cheng", "Jian", "" ] ]
new_dataset
0.997743
2011.10251
Dhruval Jain
Dhruval Jain, Arun D Prabhu, Gopi Ramena, Manoj Goyal, Debi Prasanna Mohanty, Sukumar Moharana, Naresh Purre
On-Device Text Image Super Resolution
Accepted to the International Conference on Pattern Recognition(ICPR), 2020
null
10.1109/ICPR48806.2021.9412222
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Recent research on super-resolution (SR) has witnessed major developments with the advancements of deep convolutional neural networks. There is a need for information extraction from scenic text images or even document images on device, most of which are low-resolution (LR) images. Therefore, SR becomes an essential pre-processing step as Bicubic Upsampling, which is conventionally present in smartphones, performs poorly on LR images. To give the user more control over his privacy, and to reduce the carbon footprint by reducing the overhead of cloud computing and hours of GPU usage, executing SR models on the edge is a necessity in the recent times. There are various challenges in running and optimizing a model on resource-constrained platforms like smartphones. In this paper, we present a novel deep neural network that reconstructs sharper character edges and thus boosts OCR confidence. The proposed architecture not only achieves significant improvement in PSNR over bicubic upsampling on various benchmark datasets but also runs with an average inference time of 11.7 ms per image. We have outperformed state-of-the-art on the Text330 dataset. We also achieve an OCR accuracy of 75.89% on the ICDAR 2015 TextSR dataset, where ground truth has an accuracy of 78.10%.
[ { "version": "v1", "created": "Fri, 20 Nov 2020 07:49:48 GMT" } ]
2022-01-03T00:00:00
[ [ "Jain", "Dhruval", "" ], [ "Prabhu", "Arun D", "" ], [ "Ramena", "Gopi", "" ], [ "Goyal", "Manoj", "" ], [ "Mohanty", "Debi Prasanna", "" ], [ "Moharana", "Sukumar", "" ], [ "Purre", "Naresh", "" ] ]
new_dataset
0.998455
2012.02990
Shubham Vatsal
Dhruval Jain, Arun D Prabhu, Shubham Vatsal, Gopi Ramena, Naresh Purre
Codeswitched Sentence Creation using Dependency Parsing
null
null
10.1109/ICSC50631.2021.00030
null
cs.CL
http://creativecommons.org/licenses/by-nc-nd/4.0/
Codeswitching has become one of the most common occurrences across multilingual speakers of the world, especially in countries like India which encompasses around 23 official languages with the number of bilingual speakers being around 300 million. The scarcity of Codeswitched data becomes a bottleneck in the exploration of this domain with respect to various Natural Language Processing (NLP) tasks. We thus present a novel algorithm which harnesses the syntactic structure of English grammar to develop grammatically sensible Codeswitched versions of English-Hindi, English-Marathi and English-Kannada data. Apart from maintaining the grammatical sanity to a great extent, our methodology also guarantees abundant generation of data from a minuscule snapshot of given data. We use multiple datasets to showcase the capabilities of our algorithm while at the same time we assess the quality of generated Codeswitched data using some qualitative metrics along with providing baseline results for couple of NLP tasks.
[ { "version": "v1", "created": "Sat, 5 Dec 2020 10:00:06 GMT" } ]
2022-01-03T00:00:00
[ [ "Jain", "Dhruval", "" ], [ "Prabhu", "Arun D", "" ], [ "Vatsal", "Shubham", "" ], [ "Ramena", "Gopi", "" ], [ "Purre", "Naresh", "" ] ]
new_dataset
0.999466
2012.03782
Fumiyuki Kato
Fumiyuki Kato, Yang Cao, and Masatoshi Yoshikawa
PCT-TEE: Trajectory-based Private Contact Tracing System with Trusted Execution Environment
Accepted by ACM TSAS
null
null
null
cs.CR cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing Bluetooth-based Private Contact Tracing (PCT) systems can privately detect whether people have come into direct contact with COVID-19 patients. However, we find that the existing systems lack functionality and flexibility, which may hurt the success of the contact tracing. Specifically, they cannot detect indirect contact (e.g., people may be exposed to coronavirus because of used the same elevator even without direct contact); they also cannot flexibly change the rules of "risky contact", such as how many hours of exposure or how close to a COVID-19 patient that is considered as risk exposure, which may be changed with the environmental situation. In this paper, we propose an efficient and secure contact tracing system that enables both direct contact and indirect contact. To address the above problems, we need to utilize users' trajectory data for private contact tracing, which we call trajectory-based PCT. We formalize this problem as Spatiotemporal Private Set Intersection. By analyzing different approaches such as homomorphic encryption that could be extended to solve this problem, we identify that Trusted Execution Environment (TEE) is a proposing method to achieve our requirements. The major challenge is how to design algorithms for spatiotemporal private set intersection under limited secure memory of TEE. To this end, we design a TEE-based system with flexible trajectory data encoding algorithms. Our experiments on real-world data show that the proposed system can process thousands of queries on tens of million records of trajectory data in a few seconds.
[ { "version": "v1", "created": "Mon, 7 Dec 2020 15:22:19 GMT" }, { "version": "v2", "created": "Mon, 15 Feb 2021 09:03:46 GMT" }, { "version": "v3", "created": "Wed, 24 Feb 2021 11:32:55 GMT" }, { "version": "v4", "created": "Sun, 27 Jun 2021 14:25:28 GMT" }, { "version": "v5", "created": "Fri, 31 Dec 2021 08:10:24 GMT" } ]
2022-01-03T00:00:00
[ [ "Kato", "Fumiyuki", "" ], [ "Cao", "Yang", "" ], [ "Yoshikawa", "Masatoshi", "" ] ]
new_dataset
0.998908
2012.15579
Chun Yui Wong
Chun Yui Wong, Pranay Seshadri, Ashley Scillitoe, Bryn Noel Ubald, Andrew B. Duncan, Geoffrey Parks
Blade Envelopes Part II: Multiple Objectives and Inverse Design
null
null
null
null
cs.CE
http://creativecommons.org/licenses/by-nc-nd/4.0/
Blade envelopes offer a set of data-driven tolerance guidelines for manufactured components based on aerodynamic analysis. In Part I of this two-part paper, a workflow for the formulation of blade envelopes is described and demonstrated. In Part II, this workflow is extended to accommodate multiple objectives. This allows engineers to prescribe manufacturing guidelines that take into account multiple performance criteria. The quality of a manufactured blade can be correlated with features derived from the distribution of primal flow quantities over the surface. We show that these distributions can be accounted for in the blade envelope using vector-valued models derived from discrete surface flow measurements. Our methods result in a set of variables that allows flexible and independent control over multiple flow characteristics and performance metrics, similar in spirit to inverse design methods. The augmentations to the blade envelope workflow presented in this paper are demonstrated on the LS89 turbine blade, focusing on the control of loss, mass flow and the isentropic Mach number distribution. Finally, we demonstrate how blade envelopes can be used to visualize invariant designs by producing a 3D render of the envelope using 3D modelling software.
[ { "version": "v1", "created": "Thu, 31 Dec 2020 12:27:15 GMT" }, { "version": "v2", "created": "Fri, 31 Dec 2021 11:20:02 GMT" } ]
2022-01-03T00:00:00
[ [ "Wong", "Chun Yui", "" ], [ "Seshadri", "Pranay", "" ], [ "Scillitoe", "Ashley", "" ], [ "Ubald", "Bryn Noel", "" ], [ "Duncan", "Andrew B.", "" ], [ "Parks", "Geoffrey", "" ] ]
new_dataset
0.982614
2103.09523
Keisuke Sugiura
Keisuke Sugiura and Hiroki Matsutani
A Universal LiDAR SLAM Accelerator System on Low-cost FPGA
null
null
null
null
cs.RO cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
LiDAR (Light Detection and Ranging) SLAM (Simultaneous Localization and Mapping) serves as a basis for indoor cleaning, navigation, and many other useful applications in both industry and household. From a series of LiDAR scans, it constructs an accurate, globally consistent model of the environment and estimates a robot position inside it. SLAM is inherently computationally intensive; it is a challenging problem to realize a fast and reliable SLAM system on mobile robots with a limited processing capability. To overcome such hurdles, in this paper, we propose a universal, low-power, and resource-efficient accelerator design for 2D LiDAR SLAM targeting resource-limited FPGAs. As scan matching is at the heart of SLAM, the proposed accelerator consists of dedicated scan matching cores on the programmable logic part, and provides software interfaces to facilitate the use. Our accelerator can be integrated to various SLAM methods including the ROS (Robot Operating System)-based ones, and users can switch to a different method without modifying and re-synthesizing the logic part. We integrate the accelerator into three widely-used methods, i.e., scan matching, particle filter, and graph-based SLAM. We evaluate the design in terms of resource utilization, speed, and quality of output results using real-world datasets. Experiment results on a Pynq-Z2 board demonstrate that our design accelerates scan matching and loop-closure detection tasks by up to 14.84x and 18.92x, yielding 4.67x, 4.00x, and 4.06x overall performance improvement in the above methods, respectively. Our design enables the real-time performance while consuming only 2.4W and maintaining accuracy, which is comparable to the software counterparts and even the state-of-the-art methods.
[ { "version": "v1", "created": "Wed, 17 Mar 2021 09:12:31 GMT" }, { "version": "v2", "created": "Thu, 30 Dec 2021 12:55:05 GMT" } ]
2022-01-03T00:00:00
[ [ "Sugiura", "Keisuke", "" ], [ "Matsutani", "Hiroki", "" ] ]
new_dataset
0.997525
2105.07795
Gopi Ramena
Rachit S Munjal, Arun D Prabhu, Nikhil Arora, Sukumar Moharana, Gopi Ramena
STRIDE : Scene Text Recognition In-Device
accepted in IJCNN 2021
null
10.1109/IJCNN52387.2021.9534319
null
cs.CV
http://creativecommons.org/licenses/by-nc-nd/4.0/
Optical Character Recognition (OCR) systems have been widely used in various applications for extracting semantic information from images. To give the user more control over their privacy, an on-device solution is needed. The current state-of-the-art models are too heavy and complex to be deployed on-device. We develop an efficient lightweight scene text recognition (STR) system, which has only 0.88M parameters and performs real-time text recognition. Attention modules tend to boost the accuracy of STR networks but are generally slow and not optimized for device inference. So, we propose the use of convolution attention modules to the text recognition networks, which aims to provide channel and spatial attention information to the LSTM module by adding very minimal computational cost. It boosts our word accuracy on ICDAR 13 dataset by almost 2\%. We also introduce a novel orientation classifier module, to support the simultaneous recognition of both horizontal and vertical text. The proposed model surpasses on-device metrics of inference time and memory footprint and achieves comparable accuracy when compared to the leading commercial and other open-source OCR engines. We deploy the system on-device with an inference speed of 2.44 ms per word on the Exynos 990 chipset device and achieve an accuracy of 88.4\% on ICDAR-13 dataset.
[ { "version": "v1", "created": "Mon, 17 May 2021 13:06:23 GMT" } ]
2022-01-03T00:00:00
[ [ "Munjal", "Rachit S", "" ], [ "Prabhu", "Arun D", "" ], [ "Arora", "Nikhil", "" ], [ "Moharana", "Sukumar", "" ], [ "Ramena", "Gopi", "" ] ]
new_dataset
0.998536
2106.05642
Binbin Zhang
Di Wu, Binbin Zhang, Chao Yang, Zhendong Peng, Wenjing Xia, Xiaoyu Chen, Xin Lei
U2++: Unified Two-pass Bidirectional End-to-end Model for Speech Recognition
null
null
null
null
cs.SD cs.CL eess.AS
http://creativecommons.org/licenses/by/4.0/
The unified streaming and non-streaming two-pass (U2) end-to-end model for speech recognition has shown great performance in terms of streaming capability, accuracy, real-time factor (RTF), and latency. In this paper, we present U2++, an enhanced version of U2 to further improve the accuracy. The core idea of U2++ is to use the forward and the backward information of the labeling sequences at the same time at training to learn richer information, and combine the forward and backward prediction at decoding to give more accurate recognition results. We also proposed a new data augmentation method called SpecSub to help the U2++ model to be more accurate and robust. Our experiments show that, compared with U2, U2++ shows faster convergence at training, better robustness to the decoding method, as well as consistent 5\% - 8\% word error rate reduction gain over U2. On the experiment of AISHELL-1, we achieve a 4.63\% character error rate (CER) with a non-streaming setup and 5.05\% with a streaming setup with 320ms latency by U2++. To the best of our knowledge, 5.05\% is the best-published streaming result on the AISHELL-1 test set.
[ { "version": "v1", "created": "Thu, 10 Jun 2021 10:25:15 GMT" }, { "version": "v2", "created": "Wed, 7 Jul 2021 07:38:58 GMT" }, { "version": "v3", "created": "Thu, 30 Dec 2021 00:30:30 GMT" } ]
2022-01-03T00:00:00
[ [ "Wu", "Di", "" ], [ "Zhang", "Binbin", "" ], [ "Yang", "Chao", "" ], [ "Peng", "Zhendong", "" ], [ "Xia", "Wenjing", "" ], [ "Chen", "Xiaoyu", "" ], [ "Lei", "Xin", "" ] ]
new_dataset
0.977836
2107.07964
Bosubabu Sambana
Bosubabu Sambana
Blockchain Technology: Bitcoins, Cryptocurrency and Applications
7 Pages, 4 Figures
null
null
null
cs.CR cs.AI cs.CY
http://creativecommons.org/licenses/by-nc-sa/4.0/
Blockchain is a decentralized ledger used to securely exchange digital currency, perform deals and transactions efficient manner, each user of the network has access to the least copy of the encrypted ledger so that they can validate a new transaction. The blockchain ledger is a collection of all Bitcoin transactions executed in the past. Basically, it's distributed database that maintains continuously growing tamper-proof data structure blocks that holds batches of individual transactions. The completed blocks are added in a linear and chronological order. Each block contains a timestamp and information link which points to a previous block. Bitcoin is a peer-to-peer permissionless network that allows every user to connect to the network and send new transactions to verify and create new blocks. Satoshi Nakamoto described the design of Bitcoin digital currency in his research paper posted to a cryptography listserv 2008. Nakamoto's suggestion has solved the long-pending problem of cryptography and laid the foundation stone for digital currency. This paper explains the concept of bitcoin, its characteristics, the need for Blockchain, and how Bitcoin works. It attempts to highlight the role of Blockchain in shaping the future of banking , financial services, and the adoption of the Internet of Thinks and future Technologies.
[ { "version": "v1", "created": "Fri, 16 Jul 2021 15:27:04 GMT" }, { "version": "v2", "created": "Thu, 30 Dec 2021 05:09:57 GMT" } ]
2022-01-03T00:00:00
[ [ "Sambana", "Bosubabu", "" ] ]
new_dataset
0.999476
2109.01181
Jiunn-Kai Huang
Jiunn-Kai Huang, William Clark, and Jessy W. Grizzle
Optimal Target Shape for LiDAR Pose Estimation
null
null
10.1109/LRA.2021.3138779
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Targets are essential in problems such as object tracking in cluttered or textureless environments, camera (and multi-sensor) calibration tasks, and simultaneous localization and mapping (SLAM). Target shapes for these tasks typically are symmetric (square, rectangular, or circular) and work well for structured, dense sensor data such as pixel arrays (i.e., image). However, symmetric shapes lead to pose ambiguity when using sparse sensor data such as LiDAR point clouds and suffer from the quantization uncertainty of the LiDAR. This paper introduces the concept of optimizing target shape to remove pose ambiguity for LiDAR point clouds. A target is designed to induce large gradients at edge points under rotation and translation relative to the LiDAR to ameliorate the quantization uncertainty associated with point cloud sparseness. Moreover, given a target shape, we present a means that leverages the target's geometry to estimate the target's vertices while globally estimating the pose. Both the simulation and the experimental results (verified by a motion capture system) confirm that by using the optimal shape and the global solver, we achieve centimeter error in translation and a few degrees in rotation even when a partially illuminated target is placed 30 meters away. All the implementations and datasets are available at https://github.com/UMich-BipedLab/optimal_shape_global_pose_estimation.
[ { "version": "v1", "created": "Thu, 2 Sep 2021 19:18:24 GMT" }, { "version": "v2", "created": "Mon, 6 Sep 2021 15:16:39 GMT" }, { "version": "v3", "created": "Tue, 21 Dec 2021 13:36:38 GMT" } ]
2022-01-03T00:00:00
[ [ "Huang", "Jiunn-Kai", "" ], [ "Clark", "William", "" ], [ "Grizzle", "Jessy W.", "" ] ]
new_dataset
0.993663
2109.01183
Arnav Malawade
Arnav Vaibhav Malawade, Shih-Yuan Yu, Brandon Hsu, Harsimrat Kaeley, Anurag Karra, Mohammad Abdullah Al Faruque
roadscene2vec: A Tool for Extracting and Embedding Road Scene-Graphs
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, road scene-graph representations used in conjunction with graph learning techniques have been shown to outperform state-of-the-art deep learning techniques in tasks including action classification, risk assessment, and collision prediction. To enable the exploration of applications of road scene-graph representations, we introduce roadscene2vec: an open-source tool for extracting and embedding road scene-graphs. The goal of roadscene2vec is to enable research into the applications and capabilities of road scene-graphs by providing tools for generating scene-graphs, graph learning models to generate spatio-temporal scene-graph embeddings, and tools for visualizing and analyzing scene-graph-based methodologies. The capabilities of roadscene2vec include (i) customized scene-graph generation from either video clips or data from the CARLA simulator, (ii) multiple configurable spatio-temporal graph embedding models and baseline CNN-based models, (iii) built-in functionality for using graph and sequence embeddings for risk assessment and collision prediction applications, (iv) tools for evaluating transfer learning, and (v) utilities for visualizing scene-graphs and analyzing the explainability of graph learning models. We demonstrate the utility of roadscene2vec for these use cases with experimental results and qualitative evaluations for both graph learning models and CNN-based models. roadscene2vec is available at https://github.com/AICPS/roadscene2vec.
[ { "version": "v1", "created": "Thu, 2 Sep 2021 19:21:18 GMT" }, { "version": "v2", "created": "Thu, 30 Dec 2021 09:52:18 GMT" } ]
2022-01-03T00:00:00
[ [ "Malawade", "Arnav Vaibhav", "" ], [ "Yu", "Shih-Yuan", "" ], [ "Hsu", "Brandon", "" ], [ "Kaeley", "Harsimrat", "" ], [ "Karra", "Anurag", "" ], [ "Faruque", "Mohammad Abdullah Al", "" ] ]
new_dataset
0.993524
2112.14789
Ashish Salunkhe
Ashish Salunkhe
Attention-based Bidirectional LSTM for Deceptive Opinion Spam Classification
arXiv admin note: text overlap with arXiv:1909.04826 by other authors
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-sa/4.0/
Online Reviews play a vital role in e commerce for decision making. Much of the population makes the decision of which places, restaurant to visit, what to buy and from where to buy based on the reviews posted on the respective platforms. A fraudulent review or opinion spam is categorized as an untruthful or deceptive review. Positive reviews of a product or a restaurant helps attract customers and thereby lead to an increase in sales whereas negative reviews may hamper the progress of a restaurant or sales of a product and thereby lead to defamed reputation and loss. Fraudulent reviews are deliberately posted on various online review platforms to trick customers to buy, visit or distract against a product or a restaurant. They are also written to commend or discredit the product's repute. The work aims at detecting and classifying the reviews as deceptive or truthful. It involves use of various deep learning techniques for classifying the reviews and an overview of proposed approach involving Attention based Bidirectional LSTM to tackle issues related to semantic information in reviews and a comparative study over baseline machine learning techniques for review classification.
[ { "version": "v1", "created": "Wed, 29 Dec 2021 19:02:04 GMT" } ]
2022-01-03T00:00:00
[ [ "Salunkhe", "Ashish", "" ] ]
new_dataset
0.999177
2112.14885
Clautilde Nguiadem
Clautilde Nguiadem, Maxime Raison and Sofiane Achiche
A Test Bench For Evaluating Exoskeletons For Upper Limb Rehabilitation
35 pages and 7 figures
null
null
null
cs.RO
http://creativecommons.org/licenses/by-nc-nd/4.0/
The potential of wearable robotics technology is undeniable. However, quantifying its value is difficult. Various types of exoskeleton robots have already been developed and tested for upper limb rehabilitation but, evaluations are not standardized, particularly in pediatric rehabilitation. This paper proposes a methodology for the quantitative evaluation of upper limb exoskeletons that, like a test bench, would serve for replicable testing. We determined the range of motion (ROM) and joint torques using both kinematic modeling and experimental measurements (using sensors integrated into Dynamixel actuators). The proposed test bench can provide an accurate range of motion (ROM) and joint torques during the pronation-supination (PS) task. The range of motion obtained with the physical prototype was approximately 156.26 +- 4.71{\deg} during the PS task, while it was approximately 146.84 +- 14.32{\deg} for the multibody model. The results show that the average range of experimental torques (0.28 +- 0.06 N.m) was overestimated by 40% and just 3.4%, respectively, when compared to the average range of simulated torques (0.2 +- 0.05 N.m) and to the highest range of simulated torques (0.29 N.m). For the experimental measurements, test-retest reliability was excellent (0.96-0.98) within sessions and excellent (0.93) or good (0.81-0.86) between sessions. Finally, the suggested approach provides a ROM close to the normal ROM necessary during PS tasks. These results validate the measurements' accuracy and underline the proposed methodology's relevance. The proposed test bench could become a reference standard for evaluating exoskeletons. This study also addresses a methodological aspect on the accurate assessment of joint torques that can serve in applications such as the sizing of actuators in exoskeletons or the non-invasive evaluation of muscle forces in the human body.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 01:56:19 GMT" } ]
2022-01-03T00:00:00
[ [ "Nguiadem", "Clautilde", "" ], [ "Raison", "Maxime", "" ], [ "Achiche", "Sofiane", "" ] ]
new_dataset
0.996895
2112.14916
Jinyu Yin
Jinyu Yin, Li Jiang, Xinggong Zhang, Bin Liu
INTCP: Information-centric TCP for Satellite Network
null
null
null
null
cs.NI
http://creativecommons.org/licenses/by/4.0/
Satellite networks are booming to provide high-speed and low latency Internet access, but the transport layer becomes one of the main obstacles. Legacy end-to-end TCP is designed for terrestrial networks, not suitable for error-prone, propagation delay varying, and intermittent satellite links. It is necessary to make a clean-slate design for the satellite transport layer. This paper introduces a novel Information-centric Hop-by-Hop transport layer design, INTCP. It carries out hop-by-hop packets retransmission and hop-by-hop congestion control with the help of cache and request-response model. Hop-by-hop retransmission recovers lost packets on hop, reduces retransmission delay. INTCP controls traffic and congestion also by hop. Each hop tries its best to maximize its bandwidth utilization and improves end-to-end throughput. The capability of caching enables asynchronous multicast in transport layer. This would save precious spectrum resources in the satellite network. The performance of INTCP is evaluated with the simulated Starlink constellation. Long-distance communication with more than 1000km is carried out. The results demonstrate that, for the unicast scenario INTCP could reduce 42% one-way delay, 53% delay jitters, and improve 60% throughput compared with the legacy TCP. In multicast scenario, INTCP could achieve more than 6X throughput.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 04:03:48 GMT" } ]
2022-01-03T00:00:00
[ [ "Yin", "Jinyu", "" ], [ "Jiang", "Li", "" ], [ "Zhang", "Xinggong", "" ], [ "Liu", "Bin", "" ] ]
new_dataset
0.999736
2112.14933
Saurav Ghosh
Saurav Ghosh and Philippe Loustaunau
RheFrameDetect: A Text Classification System for Automatic Detection of Rhetorical Frames in AI from Open Sources
null
null
null
null
cs.CL cs.AI cs.LG
http://creativecommons.org/licenses/by/4.0/
Rhetorical Frames in AI can be thought of as expressions that describe AI development as a competition between two or more actors, such as governments or companies. Examples of such Frames include robotic arms race, AI rivalry, technological supremacy, cyberwarfare dominance and 5G race. Detection of Rhetorical Frames from open sources can help us track the attitudes of governments or companies towards AI, specifically whether attitudes are becoming more cooperative or competitive over time. Given the rapidly increasing volumes of open sources (online news media, twitter, blogs), it is difficult for subject matter experts to identify Rhetorical Frames in (near) real-time. Moreover, these sources are in general unstructured (noisy) and therefore, detecting Frames from these sources will require state-of-the-art text classification techniques. In this paper, we develop RheFrameDetect, a text classification system for (near) real-time capture of Rhetorical Frames from open sources. Given an input document, RheFrameDetect employs text classification techniques at multiple levels (document level and paragraph level) to identify all occurrences of Frames used in the discussion of AI. We performed extensive evaluation of the text classification techniques used in RheFrameDetect against human annotated Frames from multiple news sources. To further demonstrate the effectiveness of RheFrameDetect, we show multiple case studies depicting the Frames identified by RheFrameDetect compared against human annotated Frames.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 05:39:42 GMT" } ]
2022-01-03T00:00:00
[ [ "Ghosh", "Saurav", "" ], [ "Loustaunau", "Philippe", "" ] ]
new_dataset
0.997823
2112.14934
Ivan Bajic
Takehiro Tanaka, Hyomin Choi, Ivan V. Baji\'c
SFU-HW-Tracks-v1: Object Tracking Dataset on Raw Video Sequences
4 pages, 3 figures, submitted to Data in Brief
null
null
null
cs.CV eess.IV
http://creativecommons.org/licenses/by/4.0/
We present a dataset that contains object annotations with unique object identities (IDs) for the High Efficiency Video Coding (HEVC) v1 Common Test Conditions (CTC) sequences. Ground-truth annotations for 13 sequences were prepared and released as the dataset called SFU-HW-Tracks-v1. For each video frame, ground truth annotations include object class ID, object ID, and bounding box location and its dimensions. The dataset can be used to evaluate object tracking performance on uncompressed video sequences and study the relationship between video compression and object tracking.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 05:52:15 GMT" } ]
2022-01-03T00:00:00
[ [ "Tanaka", "Takehiro", "" ], [ "Choi", "Hyomin", "" ], [ "Bajić", "Ivan V.", "" ] ]
new_dataset
0.999856
2112.14957
Qing Li
Shangguang Wang, Qing Li, Mengwei Xu, Xiao Ma, Ao Zhou, Qibo Sun
Tiansuan Constellation: An Open Research Platform
null
null
null
null
cs.DC
http://creativecommons.org/licenses/by/4.0/
Satellite network is the first step of interstellar voyages. It can provide global Internet connectivity everywhere on earth, where most areas cannot access the Internet by the terrestrial infrastructure due to the geographic accessibility and high cost. The space industry experiences a rise in large low-earth-orbit satellite constellations to achieve universal connectivity. The research community is also urgent to do some leading research to bridge the connectivity divide. Researchers now conduct their work by simulation, which is far from enough. However, experiments on real satellites are blocked by the high threshold of space technology, such as deployment cost and unknown risks. To solve the above dilemma, we are eager to contribute to the universal connectivity and build an open research platform, Tiansuan constellation to support experiments on real satellite networks. We discuss the potential research topics that would benefit from Tiansuan constellation. We provide two case studies that have already deployed in two experimental satellites of Tiansuan constellation.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 08:20:53 GMT" } ]
2022-01-03T00:00:00
[ [ "Wang", "Shangguang", "" ], [ "Li", "Qing", "" ], [ "Xu", "Mengwei", "" ], [ "Ma", "Xiao", "" ], [ "Zhou", "Ao", "" ], [ "Sun", "Qibo", "" ] ]
new_dataset
0.999447
2112.14958
Bo Liu
Liu Bo
A Benchmark Dataset for Micro-video Thumbnail Selection
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The thumbnail, as the first sight of a micro-video, plays a pivotal role in attracting users to click and watch. Although several pioneer efforts have been dedicated to jointly considering the quality and representativeness for selecting the thumbnail, they are limited in exploring the influence of users` interests. While in the real scenario, the more the thumbnails satisfy the users, the more likely the micro-videos will be clicked. In this paper, we aim to select the thumbnail of a given micro-video that meets most users` interests. Towards this end, we construct a large-scale dataset for the micro-video thumbnails. Ultimately, we conduct several baselines on the dataset and demonstrate the effectiveness of our dataset.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 08:22:03 GMT" } ]
2022-01-03T00:00:00
[ [ "Bo", "Liu", "" ] ]
new_dataset
0.999763
2112.14961
EPTCS
Christian Retor\'e (LIRMM, Univ Montpellier & CNRS)
Flag: a Self-Dual Modality for Non-Commutative Contraction and Duplication in the Category of Coherence Spaces
In Proceedings Linearity&TLLA 2020, arXiv:2112.14305
EPTCS 353, 2021, pp. 157-174
10.4204/EPTCS.353.8
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
After reminding what coherences spaces are and how they interpret linear logic, we define a modality "flag" in the category of coherence spaces (or hypercoherences) with two inverse linear (iso)morphisms: "duplication" from (flag A) to ((flag A) < (flag A)) and "contraction" in the opposite direction -- where < is the self dual and non-commutative connective known as "before" in pomset logic and known as "seq(ential)" in the deep inference system (S)BV. In addition, as expected, the coherence space A is a retract of its modal image (flag A). This suggests an intuitive interpretation of (flag A) as "repeatedly A" or as "A at any instant" when "before" is given a temporal interpretation. We hope the semantic construction of flag(A) will help to design proof rules for "flag" and we briefly discuss this at the end of the paper.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 08:35:30 GMT" } ]
2022-01-03T00:00:00
[ [ "Retoré", "Christian", "", "LIRMM, Univ Montpellier & CNRS" ] ]
new_dataset
0.999275
2112.15001
Josep Domingo-Ferrer
Josep Domingo-Ferrer and Jes\'us Manj\'on
Circuit-Free General-Purpose Multi-Party Computation via Co-Utile Unlinkable Outsourcing
IEEE Transactions on Dependable and Secure Computing, to appear
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiparty computation (MPC) consists in several parties engaging in joint computation in such a way that each party's input and output remain private to that party. Whereas MPC protocols for specific computations have existed since the 1980s, only recently general-purpose compilers have been developed to allow MPC on arbitrary functions. Yet, using today's MPC compilers requires substantial programming effort and skill on the user's side, among other things because nearly all compilers translate the code of the computation into a Boolean or arithmetic circuit. In particular, the circuit representation requires unrolling loops and recursive calls, which forces programmers to (often manually) define loop bounds and hardly use recursion. We present an approach allowing MPC on an arbitrary computation expressed as ordinary code with all functionalities that does not need to be translated into a circuit. Our notion of input and output privacy is predicated on unlinkability. Our method leverages co-utile computation outsourcing using anonymous channels via decentralized reputation, makes a minimalistic use of cryptography and does not require participants to be honest-but-curious: it works as long as participants are rational (self-interested), which may include rationally malicious peers (who become attackers if this is advantageous to them). We present example applications, including e-voting. Our empirical work shows that reputation captures well the behavior of peers and ensures that parties with high reputation obtain correct results.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 10:26:13 GMT" } ]
2022-01-03T00:00:00
[ [ "Domingo-Ferrer", "Josep", "" ], [ "Manjón", "Jesús", "" ] ]
new_dataset
0.995449
2112.15043
Cunliang Kong
Yingying Wang, Cunliang Kong, Liner Yang, Yijun Wang, Xiaorong Lu, Renfen Hu, Shan He, Zhenghao Liu, Yun Chen, Erhong Yang, Maosong Sun
YACLC: A Chinese Learner Corpus with Multidimensional Annotation
4 pages, 3 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learner corpus collects language data produced by L2 learners, that is second or foreign-language learners. This resource is of great relevance for second language acquisition research, foreign-language teaching, and automatic grammatical error correction. However, there is little focus on learner corpus for Chinese as Foreign Language (CFL) learners. Therefore, we propose to construct a large-scale, multidimensional annotated Chinese learner corpus. To construct the corpus, we first obtain a large number of topic-rich texts generated by CFL learners. Then we design an annotation scheme including a sentence acceptability score as well as grammatical error and fluency-based corrections. We build a crowdsourcing platform to perform the annotation effectively (https://yaclc.wenmind.net). We name the corpus YACLC (Yet Another Chinese Learner Corpus) and release it as part of the CUGE benchmark (http://cuge.baai.ac.cn). By analyzing the original sentences and annotations in the corpus, we found that YACLC has a considerable size and very high annotation quality. We hope this corpus can further enhance the studies on Chinese International Education and Chinese automatic grammatical error correction.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 13:07:08 GMT" } ]
2022-01-03T00:00:00
[ [ "Wang", "Yingying", "" ], [ "Kong", "Cunliang", "" ], [ "Yang", "Liner", "" ], [ "Wang", "Yijun", "" ], [ "Lu", "Xiaorong", "" ], [ "Hu", "Renfen", "" ], [ "He", "Shan", "" ], [ "Liu", "Zhenghao", "" ], [ "Chen", "Yun", "" ], [ "Yang", "Erhong", "" ], [ "Sun", "Maosong", "" ] ]
new_dataset
0.999637
2112.15065
Xin Du
Junjin He, Yujie Wang, Xin Du, Zhihui Lu
V2V-Based Task Offloading and Resource Allocation in Vehicular Edge Computing Networks
IEEE Access
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the research and application of vehicle ad hoc networks (VANETs), it is often assumed that vehicles obtain cloud computing services by accessing to roadside units (RSUs). However, due to the problems of insufficient construction quantity, limited communication range and overload of calculation load of roadside units, the calculation mode relying only on vehicle to roadside units is difficult to deal with complex and changeable calculation tasks. In this paper, when the roadside unit is missing, the vehicle mobile unit is regarded as a natural edge computing node to make full use of the excess computing power of mobile vehicles and perform the offloading task of surrounding mobile vehicles in time. In this paper, the OPFTO framework is designed, an improved task allocation algorithm HGSA is proposed, and the pre-filtering process is designed with full consideration of the moving characteristics of vehicles. In addition, vehicle simulation experiments show that the proposed strategy has the advantages of low delay and high accuracy compared with other task scheduling strategies, which provides a reference scheme for the construction of Urban Intelligent Transportation in the future.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 13:59:14 GMT" } ]
2022-01-03T00:00:00
[ [ "He", "Junjin", "" ], [ "Wang", "Yujie", "" ], [ "Du", "Xin", "" ], [ "Lu", "Zhihui", "" ] ]
new_dataset
0.96253
2112.15124
Diptesh Kanojia
Diptesh Kanojia, Kevin Patel, Pushpak Bhattacharyya, Malhar Kulkarni, Gholamreza Haffari
Utilizing Wordnets for Cognate Detection among Indian Languages
Published at GWC 2019
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
Automatic Cognate Detection (ACD) is a challenging task which has been utilized to help NLP applications like Machine Translation, Information Retrieval and Computational Phylogenetics. Unidentified cognate pairs can pose a challenge to these applications and result in a degradation of performance. In this paper, we detect cognate word pairs among ten Indian languages with Hindi and use deep learning methodologies to predict whether a word pair is cognate or not. We identify IndoWordnet as a potential resource to detect cognate word pairs based on orthographic similarity-based methods and train neural network models using the data obtained from it. We identify parallel corpora as another potential resource and perform the same experiments for them. We also validate the contribution of Wordnets through further experimentation and report improved performance of up to 26%. We discuss the nuances of cognate detection among closely related Indian languages and release the lists of detected cognates as a dataset. We also observe the behaviour of, to an extent, unrelated Indian language pairs and release the lists of detected cognates among them as well.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 16:46:28 GMT" } ]
2022-01-03T00:00:00
[ [ "Kanojia", "Diptesh", "" ], [ "Patel", "Kevin", "" ], [ "Bhattacharyya", "Pushpak", "" ], [ "Kulkarni", "Malhar", "" ], [ "Haffari", "Gholamreza", "" ] ]
new_dataset
0.986485
2112.15167
Wei Wang
Sai Rugved Lola, Rahul Dhadvai, Wei Wang, Ting Zhu
Chatbot for fitness management using IBM Watson
null
null
null
null
cs.SE cs.AI
http://creativecommons.org/licenses/by/4.0/
Chatbots have revolutionized the way humans interact with computer systems and they have substituted the use of service agents, call-center representatives etc. Fitness industry has always been a growing industry although it has not adapted to the latest technologies like AI, ML and cloud computing. In this paper, we propose an idea to develop a chatbot for fitness management using IBM Watson and integrate it with a web application. We proposed using Natural Language Processing (NLP) and Natural Language Understanding (NLU) along with frameworks of IBM Cloud Watson provided for the Chatbot Assistant. This software uses a serverless architecture to combine the services of a professional by offering diet plans, home exercises, interactive counseling sessions, fitness recommendations.
[ { "version": "v1", "created": "Thu, 30 Dec 2021 18:49:19 GMT" } ]
2022-01-03T00:00:00
[ [ "Lola", "Sai Rugved", "" ], [ "Dhadvai", "Rahul", "" ], [ "Wang", "Wei", "" ], [ "Zhu", "Ting", "" ] ]
new_dataset
0.991648
2112.15253
Sergey A. Slavnov
Sergey Slavnov
First order linear logic and tensor type calculus for categorial grammars
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by/4.0/
We study relationship between first order multiplicative linear logic (MLL1), which has been known to provide representations to different categorial grammars, and the recently introduced extended tensor type calculus (ETTC). We identify a fragment of MLL1, which seems sufficient for many grammar representations, and establish a correspondence between ETTC and this fragment. The system ETTC, thus, can be seen as an alternative syntax and intrinsic deductive system together with a geometric representation for the latter. We also give a natural deduction formulation of ETTC, which might be convenient.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 00:35:48 GMT" } ]
2022-01-03T00:00:00
[ [ "Slavnov", "Sergey", "" ] ]
new_dataset
0.954297
2112.15283
Weichong Yin
Han Zhang, Weichong Yin, Yewei Fang, Lanxin Li, Boqiang Duan, Zhihua Wu, Yu Sun, Hao Tian, Hua Wu, Haifeng Wang
ERNIE-ViLG: Unified Generative Pre-training for Bidirectional Vision-Language Generation
15 pages, 7 figures
null
null
null
cs.CV cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conventional methods for the image-text generation tasks mainly tackle the naturally bidirectional generation tasks separately, focusing on designing task-specific frameworks to improve the quality and fidelity of the generated samples. Recently, Vision-Language Pre-training models have greatly improved the performance of the image-to-text generation tasks, but large-scale pre-training models for text-to-image synthesis task are still under-developed. In this paper, we propose ERNIE-ViLG, a unified generative pre-training framework for bidirectional image-text generation with transformer model. Based on the image quantization models, we formulate both image generation and text generation as autoregressive generative tasks conditioned on the text/image input. The bidirectional image-text generative modeling eases the semantic alignments across vision and language. For the text-to-image generation process, we further propose an end-to-end training method to jointly learn the visual sequence generator and the image reconstructor. To explore the landscape of large-scale pre-training for bidirectional text-image generation, we train a 10-billion parameter ERNIE-ViLG model on a large-scale dataset of 145 million (Chinese) image-text pairs which achieves state-of-the-art performance for both text-to-image and image-to-text tasks, obtaining an FID of 7.9 on MS-COCO for text-to-image synthesis and best results on COCO-CN and AIC-ICC for image captioning.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 03:53:33 GMT" } ]
2022-01-03T00:00:00
[ [ "Zhang", "Han", "" ], [ "Yin", "Weichong", "" ], [ "Fang", "Yewei", "" ], [ "Li", "Lanxin", "" ], [ "Duan", "Boqiang", "" ], [ "Wu", "Zhihua", "" ], [ "Sun", "Yu", "" ], [ "Tian", "Hao", "" ], [ "Wu", "Hua", "" ], [ "Wang", "Haifeng", "" ] ]
new_dataset
0.956831
2112.15337
Fabrice Rossi
Elie Mengin (SAMM), Fabrice Rossi (CEREMADE)
Binary Diffing as a Network Alignment Problem via Belief Propagation
null
36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021), IEEE; ACM, Nov 2021, Melbourne, Australia
null
null
cs.LG cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing. We introduce a new formulation of this problem as a particular instance of a graph edit problem over the call graphs of the programs. In this formulation, the quality of a mapping is evaluated simultaneously with respect to both function content and call graph similarities. We show that this formulation is equivalent to a network alignment problem. We propose a solving strategy for this problem based on max-product belief propagation. Finally, we implement a prototype of our method, called QBinDiff, and propose an extensive evaluation which shows that our approach outperforms state of the art diffing tools.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 07:54:11 GMT" } ]
2022-01-03T00:00:00
[ [ "Mengin", "Elie", "", "SAMM" ], [ "Rossi", "Fabrice", "", "CEREMADE" ] ]
new_dataset
0.97724
2112.15462
Yansheng Wu
Yansheng Wu, Chengju Li, Fu Xiao
Quaternary linear codes and related binary subfield codes
24 pages, to appear in IEEE TIT
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
In this paper, we mainly study quaternary linear codes and their binary subfield codes. First we obtain a general explicit relationship between quaternary linear codes and their binary subfield codes in terms of generator matrices and defining sets. Second, we construct quaternary linear codes via simplicial complexes and determine the weight distributions of these codes. Third, the weight distributions of the binary subfield codes of these quaternary codes are also computed by employing the general characterization. Furthermore, we present two infinite families of optimal linear codes with respect to the Griesmer Bound, and a class of binary almost optimal codes with respect to the Sphere Packing Bound. We also need to emphasize that we obtain at least 9 new quaternary linear codes.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 13:52:11 GMT" } ]
2022-01-03T00:00:00
[ [ "Wu", "Yansheng", "" ], [ "Li", "Chengju", "" ], [ "Xiao", "Fu", "" ] ]
new_dataset
0.999642
2112.15475
Dmitri Rachkovskij A.
Dmitri A. Rachkovskij
Shift-Equivariant Similarity-Preserving Hypervector Representations of Sequences
null
null
null
null
cs.AI cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Hyperdimensional Computing (HDC), also known as Vector-Symbolic Architectures (VSA), is a promising framework for the development of cognitive architectures and artificial intelligence systems, as well as for technical applications and emerging neuromorphic and nanoscale hardware. HDC/VSA operate with hypervectors, i.e., distributed vector representations of large fixed dimension (usually > 1000). One of the key ingredients of HDC/VSA are the methods for encoding data of various types (from numeric scalars and vectors to graphs) into hypervectors. In this paper, we propose an approach for the formation of hypervectors of sequences that provides both an equivariance with respect to the shift of sequences and preserves the similarity of sequences with identical elements at nearby positions. Our methods represent the sequence elements by compositional hypervectors and exploit permutations of hypervectors for representing the order of sequence elements. We experimentally explored the proposed representations using a diverse set of tasks with data in the form of symbolic strings. Although our approach is feature-free as it forms the hypervector of a sequence from the hypervectors of its symbols at their positions, it demonstrated the performance on a par with the methods that apply various features, such as subsequences. The proposed techniques were designed for the HDC/VSA model known as Sparse Binary Distributed Representations. However, they can be adapted to hypervectors in formats of other HDC/VSA models, as well as for representing sequences of types other than symbolic strings.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 14:29:12 GMT" } ]
2022-01-03T00:00:00
[ [ "Rachkovskij", "Dmitri A.", "" ] ]
new_dataset
0.993296
2112.15544
Luca Buoncompagni
Luca Buoncompagni, Syed Yusha Kareem, and Fulvio Mastrogiovanni
OWLOOP: A Modular API to Describe OWL Axioms in OOP Objects Hierarchies
This version of the manuscript has been published on the SoftwareX Elsevier journal in January 2022. The manuscript is made of 21 pages, which include 3 tables, 6 figures, and 4 listings
SoftwareX, January 2022, 100952, Vol. 17, Elsevier
10.1016/j.softx.2021.100952
null
cs.AI cs.LO cs.SE
http://creativecommons.org/licenses/by-sa/4.0/
OWLOOP is an Application Programming Interface (API) for using the Ontology Web Language (OWL) by the means of Object-Oriented Programming (OOP). It is common to design software architectures using the OOP paradigm for increasing their modularity. If the components of an architecture also exploit OWL ontologies for knowledge representation and reasoning, they would require to be interfaced with OWL axioms. Since OWL does not adhere to the OOP paradigm, such an interface often leads to boilerplate code affecting modularity, and OWLOOP is designed to address this issue as well as the associated computational aspects. We present an extension of the OWL-API to provide a general-purpose interface between OWL axioms subject to reasoning and modular OOP objects hierarchies.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 16:46:45 GMT" } ]
2022-01-03T00:00:00
[ [ "Buoncompagni", "Luca", "" ], [ "Kareem", "Syed Yusha", "" ], [ "Mastrogiovanni", "Fulvio", "" ] ]
new_dataset
0.989699
2112.15561
Jungwon Lim
Jungwon Lim (1), Yonghwi Jin (2), Mansour Alharthi (1), Xiaokuan Zhang (1), Jinho Jung (1), Rajat Gupta (1), Kuilin Li (1), Daehee Jang (3), Taesoo Kim (1) ((1) Georgia Institute of Technology, (2) Theori Inc., (3) Sungshin Women's University)
SOK: On the Analysis of Web Browser Security
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
Web browsers are integral parts of everyone's daily life. They are commonly used for security-critical and privacy sensitive tasks, like banking transactions and checking medical records. Unfortunately, modern web browsers are too complex to be bug free (e.g., 25 million lines of code in Chrome), and their role as an interface to the cyberspace makes them an attractive target for attacks. Accordingly, web browsers naturally become an arena for demonstrating advanced exploitation techniques by attackers and state-of-the-art defenses by browser vendors. Web browsers, arguably, are the most exciting place to learn the latest security issues and techniques, but remain as a black art to most security researchers because of their fast-changing characteristics and complex code bases. To bridge this gap, this paper attempts to systematize the security landscape of modern web browsers by studying the popular classes of security bugs, their exploitation techniques, and deployed defenses. More specifically, we first introduce a unified architecture that faithfully represents the security design of four major web browsers. Second, we share insights from a 10-year longitudinal study on browser bugs. Third, we present a timeline and context of mitigation schemes and their effectiveness. Fourth, we share our lessons from a full-chain exploit used in 2020 Pwn2Own competition. and the implication of bug bounty programs to web browser security. We believe that the key takeaways from this systematization can shed light on how to advance the status quo of modern web browsers, and, importantly, how to create secure yet complex software in the future.
[ { "version": "v1", "created": "Fri, 31 Dec 2021 17:32:59 GMT" } ]
2022-01-03T00:00:00
[ [ "Lim", "Jungwon", "" ], [ "Jin", "Yonghwi", "" ], [ "Alharthi", "Mansour", "" ], [ "Zhang", "Xiaokuan", "" ], [ "Jung", "Jinho", "" ], [ "Gupta", "Rajat", "" ], [ "Li", "Kuilin", "" ], [ "Jang", "Daehee", "" ], [ "Kim", "Taesoo", "" ] ]
new_dataset
0.989994
2111.01193
Supriya Nagesh
Supriya Nagesh, Alexander Moreno, Stephanie M. Carpenter, Jamie Yap, Soujanya Chatterjee, Steven Lloyd Lizotte, Neng Wan, Santosh Kumar, Cho Lam, David W. Wetter, Inbal Nahum-Shani, James M. Rehg
Transformers for prompt-level EMA non-response prediction
null
null
null
null
cs.CL cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ecological Momentary Assessments (EMAs) are an important psychological data source for measuring current cognitive states, affect, behavior, and environmental factors from participants in mobile health (mHealth) studies and treatment programs. Non-response, in which participants fail to respond to EMA prompts, is an endemic problem. The ability to accurately predict non-response could be utilized to improve EMA delivery and develop compliance interventions. Prior work has explored classical machine learning models for predicting non-response. However, as increasingly large EMA datasets become available, there is the potential to leverage deep learning models that have been effective in other fields. Recently, transformer models have shown state-of-the-art performance in NLP and other domains. This work is the first to explore the use of transformers for EMA data analysis. We address three key questions in applying transformers to EMA data: 1. Input representation, 2. encoding temporal information, 3. utility of pre-training on improving downstream prediction task performance. The transformer model achieves a non-response prediction AUC of 0.77 and is significantly better than classical ML and LSTM-based deep learning models. We will make our a predictive model trained on a corpus of 40K EMA samples freely-available to the research community, in order to facilitate the development of future transformer-based EMA analysis works.
[ { "version": "v1", "created": "Mon, 1 Nov 2021 18:38:47 GMT" } ]
2022-01-02T00:00:00
[ [ "Nagesh", "Supriya", "" ], [ "Moreno", "Alexander", "" ], [ "Carpenter", "Stephanie M.", "" ], [ "Yap", "Jamie", "" ], [ "Chatterjee", "Soujanya", "" ], [ "Lizotte", "Steven Lloyd", "" ], [ "Wan", "Neng", "" ], [ "Kumar", "Santosh", "" ], [ "Lam", "Cho", "" ], [ "Wetter", "David W.", "" ], [ "Nahum-Shani", "Inbal", "" ], [ "Rehg", "James M.", "" ] ]
new_dataset
0.998965
2112.01273
David Smith
David S. Smith
RawArray: A Simple, Fast, and Extensible Archival Format for Numeric Data
8 pages, 3 figures
null
null
null
cs.DB cs.LG cs.MS
http://creativecommons.org/licenses/by/4.0/
Raw data sizes are growing and proliferating in scientific research, driven by the success of data-hungry computational methods, such as machine learning. The preponderance of proprietary and shoehorned data formats make computations slower and make it harder to reproduce research and to port methods to new platforms. Here we present the RawArray format: a simple, fast, and extensible format for archival storage of multidimensional numeric arrays on disk. The RawArray file format is a simple concatenation of a header array and a data array. The header comprises seven or more 64-bit unsigned integers. The array data can be anything. Arbitrary user metadata can be appended to an RawArray file if desired, for example to store measurement details, color palettes, or geolocation data. We present benchmarks showing a factor of 2--3$\times$ speedup over HDF5 for a range of array sizes and a speedup of up to 20$\times$ in reading the common deep learning datasets MNIST and CIFAR10.
[ { "version": "v1", "created": "Tue, 30 Nov 2021 03:51:24 GMT" } ]
2022-01-02T00:00:00
[ [ "Smith", "David S.", "" ] ]
new_dataset
0.999313
2002.00253
Karthik Abinav Sankararaman
Karthik Abinav Sankararaman and Aleksandrs Slivkins
Bandits with Knapsacks beyond the Worst-Case
The initial version, titled "Advances in Bandits with Knapsacks", was published on arxiv.org in Jan'20. The present version improves both upper and lower bounds, deriving Theorem 3.2(ii) and Theorem 4.2. Moreover, it simplifies the algorithm and analysis in the main result, and fixes several issues in the lower bounds
null
null
null
cs.LG cs.DS stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bandits with Knapsacks (BwK) is a general model for multi-armed bandits under supply/budget constraints. While worst-case regret bounds for BwK are well-understood, we present three results that go beyond the worst-case perspective. First, we provide upper and lower bounds which amount to a full characterization for logarithmic, instance-dependent regret rates. Second, we consider "simple regret" in BwK, which tracks algorithm's performance in a given round, and prove that it is small in all but a few rounds. Third, we provide a general "reduction" from BwK to bandits which takes advantage of some known helpful structure, and apply this reduction to combinatorial semi-bandits, linear contextual bandits, and multinomial-logit bandits. Our results build on the BwK algorithm from \citet{AgrawalDevanur-ec14}, providing new analyses thereof.
[ { "version": "v1", "created": "Sat, 1 Feb 2020 18:50:44 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2020 22:45:16 GMT" }, { "version": "v3", "created": "Mon, 3 May 2021 06:05:07 GMT" }, { "version": "v4", "created": "Fri, 28 May 2021 16:29:16 GMT" }, { "version": "v5", "created": "Mon, 31 May 2021 17:18:54 GMT" }, { "version": "v6", "created": "Tue, 26 Oct 2021 01:46:36 GMT" }, { "version": "v7", "created": "Tue, 28 Dec 2021 17:55:19 GMT" } ]
2021-12-30T00:00:00
[ [ "Sankararaman", "Karthik Abinav", "" ], [ "Slivkins", "Aleksandrs", "" ] ]
new_dataset
0.99693
2002.01852
Biao Yang
Biao Yang, Caizhen He, Pin Wang, Ching-yao Chan, Xiaofeng Liu, and Yang Chen
TPPO: A Novel Trajectory Predictor with Pseudo Oracle
14 pages, 7 figures, 2 tables. arXiv admin note: substantial text overlap with arXiv:2002.00391. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Forecasting pedestrian trajectories in dynamic scenes remains a critical problem in various applications, such as autonomous driving and socially aware robots. Such forecasting is challenging due to human-human and human-object interactions and future uncertainties caused by human randomness. Generative model-based methods handle future uncertainties by sampling a latent variable. However, few studies explored the generation of the latent variable. In this work, we propose the Trajectory Predictor with Pseudo Oracle (TPPO), which is a generative model-based trajectory predictor. The first pseudo oracle is pedestrians' moving directions, and the second one is the latent variable estimated from ground truth trajectories. A social attention module is used to aggregate neighbors' interactions based on the correlation between pedestrians' moving directions and future trajectories. This correlation is inspired by the fact that pedestrians' future trajectories are often influenced by pedestrians in front. A latent variable predictor is proposed to estimate latent variable distributions from observed and ground-truth trajectories. Moreover, the gap between these two distributions is minimized during training. Therefore, the latent variable predictor can estimate the latent variable from observed trajectories to approximate that estimated from ground-truth trajectories. We compare the performance of TPPO with related methods on several public datasets. Results demonstrate that TPPO outperforms state-of-the-art methods with low average and final displacement errors. The ablation study shows that the prediction performance will not dramatically decrease as sampling times decline during tests.
[ { "version": "v1", "created": "Tue, 4 Feb 2020 03:28:55 GMT" }, { "version": "v2", "created": "Tue, 21 Dec 2021 15:57:33 GMT" }, { "version": "v3", "created": "Wed, 29 Dec 2021 06:28:52 GMT" } ]
2021-12-30T00:00:00
[ [ "Yang", "Biao", "" ], [ "He", "Caizhen", "" ], [ "Wang", "Pin", "" ], [ "Chan", "Ching-yao", "" ], [ "Liu", "Xiaofeng", "" ], [ "Chen", "Yang", "" ] ]
new_dataset
0.999139
2007.04954
Chuang Gan
Chuang Gan, Jeremy Schwartz, Seth Alter, Damian Mrowca, Martin Schrimpf, James Traer, Julian De Freitas, Jonas Kubilius, Abhishek Bhandwaldar, Nick Haber, Megumi Sano, Kuno Kim, Elias Wang, Michael Lingelbach, Aidan Curtis, Kevin Feigelis, Daniel M. Bear, Dan Gutfreund, David Cox, Antonio Torralba, James J. DiCarlo, Joshua B. Tenenbaum, Josh H. McDermott, Daniel L.K. Yamins
ThreeDWorld: A Platform for Interactive Multi-Modal Physical Simulation
Oral Presentation at NeurIPS 21 Datasets and Benchmarks Track. Project page: http://www.threedworld.org
null
null
null
cs.CV cs.GR cs.LG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce ThreeDWorld (TDW), a platform for interactive multi-modal physical simulation. TDW enables simulation of high-fidelity sensory data and physical interactions between mobile agents and objects in rich 3D environments. Unique properties include: real-time near-photo-realistic image rendering; a library of objects and environments, and routines for their customization; generative procedures for efficiently building classes of new environments; high-fidelity audio rendering; realistic physical interactions for a variety of material types, including cloths, liquid, and deformable objects; customizable agents that embody AI agents; and support for human interactions with VR devices. TDW's API enables multiple agents to interact within a simulation and returns a range of sensor and physics data representing the state of the world. We present initial experiments enabled by TDW in emerging research directions in computer vision, machine learning, and cognitive science, including multi-modal physical scene understanding, physical dynamics predictions, multi-agent interactions, models that learn like a child, and attention studies in humans and neural networks.
[ { "version": "v1", "created": "Thu, 9 Jul 2020 17:33:27 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 17:03:21 GMT" } ]
2021-12-30T00:00:00
[ [ "Gan", "Chuang", "" ], [ "Schwartz", "Jeremy", "" ], [ "Alter", "Seth", "" ], [ "Mrowca", "Damian", "" ], [ "Schrimpf", "Martin", "" ], [ "Traer", "James", "" ], [ "De Freitas", "Julian", "" ], [ "Kubilius", "Jonas", "" ], [ "Bhandwaldar", "Abhishek", "" ], [ "Haber", "Nick", "" ], [ "Sano", "Megumi", "" ], [ "Kim", "Kuno", "" ], [ "Wang", "Elias", "" ], [ "Lingelbach", "Michael", "" ], [ "Curtis", "Aidan", "" ], [ "Feigelis", "Kevin", "" ], [ "Bear", "Daniel M.", "" ], [ "Gutfreund", "Dan", "" ], [ "Cox", "David", "" ], [ "Torralba", "Antonio", "" ], [ "DiCarlo", "James J.", "" ], [ "Tenenbaum", "Joshua B.", "" ], [ "McDermott", "Josh H.", "" ], [ "Yamins", "Daniel L. K.", "" ] ]
new_dataset
0.999528
2008.09870
Qiang Fu
Qiang Fu, Hongshan Yu, Xiaolong Wang, Zhengeng Yang, Yong He, Hong Zhang, and Ajmal Mian
Fast ORB-SLAM without Keypoint Descriptors
This paper has been accepted by Transaction on Image Processing, DOI:10.1109/TIP.2021.3136710
Transaction on image processing, 2022
10.1109/TIP.2021.3136710
null
cs.RO cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Indirect methods for visual SLAM are gaining popularity due to their robustness to environmental variations. ORB-SLAM2 \cite{orbslam2} is a benchmark method in this domain, however, it consumes significant time for computing descriptors that never get reused unless a frame is selected as a keyframe. To overcome these problems, we present FastORB-SLAM which is lightweight and efficient as it tracks keypoints between adjacent frames without computing descriptors. To achieve this, a two-stage coarse-to-fine descriptor independent keypoint matching method is proposed based on sparse optical flow. In the first stage, we predict initial keypoint correspondences via a simple but effective motion model and then robustly establish the correspondences via pyramid-based sparse optical flow tracking. In the second stage, we leverage the constraints of the motion smoothness and epipolar geometry to refine the correspondences. In particular, our method computes descriptors only for keyframes. We test FastORB-SLAM on \textit{TUM} and \textit{ICL-NUIM} RGB-D datasets and compare its accuracy and efficiency to nine existing RGB-D SLAM methods. Qualitative and quantitative results show that our method achieves state-of-the-art accuracy and is about twice as fast as the ORB-SLAM2.
[ { "version": "v1", "created": "Sat, 22 Aug 2020 16:37:58 GMT" }, { "version": "v2", "created": "Thu, 24 Jun 2021 06:57:53 GMT" }, { "version": "v3", "created": "Wed, 15 Dec 2021 02:16:10 GMT" }, { "version": "v4", "created": "Wed, 29 Dec 2021 01:42:56 GMT" } ]
2021-12-30T00:00:00
[ [ "Fu", "Qiang", "" ], [ "Yu", "Hongshan", "" ], [ "Wang", "Xiaolong", "" ], [ "Yang", "Zhengeng", "" ], [ "He", "Yong", "" ], [ "Zhang", "Hong", "" ], [ "Mian", "Ajmal", "" ] ]
new_dataset
0.997777
2103.08983
Michel Gokan Khan
Michel Gokan Khan, Javid Taheri, Auday Al-Dulaimy, Andreas Kassler
PerfSim: A Performance Simulator for Cloud Native Microservice Chains
for the dataset used for evaluation, see https://ieee-dataport.org/documents/experiments-data-used-evaluating-perfsim-simulation-accuracy-based-sfc-stress-workloads and https://ui.neptune.ai/o/kau/org/PerfSim/experiments. Source code will be available via perfsim.io in end of January 2022
IEEE Transactions on Cloud Computing, 2021
10.1109/TCC.2021.3135757
null
cs.DC cs.PF
http://creativecommons.org/licenses/by/4.0/
Cloud native computing paradigm allows microservice-based applications to take advantage of cloud infrastructure in a scalable, reusable, and interoperable way. However, in a cloud native system, the vast number of configuration parameters and highly granular resource allocation policies can significantly impact the performance and deployment cost. For understanding and analyzing these implications in an easy, quick, and cost-effective way, we present PerfSim, a discrete-event simulator for approximating and predicting the performance of cloud native service chains in user-defined scenarios. To this end, we proposed a systematic approach for modeling the performance of microservices endpoint functions by collecting and analyzing their performance and network traces. With a combination of the extracted models and user-defined scenarios, PerfSim can then simulate the performance behavior of all services over a given period and provide an approximation for system KPIs, such as requests' average response time. Using the processing power of a single laptop, we evaluated both simulation accuracy and speed of PerfSim in 104 prevalent scenarios and compared the simulation results with the identical deployment in a real Kubernetes cluster. We achieved ~81-99% simulation accuracy in approximating the average response time of incoming requests and ~16-1200 times speed-up factor for the simulation.
[ { "version": "v1", "created": "Tue, 16 Mar 2021 11:21:04 GMT" }, { "version": "v2", "created": "Mon, 27 Dec 2021 23:23:32 GMT" } ]
2021-12-30T00:00:00
[ [ "Khan", "Michel Gokan", "" ], [ "Taheri", "Javid", "" ], [ "Al-Dulaimy", "Auday", "" ], [ "Kassler", "Andreas", "" ] ]
new_dataset
0.951032
2105.01830
Agnieszka Ciborowska
Agnieszka Ciborowska, Aleksandar Chakarov, Rahul Pandita
Contemporary COBOL: Developers' Perspectives on Defects and Defect Location
null
null
10.1109/ICSME52107.2021.00027
null
cs.SE
http://creativecommons.org/licenses/by/4.0/
Mainframe systems are facing a critical shortage of developer workforce as the current generation of COBOL developers retires. Furthermore, due to the limited availability of public COBOL resources, entry-level developers, who assume the mantle of legacy COBOL systems maintainers, face significant difficulties during routine maintenance tasks, such as code comprehension and defect location. While we made substantial advances in the field of software maintenance for modern programming languages yearly, mainframe maintenance has received limited attention. With this study, we aim to direct the attention of researchers and practitioners towards investigating and addressing challenges associated with mainframe development. Specifically, we explore the scope of defects affecting COBOL systems and defect location strategies commonly followed by COBOL developers and compare them with the modern programming language counterparts. To this end, we surveyed 30 COBOL and 74 modern Programming Language (PL) developers to understand the differences in defects and defect location strategies employed by the two groups. Our preliminary results show that: (1) major defect categories affecting the COBOL ecosystem are different than defects encountered in modern PL software projects; (2) the most challenging defect types in COBOL are also the ones that occur most frequently; and (3) COBOL and modern PL developers follow similar strategies to locate defective code.
[ { "version": "v1", "created": "Wed, 5 May 2021 02:04:29 GMT" }, { "version": "v2", "created": "Wed, 14 Jul 2021 22:14:35 GMT" } ]
2021-12-30T00:00:00
[ [ "Ciborowska", "Agnieszka", "" ], [ "Chakarov", "Aleksandar", "" ], [ "Pandita", "Rahul", "" ] ]
new_dataset
0.999776
2106.15322
Abdelrahman Abdallah
Abdelrahman Abdallah, Alexander Berendeyev, Islam Nuradin, Daniyar Nurseitov
TNCR: Table Net Detection and Classification Dataset
null
Neurocomputing, Volume 473, 7 February 2022, Pages 79-97
10.1016/j.neucom.2021.11.101
null
cs.CV cs.AI
http://creativecommons.org/licenses/by/4.0/
We present TNCR, a new table dataset with varying image quality collected from free websites. The TNCR dataset can be used for table detection in scanned document images and their classification into 5 different classes. TNCR contains 9428 high-quality labeled images. In this paper, we have implemented state-of-the-art deep learning-based methods for table detection to create several strong baselines. Cascade Mask R-CNN with ResNeXt-101-64x4d Backbone Network achieves the highest performance compared to other methods with a precision of 79.7%, recall of 89.8%, and f1 score of 84.4% on the TNCR dataset. We have made TNCR open source in the hope of encouraging more deep learning approaches to table detection, classification, and structure recognition. The dataset and trained model checkpoints are available at https://github.com/abdoelsayed2016/TNCR_Dataset.
[ { "version": "v1", "created": "Sat, 19 Jun 2021 10:48:58 GMT" } ]
2021-12-30T00:00:00
[ [ "Abdallah", "Abdelrahman", "" ], [ "Berendeyev", "Alexander", "" ], [ "Nuradin", "Islam", "" ], [ "Nurseitov", "Daniyar", "" ] ]
new_dataset
0.999798
2108.06296
EPTCS
Sandra Alves (University of Porto), Miguel Ramos (University of Porto)
An ML-style Record Calculus with Extensible Records
In Proceedings MFPS 2021, arXiv:2112.13746
EPTCS 351, 2021, pp. 1-17
10.4204/EPTCS.351.1
EPTCS 351-1
cs.LO
http://creativecommons.org/licenses/by/4.0/
In this work, we develop a polymorphic record calculus with extensible records. Extensible records are records that can have new fields added to them, or preexisting fields removed from them. We also develop a static type system for this calculus and a sound and complete type inference algorithm. Most ML-style polymorphic record calculi that support extensible records are based on row variables. We present an alternative construction based on the polymorphic record calculus developed by Ohori. Ohori based his polymorphic record calculus on the idea of kind restrictions. This allowed him to express polymorphic operations on records such as field selection and modification. With the addition of extensible types, we were able to extend Ohori's original calculus with other powerful operations on records such as field addition and removal.
[ { "version": "v1", "created": "Fri, 13 Aug 2021 16:02:03 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 15:11:07 GMT" } ]
2021-12-30T00:00:00
[ [ "Alves", "Sandra", "", "University of Porto" ], [ "Ramos", "Miguel", "", "University of Porto" ] ]
new_dataset
0.992289
2110.00534
Aishwarya Padmakumar
Aishwarya Padmakumar, Jesse Thomason, Ayush Shrivastava, Patrick Lange, Anjali Narayan-Chen, Spandana Gella, Robinson Piramuthu, Gokhan Tur, Dilek Hakkani-Tur
TEACh: Task-driven Embodied Agents that Chat
Accepted at AAAI 2022; 7 pages main, 28 pages total, 29 figures; Version 3 uses a new test set for EDH instances that restrict evaluation to state changes only on task-relevant objects
null
null
null
cs.CV cs.AI cs.CL cs.RO
http://creativecommons.org/licenses/by-sa/4.0/
Robots operating in human spaces must be able to engage in natural language interaction with people, both understanding and executing instructions, and using conversation to resolve ambiguity and recover from mistakes. To study this, we introduce TEACh, a dataset of over 3,000 human--human, interactive dialogues to complete household tasks in simulation. A Commander with access to oracle information about a task communicates in natural language with a Follower. The Follower navigates through and interacts with the environment to complete tasks varying in complexity from "Make Coffee" to "Prepare Breakfast", asking questions and getting additional information from the Commander. We propose three benchmarks using TEACh to study embodied intelligence challenges, and we evaluate initial models' abilities in dialogue understanding, language grounding, and task execution.
[ { "version": "v1", "created": "Fri, 1 Oct 2021 17:00:14 GMT" }, { "version": "v2", "created": "Fri, 15 Oct 2021 17:08:43 GMT" }, { "version": "v3", "created": "Wed, 29 Dec 2021 02:25:05 GMT" } ]
2021-12-30T00:00:00
[ [ "Padmakumar", "Aishwarya", "" ], [ "Thomason", "Jesse", "" ], [ "Shrivastava", "Ayush", "" ], [ "Lange", "Patrick", "" ], [ "Narayan-Chen", "Anjali", "" ], [ "Gella", "Spandana", "" ], [ "Piramuthu", "Robinson", "" ], [ "Tur", "Gokhan", "" ], [ "Hakkani-Tur", "Dilek", "" ] ]
new_dataset
0.998055
2111.03210
Ron Roth
Ron M. Roth
Higher-Order MDS Codes
Main changes from v1: replaced Theorem 4 by a stronger result and added Corollary 5, Lemma 8, and Corollary 9
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An improved Singleton-type upper bound is presented for the list decoding radius of linear codes, in terms of the code parameters [n,k,d] and the list size L. L-MDS codes are then defined as codes that attain this bound (under a slightly stronger notion of list decodability), with 1-MDS codes corresponding to ordinary linear MDS codes. Several properties of such codes are presented; in particular, it is shown that the 2-MDS property is preserved under duality. Finally, explicit constructions for 2-MDS codes are presented through generalized Reed-Solomon (GRS) codes.
[ { "version": "v1", "created": "Fri, 5 Nov 2021 01:31:14 GMT" }, { "version": "v2", "created": "Wed, 29 Dec 2021 17:59:51 GMT" } ]
2021-12-30T00:00:00
[ [ "Roth", "Ron M.", "" ] ]
new_dataset
0.97725
2112.06730
Jiaolong Yang
Yizhong Zhang, Jiaolong Yang, Zhen Liu, Ruicheng Wang, Guojun Chen, Xin Tong, and Baining Guo
VirtualCube: An Immersive 3D Video Communication System
Project page: https://www.microsoft.com/en-us/research/project/virtualcube/
null
null
null
cs.CV cs.GR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The VirtualCube system is a 3D video conference system that attempts to overcome some limitations of conventional technologies. The key ingredient is VirtualCube, an abstract representation of a real-world cubicle instrumented with RGBD cameras for capturing the 3D geometry and texture of a user. We design VirtualCube so that the task of data capturing is standardized and significantly simplified, and everything can be built using off-the-shelf hardware. We use VirtualCubes as the basic building blocks of a virtual conferencing environment, and we provide each VirtualCube user with a surrounding display showing life-size videos of remote participants. To achieve real-time rendering of remote participants, we develop the V-Cube View algorithm, which uses multi-view stereo for more accurate depth estimation and Lumi-Net rendering for better rendering quality. The VirtualCube system correctly preserves the mutual eye gaze between participants, allowing them to establish eye contact and be aware of who is visually paying attention to them. The system also allows a participant to have side discussions with remote participants as if they were in the same room. Finally, the system sheds lights on how to support the shared space of work items (e.g., documents and applications) and track the visual attention of participants to work items.
[ { "version": "v1", "created": "Mon, 13 Dec 2021 15:34:08 GMT" }, { "version": "v2", "created": "Wed, 29 Dec 2021 05:09:37 GMT" } ]
2021-12-30T00:00:00
[ [ "Zhang", "Yizhong", "" ], [ "Yang", "Jiaolong", "" ], [ "Liu", "Zhen", "" ], [ "Wang", "Ruicheng", "" ], [ "Chen", "Guojun", "" ], [ "Tong", "Xin", "" ], [ "Guo", "Baining", "" ] ]
new_dataset
0.999263
2112.13488
Djoko Suprijanto -
Djoko Suprijanto and Hopein Christofen Tang
Quantum codes constructed from cyclic codes over the ring $\mathbb{F}_q+v\mathbb{F}_q+v^2\mathbb{F}_q+v^3\mathbb{F}_q+v^4\mathbb{F}_q$
14 pages, submitted to the journal at November 28, 2021
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, we investigate properties of cyclic codes over a finite non-chain ring $\mathbb{F}_q+v\mathbb{F}_q+v^2\mathbb{F}_q+v^3\mathbb{F}_q+v^4\mathbb{F}_q,$ where $q=p^r,$ $r$ is a positive integer, $p$ is an odd prime, $4 \mid (p-1),$ and $v^5=v.$ As an application, we construct several quantum error correcting codes over the finite field $\mathbb{F}_q.$
[ { "version": "v1", "created": "Mon, 27 Dec 2021 02:55:39 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 09:45:37 GMT" } ]
2021-12-30T00:00:00
[ [ "Suprijanto", "Djoko", "" ], [ "Tang", "Hopein Christofen", "" ] ]
new_dataset
0.975829
2112.13545
Bin Wang
Xian Wei, Bin Wang, Mingsong Chen, Ji Yuan, Hai Lan, Jiehuang Shi, Xuan Tang, Bo Jin, Guozhang Chen, Dongping Yang
ViR:the Vision Reservoir
10 pages, 7 figures
null
null
null
cs.CV cs.LG
http://creativecommons.org/licenses/by/4.0/
The most recent year has witnessed the success of applying the Vision Transformer (ViT) for image classification. However, there are still evidences indicating that ViT often suffers following two aspects, i) the high computation and the memory burden from applying the multiple Transformer layers for pre-training on a large-scale dataset, ii) the over-fitting when training on small datasets from scratch. To address these problems, a novel method, namely, Vision Reservoir computing (ViR), is proposed here for image classification, as a parallel to ViT. By splitting each image into a sequence of tokens with fixed length, the ViR constructs a pure reservoir with a nearly fully connected topology to replace the Transformer module in ViT. Two kinds of deep ViR models are subsequently proposed to enhance the network performance. Comparative experiments between the ViR and the ViT are carried out on several image classification benchmarks. Without any pre-training process, the ViR outperforms the ViT in terms of both model and computational complexity. Specifically, the number of parameters of the ViR is about 15% even 5% of the ViT, and the memory footprint is about 20% to 40% of the ViT. The superiority of the ViR performance is explained by Small-World characteristics, Lyapunov exponents, and memory capacity.
[ { "version": "v1", "created": "Mon, 27 Dec 2021 07:07:50 GMT" }, { "version": "v2", "created": "Wed, 29 Dec 2021 06:30:56 GMT" } ]
2021-12-30T00:00:00
[ [ "Wei", "Xian", "" ], [ "Wang", "Bin", "" ], [ "Chen", "Mingsong", "" ], [ "Yuan", "Ji", "" ], [ "Lan", "Hai", "" ], [ "Shi", "Jiehuang", "" ], [ "Tang", "Xuan", "" ], [ "Jin", "Bo", "" ], [ "Chen", "Guozhang", "" ], [ "Yang", "Dongping", "" ] ]
new_dataset
0.980906
2112.13572
Chandrakant Bothe
Chandrakant Bothe
Polite Emotional Dialogue Acts for Conversational Analysis in Daily Dialog Data
null
null
null
null
cs.CL cs.HC
http://creativecommons.org/licenses/by/4.0/
Many socio-linguistic cues are used in the conversational analysis, such as emotion, sentiment, and dialogue acts. One of the fundamental social cues is politeness, which linguistically possesses properties useful in conversational analysis. This short article presents some of the brief findings of polite emotional dialogue acts, where we can correlate the relational bonds between these socio-linguistics cues. We found that the utterances with emotion classes Anger and Disgust are more likely to be impolite while Happiness and Sadness to be polite. Similar phenomenon occurs with dialogue acts, Inform and Commissive contain many polite utterances than Question and Directive. Finally, we will conclude on the future work of these findings.
[ { "version": "v1", "created": "Mon, 27 Dec 2021 08:48:57 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 19:44:20 GMT" } ]
2021-12-30T00:00:00
[ [ "Bothe", "Chandrakant", "" ] ]
new_dataset
0.99115
2112.13808
Jamin Shin
Jamin Shin, Juneyoung Park
Pedagogical Word Recommendation: A novel task and dataset on personalized vocabulary acquisition for L2 learners
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When learning a second language (L2), one of the most important but tedious components that often demoralizes students with its ineffectiveness and inefficiency is vocabulary acquisition, or more simply put, memorizing words. In light of such, a personalized and educational vocabulary recommendation system that traces a learner's vocabulary knowledge state would have an immense learning impact as it could resolve both issues. Therefore, in this paper, we propose and release data for a novel task called Pedagogical Word Recommendation (PWR). The main goal of PWR is to predict whether a given learner knows a given word based on other words the learner has already seen. To elaborate, we collect this data via an Intelligent Tutoring System (ITS) that is serviced to ~1M L2 learners who study for the standardized English exam, TOEIC. As a feature of this ITS, students can directly indicate words they do not know from the questions they solved to create wordbooks. Finally, we report the evaluation results of a Neural Collaborative Filtering approach along with an exploratory data analysis and discuss the impact and efficacy of this dataset as a baseline for future studies on this task.
[ { "version": "v1", "created": "Mon, 27 Dec 2021 17:52:48 GMT" }, { "version": "v2", "created": "Tue, 28 Dec 2021 04:52:26 GMT" } ]
2021-12-30T00:00:00
[ [ "Shin", "Jamin", "" ], [ "Park", "Juneyoung", "" ] ]
new_dataset
0.995251
2112.13981
Xing Wang
Xing Wang, Hanwen Kang, Hongyu Zhou, Wesley Au, Chao Chen
Soft Robotic Finger with Variable Effective Length enabled by an Antagonistic Constraint Mechanism
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compared to traditional rigid robotics, soft robotics has attracted increasing attention due to its advantages as compliance, safety, and low cost. As an essential part of soft robotics, the soft robotic gripper also shows its superior while grasping the objects with irregular shapes. Recent research has been conducted to improve its grasping performance by adjusting the variable effective length (VEL). However, the VEL achieved by multi-chamber design or tunable stiffness shape memory material requires complex pneumatic circuit design or a time-consuming phase-changing process. This work proposes a fold-based soft robotic actuator made from 3D printed filament, NinjaFlex. It is experimentally tested and represented by the hyperelastic model. Mathematic and finite element modelling is conducted to study the bending behaviour of the proposed soft actuator. Besides, an antagonistic constraint mechanism is proposed to achieve the VEL, and the experiments demonstrate that better conformity is achieved. Finally, a two-mode gripper is designed and evaluated to demonstrate the advances of VEL on grasping performance.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 03:33:07 GMT" } ]
2021-12-30T00:00:00
[ [ "Wang", "Xing", "" ], [ "Kang", "Hanwen", "" ], [ "Zhou", "Hongyu", "" ], [ "Au", "Wesley", "" ], [ "Chen", "Chao", "" ] ]
new_dataset
0.997667
2112.14000
Sitong Wu
Sitong Wu, Tianyi Wu, Haoru Tan, Guodong Guo
Pale Transformer: A General Vision Transformer Backbone with Pale-Shaped Attention
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by/4.0/
Recently, Transformers have shown promising performance in various vision tasks. To reduce the quadratic computation complexity caused by the global self-attention, various methods constrain the range of attention within a local region to improve its efficiency. Consequently, their receptive fields in a single attention layer are not large enough, resulting in insufficient context modeling. To address this issue, we propose a Pale-Shaped self-Attention (PS-Attention), which performs self-attention within a pale-shaped region. Compared to the global self-attention, PS-Attention can reduce the computation and memory costs significantly. Meanwhile, it can capture richer contextual information under the similar computation complexity with previous local self-attention mechanisms. Based on the PS-Attention, we develop a general Vision Transformer backbone with a hierarchical architecture, named Pale Transformer, which achieves 83.4%, 84.3%, and 84.9% Top-1 accuracy with the model size of 22M, 48M, and 85M respectively for 224 ImageNet-1K classification, outperforming the previous Vision Transformer backbones. For downstream tasks, our Pale Transformer backbone performs better than the recent state-of-the-art CSWin Transformer by a large margin on ADE20K semantic segmentation and COCO object detection & instance segmentation. The code will be released on https://github.com/BR-IDL/PaddleViT.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 05:37:24 GMT" } ]
2021-12-30T00:00:00
[ [ "Wu", "Sitong", "" ], [ "Wu", "Tianyi", "" ], [ "Tan", "Haoru", "" ], [ "Guo", "Guodong", "" ] ]
new_dataset
0.997902
2112.14019
Jiawei Liu
Jiawei Liu, Jing Zhang, Nick Barnes
Semi-supervised Salient Object Detection with Effective Confidence Estimation
null
null
null
null
cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
The success of existing salient object detection models relies on a large pixel-wise labeled training dataset. How-ever, collecting such a dataset is not only time-consuming but also very expensive. To reduce the labeling burden, we study semi-supervised salient object detection, and formulate it as an unlabeled dataset pixel-level confidence estimation problem by identifying pixels with less confident predictions. Specifically, we introduce a new latent variable model with an energy-based prior for effective latent space exploration, leading to more reliable confidence maps. With the proposed strategy, the unlabelled images can effectively participate in model training. Experimental results show that the proposed solution, using only 1/16 of the annotations from the original training dataset, achieves competitive performance compared with state-of-the-art fully supervised models.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 07:14:48 GMT" } ]
2021-12-30T00:00:00
[ [ "Liu", "Jiawei", "" ], [ "Zhang", "Jing", "" ], [ "Barnes", "Nick", "" ] ]
new_dataset
0.997928
2112.14044
EPTCS
Bart Jacobs (Institute for Computing and Information Sciences (iCIS), Radboud University Nijmegen, The Netherlands)
Multinomial and Hypergeometric Distributions in Markov Categories
In Proceedings MFPS 2021, arXiv:2112.13746
EPTCS 351, 2021, pp. 98-115
10.4204/EPTCS.351.7
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Markov categories, having tensors with copying and discarding, provide a setting for categorical probability. This paper uses finite colimits and what we call uniform states in such Markov categories to define a (fixed size) multiset functor, with basic operations for sums and zips of multisets, and a graded monad structure. Multisets can be used to represent both urns filled with coloured balls and also draws of multiple balls from such urns. The main contribution of this paper is the abstract definition of multinomial and hypergeometric distributions on multisets, as draws. It is shown that these operations interact appropriately with various operations on multisets.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 09:02:45 GMT" } ]
2021-12-30T00:00:00
[ [ "Jacobs", "Bart", "", "Institute for Computing and Information Sciences" ] ]
new_dataset
0.999148
2112.14049
EPTCS
Giulio Fellin (Universit\`a di Verona), Peter Schuster (Universit\`a di Verona)
A General Glivenko-G\"odel Theorem for Nuclei
In Proceedings MFPS 2021, arXiv:2112.13746
EPTCS 351, 2021, pp. 51-66
10.4204/EPTCS.351.4
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
Glivenko's theorem says that, in propositional logic, classical provability of a formula entails intuitionistic provability of double negation of that formula. We generalise Glivenko's theorem from double negation to an arbitrary nucleus, from provability in a calculus to an inductively generated abstract consequence relation, and from propositional logic to any set of objects whatsoever. The resulting conservation theorem comes with precise criteria for its validity, which allow us to instantly include G\"odel's counterpart for first-order predicate logic of Glivenko's theorem. The open nucleus gives us a form of the deduction theorem for positive logic, and the closed nucleus prompts a variant of the reduction from intuitionistic to minimal logic going back to Johansson.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 09:06:54 GMT" } ]
2021-12-30T00:00:00
[ [ "Fellin", "Giulio", "", "Università di Verona" ], [ "Schuster", "Peter", "", "Università\n di Verona" ] ]
new_dataset
0.998353
2112.14056
EPTCS
Rasmus Ejlers M{\o}gelberg, Andrea Vezzosi
Two Guarded Recursive Powerdomains for Applicative Simulation
In Proceedings MFPS 2021, arXiv:2112.13746
EPTCS 351, 2021, pp. 200-217
10.4204/EPTCS.351.13
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
Clocked Cubical Type Theory is a new type theory combining the power of guarded recursion with univalence and higher inductive types (HITs). This type theory can be used as a metalanguage for synthetic guarded domain theory in which one can solve guarded recursive type equations, also with negative variable occurrences, and use these to construct models for reasoning about programming languages. Combining this with HITs allows for the use of type constructors familiar from set-theory based approaches to semantics, such as quotients and finite powersets in these models. In this paper we show how to reason about the combination of finite non-determinism and recursion in this type theory. Unlike traditional domain theory which takes an ordering of programs as primitive, synthetic guarded domain theory takes the notion of computation step as primitive in the form of a modal operator. We use this extra intensional information to define two guarded recursive (finite) powerdomain constructions differing in the way non-determinism interacts with the computation steps. As an example application of these we show how to prove applicative similarity a congruence in the cases of may- and must-convergence for the untyped lambda calculus with finite non-determinism. Such results are usually proved using operational reasoning and Howe's method. Here we use an adaptation of a denotational method developed by Pitts in the context of domain theory.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 09:09:25 GMT" } ]
2021-12-30T00:00:00
[ [ "Møgelberg", "Rasmus Ejlers", "" ], [ "Vezzosi", "Andrea", "" ] ]
new_dataset
0.981528
2112.14059
Zhi Chen
Zhi Chen, Fan Yang, Wenbing Tao
DetarNet: Decoupling Translation and Rotation by Siamese Network for Point Cloud Registration
Accepted by AAAI-2022
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Point cloud registration is a fundamental step for many tasks. In this paper, we propose a neural network named DetarNet to decouple the translation $t$ and rotation $R$, so as to overcome the performance degradation due to their mutual interference in point cloud registration. First, a Siamese Network based Progressive and Coherent Feature Drift (PCFD) module is proposed to align the source and target points in high-dimensional feature space, and accurately recover translation from the alignment process. Then we propose a Consensus Encoding Unit (CEU) to construct more distinguishable features for a set of putative correspondences. After that, a Spatial and Channel Attention (SCA) block is adopted to build a classification network for finding good correspondences. Finally, the rotation is obtained by Singular Value Decomposition (SVD). In this way, the proposed network decouples the estimation of translation and rotation, resulting in better performance for both of them. Experimental results demonstrate that the proposed DetarNet improves registration performance on both indoor and outdoor scenes. Our code will be available in \url{https://github.com/ZhiChen902/DetarNet}.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 09:12:26 GMT" } ]
2021-12-30T00:00:00
[ [ "Chen", "Zhi", "" ], [ "Yang", "Fan", "" ], [ "Tao", "Wenbing", "" ] ]
new_dataset
0.950554
2112.14067
Canze Zhu
Canze Zhu and Qunying Liao
The complete weight enumerator of the Reed-Solomon code with dimension two or three
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-sa/4.0/
It is well-known that Reed-Solomon codes and extended Reed-Solomon codes are two special classes of MDS codes with wide applications in practice. The complete weight enumerators of these codes are very important for determining the capability of both error-detection and error-correction. In this paper, for any positive integer $m$ and prime $p$, basing on the character sums, we determine the complete weight enumerators of the Reed-Solomon code and the extended Reed-Solomon code with dimension $k$ $(k=2,3)$ over $\mathbb{F}_{p^m}$, explictly, which are generalizations of the corresponding results in \cite{BK91,K04}.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 09:31:57 GMT" } ]
2021-12-30T00:00:00
[ [ "Zhu", "Canze", "" ], [ "Liao", "Qunying", "" ] ]
new_dataset
0.999333
2112.14109
Beat Signer
Ahmed A.O. Tayeh, Bruno Dumas, Beat Signer
A Metamodel and Prototype for Fluid Document Formats
null
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the transformation of computing from personal computers to the Internet, document formats have also seen some changes over the years. Future document formats are likely going to adapt to the emerging needs of ubiquitous computing, where information processing is embedded in everyday activities and objects. While most existing document formats have originally been a digital emulation of paper documents, over the years they have been enriched with additional digital features. These features were mainly incorporated to take advantage of the new functionality offered by the devices on which the documents are accessed. With the advent of ubiquitous computing, document formats seem to be facing the next evolutionary step. They will have to adapt to novel mobile devices, innovative interaction modalities, the distribution over multiple devices as well as heterogeneous input sources. This adaptation to the age of ubiquitous computing asks for several new document features. We outline a roadmap towards future fluid document representations for ubiquitous information environments. Based on the resource-selector-link (RSL) hypermedia metamodel - a general hypermedia metamodel supporting distribution, user rights management and content adaptation - we developed a metamodel for fluid document formats and the corresponding online text editor for fluid documents.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 12:23:01 GMT" } ]
2021-12-30T00:00:00
[ [ "Tayeh", "Ahmed A. O.", "" ], [ "Dumas", "Bruno", "" ], [ "Signer", "Beat", "" ] ]
new_dataset
0.978525
2112.14119
Shan Luo Dr
Jiaqi Jiang and Shan Luo
Robotic Perception of Object Properties using Tactile Sensing
19 pages, 6 figures
null
null
null
cs.RO
http://creativecommons.org/publicdomain/zero/1.0/
The sense of touch plays a key role in enabling humans to understand and interact with surrounding environments. For robots, tactile sensing is also irreplaceable. While interacting with objects, tactile sensing provides useful information for the robot to understand the object, such as distributed pressure, temperature, vibrations and texture. During robot grasping, vision is often occluded by its end-effectors, whereas tactile sensing can measure areas that are not accessible by vision. In the past decades, a number of tactile sensors have been developed for robots and used for different robotic tasks. In this chapter, we focus on the use of tactile sensing for robotic grasping and investigate the recent trends in tactile perception of object properties. We first discuss works on tactile perception of three important object properties in grasping, i.e., shape, pose and material properties. We then review the recent development in grasping stability prediction with tactile sensing. Among these works, we identify the requirement for coordinating vision and tactile sensing in the robotic grasping. To demonstrate the use of tactile sensing to improve the visual perception, our recent development of vision-guided tactile perception for crack reconstruction is presented. In the proposed framework, the large receptive field of camera vision is first leveraged to achieve a quick search of candidate regions containing cracks, a high-resolution optical tactile sensor is then used to examine these candidate regions and reconstruct a refined crack shape. The experiments show that our proposed method can achieve a significant reduction of mean distance error from 0.82 mm to 0.24 mm for crack reconstruction. Finally, we conclude this chapter with a discussion of open issues and future directions for applying tactile sensing in robotic tasks.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 12:37:29 GMT" } ]
2021-12-30T00:00:00
[ [ "Jiang", "Jiaqi", "" ], [ "Luo", "Shan", "" ] ]
new_dataset
0.983864
2112.14125
Jagadeesh Harshan
Rusni Kima Mangang and J. Harshan
Do Not Forget the Past: A Buffer-Aided Framework for Relay Based Key Generation
15 pages, 6 figures
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-nd/4.0/
We address relay-assisted key generation wherein two wireless nodes, that have no direct channel between them, seek the assistance of an intermediate relay to generate secret keys. In a celebrated version of the relay-assisted protocol, as applied by Lai et al., Zhou et al., Wang et al. and Waqas et al., the relay node generates pair-wise keys with the two nodes, and then broadcasts an XOR version of the two keys. Although such protocols are simple and effective, we observe that they face reduction in key rates due to two problems. First, for confidentiality, the relay broadcasts an XOR function of the pair-wise keys thereby pruning the length of the shared key to be the minimum of the key lengths of the pair-wise keys. Secondly, the broadcast phase may also experience outages thereby not being able to share the generated key in every round of the protocol. Identifying these issues, we propose a buffer-aided relaying protocol wherein buffer is used at the relay to store unused secret bits generated in the previous rounds of the protocol so as to provide confidentiality in the subsequent rounds of broadcast. On this buffer-aided protocol, we propose a power-allocation strategy between the phases of key generation and broadcast so as to maximize the throughput and key rate. Rigorous analyses show that buffer-aided relay when implemented along with the proposed power-allocation strategy offer remarkable advantages over existing baselines.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 13:08:11 GMT" } ]
2021-12-30T00:00:00
[ [ "Mangang", "Rusni Kima", "" ], [ "Harshan", "J.", "" ] ]
new_dataset
0.976968
2112.14225
Binoy Nair
Dineshkumar, N R Sakthivel, Binoy B Nair
Robotic Hand Rehabilitation System
null
null
null
null
cs.RO
http://creativecommons.org/licenses/by/4.0/
Rehabilitation exercises are essential to ensure speedy recovery of stroke patients. An automated system to assist the patient in performing a rehabilitation exercise repeatedly is designed. The design process is presented in this report.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 17:19:10 GMT" } ]
2021-12-30T00:00:00
[ [ "Dineshkumar", "", "" ], [ "Sakthivel", "N R", "" ], [ "Nair", "Binoy B", "" ] ]
new_dataset
0.98594
2112.14267
Matthew Fickus
Matthew Fickus and Joseph W. Iverson and John Jasper and Dustin G. Mixon
Harmonic Grassmannian codes
null
null
null
null
cs.IT math.IT math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An equi-isoclinic tight fusion frame (EITFF) is a type of Grassmannian code, being a sequence of subspaces of a finite-dimensional Hilbert space of a given dimension with the property that the smallest spectral distance between any pair of them is as large as possible. EITFFs arise in compressed sensing, yielding dictionaries with minimal block coherence. Their existence remains poorly characterized. Most known EITFFs have parameters that match those of one that arose from an equiangular tight frame (ETF) in a rudimentary, direct-sum-based way. In this paper, we construct new infinite families of non-"tensor-sized" EITFFs in a way that generalizes the one previously known infinite family of them as well as the celebrated equivalence between harmonic ETFs and difference sets for finite abelian groups. In particular, we construct EITFFs consisting of $Q$ planes in $\mathbb{C}^Q$ for each prime power $Q\geq 4$, of $Q-1$ planes in $\mathbb{C}^Q$ for each odd prime power $Q$, and of $11$ three-dimensional subspaces in $\mathbb{R}^{11}$. The key idea is that every harmonic EITFF -- one that is the orbit of a single subspace under the action of a unitary representation of a finite abelian group -- arises from a smaller tight fusion frame with a nicely behaved "Fourier transform." Our particular constructions of harmonic EITFFs exploit the properties of Gauss sums over finite fields.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 19:06:03 GMT" } ]
2021-12-30T00:00:00
[ [ "Fickus", "Matthew", "" ], [ "Iverson", "Joseph W.", "" ], [ "Jasper", "John", "" ], [ "Mixon", "Dustin G.", "" ] ]
new_dataset
0.998135
2112.14298
Shan Luo Dr
Guanqun Cao and Shan Luo
Multimodal perception for dexterous manipulation
19 pages, 10 figures
null
null
null
cs.CV cs.RO
http://creativecommons.org/publicdomain/zero/1.0/
Humans usually perceive the world in a multimodal way that vision, touch, sound are utilised to understand surroundings from various dimensions. These senses are combined together to achieve a synergistic effect where the learning is more effectively than using each sense separately. For robotics, vision and touch are two key senses for the dexterous manipulation. Vision usually gives us apparent features like shape, color, and the touch provides local information such as friction, texture, etc. Due to the complementary properties between visual and tactile senses, it is desirable for us to combine vision and touch for a synergistic perception and manipulation. Many researches have been investigated about multimodal perception such as cross-modal learning, 3D reconstruction, multimodal translation with vision and touch. Specifically, we propose a cross-modal sensory data generation framework for the translation between vision and touch, which is able to generate realistic pseudo data. By using this cross-modal translation method, it is desirable for us to make up inaccessible data, helping us to learn the object's properties from different views. Recently, the attention mechanism becomes a popular method either in visual perception or in tactile perception. We propose a spatio-temporal attention model for tactile texture recognition, which takes both spatial features and time dimension into consideration. Our proposed method not only pays attention to the salient features in each spatial feature, but also models the temporal correlation in the through the time. The obvious improvement proves the efficiency of our selective attention mechanism. The spatio-temporal attention method has potential in many applications such as grasping, recognition, and multimodal perception.
[ { "version": "v1", "created": "Tue, 28 Dec 2021 21:20:26 GMT" } ]
2021-12-30T00:00:00
[ [ "Cao", "Guanqun", "" ], [ "Luo", "Shan", "" ] ]
new_dataset
0.998077
2112.14680
Sebastian Drost
Sebastian Drost, Arne Vogt, Christian Danowski-Buhren, Simon Jirka, Verena Kirstein, Kian Pakzad, and Matthes Rieke
WaCoDiS: Automated Earth Observation Data Processing within an Event-Driven Architecture for Water Monitoring
null
null
10.1016/j.cageo.2021.105003
null
cs.DC cs.SE
http://creativecommons.org/licenses/by/4.0/
To ensure an efficient and environmentally friendly water resource management, water management associations need means for efficient water monitoring as well as novel strategies to reduce the pollution of surface and ground water. Traditionally, water management associations operate large sensor networks to suffice their needs for hydrological and meteorological measurement data to monitor and model physical processes within catchments. Implementing a comprehensive monitoring system often suffers from sparse coverage of in-situ data. Due to the evolvement of the Copernicus satellite platforms, the broader availability of satellite data provides a great potential for deriving complementary information from Earth Observation data. Although the number of satellite data platforms that provide online processing environments is growing, it is still a big challenge to integrate those platforms into traditional workflows of users from environmental domains such as hydrology. Thus, in this paper, we introduce a software architecture to facilitate the generation of Earth Observation information targeted towards hydrology. The presented WaCoDiS System comprises several microservices as well standardized interfaces that enable a platform-independent processing of satellite data. First, we discuss the contribution of Earth Observation data to water monitoring and derive several challenges regarding the facilitation of satellite data processing. We then describe our system design with a brief overview about the different system components which form an automated processing pipeline. The suitability of our system is proven as part of a pre-operational deployment for a German water management association. In addition, we demonstrate how our system is capable of integrating satellite data platforms, using the Copernicus Data and Exploitation Platform - Deutschland (CODE-DE) as a reference example.
[ { "version": "v1", "created": "Thu, 23 Dec 2021 15:37:10 GMT" } ]
2021-12-30T00:00:00
[ [ "Drost", "Sebastian", "" ], [ "Vogt", "Arne", "" ], [ "Danowski-Buhren", "Christian", "" ], [ "Jirka", "Simon", "" ], [ "Kirstein", "Verena", "" ], [ "Pakzad", "Kian", "" ], [ "Rieke", "Matthes", "" ] ]
new_dataset
0.999432
2112.14719
Daniel Katz
Jonathan M. Castello, Daniel J. Katz, Jacob M. King, and Alain Olavarrieta
Sets of Low Correlation Sequences from Cyclotomy
52 pages
null
null
null
cs.IT cs.DM eess.SP math.CO math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low correlation (finite length) sequences are used in communications and remote sensing. One seeks codebooks of sequences in which each sequence has low aperiodic autocorrelation at all nonzero shifts, and each pair of distinct sequences has low aperiodic crosscorrelation at all shifts. An overall criterion of codebook quality is the demerit factor, which normalizes all sequences to unit Euclidean norm, sums the squared magnitudes of all the correlations between every pair of sequences in the codebook (including sequences with themselves to cover autocorrelations), and divides by the square of the number of sequences in the codebook. This demerit factor is expected to be $1+1/N-1/(\ell N)$ for a codebook of $N$ randomly selected binary sequences of length $\ell$, but we want demerit factors much closer to the absolute minimum value of $1$. For each $N$ such that there is an $N\times N$ Hadamard matrix, we use cyclotomy to construct an infinite family of codebooks of binary sequences, in which each codebook has $N-1$ sequences of length $p$, where $p$ runs through the primes with $N\mid p-1$. As $p$ tends to infinity, the demerit factor of the codebooks tends to $1+1/(6(N-1))$, and the maximum magnitude of the undesirable correlations (crosscorrelations between distinct sequences and off-peak autocorrelations) is less than a small constant times $\sqrt{p}\log(p)$. This construction also generalizes to nonbinary sequences.
[ { "version": "v1", "created": "Wed, 29 Dec 2021 18:22:46 GMT" } ]
2021-12-30T00:00:00
[ [ "Castello", "Jonathan M.", "" ], [ "Katz", "Daniel J.", "" ], [ "King", "Jacob M.", "" ], [ "Olavarrieta", "Alain", "" ] ]
new_dataset
0.994736
2112.14731
Shounak Paul
Shounak Paul, Pawan Goyal and Saptarshi Ghosh
LeSICiN: A Heterogeneous Graph-based Approach for Automatic Legal Statute Identification from Indian Legal Documents
This paper has been accepted at the Main Track of the AAAI Conference on Artificial Intelligence (AAAI) 2022. Dataset and codes are available at https://github.com/Law-AI/LeSICiN
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The task of Legal Statute Identification (LSI) aims to identify the legal statutes that are relevant to a given description of Facts or evidence of a legal case. Existing methods only utilize the textual content of Facts and legal articles to guide such a task. However, the citation network among case documents and legal statutes is a rich source of additional information, which is not considered by existing models. In this work, we take the first step towards utilising both the text and the legal citation network for the LSI task. We curate a large novel dataset for this task, including Facts of cases from several major Indian Courts of Law, and statutes from the Indian Penal Code (IPC). Modeling the statutes and training documents as a heterogeneous graph, our proposed model LeSICiN can learn rich textual and graphical features, and can also tune itself to correlate these features. Thereafter, the model can be used to inductively predict links between test documents (new nodes whose graphical features are not available to the model) and statutes (existing nodes). Extensive experiments on the dataset show that our model comfortably outperforms several state-of-the-art baselines, by exploiting the graphical structure along with textual features. The dataset and our codes are available at https://github.com/Law-AI/LeSICiN.
[ { "version": "v1", "created": "Wed, 29 Dec 2021 18:39:35 GMT" } ]
2021-12-30T00:00:00
[ [ "Paul", "Shounak", "" ], [ "Goyal", "Pawan", "" ], [ "Ghosh", "Saptarshi", "" ] ]
new_dataset
0.957975