Computer Science
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Fri, 3 Apr 20
 [1] arXiv:2004.00623 [pdf, other]

Title: Bayesian ODE Solvers: The Maximum A Posteriori EstimateSubjects: Numerical Analysis (math.NA); Methodology (stat.ME); Machine Learning (stat.ML)
It has recently been established that the numerical solution of ordinary differential equations can be posed as a nonlinear Bayesian inference problem, which can be approximately solved via Gaussian filtering and smoothing, whenever a GaussMarkov prior is used. In this paper the class of $\nu$ times differentiable linear time invariant GaussMarkov priors is considered. A taxonomy of Gaussian estimators is established, with the maximum a posteriori estimate at the top of the hierarchy, which can be computed with the iterated extended Kalman smoother. The remaining three classes are termed explicit, semiimplicit, and implicit, which are in similarity with the classical notions corresponding to conditions on the vector field, under which the filter update produces a local maximum a posteriori estimate. The maximum a posteriori estimate corresponds to an optimal interpolant in the reproducing Hilbert space associated with the prior, which in the present case is equivalent to a Sobolev space of smoothness $\nu+1$. Consequently, using methods from scattered data approximation and nonlinear analysis in Sobolev spaces, it is shown that the maximum a posteriori estimate converges to the true solution at a polynomial rate in the filldistance (maximum step size) subject to mild conditions on the vector field. The methodology developed provides a novel and more natural approach to study the convergence of these estimators than classical methods of convergence analysis. The methods and theoretical results are demonstrated in numerical examples.
 [2] arXiv:2004.00626 [pdf, other]

Title: Background Matting: The World is Your Green ScreenComments: Accepted to CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
We propose a method for creating a matte  the perpixel foreground color and alpha  of a person by taking photos or videos in an everyday setting with a handheld camera. Most existing matting methods require a green screen background or a manually created trimap to produce a good matte. Automatic, trimapfree methods are appearing, but are not of comparable quality. In our trimap free approach, we ask the user to take an additional photo of the background without the subject at the time of capture. This step requires a small amount of foresight but is far less timeconsuming than creating a trimap. We train a deep network with an adversarial loss to predict the matte. We first train a matting network with supervised loss on ground truth data with synthetic composites. To bridge the domain gap to real imagery with no labeling, we train another matting network guided by the first network and by a discriminator that judges the quality of composites. We demonstrate results on a wide variety of photos and videos and show significant improvement over the state of the art.
 [3] arXiv:2004.00642 [pdf, other]

Title: ObjectCentric Image Generation with Factored Depths, Locations, and AppearancesSubjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
We present a generative model of images that explicitly reasons over the set of objects they show. Our model learns a structured latent representation that separates objects from each other and from the background; unlike prior works, it explicitly represents the 2D position and depth of each object, as well as an embedding of its segmentation mask and appearance. The model can be trained from images alone in a purely unsupervised fashion without the need for object masks or depth information. Moreover, it always generates complete objects, even though a significant fraction of training images contain occlusions. Finally, we show that our model can infer decompositions of novel images into their constituent objects, including accurate prediction of depth ordering and segmentation of occluded parts.
 [4] arXiv:2004.00646 [pdf, other]

Title: A Survey on Conversational Recommender SystemsComments: 35 pages, 5 figures. Submitted for publicationSubjects: HumanComputer Interaction (cs.HC); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)
Recommender systems are software applications that help users to find items of interest in situations of information overload. Current research often assumes a oneshot interaction paradigm, where the users' preferences are estimated based on past observed behavior and where the presentation of a ranked list of suggestions is the main, onedirectional form of user interaction. Conversational recommender systems (CRS) take a different approach and support a richer set of interactions. These interactions can, for example, help to improve the preference elicitation process or allow the user to ask questions about the recommendations and to give feedback. The interest in CRS has significantly increased in the past few years. This development is mainly due to the significant progress in the area of natural language processing, the emergence of new voicecontrolled home assistants, and the increased use of chatbot technology. With this paper, we provide a detailed survey of existing approaches to conversational recommendation. We categorize these approaches in various dimensions, e.g., in terms of the supported user intents or the knowledge they use in the background. Moreover, we discuss technological approaches, review how CRS are evaluated, and finally identify a number of gaps that deserve more research in the future.
 [5] arXiv:2004.00648 [pdf, ps, other]

Title: IgboEnglish Machine Translation: An Evaluation BenchmarkComments: 4 pagesSubjects: Computation and Language (cs.CL); Machine Learning (cs.LG)
Although researchers and practitioners are pushing the boundaries and enhancing the capacities of NLP tools and methods, works on African languages are lagging. A lot of focus on well resourced languages such as English, Japanese, German, French, Russian, Mandarin Chinese etc. Over 97% of the world's 7000 languages, including African languages, are low resourced for NLP i.e. they have little or no data, tools, and techniques for NLP research. For instance, only 5 out of 2965, 0.19% authors of full text papers in the ACL Anthology extracted from the 5 major conferences in 2018 ACL, NAACL, EMNLP, COLING and CoNLL, are affiliated to African institutions. In this work, we discuss our effort toward building a standard machine translation benchmark dataset for Igbo, one of the 3 major Nigerian languages. Igbo is spoken by more than 50 million people globally with over 50% of the speakers are in southeastern Nigeria. Igbo is low resourced although there have been some efforts toward developing IgboNLP such as part of speech tagging and diacritic restoration
 [6] arXiv:2004.00655 [pdf, other]

Title: Parameterized Analysis of Assignment Under Multiple PreferencesComments: 43 pages, 11 figuresSubjects: Data Structures and Algorithms (cs.DS)
The Assignment problem is a fundamental, wellstudied problem in the intersection of Social Choice, Computational Economics and Discrete Allocation. In the Assignment problem, we seek a pareto optimal allocation of items to agents given the preferences of the agents. We introduce a generalized version of this problem, where each agent is equipped with multiple incomplete preference lists: each list (called a layer) is a ranking of items in a possibly different way according to a different criterion. We introduce a new concept of pareto optimality, and study the generalized version of the problem from the perspective of Parameterized Complexity. Here, we consider several natural parameters such as the number of layers, number of agents, number of items, and maximal length of a preference list; we present a comprehensive picture of the parameterized complexity of the problem with respect to these parameters.
 [7] arXiv:2004.00658 [pdf, other]

Title: Sequential Feature Classification in the Context of RedundanciesComments: WIPSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
The problem of allrelevant feature selection is concerned with finding a relevant feature set with preserved redundancies. There exist several approximations to solve this problem but only one could give a distinction between strong and weak relevance. This approach was limited to the case of linear problems. In this work, we present a new solution for this distinction in the nonlinear case through the use of random forest models and statistical methods.
 [8] arXiv:2004.00660 [pdf, ps, other]

Title: Network Orchestration in Mobile Networks via a Synergy of Modeldriven and AIbased TechniquesComments: 6 pages, 3 figures, the conference accepted versionSubjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
As data traffic volume continues to increase, caching of popular content at strategic network locations closer to the end user can enhance not only user experience but ease the utilization of highly congested links in the network. A key challenge in the area of proactive caching is finding the optimal locations to host the popular content items under various optimization criteria. These problems are combinatorial in nature and therefore finding optimal and/or near optimal decisions is computationally expensive. In this paper a framework is proposed to reduce the computational complexity of the underlying integer mathematical program by first predicting decision variables related to optimal locations using a deep convolutional neural network (CNN). The CNN is trained in an offline manner with optimal solutions and is then used to feed a much smaller optimization problems which is amenable for realtime decision making. Numerical investigations reveal that the proposed approach can provide in an online manner high quality decision making; a feature which is crucially important for realworld implementations.
 [9] arXiv:2004.00662 [pdf, other]

Title: Bayesian Safe Learning and Control with SumofSquares Analysis and Polynomial KernelsComments: 8 pages, 3 figures. Submission to IEEE CDC 2020Subjects: Systems and Control (eess.SY)
We propose an iterative method to safely learn the unmodeled dynamics of a nonlinear system using Bayesian Gaussian process (GP) models with polynomial kernel functions. The method maintains safety by ensuring that the system state stays within the region of attraction (ROA) of a stabilizing control policy while collecting data. A quadratic programming based exploration control policy is computed to keep the exploration trajectory inside an innerapproximation of the ROA and to maximize the information gained from the trajectory. A prior GP model, which incorporates prior information about the unknown dynamics, is used to construct an initial stabilizing policy. As the GP model is updated with data, it is used to synthesize a new policy and a larger ROA, which increases the range of safe exploration. The use of polynomial kernels allows us to compute ROA innerapproximations and stabilizing control laws for the model using sumofsquares programming. We also provide a probabilistic guarantee of safety which ensures that the policy computed using the learned model stabilizes the true dynamics with high confidence.
 [10] arXiv:2004.00663 [pdf, other]

Title: Synchronizing Probability Measures on Rotations via Optimal TransportComments: Accepted for publication at CVPR 2020, includes supplementary material. Project website: this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR); Machine Learning (cs.LG); Robotics (cs.RO); Machine Learning (stat.ML)
We introduce a new paradigm, $\textit{measure synchronization}$, for synchronizing graphs with measurevalued edges. We formulate this problem as maximization of the cycleconsistency in the space of probability measures over relative rotations. In particular, we aim at estimating marginal distributions of absolute orientations by synchronizing the $\textit{conditional}$ ones, which are defined on the Riemannian manifold of quaternions. Such graph optimization on distributionsonmanifolds enables a natural treatment of multimodal hypotheses, ambiguities and uncertainties arising in many computer vision applications such as SLAM, SfM, and object pose estimation. We first formally define the problem as a generalization of the classical rotation graph synchronization, where in our case the vertices denote probability measures over rotations. We then measure the quality of the synchronization by using Sinkhorn divergences, which reduces to other popular metrics such as Wasserstein distance or the maximum mean discrepancy as limit cases. We propose a nonparametric Riemannian particle optimization approach to solve the problem. Even though the problem is nonconvex, by drawing a connection to the recently proposed sparse optimization methods, we show that the proposed algorithm converges to the global optimum in a special case of the problem under certain conditions. Our qualitative and quantitative experiments show the validity of our approach and we bring in new perspectives to the study of synchronization.
 [11] arXiv:2004.00666 [pdf, other]

Title: Generalized ZeroShot Learning Via OverComplete DistributionComments: 9 pages, 5 figures, Accepted in CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
A well trained and generalized deep neural network (DNN) should be robust to both seen and unseen classes. However, the performance of most of the existing supervised DNN algorithms degrade for classes which are unseen in the training set. To learn a discriminative classifier which yields good performance in ZeroShot Learning (ZSL) settings, we propose to generate an OverComplete Distribution (OCD) using Conditional Variational Autoencoder (CVAE) of both seen and unseen classes. In order to enforce the separability between classes and reduce the class scatter, we propose the use of Online Batch Triplet Loss (OBTL) and Center Loss (CL) on the generated OCD. The effectiveness of the framework is evaluated using both ZeroShot Learning and Generalized ZeroShot Learning protocols on three publicly available benchmark databases, SUN, CUB and AWA2. The results show that generating overcomplete distributions and enforcing the classifier to learn a transform function from overlapping to nonoverlapping distributions can improve the performance on both seen and unseen classes.
 [12] arXiv:2004.00668 [pdf, other]

Title: Understanding Global Feature Contributions Through Additive Importance MeasuresSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
Understanding the inner workings of complex machine learning models is a longstanding problem, with recent research focusing primarily on local interpretability. To assess the role of individual input features in a global sense, we propose a new feature importance method, Shapley Additive Global importancE (SAGE), a modelagnostic measure of feature importance based on the predictive power associated with each feature. SAGE relates to prior work through the novel framework of additive importance measures, a perspective that unifies numerous other feature importance methods and shows that only SAGE properly accounts for complex feature interactions. We define SAGE using the Shapley value from cooperative game theory, which leads to numerous intuitive and desirable properties. Our experiments apply SAGE to eight datasets, including MNIST and breast cancer subtype classification, and demonstrate its advantages through quantitative and qualitative evaluations.
 [13] arXiv:2004.00677 [pdf, other]

Title: Subspace Decomposition for Graphon LQR: Applications to VLSNs of Harmonic OscillatorsComments: Submitted on Feb 28, 2020Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)
Graphon control has been proposed and developed in [Gao and Caines CDC 2017, 2018, 2019, TAC 2020) to approximately solve control problems for very largescale networks of linear dynamical systems. In this paper, linear quadratic regulation (LQR) problems for graphon dynamical systems are studied. Graphon couplings appear in states, controls and cost, and these couplings may be represented by different graphons. Based on invariant subspace decompositions, this work provides a solution method for a class of such problems where the local dynamics is homogeneous but the network couplings are heterogeneous among the coupled subsystems. By exploring a common invariant subspace of the couplings, the original problem is decomposed into a network coupled LQR problem of finite dimension and a decoupled infinite dimensional LQR problem. A centralized optimal solution and a nodal collaborative optimal control solution are established. The complexity of these solutions involves solving one nd X nd dimensional Riccati equation and one n X n Riccati equation, where n is the dimension of each nodal agent state and d is the dimension of the (nontrivial) invariant subspace shared by the coupling operators. For situations where the graphon couplings do not admit exact lowrank representations, approximate control is developed based on lowrank approximations. Finally, an application to the regulation of harmonic oscillators coupled over large networks with uncertainties is demonstrated.
 [14] arXiv:2004.00679 [pdf, ps, other]

Title: LQG Graphon Mean Field GamesComments: As submitted on March 31, 2020 to the IEEE Conference on Decisions and ControlSubjects: Systems and Control (eess.SY); Optimization and Control (math.OC)
This paper formulates infinite dimensional graphon dynamical systems to study the limit problem of linear quadratic Gaussian graphon mean field game (LQGGMFG). The limit problem is characterized by forward and backward graphon dynamical system equations. Based on this representation, sufficient conditions on the existence of a unique fixed point are established. Furthermore, under the finite rank assumption on the underlying graphon, exact numerical solution methods are presented.
 [15] arXiv:2004.00685 [pdf, other]

Title: A Sensorized Multicurved Robot Finger with Datadriven Touch Sensing via Overlapping Light SignalsComments: To be published in IEEE/ASME Transactions on Mechatronics. this https URLSubjects: Robotics (cs.RO)
Despite significant advances in touch and force transduction, tactile sensing is still far from ubiquitous in robotic manipulation. Existing methods for building touch sensors have proven difficult to integrate into robot fingers due to multiple challenges, including difficulty in covering multicurved surfaces, high wire count, or packaging constrains preventing their use in dexterous hands. In this paper, we present a multicurved robotic finger with accurate touch localization and normal force detection over complex, threedimensional surfaces. The key to our approach is the novel use of overlapping signals from light emitters and receivers embedded in a transparent waveguide layer that covers the functional areas of the finger. By measuring light transport between every emitter and receiver, we show that we can obtain a very rich signal set that changes in response to deformation of the finger due to touch. We then show that purely datadriven deep learning methods are able to extract useful information from such data, such as contact location and applied normal force, without the need for analytical models. The final result is a fully integrated, sensorized robot finger, with a low wire count and using easily accessible manufacturing methods, designed for easy integration into dexterous manipulators.
 [16] arXiv:2004.00686 [pdf, other]

Title: Bias in Machine Learning What is it Good (and Bad) for?Subjects: Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
In public media as well as in scientific publications, the term \emph{bias} is used in conjunction with machine learning in many different contexts, and with many different meanings. This paper proposes a taxonomy of these different meanings, terminology, and definitions by surveying the, primarily scientific, literature on machine learning. In some cases, we suggest extensions and modifications to promote a clear terminology and completeness. The survey is followed by an analysis and discussion on how different types of biases are connected and depend on each other. We conclude that there is a complex relation between bias occurring in the machine learning pipeline that leads to a model, and the eventual bias of the model (which is typically related to social discrimination). The former bias may or may not influence the latter, in a sometimes bad, and sometime good way.
 [17] arXiv:2004.00689 [pdf, other]

Title: Robots in the Danger Zone: Exploring Public Perception through EngagementAuthors: David A. Robb, Muneeb I. Ahmad, Carlo Tiseo, Simona Aracri, Alistair C. McConnell, Vincent Page, Christian Dondrup, Francisco J. Chiyah Garcia, HaiNguyen Nguyen, Èric Pairet, Paola Ardón Ramírez, Tushar Semwal, Hazel M. Taylor, Lindsay J. Wilson, David Lane, Helen Hastie, Katrin LohanComments: Accepted in HRI 2020, Keywords: Human robot interaction, robotics, artificial intelligence, public engagement, public perceptions of robots, robotics and societyJournalref: In HumanRobot Interaction HRI 2020, ACM, NY, USA, 10 pagesSubjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); HumanComputer Interaction (cs.HC); Robotics (cs.RO)
Public perceptions of Robotics and Artificial Intelligence (RAI) are important in the acceptance, uptake, government regulation and research funding of this technology. Recent research has shown that the public's understanding of RAI can be negative or inaccurate. We believe effective public engagement can help ensure that public opinion is better informed. In this paper, we describe our first iteration of a high throughput inperson public engagement activity. We describe the use of a light touch quizformat survey instrument to integrate inthewild research participation into the engagement, allowing us to probe both the effectiveness of our engagement strategy, and public perceptions of the future roles of robots and humans working in dangerous settings, such as in the offshore energy sector. We critique our methods and share interesting results into generational differences within the public's view of the future of Robotics and AI in hazardous environments. These findings include that older peoples' views about the future of robots in hazardous environments were not swayed by exposure to our exhibit, while the views of younger people were affected by our exhibit, leading us to consider carefully in future how to more effectively engage with and inform older people.
 [18] arXiv:2004.00693 [pdf, other]

Title: The lowestorder stabilizer free Weak Galerkin Finite Element MethodSubjects: Numerical Analysis (math.NA)
Recently, a new stabilizer free weak Galerkin method (SFWG) is proposed, which is easier to implement and more efficient. The main idea is that by letting $j\geq j_{0}$ for some $j_{0}$, where $j$ is the degree of the polynomials used to compute the weak gradients, then the stabilizer term in the regular weak Galerkin method is no longer needed. Later on in \cite{al2019note}, the optimal of such $j_{0}$ for certain types of finite element spaces was given. In this paper, we propose a new efficient SFWG scheme using the lowest possible orders of piecewise polynomials for triangular meshes in $2 D$ with the optimal order of convergence.
 [19] arXiv:2004.00698 [pdf, other]

Title: Adversarial Learning for Personalized Tag RecommendationSubjects: Computer Vision and Pattern Recognition (cs.CV); Information Retrieval (cs.IR); Machine Learning (cs.LG)
We have recently seen great progress in image classification due to the success of deep convolutional neural networks and the availability of largescale datasets. Most of the existing work focuses on singlelabel image classification. However, there are usually multiple tags associated with an image. The existing works on multilabel classification are mainly based on lab curated labels. Humans assign tags to their images differently, which is mainly based on their interests and personal tagging behavior. In this paper, we address the problem of personalized tag recommendation and propose an endtoend deep network which can be trained on largescale datasets. The userpreference is learned within the network in an unsupervised way where the network performs joint optimization for userpreference and visual encoding. A joint training of userpreference and visual encoding allows the network to efficiently integrate the visual preference with tagging behavior for a better user recommendation. In addition, we propose the use of adversarial learning, which enforces the network to predict tags resembling usergenerated tags. We demonstrate the effectiveness of the proposed model on two different largescale and publicly available datasets, YFCC100M and NUSWIDE. The proposed method achieves significantly better performance on both the datasets when compared to the baselines and other stateoftheart methods. The code is publicly available at https://github.com/vyzuer/ALTReco.
 [20] arXiv:2004.00701 [pdf, other]

Title: An Exploratory Study of Writing and Revising Explicit Programming StrategiesSubjects: Software Engineering (cs.SE); HumanComputer Interaction (cs.HC)
Knowledge sharing plays a crucial role throughout all software application development activities. When programmers learn and share through media like Stack overflow, GitHub, Meetups, videos, discussion forums, wikis, and blogs, every developer benefits. However, there is one kind of knowledge that developers share far less often: strategic knowledge for how to approach programming problems (e.g., how to debug serverside Python errors, how to resolve a merge conflict, how to evaluate the stability of an API one is considering for adoption). In this paper, we investigate the feasibility of developers articulating and sharing their strategic knowledge, and the use of these strategies to support other developers in their problemsolving. We specifically investigate challenges that developers face in articulating strategies in a form in which other developers can use to increase their productivity. To observe this, we simulated a knowledgesharing platform, asking experts to articulate one of their own strategies and then asked the second set of developers to try to use the strategies and provide feedback on the strategies to authors. During the study, we asked both strategy authors and users to reflect on the challenges they faced. In analyzing the strategies authors created, the use of the strategies, the feedback that users provided to authors, and the difficulties that authors faced addressing this feedback, we found that developers can share strategic knowledge, but authoring strategies require substantial feedback from diverse audiences to be helpful to programmers with varying prior knowledge. Our results also raise challenging questions about how future work should support searching and browsing for strategies that support varying prior knowledge.
 [21] arXiv:2004.00703 [pdf, other]

Title: A Hybrid FeMFETCMOS Analog Synapse Circuit for Neural Network Training and InferenceComments: Accepted at ISCAS'20 for oral presentationSubjects: Emerging Technologies (cs.ET)
An analog synapse circuit based on ferroelectricmetal fieldeffect transistors is proposed, that offers 6bit weight precision. The circuit is comprised of volatile least significant bits (LSBs) used solely during training, and nonvolatile most significant bits (MSBs) used for both training and inference. The design works at a 1.8V logiccompatible voltage, provides 10^10 endurance cycles, and requires only 250ps update pulses. A variant of LeNet trained with the proposed synapse achieves 98.2% accuracy on MNIST, which is only 0.4% lower than an ideal implementation of the same network with the same bit precision. Furthermore, the proposed synapse offers improvements of up to 26% in area, 44.8% in leakage power, 16.7% in LSB update pulse duration, and two orders of magnitude in endurance cycles, when compared to stateoftheart hybrid synaptic circuits. Our proposed synapse can be extended to an 8bit design, enabling a VGGlike network to achieve 88.8% accuracy on CIFAR10 (only 0.8% lower than an ideal implementation of the same network).
 [22] arXiv:2004.00705 [pdf, other]

Title: Revisiting PoseNormalization for FineGrained FewShot RecognitionComments: To appear in CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
Fewshot, finegrained classification requires a model to learn subtle, finegrained distinctions between different classes (e.g., birds) based on a few images alone. This requires a remarkable degree of invariance to pose, articulation and background. A solution is to use posenormalized representations: first localize semantic parts in each image, and then describe images by characterizing the appearance of each part. While such representations are out of favor for fully supervised classification, we show that they are extremely effective for fewshot finegrained classification. With a minimal increase in model capacity, pose normalization improves accuracy between 10 and 20 percentage points for shallow and deep architectures, generalizes better to new domains, and is effective for multiple fewshot algorithms and network backbones. Code is available at https://github.com/Tsingularity/PoseNorm_Fewshot
 [23] arXiv:2004.00711 [pdf, ps, other]

Title: The Pade Approximant Based Network for Variational ProblemsSubjects: Numerical Analysis (math.NA); Signal Processing (eess.SP)
In solving the variational problem, the key is to efficiently find the target function that minimizes or maximizes the specified functional. In this paper, by using the Pade approximant, we suggest a methods for the variational problem. By comparing the method with those based on the radial basis function networks (RBF), the multilayer perception networks (MLP), and the Legendre polynomials, we show that the method searches the target function effectively and efficiently.
 [24] arXiv:2004.00713 [pdf, other]

Title: MemoryEfficient Incremental Learning Through Feature AdaptationSubjects: Computer Vision and Pattern Recognition (cs.CV)
In this work we introduce an approach for incremental learning, which preserves feature descriptors instead of images unlike most existing work. Keeping such lowdimensional embeddings instead of images reduces the memory footprint significantly. We assume that the model is updated incrementally for new classes as new data becomes available sequentially. This requires adapting the previously stored feature vectors to the updated feature space without having access to the corresponding images. Feature adaptation is learned with a multilayer perceptron, which is trained on feature pairs of an image corresponding to the outputs of the original and updated network. We validate experimentally that such a transformation generalizes well to the features of the previous set of classes, and maps features to a discriminative subspace in the feature space. As a result, the classifier is optimized jointly over new and old classes without requiring old class images. Experimental results show that our method achieves stateoftheart classification accuracy in incremental learning benchmarks, while having at least an order of magnitude lower memory footprint compared to image preserving strategies.
 [25] arXiv:2004.00716 [pdf, other]

Title: ConstrainedSpace Optimization and Reinforcement Learning for Complex TasksComments: Accepted for publication in RALetters and at ICRA 2020Journalref: IEEE Robotics and Automation Letters, 5(2) (2020) 682689Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
Learning from Demonstration is increasingly used for transferring operator manipulation skills to robots. In practice, it is important to cater for limited data and imperfect human demonstrations, as well as underlying safety constraints. This paper presents a constrainedspace optimization and reinforcement learning scheme for managing complex tasks. Through interactions within the constrained space, the reinforcement learning agent is trained to optimize the manipulation skills according to a defined reward function. After learning, the optimal policy is derived from the welltrained reinforcement learning agent, which is then implemented to guide the robot to conduct tasks that are similar to the experts' demonstrations. The effectiveness of the proposed method is verified with a robotic suturing task, demonstrating that the learned policy outperformed the experts' demonstrations in terms of the smoothness of the joint motion and endeffector trajectories, as well as the overall task completion time.
 [26] arXiv:2004.00722 [pdf, ps, other]

Title: kMedian clustering under discrete Fréchet and Hausdorff distancesComments: A shorter version to appear in SoCG 2020Subjects: Computational Geometry (cs.CG)
We give the first nearlinear time $(1+\eps)$approximation algorithm for $k$median clustering of polygonal trajectories under the discrete Fr\'{e}chet distance, and the first polynomial time $(1+\eps)$approximation algorithm for $k$median clustering of finite point sets under the Hausdorff distance, provided the cluster centers, ambient dimension, and $k$ are bounded by a constant. The main technique is a general framework for solving clustering problems where the cluster centers are restricted to come from a \emph{simpler} metric space. We precisely characterize conditions on the simpler metric space of the cluster centers that allow faster $(1+\eps)$approximations for the $k$median problem. We also show that the $k$median problem under Hausdorff distance is \textsc{NPHard}.
 [27] arXiv:2004.00732 [pdf, other]

Title: Robust Single Rotation AveragingSubjects: Computer Vision and Pattern Recognition (cs.CV)
We propose a novel method for single rotation averaging using the Weiszfeld algorithm. Our contribution is threefold: First, we propose a robust initialization based on the elementwise median of the input rotation matrices. Our initial solution is more accurate and robust than the commonly used chordal $L_2$mean. Second, we propose an outlier rejection scheme that can be incorporated in the Weiszfeld algorithm to improve the robustness of $L_1$ rotation averaging. Third, we propose a method for approximating the chordal $L_1$mean using the Weiszfeld algorithm. An extensive evaluation shows that both our method and the state of the art perform equally well with the proposed outlier rejection scheme, but ours is $24$ times faster.
 [28] arXiv:2004.00740 [pdf, other]

Title: Monocular Camera Localization in Prior LiDAR Maps with 2D3D Line CorrespondencesComments: Submitted to IROS 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
Lightweight camera localization in existing maps is essential for visionbased navigation. Currently, visual and visualinertial odometry (VO\&VIO) techniques are welldeveloped for state estimation but with inevitable accumulated drifts and pose jumps upon loop closure. To overcome these problems, we propose an efficient monocular camera localization method in prior LiDAR maps using directly estimated 2D3D line correspondences. To handle the appearance differences and modality gaps between untextured point clouds and images, geometric 3D lines are extracted offline from LiDAR maps while robust 2D lines are extracted online from video sequences. With the pose prediction from VIO, we can efficiently obtain coarse 2D3D line correspondences. After that, the camera poses and 2D3D correspondences are iteratively optimized by minimizing the projection error of correspondences and rejecting outliers. The experiment results on the EurocMav dataset and our collected dataset demonstrate that the proposed method can efficiently estimate camera poses without accumulated drifts or pose jumps in urban environments. The code and our collected data are available at https://github.com/levenberg/2D3Dposetracking.
 [29] arXiv:2004.00742 [pdf, other]

Title: #ArsonEmergency and Australia's "Black Summer": Polarisation and misinformation on social mediaComments: 15 pages, 8 images, accepted by the 2nd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM 2020), Leiden University, The NetherlandsSubjects: Social and Information Networks (cs.SI)
During the summer of 201920, while Australia suffered unprecedented bushfires across the country, false narratives regarding arson and limited backburning spread quickly on Twitter, particularly using the hashtag #ArsonEmergency. Misinformation and bot and trolllike behaviour were detected and reported by social media researchers and the news soon reached mainstream media. This paper examines the communication and behaviour of two polarised online communities before and after news of the misinformation became public knowledge. Specifically, the Supporter community actively engaged with others to spread the hashtag, using a variety of news sources pushing the arson narrative, while the Opposer community engaged less, retweeted more, and focused its use of URLs to link to mainstream sources, debunking the narratives and exposing the anomalous behaviour. This influenced the content of the broader discussion. Bot analysis revealed the active accounts were predominantly human, but behavioural and content analysis suggests Supporters engaged in trolling, though both communities used aggressive language.
 [30] arXiv:2004.00749 [pdf]

Title: Learned and Controlled Autonomous Robotic Exploration in an Extreme, Unknown EnvironmentComments: Published in: 2019 IEEE Aerospace Conference Date of Conference: 29 March 2019 Date Added to IEEE Xplore: 20 June 2019Subjects: Robotics (cs.RO)
Exploring and traversing extreme terrain with surface robots is difficult, but highly desirable for many applications, including exploration of planetary surfaces, search and rescue, among others. For these applications, to ensure the robot can predictably locomote, the interaction between the terrain and vehicle, terramechanics, must be incorporated into the model of the robot's locomotion. Modeling terramechanic effects is difficult and may be impossible in situations where the terrain is not known a priori. For these reasons, learning a terramechanics model online is desirable to increase the predictability of the robot's motion. A problem with previous implementations of learning algorithms is that the terramechanics model and corresponding generated control policies are not easily interpretable or extensible. If the models were of interpretable form, designers could use the learned models to inform vehicle and/or control design changes to refine the robot architecture for future applications. This paper explores a new method for learning a terramechanics model and a control policy using a modelbased genetic algorithm. The proposed method yields an interpretable model, which can be analyzed using preexisting analysis methods. The paper provides simulation results that show for a practical application, the genetic algorithm performance is approximately equal to the performance of a stateoftheart neural network approach, which does not provide an easily interpretable model.
 [31] arXiv:2004.00750 [pdf, ps, other]

Title: Terrain Visibility Graphs: Persistence is Not EnoughComments: To appear in SoCG 2020Subjects: Computational Geometry (cs.CG)
In this paper, we consider the Visibility Graph Recognition and Reconstruction problems in the context of terrains. Here, we are given a graph $G$ with labeled vertices $v_0, v_1, \ldots, v_{n1}$ such that the labeling corresponds with a Hamiltonian path $H$. $G$ also may contain other edges. We are interested in determining if there is a terrain $T$ with vertices $p_0, p_1, \ldots, p_{n1}$ such that $G$ is the visibility graph of $T$ and the boundary of $T$ corresponds with $H$. $G$ is said to be persistent if and only if it satisfies the socalled Xproperty and Barproperty. It is known that every "pseudoterrain" has a persistent visibility graph and that every persistent graph is the visibility graph for some pseudoterrain. The connection is not as clear for (geometric) terrains. It is known that the visibility graph of any terrain $T$ is persistent, but it has been unclear whether every persistent graph $G$ has a terrain $T$ such that $G$ is the visibility graph of $T$. There actually have been several papers that claim this to be the case (although no formal proof has ever been published), and recent works made steps towards building a terrain reconstruction algorithm for any persistent graph. In this paper, we show that there exists a persistent graph $G$ that is not the visibility graph for any terrain $T$. This means persistence is not enough by itself to characterize the visibility graphs of terrains, and implies that pseudoterrains are not stretchable.
 [32] arXiv:2004.00756 [pdf, other]

Title: A Countylevel Dataset for Informing the United States' Response to COVID19Authors: Benjamin D. Killeen, Jie Ying Wu, Kinjal Shah, Anna Zapaishchykova, Philipp Nikutta, Aniruddha Tamhane, Shreya Chakraborty, Jinchi Wei, Tiger Gao, Mareike Thies, Mathias UnberathSubjects: Computers and Society (cs.CY); Databases (cs.DB); Physics and Society (physics.socph); Populations and Evolution (qbio.PE)
As the coronavirus disease 2019 (COVID19) becomes a global pandemic, policy makers must enact interventions to stop its spread. Data driven approaches might supply information to support the implementation of mitigation and suppression strategies. To facilitate research in this direction, we present a machinereadable dataset that aggregates relevant data from governmental, journalistic, and academic sources on the county level. In addition to countylevel timeseries data from the JHU CSSE COVID19 Dashboard, our dataset contains more than 300 variables that summarize population estimates, demographics, ethnicity, housing, education, employment and in come, climate, transit scores, and healthcare systemrelated metrics. Furthermore, we present aggregated outofhome activity information for various points of interest for each county, including grocery stores and hospitals, summarizing data from SafeGraph. By collecting these data, as well as providing tools to read them, we hope to aid researchers investigating how the disease spreads and which communities are best able to accommodate stayathome mitigation efforts. Our dataset and associated code are available at https://github.com/JieYingWu/COVID19_US_Countylevel_Summaries.
 [33] arXiv:2004.00759 [pdf, other]

Title: Safe ZeroShot ModelBased Learning and Control: A Wasserstein Distributionally Robust ApproachComments: In review for CDC20Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)
This paper explores distributionally robust zeroshot modelbased learning and control using Wasserstein ambiguity sets. Conventional modelbased reinforcement learning algorithms struggle to guarantee feasibility throughout the online learning process. We address this open challenge with the following approach. Using a stochastic modelpredictive control (MPC) strategy, we augment safety constraints with affine random variables corresponding to the instantaneous empirical distributions of modeling error. We obtain these distributions by evaluating model residuals in real time throughout the online learning process. By optimizing over the worst case modeling error distribution defined within a Wasserstein ambiguity set centered about our empirical distributions, we can approach the nominal constraint boundary in a provably safe way. We validate the performance of our approach using a case study of lithiumion battery fast charging, a relevant and safetycritical energy systems control application. Our results demonstrate marked improvements in safety compared to a basic learning modelpredictive controller, with constraints satisfied at every instance during online learning and control.
 [34] arXiv:2004.00760 [pdf, other]

Title: Consistent Multiple Sequence DecodingSubjects: Computer Vision and Pattern Recognition (cs.CV)
Sequence decoding is one of the core components of most visuallingual models. However, typical neural decoders when faced with decoding multiple, possibly correlated, sequences of tokens resort to simple independent decoding schemes. In this paper, we introduce a consistent multiple sequence decoding architecture, which is while relatively simple, is general and allows for consistent and simultaneous decoding of an arbitrary number of sequences. Our formulation utilizes a consistency fusion mechanism, implemented using message passing in a Graph Neural Network (GNN), to aggregate context from related decoders. This context is then utilized as a secondary input, in addition to previously generated output, to make a prediction at a given step of decoding. Selfattention, in the GNN, is used to modulate the fusion mechanism locally at each node and each step in the decoding process. We show the efficacy of our consistent multiple sequence decoder on the task of dense relational image captioning and illustrate stateoftheart performance (+ 5.2% in mAP) on the task. More importantly, we illustrate that the decoded sentences, for the same regions, are more consistent (improvement of 9.5%), while across images and regions maintain diversity.
 [35] arXiv:2004.00761 [pdf]

Title: A Primer on Bandwidth Parts in 5G New RadioComments: 7 pages, 3 figures, 2 tablesSubjects: Networking and Internet Architecture (cs.NI)
The fifth generation (5G) wireless access technology, known as New Radio (NR), features flexibility to support a variety of usage scenarios. One of the basic concepts in 5G NR is bandwidth part (BWP), which is, at a high level, a set of contiguous resource blocks configured inside a channel bandwidth. BWP spans across many 5G NR specifications developed by the 3rd Generation Partnership Project. Understanding how BWP operates is vital to understanding 5G NR. This article provides an overview of the essentials of BWP in the NR technical specifications. We describe fundamental BWP concepts, BWP configuration methods, and BWP switch mechanisms. We also discuss user equipment capabilities in terms of BWP support and share our thoughts on use cases of BWP for NR deployments.
 [36] arXiv:2004.00762 [pdf, other]

Title: In Automation We Trust: Investigating the Role of Uncertainty in Active Learning SystemsSubjects: Machine Learning (cs.LG); HumanComputer Interaction (cs.HC); Machine Learning (stat.ML)
We investigate how different active learning (AL) query policies coupled with classification uncertainty visualizations affect analyst trust in automated classification systems. A current standard policy for AL is to query the oracle (e.g., the analyst) to refine labels for datapoints where the classifier has the highest uncertainty. This is an optimal policy for the automation system as it yields maximal information gain. However, modelcentric policies neglect the effects of this uncertainty on the human component of the system and the consequent manner in which the human will interact with the system posttraining. In this paper, we present an empirical study evaluating how AL query policies and visualizations lending transparency to classification influence trust in automated classification of image data. We found that query policy significantly influences an analyst's trust in an image classification system, and we use these results to propose a set of oracle query policies and visualizations for use during AL training phases that can influence analyst trust in classification.
 [37] arXiv:2004.00768 [pdf, other]

Title: Software Language Comprehension using a ProgramDerived Semantic GraphSubjects: Artificial Intelligence (cs.AI); Programming Languages (cs.PL)
Traditional code transformation structures, such as an abstract syntax tree, may have limitations in their ability to extract semantic meaning from code. Others have begun to work on this issue, such as the stateoftheart Aroma system and its simplified parse tree (SPT). Continuing this research direction, we present a new graphical structure to capture semantics from code using what we refer to as a programderived semantic graph (PSG). The principle behind the PSG is to provide a single structure that can capture program semantics at many levels of granularity. Thus, the PSG is hierarchical in nature. Moreover, because the PSG may have cycles due to dependencies in semantic layers, it is a graph, not a tree. In this paper, we describe the PSG and its fundamental structural differences to the Aroma's SPT. Although our work in the PSG is in its infancy, our early results indicate it is a promising new research direction to explore to automatically extract program semantics.
 [38] arXiv:2004.00773 [pdf, other]

Title: A Blockchainbased Decentralized Federated Learning Framework with Committee ConsensusComments: 7 pages, 4 figures and 1 tableSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)
Federated learning has been widely studied and applied to various scenarios. In mobile computing scenarios, federated learning protects users from exposing their private data, while cooperatively training the global model for a variety of realworld applications. However, the security of federated learning is increasingly being questioned, due to the malicious clients or central servers' constant attack to the global model or user privacy data. To address these security issues, we proposed a decentralized federated learning framework based on blockchain, i.e., a Blockchainbased Federated Learning framework with Committee consensus (BFLC). The framework uses blockchain for the global model storage and the local model update exchange. To enable the proposed BFLC, we also devised an innovative committee consensus mechanism, which can effectively reduce the amount of consensus computing and reduce malicious attacks. We then discussed the scalability of BFLC, including theoretical security, storage optimization, and incentives. Finally, we performed experiments using realworld datasets to verify the effectiveness of the BFLC framework.
 [39] arXiv:2004.00775 [pdf, other]

Title: Strong Converse for Testing Against Independence over a Noisy channelSubjects: Information Theory (cs.IT); Statistics Theory (math.ST)
A distributed binary hypothesis testing (HT) problem over a noisy channel studied previously by the authors is investigated from the perspective of the strong converse property. It was shown by Ahlswede and Csisz\'{a}r that a strong converse holds in the above setting when the channel is ratelimited and noiseless. Motivated by this observation, we show that the strong converse continues to hold in the noisy channel setting for a special case of HT known as testing against independence (TAI). The proof utilizes the blowing up lemma and the recent change of measure technique of Tyagi and Watanabe as the key tools.
 [40] arXiv:2004.00779 [pdf, other]

Title: SceneAdaptive Video Frame Interpolation via MetaLearningComments: CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
Video frame interpolation is a challenging problem because there are different scenarios for each video depending on the variety of foreground and background motion, frame rate, and occlusion. It is therefore difficult for a single network with fixed parameters to generalize across different videos. Ideally, one could have a different network for each scenario, but this is computationally infeasible for practical applications. In this work, we propose to adapt the model to each video by making use of additional information that is readily available at test time and yet has not been exploited in previous works. We first show the benefits of `testtime adaptation' through simple finetuning of a network, then we greatly improve its efficiency by incorporating metalearning. We obtain significant performance gains with only a single gradient update without any additional parameters. Finally, we show that our metalearning framework can be easily employed to any video frame interpolation network and can consistently improve its performance on multiple benchmark datasets.
 [41] arXiv:2004.00783 [pdf, other]

Title: A Literature Review on Mobile Charging Station Technology for Electric VehiclesComments: This paper has been accepted for presentation at the 2020 IEEE Transportation Electrification Conference & Expo, to be held in Chicago, Illinois USA from June 2426, 2020Subjects: Systems and Control (eess.SY); Signal Processing (eess.SP)
While Electric vehicles (EVs) adoption is accelerating in an unprecedented way, lacking EV charging infrastructure hinders the development of the EV market. To compensate for these shortcomings, Mobile Charging Stations (MCS) could play a prominent role to accelerate EV penetration by providing charging services with no restrictions on the location and time of the charging process. This paper disseminates information on other papers and technical reports on MCS in the literature. It also discusses the benefits of MCS, its challenges, and finally introduces the research gaps in this area.
 [42] arXiv:2004.00784 [pdf, other]

Title: Learning Agile Robotic Locomotion Skills by Imitating AnimalsSubjects: Robotics (cs.RO); Machine Learning (cs.LG)
Reproducing the diverse and agile locomotion skills of animals has been a longstanding challenge in robotics. While manuallydesigned controllers have been able to emulate many complex behaviors, building such controllers involves a timeconsuming and difficult development process, often requiring substantial expertise of the nuances of each skill. Reinforcement learning provides an appealing alternative for automating the manual effort involved in the development of controllers. However, designing learning objectives that elicit the desired behaviors from an agent can also require a great deal of skillspecific expertise. In this work, we present an imitation learning system that enables legged robots to learn agile locomotion skills by imitating realworld animals. We show that by leveraging reference motion data, a single learningbased approach is able to automatically synthesize controllers for a diverse repertoire behaviors for legged robots. By incorporating sample efficient domain adaptation techniques into the training process, our system is able to learn adaptive policies in simulation that can then be quickly adapted for realworld deployment. To demonstrate the effectiveness of our system, we train an 18DoF quadruped robot to perform a variety of agile behaviors ranging from different locomotion gaits to dynamic hops and turns.
 [43] arXiv:2004.00786 [pdf, other]

Title: Graphbased fusion for change detection in multispectral imagesAuthors: David Alejandro Jimenez Sierra, Hernán Darío Benítez Restrepo, Hernán Darío Vargas Cardonay, Jocelyn ChanussotComments: Four pages conference paper, four figuresSubjects: Computer Vision and Pattern Recognition (cs.CV)
In this paper we address the problem of change detection in multispectral images by proposing a datadriven framework of graphbased data fusion. The main steps of the proposed approach are: (i) The generation of a multitemporal pixel based graph, by the fusion of intragraphs of each temporal data; (ii) the use of Nystr\"om extension to obtain the eigenvalues and eigenvectors of the fused graph, and the selection of the final change map. We validated our approach in two real cases of remote sensing according to both qualitative and quantitative analyses. The results confirm the potential of the proposed graphbased change detection algorithm outperforming stateoftheart methods.
 [44] arXiv:2004.00794 [pdf, other]

Title: Alleviating Semanticlevel Shift: A Semisupervised Domain Adaptation Method for Semantic SegmentationAuthors: Zhonghao Wang, Yunchao Wei, Rogerior Feris, Jinjun Xiong, WenMei Hwu, Thomas S. Huang, Honghui ShiSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Learning segmentation from synthetic data and adapting to real data can significantly relieve human efforts in labelling pixellevel masks. A key challenge of this task is how to alleviate the data distribution discrepancy between the source and target domains, i.e. reducing domain shift. The common approach to this problem is to minimize the discrepancy between feature distributions from different domains through adversarial training. However, directly aligning the feature distribution globally cannot guarantee consistency from a local view (i.e. semanticlevel), which prevents certain semantic knowledge learned on the source domain from being applied to the target domain. To tackle this issue, we propose a semisupervised approach named Alleviating Semanticlevel Shift (ASS), which can successfully promote the distribution consistency from both global and local views. Specifically, leveraging a small number of labeled data from the target domain, we directly extract semanticlevel feature representations from both the source and the target domains by averaging the features corresponding to same categories advised by pixellevel masks. We then feed the produced features to the discriminator to conduct semanticlevel adversarial learning, which collaborates with the adversarial learning from the global view to better alleviate the domain shift. We apply our ASS to two domain adaptation tasks, from GTA5 to Cityscapes and from Synthia to Cityscapes. Extensive experiments demonstrate that: (1) ASS can significantly outperform the current unsupervised stateofthearts by employing a small number of annotated samples from the target domain; (2) ASS can beat the oracle model trained on the whole target dataset by over 3 points by augmenting the synthetic source data with annotated samples from the target domain without suffering from the prevalent problem of overfitting to the source domain.
 [45] arXiv:2004.00797 [pdf, other]

Title: SSHFD: Single Shot Human Fall Detection with Occluded Joints ResilienceSubjects: Computer Vision and Pattern Recognition (cs.CV)
Falling can have fatal consequences for elderly people especially if the fallen person is unable to call for help due to loss of consciousness or any injury. Automatic fall detection systems can assist through prompt fall alarms and by minimizing the fear of falling when living independently at home. Existing visionbased fall detection systems lack generalization to unseen environments due to challenges such as variations in physical appearances, different camera viewpoints, occlusions, and background clutter. In this paper, we explore ways to overcome the above challenges and present Single Shot Human Fall Detector (SSHFD), a deep learning based framework for automatic fall detection from a single image. This is achieved through two key innovations. First, we present a human pose based fall representation which is invariant to appearance characteristics. Second, we present neural network models for 3d pose estimation and fall recognition which are resilient to missing joints due to occluded body parts. Experiments on public fall datasets show that our framework successfully transfers knowledge of 3d pose estimation and fall recognition learnt purely from synthetic data to unseen realworld data, showcasing its generalization capability for accurate fall detection in realworld scenarios.
 [46] arXiv:2004.00798 [pdf]

Title: Mapping Languages: The Corpus of Global Language UseAuthors: Jonathan DunnComments: This is a preprint of an article published in Language Resources and Evaluation. The final authenticated version is available online at: this https URLSubjects: Computation and Language (cs.CL)
This paper describes a webbased corpus of global language use with a focus on how this corpus can be used for datadriven language mapping. First, the corpus provides a representation of where national varieties of major languages are used (e.g., English, Arabic, Russian) together with consistently collected data for each variety. Second, the paper evaluates a language identification model that supports more local languages with smaller sample sizes than alternative offtheshelf models. Improved language identification is essential for moving beyond majority languages. Given the focus on language mapping, the paper analyzes how well this digital language data represents actual populations by (i) systematically comparing the corpus with demographic groundtruth data and (ii) triangulating the corpus with an alternate Twitterbased dataset. In total, the corpus contains 423 billion words representing 148 languages (with over 1 million words from each language) and 158 countries (again with over 1 million words from each country), all distilled from Common Crawl web data. The main contribution of this paper, in addition to describing this publiclyavailable corpus, is to provide a comprehensive analysis of the relationship between two sources of digital data (the web and Twitter) as well as their connection to underlying populations.
 [47] arXiv:2004.00799 [pdf, ps, other]

Title: Cocktail: Costefficient and Data Skewaware Online InNetwork Distributed Machine Learning for Intelligent 5G and BeyondSubjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)
To facilitate the emerging applications in the 5G networks and beyond, mobile network operators will provide many powerful control functionalities such as RAN slicing and resource scheduling. These control functionalities generally comprise a series of prediction tasks such as channel state information prediction, cellular traffic prediction and user mobility prediction which will be enabled by machine learning (ML) techniques. However, training the ML models offline is inefficient, due to the excessive overhead for forwarding the huge volume of data samples from cellular networks to remote ML training clouds. Thanks to the promising edge computing paradigm, we advocate cooperative online innetwork ML training across edge clouds. To alleviate the data skew issue caused by the capacity heterogeneity and dynamics of edge clouds while avoiding excessive overhead, we propose Cocktail, a costefficient and data skewaware online innetwork distributed machine learning framework. We build a comprehensive model and formulate an online data scheduling problem to optimize the framework cost while reconciling the data skew from both shortterm and longterm perspective. We exploit the stochastic gradient descent to devise an online asymptotically optimal algorithm. As its core building block, we propose optimal policies based on novel graph constructions to respectively solve two subproblems. We also improve the proposed online algorithm with online learning for fast convergence of innetwork ML training. A smallscale testbed and largescale simulations validate the superior performance of our framework.
 [48] arXiv:2004.00801 [pdf, other]

Title: Exploration of Reinforcement Learning for Event Camera using Carlike RobotsSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Robotics (cs.RO)
We demonstrate the first reinforcementlearning application for robots equipped with an event camera. Because of the considerably lower latency of the event camera, it is possible to achieve much faster control of robots compared with the existing visionbased reinforcementlearning applications using standard cameras. To handle a stream of events for reinforcement learning, we introduced an imagelike feature and demonstrated the feasibility of training an agent in a simulator for two tasks: fast collision avoidance and obstacle tracking. Finally, we set up a robot with an event camera in the real world and then transferred the agent trained in the simulator, resulting in successful fast avoidance of randomly thrown objects. Incorporating event camera into reinforcement learning opens new possibilities for various robotics applications that require swift control, such as autonomous vehicles and drones, through endtoend learning approaches.
 [49] arXiv:2004.00802 [pdf]

Title: Deviceaware inference operations in SONOS nonvolatile memory arraysAuthors: Christopher H. Bennett, T. Patrick Xiao, Ryan Dellana, Vineet Agrawal, Ben Feinberg, Venkatraman Prabhakar, Krishnaswamy Ramkumar, Long Hinh, Swatilekha Saha, Vijay Raghavan, Ramesh Chettuvetty, Sapan Agarwal, Matthew J. MarinellaComments: To be presented at IEEE International Physics Reliability Symposium (IRPS) 2020Subjects: Neural and Evolutionary Computing (cs.NE)
Nonvolatile memory arrays can deploy pretrained neural network models for edge inference. However, these systems are affected by devicelevel noise and retention issues. Here, we examine damage caused by these effects, introduce a mitigation strategy, and demonstrate its use in fabricated array of SONOS (SiliconOxideNitrideOxideSilicon) devices. On MNIST, fashionMNIST, and CIFAR10 tasks, our approach increases resilience to synaptic noise and drift. We also show strong performance can be realized with ADCs of 58 bits precision.
 [50] arXiv:2004.00803 [pdf, other]

Title: RisGraph: A RealTime Streaming System for Evolving GraphsSubjects: Databases (cs.DB)
Graphs in the real world are constantly changing and of large scale. In processing these evolving graphs, the combination of update workloads (updating vertices and edges in a streaming manner) and analytical (performing graph algorithms incrementally) workloads is ubiquitous. Throughput, latency, and granularity are three key requirements in processing evolving graphs with such combined workloads. Although there are several streaming systems proposed for evolving graphs to improve latency. They usually use batchupdate model to improve throughput but hurt granularity. It is still challenging to fulfill all the requirements simultaneously, especially for powerlaw graphs because they are difficult to be partitioned.
We analyze the computational cost on synthesized powerlaw graphs and realistic evolving graphs from public datasets. We find that the affected areas are usually small for each update, and there are scheduling opportunities for combined workloads. Based on these observations, we design a realtime streaming system for incremental graph computing called RisGraph. Our novel design on scheduling, tradeoffs on data structures and the computing engine make RisGraph satisfy the three requirements at the same time. The evaluation shows RisGraph can ingest millions of updates per second and its 99.9%ile latency is within 20 milliseconds for graphs with hundreds of millions of vertices and billions of edges on a single commodity machine.  [51] arXiv:2004.00809 [pdf, other]

Title: Mapping Languages and Demographics with Georeferenced CorporaComments: Proceedings of GeoComputation 19Subjects: Computation and Language (cs.CL)
This paper evaluates large georeferenced corpora, taken from both webcrawled and social media sources, against groundtruth population and languagecensus datasets. The goal is to determine (i) which dataset best represents population demographics; (ii) in what parts of the world the datasets are most representative of actual populations; and (iii) how to weight the datasets to provide more accurate representations of underlying populations. The paper finds that the two datasets represent very different populations and that they correlate with actual populations with values of r=0.60 (social media) and r=0.49 (webcrawled). Further, Twitter data makes better predictions about the inventory of languages used in each country.
 [52] arXiv:2004.00811 [pdf, ps, other]

Title: Fundamental Limits of Distributed EncodingSubjects: Information Theory (cs.IT)
In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is errorfree. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which comprises of a set of $K \in \mathbb{N}$ isolated source nodes and $N \in \mathbb{N}$ encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of adversarial nodes, denoted by $\beta \in \mathbb{N}$, and the cardinality of the set of symbols that each one generates, denoted by $v \in \mathbb{N}$, this would make the process of decoding from the encoded symbols impossible. Assume that a decoder connects to an arbitrary subset of $t \in \mathbb{N}$ encoding nodes and wants to decode the symbols of the honest nodes correctly, without necessarily identifying the sets of honest and adversarial nodes. In this paper, we characterize $t^* \in \mathbb{N}$, as the minimum of such $t$, as a function of $K$, $N$, $\beta$, and $v$. We show that for $\beta\geq 1, v\ge 2$, $t^*=K+\beta (v1)+1$, if $N \geq K+\beta (v1)+1 $, and $t^*=N$, if $N \le K+\beta (v1)$. In order to achieve $t^*$, we introduce a nonlinear code. In continue, we focus on linear coding and show that $t^*_{\textrm{linear}}=K+2\beta(v1)$, if $N\ge K+2\beta(v1)$, and $t^*_{\textrm{linear}}=N$, if $N\le K+2\beta(v1)$.
 [53] arXiv:2004.00812 [pdf, other]

Title: Identification of Critical Clusters in Inverterbased MicrogridsComments: Accepted for the PSCC conferenceSubjects: Systems and Control (eess.SY)
In this paper, we investigate the stability properties of inverterbased microgrids by establishing the possible presence of the socalled critical clusters  groups of inverters with their control settings being close to the stability boundary. For this, we consider the spectrum of the weighted admittance matrix of the network and show that its distinct eigenvalues correspond to inverter clusters, whose structure can be revealed by the corresponding eigenvector. We show that the maximum eigenvalue of the weighted admittance matrix corresponds to the cluster, closest to stability boundary. We also establish, that there exists a boundary on the value of this eigenvalue, that corresponds to the stability of the overall system. Thus, we make it possible to certify the stability of the system and find the groups of inverters in which control settings are closest to the stability boundary.
 [54] arXiv:2004.00813 [pdf, other]

Title: Repetitionbased NOMA Transmission and Its Outage Probability AnalysisAuthors: Jinho ChoiComments: 10 pages, 8 figures (to be published by IEEE Trans. Vehicular Technology)Subjects: Information Theory (cs.IT)
In this paper, we discuss a nonorthogonal multiple access (NOMA) scheme to exploit a high diversity gain using repetition, namely repetitionbased NOMA. Unlike conventional powerdomain NOMA, all the users can have the same transmit power, but different number of repetitions. Thanks to a high diversity gain, a low outage probability can be achieved without instantaneous channel state information (CSI) feedback for power allocation. A closedform expression for an upperbound on the outage probability is derived so that the values of key parameters can be decided to maintain the outage probability below a target value. We also consider the average error probability for finitelength codes. Simulation results are compared with the derived bounds and it is shown that the bounds are reasonably tight and can be used to decide key parameters (e.g., code rates) to guarantee target error probabilities.
 [55] arXiv:2004.00817 [pdf, ps, other]

Title: Combating The Machine Ethics Crisis: An Educational ApproachAuthors: Tai VuSubjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
In recent years, the availability of massive data sets and improved computing power have driven the advent of cuttingedge machine learning algorithms. However, this trend has triggered growing concerns associated with its ethical issues. In response to such a phenomenon, this study proposes a feasible solution that combines ethics and computer science materials in artificial intelligent classrooms. In addition, the paper presents several arguments and evidence in favor of the necessity and effectiveness of this integrated approach.
 [56] arXiv:2004.00819 [pdf, other]

Title: Chattering analysis of Lipschitz continuous slidingmode controllersComments: 7 pages, 9 figures. This paper was submitted to the CDC 2020Subjects: Systems and Control (eess.SY)
Lipschitz continuous slidingmode controllers (LCSMC) are developed as the integral of discontinuous SMC, producing control signals of finite slope. Nevertheless, LCSMC still generate chattering in the presence of fast parasitic dynamics. In this paper, an analysis of chattering in systems driven by LCSMC is performed using the Harmonic Balance (HB) approach. Two kinds of LCSMC are considered: the first one is based on a linear sliding variable (LSV) and the second one on a terminal switching variable (TSV). Predictions of the amplitude and frequency of selfexcited oscillations allowed to compute the average power consumed by the controller, in order to maintain the trajectories into the real sliding mode. A comparison of LCSMC with the SuperTwisting controller (STC), which produce a continuous control signal with infinite slope, is performed. Theoretical predictions and simulation results confirm that LCSMC may induce fastoscillations (chattering) of smaller amplitude and average power than those ones caused by the STC. But, surprisingly, the chattering generated by LSVLCSMC could be smaller than that one caused by TSVLCSMC, when the actuators are fast enough. On the other hand, it tuns that if the sliding dynamics of the LSVLCSMC closedloop is of similar speed as the actuators dynamics, the system can loose even practical stability.
 [57] arXiv:2004.00821 [pdf, ps, other]

Title: GopalaHemachandra codes revisitedSubjects: Information Theory (cs.IT); Combinatorics (math.CO); Number Theory (math.NT)
GopalaHemachandra codes are a variation of the Fibonacci universal code and have applications in cryptography and data compression. We show that $GH_{a}(n)$ codes always exist for $a=2,3$ and $4$ for any integer $n \geq 1$ and hence are universal codes. We develop two new algorithms to determine whether a GH code exists for a given set of parameters $a$ and $n$. In 2010, Basu and Prasad showed experimentally that in the range $1 \leq n \leq 100$ and $1 \leq k \leq 16$, there are at most $k$ consecutive integers for which $GH_{(4+k)}(n)$ does not exist. We turn their numerical result into a mathematical theorem and show that it is valid well beyond the limited range considered by them.
 [58] arXiv:2004.00827 [pdf, other]

Title: Approximate Selection with Guarantees using ProxiesSubjects: Databases (cs.DB)
Due to the falling costs of data acquisition and storage, researchers and industry analysts often want to find all instances of rare events in large datasets. For instance, scientists can cheaply capture thousands of hours of video, but are limited by the need to manually inspect all the video to identify relevant objects and events. To reduce this cost, recent work proposes to use cheap proxy models, such as image classifiers, to identify an approximate set of data points satisfying a data selection filter. Unfortunately, this recent work does not provide the statistical accuracy guarantees necessary in scientific and production settings.
In this work, we introduce novel algorithms for approximate selection queries with statistical accuracy guarantees. Namely, given a limited number of exact identifications from an oracle, often a human or an expensive machine learning model, our algorithms meet a minimum precision or recall target with high probability. In contrast, existing approaches can catastrophically fail in satisfying these recall and precision targets. We show that our algorithms can improve query result quality by up to 30$\times$ for both the precision and recall targets in both real and synthetic datasets.  [59] arXiv:2004.00828 [pdf, other]

Title: Equivariant Filter Design for Kinematic Systems on Lie GroupsSubjects: Systems and Control (eess.SY)
It is known that invariance and equivariance properties for systems on Lie groups can be exploited in the design of high performance and robust observers and filters for realworld robotic systems. This paper proposes an analysis framework that allows any kinematic system on a Lie group to be embedded in a natural manner into an equivariant kinematic system. This framework allows us to characterise the properties of, and relationships between, invariant systems, group affine systems, and equivariant systems. We propose a new filter design, the Equivariant Filter (EqF), that exploits the equivariance properties of the system embedding and can be applied to any kinematic system on a Lie group.
 [60] arXiv:2004.00830 [pdf, other]

Title: Tracking by Instance Detection: A MetaLearning ApproachComments: This paper has been accepted by CVPR'20 as an oralSubjects: Computer Vision and Pattern Recognition (cs.CV)
We consider the tracking problem as a special type of object detection problem, which we call instance detection. With proper initialization, a detector can be quickly converted into a tracker by learning the new instance from a single image. We find that modelagnostic metalearning (MAML) offers a strategy to initialize the detector that satisfies our needs. We propose a principled threestep approach to build a highperformance tracker. First, pick any modern object detector trained with gradient descent. Second, conduct offline training (or initialization) with MAML. Third, perform domain adaptation using the initial frame. We follow this procedure to build two trackers, named RetinaMAML and FCOSMAML, based on two modern detectors RetinaNet and FCOS. Evaluations on four benchmarks show that both trackers are competitive against stateoftheart trackers. On OTB100, RetinaMAML achieves the highest ever AUC of 0.712. On TrackingNet, FCOSMAML ranks the first on the leader board with an AUC of 0.757 and the normalized precision of 0.822. Both trackers run in realtime at 40 FPS.
 [61] arXiv:2004.00831 [pdf, other]

Title: Improving 3D Object Detection through Progressive Population Based AugmentationAuthors: Shuyang Cheng, Zhaoqi Leng, Ekin Dogus Cubuk, Barret Zoph, Chunyan Bai, Jiquan Ngiam, Yang Song, Benjamin Caine, Vijay Vasudevan, Congcong Li, Quoc V. Le, Jonathon Shlens, Dragomir AnguelovSubjects: Computer Vision and Pattern Recognition (cs.CV)
Data augmentation has been widely adopted for object detection in 3D point clouds. All previous efforts have focused on manually designing specific data augmentation methods for individual architectures, however no work has attempted to automate the design of data augmentation in 3D detection problems  as is common in 2D imagebased computer vision. In this work, we present the first attempt to automate the design of data augmentation policies for 3D object detection. We present an algorithm, termed Progressive Population Based Augmentation (PPBA). PPBA learns to optimize augmentation strategies by narrowing down the search space and adopting the best parameters discovered in previous iterations. On the KITTI test set, PPBA improves the StarNet detector by substantial margins on the moderate difficulty category of cars, pedestrians, and cyclists, outperforming all current stateoftheart singlestage detection models. Additional experiments on the Waymo Open Dataset indicate that PPBA continues to effectively improve 3D object detection on a 20x larger dataset compared to KITTI. The magnitude of the improvements may be comparable to advances in 3D perception architectures and the gains come without an incurred cost at inference time. In subsequent experiments, we find that PPBA may be up to 10x more data efficient than baseline 3D detection models without augmentation, highlighting that 3D detection models may achieve competitive accuracy with far fewer labeled examples.
 [62] arXiv:2004.00833 [pdf, other]

Title: Efficient Online Classification and Tracking on Resourceconstrained IoT DevicesComments: This paper is to be published in ACM Transactions on Internet of Things (TIOT)Subjects: Networking and Internet Architecture (cs.NI)
Timely processing has been increasingly required on smart IoT devices, which leads to directly implementing information processing tasks on an IoT device for bandwidth savings and privacy assurance. Particularly, monitoring and tracking the observed signals in continuous form are common tasks for a variety of near realtime processing IoT devices, such as in smart homes, bodyarea and environmental sensing applications. However, these systems are likely lowcost resourceconstrained embedded systems, equipped with compact memory space, whereby the ability to store the full information state of continuous signals is limited. Hence, in this paper, we develop solutions of efficient timely processing embedded systems for online classification and tracking of continuous signals with compact memory space. Particularly, we focus on the application of smart plugs that are capable of timely classification of appliance types and tracking of appliance behavior in a standalone manner. We implemented a smart plug prototype using lowcost Arduino platform with small amount of memory space to demonstrate the following timely processing operations: (1) learning and classifying the patterns associated with the continuous power consumption signals, and (2) tracking the occurrences of signal patterns using small local memory space. Furthermore, our system designs are also sufficiently generic for timely monitoring and tracking applications in other resourceconstrained IoT devices.
 [63] arXiv:2004.00835 [pdf, other]

Title: Adversarial Reinforcement Learningbased Robust Access Point Coordination Against Uncoordinated InterferenceSubjects: Networking and Internet Architecture (cs.NI)
This paper proposes a robust adversarial reinforcement learning (RARL)based multiaccess point (AP) coordination method that is robust even against unexpected decentralized operations of uncoordinated APs. MultiAP coordination is a promising technique towards IEEE 802.11be, and there are studies that use RL for multiAP coordination. Indeed, a simple RLbased multiAP coordination method diminishes the collision probability among the APs; therefore, the method is a promising approach to improve timeresource efficiency. However, this method is vulnerable to frame transmissions of uncoordinated APs that are less aware of frame transmissions of other coordinated APs. To help the central agent experience even such unexpected frame transmissions, in addition to the central agent, the proposed method also competitively trains an adversarial AP that disturbs coordinated APs by causing frame collisions intensively. Besides, we propose to exploit a history of frame losses of a coordinated AP to promote reasonable competition between the central agent and adversarial AP. The simulation results indicate that the proposed method can avoid uncoordinated interference and thereby improve the minimum sum of the throughputs in the system compared to not considering the uncoordinated AP.
 [64] arXiv:2004.00843 [pdf, other]

Title: Robust SingleImage SuperResolution via CNNs and TVTV MinimizationComments: Under peer reviewSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Optimization and Control (math.OC)
Singleimage superresolution is the process of increasing the resolution of an image, obtaining a highresolution (HR) image from a lowresolution (LR) one. By leveraging large training datasets, convolutional neural networks (CNNs) currently achieve the stateoftheart performance in this task. Yet, during testing/deployment, they fail to enforce consistency between the HR and LR images: if we downsample the output HR image, it never matches its LR input. Based on this observation, we propose to postprocess the CNN outputs with an optimization problem that we call TVTV minimization, which enforces consistency. As our extensive experiments show, such postprocessing not only improves the quality of the images, in terms of PSNR and SSIM, but also makes the superresolution task robust to operator mismatch, i.e., when the true downsampling operator is different from the one used to create the training dataset.
 [65] arXiv:2004.00844 [pdf]

Title: IoTFlock: An Opensource Framework for IoT Traffic GenerationAuthors: Syed Ghazanfar, Faisal Hussain, Atiq Ur Rehman, Ubaid U. Fayyaz, Farrukh Shahzad, Ghalib A. ShahComments: 6 Pages, 2 Figures, 4 Tables. Accepted in IEEE International Conference on Emerging Trends in Smart Technologies(ICETST) 2020Subjects: Networking and Internet Architecture (cs.NI); Computers and Society (cs.CY)
Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoTspecific security solutions. In order to design an IoTbased traffic generation framework, two main challenges include IoT device modelling and generating the IoT normal and attack traffic simultaneously. Therefore, in this work, we propose an opensource framework for IoT traffic generation which supports the two widely used IoT application layer protocols, i.e., MQTT and CoAP. The proposed framework allows a user to create an IoT use case, add customized IoT devices into it and generate normal and malicious IoT traffic over a realtime network. Furthermore, we set up a realtime IoT smart home use case to manifest the applicability of the proposed framework for developing the security solutions for IoT smart home by emulating the real world IoT devices. The experimental results demonstrate that the proposed framework can be effectively used to develop better security solutions for IoT networks without physically deploying the realtime use case.
 [66] arXiv:2004.00845 [pdf, other]

Title: OcclusionAware Depth Estimation with Adaptive Normal ConstraintsSubjects: Computer Vision and Pattern Recognition (cs.CV)
We present a new learningbased method for multiframe depth estimation from a color video, which is a fundamental problem in scene understanding, robot navigation or handheld 3D reconstruction. While recent learningbased methods estimate depth at high accuracy, 3D point clouds exported from their depth maps often fail to preserve important geometric feature (e.g., corners, edges, planes) of manmade scenes. Widelyused pixelwise depth errors do not specifically penalize inconsistency on these features. These inaccuracies are particularly severe when subsequent depth reconstructions are accumulated in an attempt to scan a full environment with manmade objects with this kind of features. Our depth estimation algorithm therefore introduces a Combined Normal Map (CNM) constraint, which is designed to better preserve highcurvature features and global planar regions. In order to further improve the depth estimation accuracy, we introduce a new occlusionaware strategy that aggregates initial depth predictions from multiple adjacent views into one final depth map and one occlusion probability map for the current reference view. Our method outperforms the stateoftheart in terms of depth estimation accuracy, and preserves essential geometric features of manmade indoor scenes much better than other algorithms.
 [67] arXiv:2004.00849 [pdf, other]

Title: PixelBERT: Aligning Image Pixels with Text by Deep MultiModal TransformersSubjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Machine Learning (cs.LG); Multimedia (cs.MM)
We propose PixelBERT to align image pixels with text by deep multimodal transformers that jointly learn visual and language embedding in a unified endtoend framework. We aim to build a more accurate and thorough connection between image pixels and language semantics directly from image and sentence pairs instead of using regionbased image features as the most recent vision and language tasks. Our PixelBERT which aligns semantic connection in pixel and text level solves the limitation of taskspecific visual representation for vision and language tasks. It also relieves the cost of bounding box annotations and overcomes the unbalance between semantic labels in visual task and language semantic. To provide a better representation for downstream tasks, we pretrain a universal endtoend model with image and sentence pairs from Visual Genome dataset and MSCOCO dataset. We propose to use a random pixel sampling mechanism to enhance the robustness of visual representation and to apply the Masked Language Model and ImageText Matching as pretraining tasks. Extensive experiments on downstream tasks with our pretrained model show that our approach makes the most stateofthearts in downstream tasks, including Visual Question Answering (VQA), imagetext retrieval, Natural Language for Visual Reasoning for Real (NLVR). Particularly, we boost the performance of a single model in VQA task by 2.17 points compared with SOTA under fair comparison.
 [68] arXiv:2004.00850 [pdf, ps, other]

Title: Learning control for polynomial systems using sum of squaresSubjects: Systems and Control (eess.SY)
This paper considers the problem of learning control laws for nonlinear polynomial systems directly from data, which are inputoutput measurements collected in an experiment over a finite time period. Without explicitly identifying the system dynamics, stabilizing laws are directly designed for nonlinear polynomial systems by solving sum of square problems that depend on the experimental data alone. Moreover, the stabilizing statedependent control gains can be constructed by databased linear programming.
 [69] arXiv:2004.00857 [pdf, ps, other]

Title: Average Reward Adjusted Discounted Reinforcement Learning: NearBlackwellOptimal Policies for RealWorld ApplicationsAuthors: Manuel SchneckenreitherSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
Although in recent years reinforcement learning has become very popular the number of successful applications to different kinds of operations research problems is rather scarce. Reinforcement learning is based on the wellstudied dynamic programming technique and thus also aims at finding the best stationary policy for a given Markov Decision Process, but in contrast does not require any model knowledge. The policy is assessed solely on consecutive states (or stateaction pairs), which are observed while an agent explores the solution space. The contributions of this paper are manifold. First we provide deep theoretical insights to the widely applied standard discounted reinforcement learning framework, which give rise to the understanding of why these algorithms are inappropriate when permanently provided with nonzero rewards, such as costs or profit. Second, we establish a novel nearBlackwelloptimal reinforcement learning algorithm. In contrary to former method it assesses the average reward per step separately and thus prevents the incautious combination of different types of state values. Thereby, the Laurent Series expansion of the discounted state values forms the foundation for this development and also provides the connection between the two approaches. Finally, we prove the viability of our algorithm on a challenging problem set, which includes a wellstudied M/M/1 admission control queuing system. In contrast to standard discounted reinforcement learning our algorithm infers the optimal policy on all tested problems. The insights are that in the operations research domain machine learning techniques have to be adapted and advanced to successfully apply these methods in our settings.
 [70] arXiv:2004.00858 [pdf, other]

Title: Projected Neural Network for a Class of Sparse Regression with Cardinality PenaltySubjects: Neural and Evolutionary Computing (cs.NE); Optimization and Control (math.OC)
In this paper, we consider a class of sparse regression problems, whose objective function is the summation of a convex loss function and a cardinality penalty. By constructing a smoothing function for the cardinality function, we propose a projected neural network and design a correction method for solving this problem. The solution of the proposed neural network is unique, global existent, bounded and globally Lipschitz continuous. Besides, we prove that all accumulation points of the proposed neural network have a common support set and a unified lower bound for the nonzero entries. Combining the proposed neural network with the correction method, any corrected accumulation point is a local minimizer of the considered sparse regression problem. Moreover, we analyze the equivalent relationship on the local minimizers between the considered sparse regression problem and another sparse problem. Finally, some numerical experiments are provided to show the efficiency of the proposed neural networks in solving some sparse regression problems in practice.
 [71] arXiv:2004.00860 [pdf, ps, other]

Title: SampledData Control Based Consensus of FractionalOrder MultiAgent SystemsComments: Submitted to IEEE Control Systems LettersSubjects: Systems and Control (eess.SY)
In this paper, we investigate consensus control of fractionalorder multiagent systems with order in (0,1) via sampleddata control. A new scheme to design distributed controllers with rigorous analysis is presented by utilizing the unique properties of fractionalorder calculus, namely hereditary and infinite memory. It is established that global boundedness of all closedloop signals is ensured and asymptotic consensus is realized. Simulation studies are conducted to illustrate the effectiveness of the proposed control method and verify the obtained results.
 [72] arXiv:2004.00862 [pdf, other]

Title: Enabling EndUsers to Deploy Flexible HumanRobot Teams to Factories of the FutureComments: Workshop "Factory of the Future  How to digitalize the robotaided manufacturing process in Industry 4.0?"; 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, MacaoSubjects: Robotics (cs.RO)
HumanRobot Teams offer the flexibility needed for partial automation in small and mediumsized enterprises (SMEs). They will thus be an integral part of Factories of the Future. Our research targets a particularly flexible teaming mode, where agents share tasks dynamically. Such approaches require cognitive robots with reasoning and sensing capabilities. This results in hardware maintenance demands in terms of sensor calibration. In contrast to intuitive enduser programming, system setup and maintenance are rarely addressed in literature on robot application in SMEs. In this paper, we describe a prototype software toolchain that covers the initial setup, task modelling, and online operation of humanrobot teams. We further show, that endusers can setup the system quickly and operate the whole toolchain effortlessly. All in all, this work aims to reduce the concern, that deploying humanrobot teams comes with high costs for external expertise.
 [73] arXiv:2004.00865 [pdf, other]

Title: A reconfigurable robot workcell for quick setup of assembly processesSubjects: Robotics (cs.RO)
High volume production has been a prerequisite in order to invest into automation of the manufacturing process for decades. The high cost of setup and the inflexibility of classical automation meant that low batch productions, often present in Small and Mediumsized Enterprises (SMEs), were dismissed as potential end user of automation technologies. In this extended abstract we present the results of the ReconCell project whose objective was to develop a new type of highly reconfigurable robot workcell for fast setup of automated assembly processes in SMEs. The high degree of reconfigurability was achieved by the developed reconfigurable hardware and the complementary reconfigurable software, while fast setup was achieved with technologies for fast robot programming.
 [74] arXiv:2004.00869 [pdf, other]

Title: An Upgrading Algorithm with Optimal Power LawSubjects: Information Theory (cs.IT)
Consider a channel $W$ along with a given input distribution $P_X$. In certain settings, such as in the construction of polar codes, the output alphabet of $W$ is `too large', and hence we replace $W$ by a channel $Q$ having a smaller output alphabet. We say that $Q$ is upgraded with respect to $W$ if $W$ is obtained from $Q$ by processing its output. In this case, the mutual information $I(P_X,W)$ between the input and output of $W$ is upperbounded by the mutual information $I(P_X,Q)$ between the input and output of $Q$. In this paper, we present an algorithm that produces an upgraded channel $Q$ from $W$, as a function of $P_X$ and the required output alphabet size of $Q$, denoted $L$. We show that the difference in mutual informations is `small'. Namely, it is $O(L^{2/(\mathcal{X}1)})$, where $\mathcal{X}$ is the size of the input alphabet. This power law of $L$ is optimal.
 [75] arXiv:2004.00878 [pdf, other]

Title: Exact and Approximate Methods for Proving Unrealizability of SyntaxGuided Synthesis ProblemsJournalref: PLDI 2020Subjects: Programming Languages (cs.PL)
We consider the problem of automatically establishing that a given syntaxguidedsynthesis (SyGuS) problem is unrealizable (i.e., has no solution). We formulate the problem of proving that a SyGuS problem is unrealizable over a finite set of examples as one of solving a set of equations: the solution yields an overapproximation of the set of possible outputs that any term in the search space can produce on the given examples. If none of the possible outputs agrees with all of the examples, our technique has proven that the given SyGuS problem is unrealizable. We then present an algorithm for exactly solving the set of equations that result from SyGuS problems over linear integer arithmetic (LIA) and LIA with conditionals (CLIA), thereby showing that LIA and CLIA SyGuS problems over finitely many examples are decidable. We implement the proposed technique and algorithms in a tool called Nay. Nay can prove unrealizability for 70/132 existing SyGuS benchmarks, with running times comparable to those of the stateoftheart tool Nope. Moreover, Nay can solve 11 benchmarks that Nope cannot solve.
 [76] arXiv:2004.00879 [pdf, other]

Title: Enhance the performance of navigation: A twostage machine learning approachComments: 8 pages, under reviewSubjects: Signal Processing (eess.SP); Machine Learning (cs.LG)
Real time traffic navigation is an important capability in smart transportation technologies, which has been extensively studied these years. Due to the vast development of edge devices, collecting real time traffic data is no longer a problem. However, real traffic navigation is still considered to be a particularly challenging problem because of the timevarying patterns of the traffic flow and unpredictable accidents/congestion. To give accurate and reliable navigation results, predicting the future traffic flow(speed,congestion,volume,etc) in a fast and accurate way is of great importance. In this paper, we adopt the ideas of ensemble learning and develop a twostage machine learning model to give accurate navigation results. We model the traffic flow as a time series and apply XGBoost algorithm to get accurate predictions on future traffic conditions(1st stage). We then apply the Top K Dijkstra algorithm to find a set of shortest paths from the give start point to the destination as the candidates of the output optimal path. With the prediction results in the 1st stage, we find one optimal path from the candidates as the output of the navigation algorithm. We show that our navigation algorithm can be greatly improved via EOPF(Enhanced Optimal Path Finding), which is based on neural network(2nd stage). We show that our method can be over 7% better than the method without EOPF in many situations, which indicates the effectiveness of our model.
 [77] arXiv:2004.00880 [pdf]

Title: CLASH WRIST  A hardware to increase the capability of CLASH fruit gripper to use environment constraints explorationComments: IROS 2019, Factory of the FutureSubjects: Robotics (cs.RO)
Humans use environmental constraints (EC) in manipulation to compensate for uncertainties in their world model. The same principle was recently applied to robotics, so that soft underactuated hands improve their grasping capability by using environmental constraints exploitation (ECE) [1]. Due to orientation of the robotic hand for example in the EC wall grasp, the length of the robot wrist plus the hand length gets quite important, if objects are grasp out of a box [2] . Most of the modern cobots have quite long wrist, so we have constructed a two degree of freedom wrist for the CLASH [3], to solve this problem (Fig. 1).
 [78] arXiv:2004.00881 [pdf, other]

Title: How Furiously Can Colourless Green Ideas Sleep? Sentence Acceptability in ContextComments: 14 pages. Author's final version, accepted for publication in Transactions of the Association for Computational LinguisticsSubjects: Computation and Language (cs.CL)
We study the influence of context on sentence acceptability. First we compare the acceptability ratings of sentences judged in isolation, with a relevant context, and with an irrelevant context. Our results show that context induces a cognitive load for humans, which compresses the distribution of ratings. Moreover, in relevant contexts we observe a discourse coherence effect which uniformly raises acceptability. Next, we test unidirectional and bidirectional language models in their ability to predict acceptability ratings. The bidirectional models show very promising results, with the best model achieving a new stateoftheart for unsupervised acceptability prediction. The two sets of experiments provide insights into the cognitive aspects of sentence processing and central issues in the computational modelling of text and discourse.
 [79] arXiv:2004.00893 [pdf, other]

Title: A khop Collaborate Game Model: Extended to Community Budgets and Adaptive NonSubmodularitySubjects: Social and Information Networks (cs.SI); Computer Science and Game Theory (cs.GT)
Revenue maximization (RM) is one of the most important problems on online social networks (OSNs), which attempts to find a small subset of users in OSNs that makes the expected revenue maximized. It has been researched intensively before. However, most of exsiting literatures were based on nonadaptive seeding strategy and on simple information diffusion model, such as IC/LTmodel. It considered the single influenced user as a measurement unit to quantify the revenue. Until Collaborate Game model appeared, it considered activity as a basic object to compute the revenue. An activity initiated by a user can only influence those users whose distance are within khop from the initiator. Based on that, we adopt adaptive seed strategy and formulate the Revenue Maximization under the Size Budget (RMSB) problem. If taking into account the product's promotion, we extend RMSB to the Revenue Maximization under the Community Budget (RMCB) problem, where the influence can be distributed over the whole network. The objective function of RMSB and RMCB is adatpive monotone and not adaptive submodular, but in some special cases, it is adaptive submodular. We study the RMSB and RMCB problem under both the speical submodular cases and general nonsubmodular cases, and propose RMSBSolver and RMCBSolver to solve them with strong theoretical guarantees, respectively. Especially, we give a datadependent approximation ratio for RMSB problem under the general nonsubmodular cases. Finally, we evaluate our proposed algorithms by conducting experiments on real datasets, and show the effectiveness and accuracy of our solutions.
 [80] arXiv:2004.00899 [pdf, other]

Title: Go Fetch: Mobile Manipulation in Unstructured EnvironmentsAuthors: Kenneth Blomqvist, Michel Breyer, Andrei Cramariuc, Julian Förster, Margarita Grinvald, Florian Tschopp, Jen Jen Chung, Lionel Ott, Juan Nieto, Roland SiegwartComments: Kenneth Blomqvist, Michel Breyer, Andrei Cramariuc, Julian F\"orster, Margarita Grinvald, and Florian Tschopp contributed equally to this workSubjects: Robotics (cs.RO); Computer Vision and Pattern Recognition (cs.CV)
With humankind facing new and increasingly largescale challenges in the medical and domestic spheres, automation of the service sector carries a tremendous potential for improved efficiency, quality, and safety of operations. Mobile robotics can offer solutions with a high degree of mobility and dexterity, however these complex systems require a multitude of heterogeneous components to be carefully integrated into one consistent framework. This work presents a mobile manipulation system that combines perception, localization, navigation, motion planning and grasping skills into one common workflow for fetch and carry applications in unstructured indoor environments. The tight integration across the various modules is experimentally demonstrated on the task of finding a commonly available object in an office environment, grasping it, and delivering it to a desired dropoff location. The accompanying video is available at https://youtu.be/e89_Xg1sLnY.
 [81] arXiv:2004.00900 [pdf, other]

Title: Learning to Segment the TailSubjects: Computer Vision and Pattern Recognition (cs.CV)
Realworld visual recognition requires handling the extreme sample imbalance in largescale longtailed data. We propose a "divide\&conquer" strategy for the challenging LVIS task: divide the whole data into balanced parts and then apply incremental learning to conquer each one. This derives a novel learning paradigm: \textbf{classincremental fewshot learning}, which is especially effective for the challenge evolving over time: 1) the class imbalance among the oldclass knowledge review and 2) the fewshot data in newclass learning. We call our approach \textbf{Learning to Segment the Tail} (LST). In particular, we design an instancelevel balanced replay scheme, which is a memoryefficient approximation to balance the instancelevel samples from the oldclass images. We also propose to use a metamodule for newclass learning, where the module parameters are shared across incremental phases, gaining the learningtolearn knowledge incrementally, from the datarich head to the datapoor tail. We empirically show that: at the expense of a little sacrifice of headclass forgetting, we can gain a significant 8.3\% AP improvement for the tail classes with less than 10 instances, achieving an overall 2.0\% AP boost for the whole 1,230 classes\footnote{Code is available at \url{https://github.com/JoyHuYY1412/LST_LVIS}}.
 [82] arXiv:2004.00909 [pdf, other]

Title: Learning Representations For Images With Hierarchical LabelsAuthors: Ankit DhallComments: Master thesisSubjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Image classification has been studied extensively but there has been limited work in the direction of using nonconventional, external guidance other than traditional imagelabel pairs to train such models. In this thesis we present a set of methods to leverage information about the semantic hierarchy induced by class labels. In the first part of the thesis, we inject labelhierarchy knowledge to an arbitrary classifier and empirically show that availability of such external semantic information in conjunction with the visual semantics from images boosts overall performance. Taking a step further in this direction, we model more explicitly the labellabel and labelimage interactions by using orderpreserving embeddingbased models, prevalent in natural language, and tailor them to the domain of computer vision to perform image classification. Although, contrasting in nature, both the CNNclassifiers injected with hierarchical information, and the embeddingbased models outperform a hierarchyagnostic model on the newly presented, realworld ETH Entomological Collection image dataset.
 [83] arXiv:2004.00915 [pdf, ps, other]

Title: Safe Reinforcement Learning via Projection on a Safe Set: How to Achieve Optimality?Comments: Accepted at IFAC 2020Subjects: Systems and Control (eess.SY); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
For all its successes, Reinforcement Learning (RL) still struggles to deliver formal guarantees on the closedloop behavior of the learned policy. Among other things, guaranteeing the safety of RL with respect to safetycritical systems is a very active research topic. Some recent contributions propose to rely on projections of the inputs delivered by the learned policy into a safe set, ensuring that the system safety is never jeopardized. Unfortunately, it is unclear whether this operation can be performed without disrupting the learning process. This paper addresses this issue. The problem is analysed in the context of $Q$learning and policy gradient techniques. We show that the projection approach is generally disruptive in the context of $Q$learning though a simple alternative solves the issue, while simple corrections can be used in the context of policy gradient methods in order to ensure that the policy gradients are unbiased. The proposed results extend to safe projections based on robust MPC techniques.
 [84] arXiv:2004.00917 [pdf, other]

Title: Controllable Orthogonalization in Training DNNsComments: Accepted to CVPR 2020. The Code is available at this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Orthogonality is widely used for training deep neural networks (DNNs) due to its ability to maintain all singular values of the Jacobian close to 1 and reduce redundancy in representation. This paper proposes a computationally efficient and numerically stable orthogonalization method using Newton's iteration (ONI), to learn a layerwise orthogonal weight matrix in DNNs. ONI works by iteratively stretching the singular values of a weight matrix towards 1. This property enables it to control the orthogonality of a weight matrix by its number of iterations. We show that our method improves the performance of image classification networks by effectively controlling the orthogonality to provide an optimal tradeoff between optimization benefits and representational capacity reduction. We also show that ONI stabilizes the training of generative adversarial networks (GANs) by maintaining the Lipschitz continuity of a network, similar to spectral normalization (SN), and further outperforms SN by providing controllable orthogonality.
 [85] arXiv:2004.00931 [pdf, other]

Title: Spotting political social bots in Twitter: A use case of the 2019 Spanish general electionAuthors: Javier PastorGalindo, Mattia Zago, Pantaleone Nespoli, Sergio López Bernal, Alberto Huertas Celdrán, Manuel Gil Pérez, José A. RuipérezValiente, Gregorio Martínez Pérez, Félix Gómez MármolSubjects: Social and Information Networks (cs.SI)
While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been illintentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Spanish general election. Throughout our study, we classified involved users as social bots or humans, and examined their interactions from a quantitative (i.e., amount of traffic generated and existing relations) and qualitative (i.e., user's political affinity and sentiment towards the most important parties) perspectives. Results demonstrated that a nonnegligible amount of those bots actively participated in the election, supporting each of the five principal political parties.
 [86] arXiv:2004.00935 [pdf, other]

Title: Best Practices for Transparency in Machine Generated PersonalizationComments: 8 pagesSubjects: Computers and Society (cs.CY); HumanComputer Interaction (cs.HC); Machine Learning (cs.LG)
Machine generated personalization is increasingly used in online systems. Personalization is intended to provide users with relevant content, products, and solutions that address their respective needs and preferences. However, users are becoming increasingly vulnerable to online manipulation due to algorithmic advancements and lack of transparency. Such manipulation decreases users' levels of trust, autonomy, and satisfaction concerning the systems with which they interact. Increasing transparency is an important goal for personalization based systems. Unfortunately, system designers lack guidance in assessing and implementing transparency in their developed systems.
In this work we combine insights from technology ethics and computer science to generate a list of transparency best practices for machine generated personalization. Based on these best practices, we develop a checklist to be used by designers wishing to evaluate and increase the transparency of their algorithmic systems. Adopting a designer perspective, we apply the checklist to prominent online services and discuss its advantages and shortcomings. We encourage researchers to adopt the checklist in various environments and to work towards a consensusbased tool for measuring transparency in the personalization community.  [87] arXiv:2004.00939 [pdf, other]

Title: CORSICA: CrossOrigin Web Service IdentificationAuthors: Christian Dresen, Fabian Ising, Damian Poddebniak, Tobias Kappert, Thorsten Holz, Sebastian SchinzelComments: Accepted to ASIACCS2020Subjects: Cryptography and Security (cs.CR)
Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standardcompliant web browsers that may leak sensitive information about crossorigin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of crossorigin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies CrossOrigin Resource Policy (CORP)} and SecMetadata would prevent our identification techniques.
 [88] arXiv:2004.00945 [pdf, other]

Title: PaStaNet: Toward Human Activity Knowledge EngineAuthors: YongLu Li, Liang Xu, Xinpeng Liu, Xijie Huang, Yue Xu, Shiyi Wang, HaoShu Fang, Ze Ma, Mingyang Chen, Cewu LuComments: Accepted to CVPR 2020, supplementary materials included, code available: this http URLSubjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)
Existing imagebased activity understanding methods mainly adopt direct mapping, i.e. from image to activity concepts, which may encounter performance bottleneck since the huge gap. In light of this, we propose a new path: infer human part states first and then reason out the activities based on partlevel semantics. Human Body Part States (PaSta) are finegrained action semantic tokens, e.g. <hand, hold, something>, which can compose the activities and help us step toward human activity knowledge engine. To fully utilize the power of PaSta, we build a largescale knowledge base PaStaNet, which contains 7M+ PaSta annotations. And two corresponding models are proposed: first, we design a model named Activity2Vec to extract PaSta features, which aim to be general representations for various activities. Second, we use a PaStabased Reasoning method to infer activities. Promoted by PaStaNet, our method achieves significant improvements, e.g. 6.4 and 13.9 mAP on full and oneshot sets of HICO in supervised learning, and 3.2 and 4.2 mAP on VCOCO and imagesbased AVA in transfer learning. Code and data are available at this http URL
 [89] arXiv:2004.00946 [pdf, other]

Title: HumanGuided Planner for NonPrehensile ManipulationComments: Presented at "Factory of the Future" workshop, IROS 2019. arXiv admin note: substantial text overlap with arXiv:1904.03748Subjects: Robotics (cs.RO)
We present a humanguided planner for nonprehensile manipulation in clutter. Most recent approaches to manipulation in clutter employs randomized planning, however, the problem remains a challenging one where the planning times are still in the order of tens of seconds or minutes, and the success rates are low for difficult instances of the problem. We build on these controlbased randomized planning approaches, but we investigate using them in conjunction with humanoperator input. We show that with a minimal amount of human input, the lowlevel planner can solve the problem faster and with higher success rates.
 [90] arXiv:2004.00948 [pdf]

Title: A high capacity text steganography scheme based on permutation and color codingComments: 15 pages , 8 figuresSubjects: Cryptography and Security (cs.CR)
In this paper, we propose a text steganographic scheme based on color coding and permutation. Given a secret message and a cover text, the proposed scheme embed the secret message in the cover text by making it colored, using a permutation algorithm. The stegotext is then send to the receiver by mail. The results which have been obtained by experiments, show that our model performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.
 [91] arXiv:2004.00963 [pdf, other]

Title: An anytime tree search algorithm for the 2018 ROADEF/EURO challenge glass cutting problemSubjects: Artificial Intelligence (cs.AI)
In this article, we present the anytime tree search algorithm we designed for the 2018 ROADEF/EURO challenge glass cutting problem proposed by the French company SaintGobain. The resulting program was ranked first among 64 participants. Its key components are: a new search algorithm called Memory Bounded A* (MBA*) with guide functions, a symmetry breaking strategy, and a pseudodominance rule. We perform a comprehensive study of these components showing that each of them contributes to the algorithm global performances. In addition, we designed a second tree search algorithm fully based on the pseudodominance rule and dedicated to some of the challenge instances with strong precedence constraints. On these instances, it finds the bestknown solutions very quickly.
 [92] arXiv:2004.00969 [pdf, other]

Title: FaaSten Your Decisions: Classification Framework and Technology Review of FunctionasaService PlatformsSubjects: Software Engineering (cs.SE); Distributed, Parallel, and Cluster Computing (cs.DC)
FunctionasaService (FaaS) is a cloud service model enabling developers to offload eventdriven executable snippets of code. The execution and management of such functions becomes a FaaS provider's responsibility, hereby included their ondemand provisioning and automatic scaling. Key enablers for this cloud service model are FaaS platforms, e.g., AWS Lambda, Microsoft Azure Functions or OpenFaaS. At the same time, the choice of the most appropriate FaaS platform for deploying and running a serverless application is not trivial, as various organizational and technical aspects have to be taken into account. In this work, we present (i) a FaaS platform classification framework derived using a mixed method study and (ii) a systematic technology review of the ten most prominent FaaS platforms, based on the proposed classification framework. Moreover, we present (iii) a FaaS platform selection support system, called \faastener, which helps researchers and practitioners to choose the FaaS platform most suited for their requirements.
 [93] arXiv:2004.00974 [pdf, other]

Title: DeepnCheap: An Automated Search Framework for Low Complexity Deep LearningComments: Submitted to ECMLPKDD 2020Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
We present DeepnCheap  an opensource AutoML framework to search for deep learning models. This search includes both architecture and training hyperparameters, and supports convolutional neural networks and multilayer perceptrons. Our framework is targeted for deployment on both benchmark and custom datasets, and as a result, offers a greater degree of search space customizability as compared to a more limited search over only preexisting models from literature. We also introduce the technique of 'search transfer', which demonstrates the generalization capabilities of the models found by our framework to multiple datasets.
DeepnCheap includes a usercustomizable complexity penalty which trades off performance with training time or number of parameters. Specifically, our framework results in models offering performance comparable to stateoftheart while taking 12 orders of magnitude less time to train than models from other AutoML and model search frameworks. Additionally, this work investigates and develops various insights regarding the search process. In particular, we show the superiority of a greedy strategy and justify our choice of Bayesian optimization as the primary search methodology over random / grid search.  [94] arXiv:2004.00980 [pdf, other]

Title: Action Space Shaping in Deep Reinforcement LearningSubjects: Artificial Intelligence (cs.AI)
Reinforcement learning (RL) has been successful in training agents in various learning environments, including videogames. However, such work modifies and shrinks the action space from the game's original. This is to avoid trying "pointless" actions and to ease the implementation. Currently, this is mostly done based on intuition, with little systematic research supporting the design decisions. In this work, we aim to gain insight on these action space modifications by conducting extensive experiments in videogame environments. Our results show how domainspecific removal of actions and discretization of continuous actions can be crucial for successful learning. With these insights, we hope to ease the use of RL in new environments, by clarifying what actionspaces are easy to learn.
 [95] arXiv:2004.00981 [pdf, other]

Title: Benchmarking EndtoEnd Behavioural Cloning on Video GamesSubjects: Artificial Intelligence (cs.AI)
Behavioural cloning, where a computer is taught to perform a task based on demonstrations, has been successfully applied to various video games and robotics tasks, with and without reinforcement learning. This also includes endtoend approaches, where a computer plays a video game like humans do: by looking at the image displayed on the screen, and sending keystrokes to the game. As a general approach to playing video games, this has many inviting properties: no need for specialized modifications to the game, no lengthy training sessions and the ability to reuse the same tools across different games. However, related work includes gamespecific engineering to achieve the results. We take a step towards a general approach and study the general applicability of behavioural cloning on twelve video games, including six modern video games (published after 2010), by using human demonstrations as training data. Our results show that these agents cannot match humans in raw performance but can learn humanlike behaviour. We also demonstrate how the quality of the data matters, and how recording data from humans is subject to a stateaction mismatch, due to human reflexes.
 [96] arXiv:2004.00993 [pdf]

Title: Augmented Q Imitation Learning (AQIL)Comments: 5 pagesSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)
The study of unsupervised learning can be generally divided into two categories: imitation learning and reinforcement learning. In imitation learning the machine learns by mimicking the behavior of an expert system whereas in reinforcement learning the machine learns via direct environment feedback. Traditional deep reinforcement learning takes a significant time before the machine starts to converge to an optimal policy. This paper proposes Augmented QImitationLearning, a method by which deep reinforcement learning convergence can be accelerated by applying Qimitationlearning as the initial training process in traditional Deep Qlearning.
 [97] arXiv:2004.00994 [pdf, other]

Title: Learning to Ask Medical Questions using Reinforcement LearningSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
We propose a novel reinforcement learningbased approach for adaptive and iterative feature selection. Given a masked vector of input features, a reinforcement learning agent iteratively selects certain features to be unmasked, and uses them to predict an outcome when it is sufficiently confident. The algorithm makes use of a novel environment setting, corresponding to a nonstationary Markov Decision Process. A key component of our approach is a guesser network, trained to predict the outcome from the selected features and parametrizing the reward function. Applying our method to a national survey dataset, we show that it not only outperforms strong baselines when requiring the prediction to be made based on a small number of input features, but is also highly more interpretable. Our code is publicly available at \url{https://github.com/ushaham/adaptiveFS}.
 [98] arXiv:2004.00998 [pdf, other]

Title: DeepSumm  Deep Code Summaries using Neural Transformer ArchitectureAuthors: Vivek GuptaComments: arXiv admin note: substantial text overlap with arXiv:1902.01954 by other authorsSubjects: Machine Learning (cs.LG); Computation and Language (cs.CL)
Source code summarizing is a task of writing short, natural language descriptions of source code behavior during run time. Such summaries are extremely useful for software development and maintenance but are expensive to manually author,hence it is done for small fraction of the code that is produced and is often ignored. Automatic code documentation can possibly solve this at a low cost. This is thus an emerging research field with further applications to program comprehension, and software maintenance. Traditional methods often relied on cognitive models that were built in the form of templates and by heuristics and had varying degree of adoption by the developer community. But with recent advancements, end to end datadriven approaches based on neural techniques have largely overtaken the traditional techniques. Much of the current landscape employs neural translation based architectures with recurrence and attention which is resource and time intensive training procedure. In this paper, we employ neural techniques to solve the task of source code summarizing and specifically compare NMT based techniques to more simplified and appealing Transformer architecture on a dataset of Java methods and comments. We bring forth an argument to dispense the need of recurrence in the training procedure. To the best of our knowledge, transformer based models have not been used for the task before. With supervised samples of more than 2.1m comments and code, we reduce the training time by more than 50% and achieve the BLEU score of 17.99 for the test set of examples.
 [99] arXiv:2004.00999 [pdf, other]

Title: Pruned Wasserstein Index Generation Model and wigpy PackageAuthors: Fangzhou XieSubjects: Machine Learning (cs.LG); Computation and Language (cs.CL); General Economics (econ.GN)
Recent proposal of Wasserstein Index Generation model (WIG) has shown a new direction for automatically generating indices. However, it is challenging in practice to fit large datasets for two reasons. First, the Sinkhorn distance is notoriously expensive to compute and suffers from dimensionality severely. Second, it requires to compute a full $N\times N$ matrix to be fit into memory, where $N$ is the dimension of vocabulary. When the dimensionality is too large, it is even impossible to compute at all. I hereby propose a Lassobased shrinkage method to reduce dimensionality for the vocabulary as a preprocessing step prior to fitting the WIG model. After we get the word embedding from Word2Vec model, we could cluster these highdimensional vectors by $k$means clustering, and pick most frequent tokens within each cluster to form the "base vocabulary". Nonbase tokens are then regressed on the vectors of base token to get a transformation weight and we could thus represent the whole vocabulary by only the "base tokens". This variant, called pruned WIG (pWIG), will enable us to shrink vocabulary dimension at will but could still achieve high accuracy. I also provide a \textit{wigpy} module in Python to carry out computation in both flavor. Application to Economic Policy Uncertainty (EPU) index is showcased as comparison with existing methods of generating timeseries sentiment indices.
 [100] arXiv:2004.01002 [pdf, other]

Title: DualConvMeshNet: Joint Geodesic and Euclidean Convolutions on 3D MeshesComments: CVPR 2020 cameraready versionSubjects: Computer Vision and Pattern Recognition (cs.CV)
We propose DualConvMeshNets (DCMNet) a family of deep hierarchical convolutional networks over 3D geometric data that combines two types of convolutions. The first type, geodesic convolutions, defines the kernel weights over mesh surfaces or graphs. That is, the convolutional kernel weights are mapped to the local surface of a given mesh. The second type, Euclidean convolutions, is independent of any underlying mesh structure. The convolutional kernel is applied on a neighborhood obtained from a local affinity representation based on the Euclidean distance between 3D points. Intuitively, geodesic convolutions can easily separate objects that are spatially close but have disconnected surfaces, while Euclidean convolutions can represent interactions between nearby objects better, as they are oblivious to object surfaces. To realize a multiresolution architecture, we borrow wellestablished mesh simplification methods from the geometry processing domain and adapt them to define meshpreserving pooling and unpooling operations. We experimentally show that combining both types of convolutions in our architecture leads to significant performance gains for 3D semantic segmentation, and we report competitive results on three scene segmentation benchmarks. Our models and code are publicly available.
 [101] arXiv:2004.01014 [pdf]

Title: The Covid19Impact Survey: Assessing the Pulse of the COVID19 Pandemic in Spain via 24 questionsSubjects: Computers and Society (cs.CY)
In this paper, we describe the results of analyzing a largescale survey, called the Covid19Impact survey, to assess citizens feedback on four areas related to the COVID19 pandemic in Spain: social contact behavior, financial impact, working situation and health status. A total of 24 questions cover the areas of demographics, their home situation, social contact behavior, personal economic impact, their workplace situation and their health. The survey was responded to by 146,728 participants over a period of 44 hours. Such a large response enables us to gain new insights, as well as an unprecedented glimpse at respondents personal experiences and concerns during the current COVID19 pandemic. From the analysis, we draw 11 implications for the design of public policies related to the management of the COVID19 pandemic.
 [102] arXiv:2004.01019 [pdf, other]

Title: Face Quality Estimation and Its Correlation to Demographic and NonDemographic Bias in Face RecognitionSubjects: Computer Vision and Pattern Recognition (cs.CV)
Face quality assessment aims at estimating the utility of a face image for the purpose of recognition. It is a key factor to achieve high face recognition performances. Currently, the high performance of these face recognition systems come with the cost of a strong bias against demographic and nondemographic subgroups. Recent work has shown that face quality assessment algorithms should adapt to the deployed face recognition system, in order to achieve highly accurate and robust quality estimations. However, this could lead to a bias transfer towards the face quality assessment leading to discriminatory effects e.g. during enrolment. In this work, we present an indepth analysis of the correlation between bias in face recognition and face quality assessment. Experiments were conducted on two publicly available datasets captured under controlled and uncontrolled circumstances with two popular face embeddings. We evaluated four stateoftheart solutions for face quality assessment towards biases to pose, ethnicity, and age. The experiments showed that the face quality assessment solutions assign significantly lower quality values towards subgroups affected by the recognition bias demonstrating that these approaches are biased as well. This raises ethical questions towards fairness and discrimination which future works have to address.
 [103] arXiv:2004.01022 [pdf, other]

Title: Provable Sample Complexity Guarantees for Learning of ContinuousAction Graphical Games with Nonparametric UtilitiesComments: arXiv admin note: text overlap with arXiv:1911.04225Subjects: Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG); Machine Learning (stat.ML)
In this paper, we study the problem of learning the exact structure of continuousaction games with nonparametric utility functions. We propose an $\ell_1$ regularized method which encourages sparsity of the coefficients of the Fourier transform of the recovered utilities. Our method works by accessing very few Nash equilibria and their noisy utilities. Under certain technical conditions, our method also recovers the exact structure of these utility functions, and thus, the exact structure of the game. Furthermore, our method only needs a logarithmic number of samples in terms of the number of players and runs in polynomial time. We follow the primaldual witness framework to provide provable theoretical guarantees.
 [104] arXiv:2004.01023 [pdf, other]

Title: MultiModal Video Forensic Platform for Investigating PostTerrorist Attack ScenariosJournalref: In Proceedings of the 11th ACM Multimedia Systems Conference (MMSys2020), June 0611, 2020, Istanbul, TurkeySubjects: Multimedia (cs.MM); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Sound (cs.SD); Audio and Speech Processing (eess.AS)
The forensic investigation of a terrorist attack poses a significant challenge to the investigative authorities, as often several thousand hours of video footage must be viewed. Large scale Video Analytic Platforms (VAP) assist law enforcement agencies (LEA) in identifying suspects and securing evidence. Current platforms focus primarily on the integration of different computer vision methods and thus are restricted to a single modality. We present a video analytic platform that integrates visual and audio analytic modules and fuses information from surveillance cameras and video uploads from eyewitnesses. Videos are analyzed according their acoustic and visual content. Specifically, Audio Event Detection is applied to index the content according to attackspecific acoustic concepts. Audio similarity search is utilized to identify similar video sequences recorded from different perspectives. Visual object detection and tracking are used to index the content according to relevant concepts. Innovative userinterface concepts are introduced to harness the full potential of the heterogeneous results of the analytical modules, allowing investigators to more quickly followup on leads and eyewitness reports.
 [105] arXiv:2004.01024 [pdf, other]

Title: Modeling Dynamic Heterogeneous Network for Link Prediction using Hierarchical Attention with Temporal RNNSubjects: Social and Information Networks (cs.SI); Machine Learning (cs.LG); Machine Learning (stat.ML)
Network embedding aims to learn lowdimensional representations of nodes while capturing structure information of networks. It has achieved great success on many tasks of network analysis such as link prediction and node classification. Most of existing network embedding algorithms focus on how to learn static homogeneous networks effectively. However, networks in the real world are more complex, e.g., networks may consist of several types of nodes and edges (called heterogeneous information) and may vary over time in terms of dynamic nodes and edges (called evolutionary patterns). Limited work has been done for network embedding of dynamic heterogeneous networks as it is challenging to learn both evolutionary and heterogeneous information simultaneously. In this paper, we propose a novel dynamic heterogeneous network embedding method, termed as DyHATR, which uses hierarchical attention to learn heterogeneous information and incorporates recurrent neural networks with temporal attention to capture evolutionary patterns. We benchmark our method on four realworld datasets for the task of link prediction. Experimental results show that DyHATR significantly outperforms several stateoftheart baselines.
 [106] arXiv:2004.01025 [pdf, ps, other]

Title: Mirrorless Mirror Descent: A More Natural Discretization of Riemannian Gradient FlowComments: 8 pagesSubjects: Machine Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
We present a direct (primal only) derivation of Mirror Descent as a "partial" discretization of gradient flow on a Riemannian manifold where the metric tensor is the Hessian of the Mirror Descent potential function. We argue that this discretization is more faithful to the geometry than Natural Gradient Descent, which is obtained by a "full" forward Euler discretization. This view helps shed light on the relationship between the methods and allows generalizing Mirror Descent to any Riemannian geometry, even when the metric tensor is not a Hessian, and thus there is no "dual."
 [107] arXiv:2004.01030 [pdf, other]

Title: Objects of violence: synthetic data for practical ML in human rights investigationsAuthors: Lachlan Kermode, Jan Freyberg, Alican Akturk, Robert Trafford, Denis Kochetkov, Rafael Pardinas, Eyal Weizman, Julien CornebiseComments: Presented at NeurIPS 2019 in the AI for Social Good trackSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
We introduce a machine learning workflow to search for, identify, and meaningfully triage videos and images of munitions, weapons, and military equipment, even when limited training data exists for the object of interest. This workflow is designed to expedite the work of OSINT ("open source intelligence") researchers in human rights investigations. It consists of three components: automatic rendering and annotating of synthetic datasets that make up for a lack of training data; training image classifiers from combined sets of photographic and synthetic data; and mtriage, an open source software that orchestrates these classifiers' deployment to triage public domain media, and visualise predictions in a web interface. We show that synthetic data helps to train classifiers more effectively, and that certain approaches yield better results for different architectures. We then demonstrate our workflow in two realworld human rights investigations: the use of the TripleChaser tear gas grenade against civilians, and the verification of allegations of military presence in Ukraine in 2014.
 [108] arXiv:2004.01031 [pdf, other]

Title: Generate CountryScale Networks of Interaction from Scattered StatisticsComments: 12 pages. arXiv admin note: substantial text overlap with arXiv:2003.02213Journalref: in Proceedings of The Fifth Conference of the European Social Simulation Association (ESSA'2008), Brescia, ItalySubjects: Multiagent Systems (cs.MA); Social and Information Networks (cs.SI); Applications (stat.AP)
It is common to define the structure of interactions among a population of agents by a network. Most of agentbased models were shown highly sensitive to that network, so the relevance of simulation results directely depends on the descriptive power of that network. When studying social dynamics in large populations, that network cannot be collected, and is rather generated by algorithms which aim to fit general properties of social networks. However, more precise data is available at a country scale in the form of sociodemographic studies, census or sociological studies. These "scattered statistics" provide rich information, especially on agents' attributes, similar properties of tied agents and affiliations. In this paper, we propose a generic methodology to bring up together these scattered statistics with bayesian networks. We explain how to generate a population of heterogeneous agents, and how to create links by using both scattered statistics and knowledge on social selection processes. The methodology is illustrated by generating an interaction network for rural Kenya which includes familial structure, colleagues and friendship constrained given field studies and statistics.
 [109] arXiv:2004.01032 [pdf, other]

Title: GrammarCompressed Indexes with Logarithmic Search TimeComments: arXiv admin note: substantial text overlap with arXiv:1110.4493Subjects: Data Structures and Algorithms (cs.DS)
Let a text $T[1..n]$ be the only string generated by a contextfree grammar with $g$ (terminal and nonterminal) symbols, and of size $G$ (measured as the sum of the lengths of the righthand sides of the rules). Such a grammar, called a grammarcompressed representation of $T$, can be encoded using essentially $G\lg g$ bits. We introduce the first grammarcompressed index that uses $O(G\lg n)$ bits and can find the $occ$ occurrences of patterns $P[1..m]$ in time $O((m^2+occ)\lg G)$. We implement the index and demonstrate its practicality in comparison with the state of the art, on highly repetitive text collections.
 [110] arXiv:2004.01041 [pdf, other]

Title: Near Optimality and Tractability in Stochastic Nonlinear ControlSubjects: Systems and Control (eess.SY); Robotics (cs.RO)
We consider the problem of nonlinear stochastic optimal control. This is fundamentally intractable owing to Bellman's infamous "curse of dimensionality". We present a "decoupling principle" for the tractable feedback design for such problems, wherein, first, a nominal openloop problem is solved, followed by a suitable linear feedback design around the openloop. The performance of the resulting feedback law is shown to be asymptotically close to the true stochastic feedback law to fourth order in a small noise parameter $\epsilon$. The decoupling theory is empirically tested on robotic planning problems under uncertainty.
 [111] arXiv:2004.01045 [pdf, other]

Title: Topological Properties of MultiParty Blockchain TransactionsAuthors: Dongfang ZhaoSubjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)
The crossblockchain transaction remains one of the most challenging problems in blockchains. The root cause of the challenge lies in the nondeterministic nature of blockchains: A transaction across multiple blockchains might be partially rolled back due to the potential forks in any of the participating blockchainseventually, only one fork will survive in the competition among miners. While some effort has recently been made to developing hierarchically distributed commit protocols to make multiparty transactions progress, there is no systematic method to reason about the transaction results. This paper tackles this problem from a perspective of pointset topology. We construct multiple topology spaces for the transactions and blockchain forks, and show that these spaces are internally related through either homeomorphism or continuous functions. Combined together, these tools allow us to reason about the crossblockchain transactions through the growingfork topology, an intuitive representation of blockchains. As of writing, this paper is the first study on pointset topological properties of blockchains.
 [112] arXiv:2004.01056 [pdf, other]

Title: Improving Confidence in the Estimation of Values and NormsAuthors: Luciano Cavalcante Siebert, Rijk Mercuur, Virginia Dignum, Jeroen van den Hoven, Catholijn JonkerComments: 16 pages, 3 figures, preprint for the International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of MultiAgent Systems (COINE), colocated with AAMAS 2020Subjects: Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)
Autonomous agents (AA) will increasingly be interacting with us in our daily lives. While we want the benefits attached to AAs, it is essential that their behavior is aligned with our values and norms. Hence, an AA will need to estimate the values and norms of the humans it interacts with, which is not a straightforward task when solely observing an agent's behavior. This paper analyses to what extent an AA is able to estimate the values and norms of a simulated human agent (SHA) based on its actions in the ultimatum game. We present two methods to reduce ambiguity in profiling the SHAs: one based on search space exploration and another based on counterfactual analysis. We found that both methods are able to increase the confidence in estimating human values and norms, but differ in their applicability, the latter being more efficient when the number of interactions with the agent is to be minimized. These insights are useful to improve the alignment of AAs with human values and norms.
 [113] arXiv:2004.01059 [pdf, other]

Title: Effect of Annotation Errors on Drone Detection with YOLOv3Subjects: Computer Vision and Pattern Recognition (cs.CV)
Following the recent advances in deep networks, object detection and tracking algorithms with deep learning backbones have been improved significantly; however, this rapid development resulted in the necessity of large amounts of annotated labels. Even if the details of such semiautomatic annotation processes for most of these datasets are not known precisely, especially for the video annotations, some automated labeling processes are usually employed. Unfortunately, such approaches might result with erroneous annotations. In this work, different types of annotation errors for object detection problem are simulated and the performance of a popular stateoftheart object detector, YOLOv3, with erroneous annotations during training and testing stages is examined. Moreover, some inevitable annotation errors in AntiUAV Challenge dataset is also examined in this manner, while proposing a solution to correct such annotation errors of this valuable data set.
 [114] arXiv:2004.01062 [html]

Title: Proceedings of the 12th International Workshop on Programming Language Approaches to Concurrency and CommunicationcEntric SoftwareJournalref: EPTCS 314, 2020Subjects: Programming Languages (cs.PL); Distributed, Parallel, and Cluster Computing (cs.DC)
Modern hardware platforms, from the very small to the very large, increasingly provide parallel and distributed computing resources for applications to maximise performance. Many applications therefore need to make effective use of tens, hundreds, and even thousands of compute nodes. Computation in such systems is thus inherently concurrent and communication centric. Effectively programming such applications is challenging; performance, correctness, and scalability are difficult to achieve. The development of effective programming methodologies for this increasingly parallel landscape therefore demands exploration and understanding of a wide variety of foundational and practical ideas. The International Workshop on Programming Language Approaches to Concurrency and CommunicationcEntric Software (PLACES) is dedicated to work in this area. The workshop offers a forum for researchers from different fields to exchange new ideas about these challenges to modern and future programming, where concurrency and distribution are the norm rather than a marginal concern. This volume contains the proceedings of the 12th edition of PLACES, which was colocated with ETAPS 2020 in Dublin, Ireland.
 [115] arXiv:2004.01071 [pdf, other]

Title: Modelbased disentanglement of lens occlusionsComments: Submitted to conferenceSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
With lens occlusions, naive imagetoimage networks fail to learn an accurate source to target mapping, due to the partial entanglement of the scene and occlusion domains. We propose an unsupervised modelbased disentanglement training, which learns to disentangle scene from lens occlusion and can regress the occlusion model parameters from target database. The experiments demonstrate our method is able to handle varying types of occlusions (raindrops, dirt, watermarks, etc.) and generate highly realistic translations, qualitatively and quantitatively outperforming the stateoftheart on multiple datasets.
 [116] arXiv:2004.01077 [pdf, other]

Title: Learning Sparse & Ternary Neural Networks with EntropyConstrained Trained Ternarization (EC2T)Comments: Under review. Code is available at this https URLSubjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)
Deep neural networks (DNN) have shown remarkable success in a variety of machine learning applications. The capacity of these models (i.e., number of parameters), endows them with expressive power and allows them to reach the desired performance. In recent years, there is an increasing interest in deploying DNNs to resourceconstrained devices (i.e., mobile devices) with limited energy, memory, and computational budget. To address this problem, we propose EntropyConstrained Trained Ternarization (EC2T), a general framework to create sparse and ternary neural networks which are efficient in terms of storage (e.g., at most two binarymasks and two fullprecision values are required to save a weight matrix) and computation (e.g., MAC operations are reduced to a few accumulations plus two multiplications). This approach consists of two steps. First, a supernetwork is created by scaling the dimensions of a pretrained model (i.e., its width and depth). Subsequently, this supernetwork is simultaneously pruned (using an entropy constraint) and quantized (that is, ternary values are assigned layerwise) in a training process, resulting in a sparse and ternary network representation. We validate the proposed approach in CIFAR10, CIFAR100, and ImageNet datasets, showing its effectiveness in image classification tasks.
 [117] arXiv:2004.01079 [pdf, other]

Title: Revisiting the linearity in crosslingual embedding mappings: from a perspective of word analogiesComments: Comments welcome!Subjects: Computation and Language (cs.CL)
Most crosslingual embedding mapping algorithms assume the optimised transformation functions to be linear. Recent studies showed that on some occasions, learning a linear mapping does not work, indicating that the commonlyused assumption may fail. However, it still remains unclear under which conditions the linearity of crosslingual embedding mappings holds. In this paper, we rigorously explain that the linearity assumption relies on the consistency of analogical relations encoded by multilingual embeddings. We did extensive experiments to validate this claim. Empirical results based on the analogy completion benchmark and the BLI task demonstrate a strong correlation between whether mappings capture analogical information and are linear.
 [118] arXiv:2004.01084 [pdf]

Title: Patterns of population displacement during megafires in California detected using Facebook Disaster MapsComments: 16 pages with supplemental informationSubjects: Computers and Society (cs.CY)
Facebook Disaster Maps (FBDM) is the first platform providing analysisready population change products derived from crowdsourced data targeting disaster relief practices. We evaluate the representativeness of FBDM data using the MannKendall test and emerging hot and cold spots in an anomaly analysis to reveal the trend, magnitude, and agglommeration of population displacement during the Mendocino Complex and Woolsey fires in California, USA. Our results show that the distribution of FBDM precrisis users fits well with the total population from different sources. Due to usage habits, the elder population is underrepresented in FBDM data. During the two megafires in California, FBDM data effectively captured the temporal change of population arising from the placing and lifting of evacuation orders. Coupled with monotonic trends, the fall and rise of cold and hot spots of population revealed the areas with the greatest population drop and potential places to house the displaced residents. A comparison between the Mendocino Complex and Woolsey fires indicates that a densely populated region can be evacuated faster than a scarcely populated one, possibly due to the better access to transportation. In sparsely populated fireprone areas, resources should be prioritized to move people to shelters as the displaced residents do not have many alternative options, while their counterparts in densely populated areas can utilize their social connections to seek temporary stay at nearby locations during an evacuation. Integrated with an assessment on underrepresented communities, FBDM data and the derivatives can provide much needed information of near realtime population displacement for crisis response and disaster relief. As applications and data generation mature, FBDM will harness crowdsourced data and aid first responder decisionmaking.
 [119] arXiv:2004.01090 [pdf, ps, other]

Title: Analysis of MultiMessages Retransmission SchemesSubjects: Information Theory (cs.IT)
Hybrid Automatic ReQuest (HARQ) protocol enables reliable communications in wireless systems. Usually, several parallel streams are sent in successive timeslots following a timesharing approach. Recently, multilayer HARQ has been proposed by superposing packets within a timeslot. In this paper, we evaluate the potential of this multilayer HARQ by playing with some design parameters. We show that a gain in throughput is only obtained at midSignaltoNoise Ratio (SNR).
 [120] arXiv:2004.01091 [pdf, other]

Title: Learning Longterm Representations for Person ReIdentification Using Radio SignalsComments: CVPR 2020. The first three authors contributed equally to this paperSubjects: Computer Vision and Pattern Recognition (cs.CV)
Person ReIdentification (ReID) aims to recognize a personofinterest across different places and times. Existing ReID methods rely on images or videos collected using RGB cameras. They extract appearance features like clothes, shoes, hair, etc. Such features, however, can change drastically from one day to the next, leading to inability to identify people over extended time periods. In this paper, we introduce RFReID, a novel approach that harnesses radio frequency (RF) signals for longterm person ReID. RF signals traverse clothes and reflect off the human body; thus they can be used to extract more persistent humanidentifying features like body size and shape. We evaluate the performance of RFReID on longitudinal datasets that span days and weeks, where the person may wear different clothes across days. Our experiments demonstrate that RFReID outperforms stateoftheart RGBbased ReID approaches for long term person ReID. Our results also reveal two interesting features: First since RF signals work in the presence of occlusions and poor lighting, RFReID allows for person ReID in such scenarios. Second, unlike photos and videos which reveal personal and private information, RF signals are more privacypreserving, and hence can help extend person ReID to privacyconcerned domains, like healthcare.
 [121] arXiv:2004.01092 [pdf, ps, other]

Title: NUBES: A Corpus of Negation and Uncertainty in Spanish Clinical TextsComments: Accepted at the Twelfth International Conference on Language Resources and Evaluation (LREC 2020)Subjects: Computation and Language (cs.CL)
This paper introduces the first version of the NUBes corpus (Negation and Uncertainty annotations in Biomedical texts in Spanish). The corpus is part of an ongoing research and currently consists of 29,682 sentences obtained from anonymised health records annotated with negation and uncertainty. The article includes an exhaustive comparison with similar corpora in Spanish, and presents the main annotation and design decisions. Additionally, we perform preliminary experiments using deep learning algorithms to validate the annotated dataset. As far as we know, NUBes is the largest publicly available corpus for negation in Spanish and the first that also incorporates the annotation of speculation cues, scopes, and events.
 [122] arXiv:2004.01095 [pdf, other]

Title: MCEN: Bridging CrossModal Gap between Cooking Recipes and Dish Images with Latent Variable ModelComments: Accepted to CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL)
Nowadays, driven by the increasing concern on diet and health, food computing has attracted enormous attention from both industry and research community. One of the most popular research topics in this domain is Food Retrieval, due to its profound influence on healthoriented applications. In this paper, we focus on the task of crossmodal retrieval between food images and cooking recipes. We present ModalityConsistent Embedding Network (MCEN) that learns modalityinvariant representations by projecting images and texts to the same embedding space. To capture the latent alignments between modalities, we incorporate stochastic latent variables to explicitly exploit the interactions between textual and visual features. Importantly, our method learns the crossmodal alignments during training but computes embeddings of different modalities independently at inference time for the sake of efficiency. Extensive experimental results clearly demonstrate that the proposed MCEN outperforms all existing approaches on the benchmark Recipe1M dataset and requires less computational cost.
 [123] arXiv:2004.01097 [pdf, other]

Title: Learning to cooperate: Emergent communication in multiagent navigationSubjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Multiagent Systems (cs.MA); Machine Learning (stat.ML)
Emergent communication in artificial agents has been studied to understand language evolution, as well as to develop artificial systems that learn to communicate with humans. We show that agents performing a cooperative navigation task in various gridworld environments learn an interpretable communication protocol that enables them to efficiently, and in many cases, optimally, solve the task. An analysis of the agents' policies reveals that emergent signals spatially cluster the state space, with signals referring to specific locations and spatial directions such as "left", "up", or "upper left room". Using populations of agents, we show that the emergent protocol has basic compositional structure, thus exhibiting a core property of natural language.
 [124] arXiv:2004.01098 [pdf, other]

Title: Information State Embedding in Partially Observable Cooperative MultiAgent Reinforcement LearningComments: Submitted to CDC 2020Subjects: Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
Multiagent reinforcement learning (MARL) under partial observability has long been considered challenging, primarily due to the requirement for each agent to maintain a belief over all other agents' local histories  a domain that generally grows exponentially over time. In this work, we investigate a partially observable MARL problem in which agents are cooperative. To enable the development of tractable algorithms, we introduce the concept of an information state embedding that serves to compress agents' histories. We quantify how the compression error influences the resulting value functions for decentralized control. Furthermore, we propose three natural embeddings, based on finitememory truncation, principal component analysis, and recurrent neural networks. The output of these embeddings are then used as the information state, and can be fed into any MARL algorithm. The proposed embedthenlearn pipeline opens the blackbox of existing MARL algorithms, allowing us to establish some theoretical guarantees (error bounds of value functions) while still achieving competitive performance with many endtoend approaches.
 [125] arXiv:2004.01099 [pdf]

Title: Natural Language Processing (NLP) for Requirements Engineering: A Systematic Mapping StudyAuthors: Liping Zhao, Waad Alhoshan, Alessio Ferrari, Keletso J. Letsholo, Muideen A. Ajagbe, ErolValeriu Chioasca, Riza T. BatistaNavarroComments: 35 pagesSubjects: Software Engineering (cs.SE)
Natural language processing supported requirements engineering is an area of research and development that seeks to apply NLP techniques, tools and resources to a variety of requirements documents or artifacts to support a range of linguistic analysis tasks performed at various RE phases. Such tasks include detecting language issues, identifying key domain concepts and establishing traceability links between requirements. This article surveys the landscape of NLP4RE research to understand the state of the art and identify open problems. The systematic mapping study approach is used to conduct this survey, which identified 404 relevant primary studies and reviewed them according to five research questions, cutting across five aspects of NLP4RE research, concerning the state of the literature, the state of empirical research, the research focus, the state of the practice, and the NLP technologies used. Results: 1) NLP4RE is an active and thriving research area in RE that has amassed a large number of publications and attracted widespread attention from diverse communities; 2) most NLP4RE studies are solution proposals having only been evaluated using a laboratory experiment or an example application; 3) most studies have focused on the analysis phase, with detection as their central linguistic analysis task and requirements specification as their commonly processed document type; 4) 130 new tools have been proposed to support a range of linguistic analysis tasks, but there is little evidence of adoption in the long term, although some industrial applications have been published; 5) 140 NLP techniques, 66 NLP tools and 25 NLP resources are extracted from the selected studies.
 [126] arXiv:2004.01101 [pdf, other]

Title: MapEnhanced EgoLane Detection in the Missing Feature ScenariosComments: Submitted to IEEE ACCESSSubjects: Computer Vision and Pattern Recognition (cs.CV)
As one of the most important tasks in autonomous driving systems, egolane detection has been extensively studied and has achieved impressive results in many scenarios. However, egolane detection in the missing feature scenarios is still an unsolved problem. To address this problem, previous methods have been devoted to proposing more complicated feature extraction algorithms, but they are very timeconsuming and cannot deal with extreme scenarios. Different from others, this paper exploits prior knowledge contained in digital maps, which has a strong capability to enhance the performance of detection algorithms. Specifically, we employ the road shape extracted from OpenStreetMap as lane model, which is highly consistent with the real lane shape and irrelevant to lane features. In this way, only a few lane features are needed to eliminate the position error between the road shape and the real lane, and a searchbased optimization algorithm is proposed. Experiments show that the proposed method can be applied to various scenarios and can run in realtime at a frequency of 20 Hz. At the same time, we evaluated the proposed method on the public KITTI Lane dataset where it achieves stateoftheart performance. Moreover, our code will be open source after publication.
 [127] arXiv:2004.01106 [pdf, other]

Title: The Paradox of Information Access: On Modeling SocialMediaInduced PolarizationSubjects: Social and Information Networks (cs.SI)
The paper develops a stochastic model of drift in human beliefs that shows that today's sheer volume of accessible information, combined with consumers' confirmation bias and natural preference to more outlying content, necessarily lead to increased polarization. The model explains the paradox of growing ideological fragmentation in the age of increased sharing. As social media, search engines, and other realtime information sharing outlets purport to facilitate access to information, a need for content filtering arises due to the ensuing information overload. In general, consumers select information that matches their individual views and values. The bias inherent in such selection is echoed by today's information curation services that maximize user engagement by filtering new content in accordance with observed consumer preferences. Consequently, individuals get exposed to increasingly narrower bands of the ideology spectrum, thus fragmenting society into increasingly ideologically isolated enclaves. We call this dynamic the paradox of information access. The model also suggests the disproportionate damage attainable with a small infusion of wellpositioned misinformation. The paper describes the modeling methodology, and evaluates modeling results for different population sizes and parameter settings.
 [128] arXiv:2004.01110 [pdf, other]

Title: An AttentionBased Deep Learning Model for Multiple Pedestrian Attributes RecognitionComments: Submitted to Image and Vision Computing journalSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
The automatic characterization of pedestrians in surveillance footage is a tough challenge, particularly when the data is extremely diverse with cluttered backgrounds, and subjects are captured from varying distances, under multiple poses, with partial occlusion. Having observed that the stateoftheart performance is still unsatisfactory, this paper provides a novel solution to the problem, with twofold contributions: 1) considering the strong semantic correlation between the different fullbody attributes, we propose a multitask deep model that uses an elementwise multiplication layer to extract more comprehensive feature representations. In practice, this layer serves as a filter to remove irrelevant background features, and is particularly important to handle complex, cluttered data; and 2) we introduce a weightedsum term to the loss function that not only relativizes the contribution of each task (kind of attributed) but also is crucial for performance improvement in multipleattribute inference settings. Our experiments were performed on two wellknown datasets (RAP and PETA) and point for the superiority of the proposed method with respect to the stateoftheart. The code is available at https://github.com/EhsanYaghoubi/MANPAR.
 [129] arXiv:2004.01113 [pdf, other]

Title: ProxyNCA++: Revisiting and Revitalizing Proxy Neighborhood Component AnalysisSubjects: Computer Vision and Pattern Recognition (cs.CV)
We consider the problem of distance metric learning (DML), where the task is to learn an effective similarity measure between images. We revisit ProxyNCA and incorporate several enhancements. We find that low temperature scaling is a performancecritical component and explain why it works. Besides, we also discover that Global Max Pooling works better in general when compared to Global Average Pooling. Additionally, our proposed fast moving proxies also addresses small gradient issue of proxies, and this component synergizes well with low temperature scaling and Global Max Pooling. Our enhanced model, called ProxyNCA++, achieves a 22.9 percentage point average improvement of Recall@1 across four different zeroshot retrieval datasets compared to the original ProxyNCA algorithm. Furthermore, we achieve stateoftheart results on the CUB200, Cars196, Sop, and InShop datasets, achieving Recall@1 scores of 72.2, 90.1, 81.4, and 90.9, respectively.
 [130] arXiv:2004.01120 [pdf, other]

Title: On Locating Paths in Compressed Cardinal TreesAuthors: Nicola PrezzaSubjects: Data Structures and Algorithms (cs.DS)
A compressed index is a data structure representing a text within compressed space and supporting fast indexing queries: given a pattern, count/return all positions where the pattern occurs. In recent years, powerful compressed indexes have emerged. These are based on Entropy, the LempelZiv factorization, the runlength BurrowsWheeler Transform (BWT), contextfree grammars and, more recently, string attractors. Trees add a whole new dimension to the problem: one needs not only to compress the labels, but also the tree's topology. On this side, less is known. Jacobson showed how to represent the topology of a tree with $n$ nodes in $2n+o(n)$ bits of space (succinct) while also supporting constanttime navigation queries. Ferragina et al. presented the first entropycompressed labeled tree representation (the XBWT) able to count, but not locate, paths labeled with a given pattern. Grammars and the LempelZiv factorization have been extended to trees, but those representations do not support indexing queries. In this paper, we extend to cardinal trees (i.e. tries) the most powerful string compression and indexing tools known to date. We start by proposing suitable generalizations of runlength BWT, highorder entropy, and string attractors to cardinal trees. We show that the number $r\leq n$ of XBWTruns upperbounds the size of the smallest tree attractor and lowerbounds the trie's highorder worstcase entropy $\mathcal H^{wc}_k$. The main result of this paper is the first tree index able to \emph{locate} in preorder nodes reached by a path labeled with a given pattern. Our index locates path occurrences in constant time each and takes $2n + o(n) + O(r\log n) \leq 2n + o(n) + O(\mathcal H^{wc}_k\log n)$ bits of space: the reporting time is optimal and the locate machinery fits within compressed space on top of the tree's topology.
 [131] arXiv:2004.01122 [pdf, other]

Title: On the Principles of Differentiable Quantum Programming LanguagesComments: Codes are available at this https URLSubjects: Programming Languages (cs.PL); Machine Learning (cs.LG); Quantum Physics (quantph)
Variational Quantum Circuits (VQCs), or the socalled quantum neuralnetworks, are predicted to be one of the most important nearterm quantum applications, not only because of their similar promises as classical neuralnetworks, but also because of their feasibility on nearterm noisy intermediatesize quantum (NISQ) machines. The need for gradient information in the training procedure of VQC applications has stimulated the development of autodifferentiation techniques for quantum circuits. We propose the first formalization of this technique, not only in the context of quantum circuits but also for imperative quantum programs (e.g., with controls), inspired by the success of differentiable programming languages in classical machine learning. In particular, we overcome a few unique difficulties caused by exotic quantum features (such as quantum nocloning) and provide a rigorous formulation of differentiation applied to boundedloop imperative quantum programs, its codetransformation rules, as well as a sound logic to reason about their correctness. Moreover, we have implemented our code transformation in OCaml and demonstrated the resourceefficiency of our scheme both analytically and empirically. We also conduct a case study of training a VQC instance with controls, which shows the advantage of our scheme over existing autodifferentiation for quantum circuits without controls.
 [132] arXiv:2004.01123 [pdf]

Title: Surrogateassisted performance tuning of knowledge discovery algorithms: application to clinical pathway evolutionary modelingSubjects: Machine Learning (cs.LG); Mathematical Software (cs.MS); Machine Learning (stat.ML)
The paper proposes an approach for surrogateassisted tuning of knowledge discovery algorithms. The approach is based on the prediction of both the quality and performance of the target algorithm. The prediction is furtherly used as objectives for the optimization and tuning of the algorithm. The approach is investigated using clinical pathways (CP) discovery problem resolved using the evolutionarybased clustering of electronic health records (EHR). Target algorithm and the proposed approach were applied to the discovery of CPs for Acute Coronary Syndrome patients in 3434 EHRs of patients treated in Almazov National Medical Research Center (Saint Petersburg, Russia). The study investigates the possible acquisition of interpretable clusters of typical CPs within a single disease. It shows how the approach could be used to improve complex datadriven analytical knowledge discovery algorithms. The study of the results includes the feature importance of the best surrogate model and discover how the parameters of input data influence the predictions.
 [133] arXiv:2004.01124 [pdf, other]

Title: Nass: A New Approach to Graph Similarity SearchAuthors: Jongik KimSubjects: Databases (cs.DB)
In this paper, we study the problem of graph similarity search with graph edit distance (GED) constraints. Due to the NPhardness of GED computation, existing solutions to this problem adopt the filteringandverification framework with a main focus on the filtering phase to generate a small number of candidate graphs. However, they have a limitation that the number of candidates grows extremely rapidly as a GED threshold increases. To address the limitation, we propose a new approach that utilizes GED computation results in generating candidate graphs. The main idea is that whenever we identify a result graph of the query, we immediately regenerate candidate graphs using a subset of precomputed graphs similar to the identified result graph. To speed up GED computation, we also develop a novel GED computation algorithm. The proposed algorithm reduces the search space for GED computation by utilizing a series of filtering techniques, which have been used to generate candidates in existing solutions. Experimental results on real datasets demonstrate the proposed approach significantly outperforms the stateofthe art techniques.
 [134] arXiv:2004.01130 [pdf, other]

Title: BUDA: Boundless Unsupervised Domain Adaptation in Semantic SegmentationSubjects: Computer Vision and Pattern Recognition (cs.CV)
In this work, we define and address "Boundless Unsupervised Domain Adaptation" (BUDA), a novel problem in semantic segmentation. BUDA setup pictures a realistic scenario where unsupervised target domain not only exhibits a data distribution shift w.r.t. supervised source domain but also includes classes that are absent from the latter. Different to "openset" and "universal domain adaptation", which both regard neverseen objects as "unknown", BUDA aims at explicit testtime prediction for these neverseen classes. To reach this goal, we propose a novel framework leveraging domain adaptation and zeroshot learning techniques to enable "boundless" adaptation on the target domain. Performance is further improved using selftraining on target pseudolabels. For validation, we consider different domain adaptation setups, namely synthetic2real, country2country and dataset2dataset. Our framework outperforms the baselines by significant margins, setting competitive standards on all benchmarks for the new task. Code and models are available at:~\url{https://github.com/valeoai/buda}.
 [135] arXiv:2004.01136 [pdf, other]

Title: Hierarchical Adaptive Contextual Bandits for Resource Constraint based RecommendationComments: Accepted for publication at WWW (The Web Conference) 2020Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
Contextual multiarmed bandit (MAB) achieves cuttingedge performance on a variety of problems. When it comes to realworld scenarios such as recommendation system and online advertising, however, it is essential to consider the resource consumption of exploration. In practice, there is typically nonzero cost associated with executing a recommendation (arm) in the environment, and hence, the policy should be learned with a fixed exploration cost constraint. It is challenging to learn a global optimal policy directly, since it is a NPhard problem and significantly complicates the exploration and exploitation tradeoff of bandit algorithms. Existing approaches focus on solving the problems by adopting the greedy policy which estimates the expected rewards and costs and uses a greedy selection based on each arm's expected reward/cost ratio using historical observation until the exploration resource is exhausted. However, existing methods are hard to extend to infinite time horizon, since the learning process will be terminated when there is no more resource. In this paper, we propose a hierarchical adaptive contextual bandit method (HATCH) to conduct the policy learning of contextual bandits with a budget constraint. HATCH adopts an adaptive method to allocate the exploration resource based on the remaining resource/time and the estimation of reward distribution among different user contexts. In addition, we utilize full of contextual feature information to find the best personalized recommendation. Finally, in order to prove the theoretical guarantee, we present a regret bound analysis and prove that HATCH achieves a regret bound as low as $O(\sqrt{T})$. The experimental results demonstrate the effectiveness and efficiency of the proposed method on both synthetic data sets and the realworld applications.
 [136] arXiv:2004.01138 [pdf, other]

Title: Numerical analysis of least squares and perceptron learning for classification problemsAuthors: L. BeilinaSubjects: Numerical Analysis (math.NA)
This work presents study on regularized and nonregularized versions of perceptron learning and least squares algorithms for classification problems. Fr'echet derivatives for regularized least squares and perceptron learning algorithms are derived. Different techniques for choosing the regularization parameter are discussed. Decision boundaries obtained by nonregularized algorithms to classify simulated and experimental data sets are analyzed.
 [137] arXiv:2004.01141 [pdf, ps, other]

Title: Predictive BanditsComments: 10 pages, 4 figures, conferenceSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
We introduce and study a new class of stochastic bandit problems, referred to as predictive bandits. In each round, the decision maker first decides whether to gather information about the rewards of particular arms (so that their rewards in this round can be predicted). These measurements are costly, and may be corrupted by noise. The decision maker then selects an arm to be actually played in the round. Predictive bandits find applications in many areas; e.g. they can be applied to channel selection problems in radio communication systems. In this paper, we provide the first theoretical results about predictive bandits, and focus on scenarios where the decision maker is allowed to measure at most one arm per round. We derive asymptotic instancespecific regret lower bounds for these problems, and develop algorithms whose regret match these fundamental limits. We illustrate the performance of our algorithms through numerical experiments. In particular, we highlight the gains that can be achieved by using reward predictions, and investigate the impact of the noise in the corresponding measurements.
 [138] arXiv:2004.01142 [pdf, other]

Title: Safe Feedback Motion Planning: A Contraction Theory and $\mathcal{L}_1$Adaptive Control Based ApproachComments: Submitted to the Conference on Decision and Control (CDC) 2020Subjects: Systems and Control (eess.SY); Robotics (cs.RO)
Autonomous robots that are capable of operating safely in the presence of imperfect model knowledge or external disturbances are vital in safetycritical applications. In this paper, we present a planneragnostic framework to design and certify safe tubes around desired trajectories that the robot is always guaranteed to remain inside of. By leveraging recent results in contraction analysis and $\mathcal{L}_1$adaptive control we synthesize an architecture that induces safe tubes for nonlinear systems with state and timevarying uncertainties. We demonstrate with a few illustrative examples how contraction theorybased $\mathcal{L}_1$adaptive control can be used in conjunction with traditional motion planning algorithms to obtain provably safe trajectories.
 [139] arXiv:2004.01144 [pdf, other]

Title: Predicting Injectable Medication Adherence via a Smart Sharps Bin and Machine LearningComments: This paper has been accepted by IEEE IoT World ForumSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
Medication nonadherence is a widespread problem affecting over 50% of people who have chronic illness and need chronic treatment. Nonadherence exacerbates health risks and drives significant increases in treatment costs. In order to address these challenges, the importance of predicting patients' adherence has been recognised. In other words, it is important to improve the efficiency of interventions of the current healthcare system by prioritizing resources to the patients who are most likely to be nonadherent. Our objective in this work is to make predictions regarding individual patients' behaviour in terms of taking their medication on time during their next scheduled medication opportunity. We do this by leveraging a number of machine learning models. In particular, we demonstrate the use of a connected IoT device; a "Smart Sharps Bin", invented by HealthBeacon Ltd.; to monitor and track injection disposal of patients in their home environment. Using extensive data collected from these devices, five machine learning models, namely Extra Trees Classifier, Random Forest, XGBoost, Gradient Boosting and Multilayer Perception were trained and evaluated on a large dataset comprising 165,223 historic injection disposal records collected from 5,915 HealthBeacon units over the course of 3 years. The testing work was conducted on realtime data generated by the smart device over a time period after the model training was complete, i.e. true future data. The proposed machine learning approach demonstrated very good predictive performance exhibiting an Area Under the Receiver Operating Characteristic Curve (ROC AUC) of 0.86.
 [140] arXiv:2004.01156 [pdf, other]

Title: No Repetition: Fast Streaming with Highly Concentrated HashingAuthors: Anders Aamand, Debarati Das, Evangelos Kipouridis, Jakob B. T. Knudsen, Peter M. R. Rasmussen, Mikkel ThorupComments: 10 pagesSubjects: Data Structures and Algorithms (cs.DS)
To get estimators that work within a certain error bound with high probability, a common strategy is to design one that works with constant probability, and then boost the probability using independent repetitions. Important examples of this approach are small space algorithms for estimating the number of distinct elements in a stream, or estimating the set similarity between large sets. Using standard strongly universal hashing to process each element, we get a sketch based estimator where the probability of a too large error is, say, 1/4. By performing $r$ independent repetitions and taking the median of the estimators, the error probability falls exponentially in $r$. However, running $r$ independent experiments increases the processing time by a factor $r$.
Here we make the point that if we have a hash function with strong concentration bounds, then we get the same high probability bounds without any need for repetitions. Instead of $r$ independent sketches, we have a single sketch that is $r$ times bigger, so the total space is the same. However, we only apply a single hash function, so we save a factor $r$ in time, and the overall algorithms just get simpler.
Fast practical hash functions with strong concentration bounds were recently proposed by Aamand em et al. (to appear in STOC 2020). Using their hashing schemes, the algorithms thus become very fast and practical, suitable for online processing of high volume data streams.  [141] arXiv:2004.01160 [pdf, other]

Title: Multimodal Material Classification for Robots using Spectroscopy and High Resolution Texture ImagingComments: 8 pages, 10 figures, 5 tablesSubjects: Robotics (cs.RO); Machine Learning (cs.LG)
Material recognition can help inform robots about how to properly interact with and manipulate realworld objects. In this paper, we present a multimodal sensing technique, leveraging nearinfrared spectroscopy and closerange high resolution texture imaging, that enables robots to estimate the materials of household objects. We release a dataset of high resolution texture images and spectral measurements collected from a mobile manipulator that interacted with 144 household objects. We then present a neural network architecture that learns a compact multimodal representation of spectral measurements and texture images. When generalizing material classification to new objects, we show that this multimodal representation enables a robot to recognize materials with greater performance as compared to prior stateoftheart approaches. Finally, we present how a robot can combine this high resolution local sensing with images from the robot's headmounted camera to achieve accurate material classification over a scene of objects on a table.
 [142] arXiv:2004.01166 [pdf, other]

Title: Bodies at Rest: 3D Human Pose and Shape Estimation from a Pressure Image using Synthetic DataComments: 18 pages, 18 figures, 5 tables. Accepted for oral presentation at CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
People spend a substantial part of their lives at rest in bed. 3D human pose and shape estimation for this activity would have numerous beneficial applications, yet lineofsight perception is complicated by occlusion from bedding. Pressure sensing mats are a promising alternative, but training data is challenging to collect at scale. We describe a physicsbased method that simulates human bodies at rest in a bed with a pressure sensing mat, and present PressurePose, a synthetic dataset with 206K pressure images with 3D human poses and shapes. We also present PressureNet, a deep learning model that estimates human pose and shape given a pressure image and gender. PressureNet incorporates a pressure map reconstruction (PMR) network that models pressure image generation to promote consistency between estimated 3D body models and pressure image input. In our evaluations, PressureNet performed well with real data from participants in diverse poses, even though it had only been trained with synthetic data. When we ablated the PMR network, performance dropped substantially.
 [143] arXiv:2004.01167 [pdf, other]

Title: Sumproduct networks: A surveyComments: 24 pages, 6 figures, 97 referencesSubjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)
A sumproduct network (SPN) is a probabilistic model, based on a rooted acyclic directed graph, in which terminal nodes represent univariate probability distributions and nonterminal nodes represent convex combinations (weighted sums) and products of probability functions. They are closely related to probabilistic graphical models, in particular to Bayesian networks with multiple contextspecific independencies. Their main advantage is the possibility of building tractable models from data, i.e., models that can perform several inference tasks in time proportional to the number of links in the graph. They are somewhat similar to neural networks and can address the same kinds of problems, such as image processing and natural language understanding. This paper offers a survey of SPNs, including their definition, the main algorithms for inference and learning from data, the main applications, a brief review of software libraries, and a comparison with related models
 [144] arXiv:2004.01168 [pdf, other]

Title: Improving the Utility of Knowledge Graph Embeddings with CalibrationSubjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)
This paper addresses machine learning models that embed knowledge graph entities and relationships toward the goal of predicting unseen triples, which is an important task because most knowledge graphs are by nature incomplete. We posit that while offline link prediction accuracy using embeddings has been steadily improving on benchmark datasets, such embedding models have limited practical utility in realworld knowledge graph completion tasks because it is not clear when their predictions should be accepted or trusted. To this end, we propose to calibrate knowledge graph embedding models to output reliable confidence estimates for predicted triples. In crowdsourcing experiments, we demonstrate that calibrated confidence scores can make knowledge graph embeddings more useful to practitioners and data annotators in knowledge graph completion tasks. We also release two resources from our evaluation tasks: An enriched version of the FB15K benchmark and a new knowledge graph dataset extracted from Wikidata.
 [145] arXiv:2004.01170 [pdf, other]

Title: DOPS: Learning to Detect 3D Objects and Predict their 3D ShapesAuthors: Mahyar Najibi, Guangda Lai, Abhijit Kundu, Zhichao Lu, Vivek Rathod, Tom Funkhouser, Caroline Pantofaru, David Ross, Larry S. Davis, Alireza FathiComments: To appear in CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
We propose DOPS, a fast singlestage 3D object detection method for LIDAR data. Previous methods often make domainspecific design decisions, for example projecting points into a birdeye view image in autonomous driving scenarios. In contrast, we propose a generalpurpose method that works on both indoor and outdoor scenes. The core novelty of our method is a fast, singlepass architecture that both detects objects in 3D and estimates their shapes. 3D bounding box parameters are estimated in one pass for every point, aggregated through graph convolutions, and fed into a branch of the network that predicts latent codes representing the shape of each detected object. The latent shape space and shape decoder are learned on a synthetic dataset and then used as supervision for the endtoend training of the 3D object detection pipeline. Thus our model is able to extract shapes without access to groundtruth shape information in the target dataset. During experiments, we find that our proposed method achieves stateoftheart results by ~5% on object detection in ScanNet scenes, and it gets top results by 3.4% in the Waymo Open Dataset, while reproducing the shapes of detected cars.
 [146] arXiv:2004.01174 [pdf, other]

Title: Causal Inference of Script KnowledgeComments: PrePrintSubjects: Computation and Language (cs.CL)
When does a sequence of events define an everyday scenario and how can this knowledge be induced from text? Prior works in inducing such scripts have relied on, in one form or another, measures of correlation between instances of events in a corpus. We argue from both a conceptual and practical sense that a purely correlationbased approach is insufficient, and instead propose an approach to script induction based on the causal effect between events, formally defined via interventions. Through both human and automatic evaluations, we show that the output of our method based on causal effects better matches the intuition of what a script represents
 [147] arXiv:2004.01176 [pdf, other]

Title: Learning Unsupervised Hierarchical Part Decomposition of 3D Objects from a Single RGB ImageComments: To appear at CVPR 2020, project page this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV)
Humans perceive the 3D world as a set of distinct objects that are characterized by various lowlevel (geometry, reflectance) and highlevel (connectivity, adjacency, symmetry) properties. Recent methods based on convolutional neural networks (CNNs) demonstrated impressive progress in 3D reconstruction, even when using a single 2D image as input. However, the majority of these methods focuses on recovering the local 3D geometry of an object without considering its partbased decomposition or relations between parts. We address this challenging problem by proposing a novel formulation that allows to jointly recover the geometry of a 3D object as a set of primitives as well as their latent hierarchical structure without partlevel supervision. Our model recovers the higher level structural decomposition of various objects in the form of a binary tree of primitives, where simple parts are represented with fewer primitives and more complex parts are modeled with more components. Our experiments on the ShapeNet and DFAUST datasets demonstrate that considering the organization of parts indeed facilitates reasoning about 3D geometry.
 [148] arXiv:2004.01177 [pdf, other]

Title: Tracking Objects as PointsComments: Code available at this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV)
Tracking has traditionally been the art of following interest points through space and time. This changed with the rise of powerful deep networks. Nowadays, tracking is dominated by pipelines that perform object detection followed by temporal association, also known as trackingbydetection. In this paper, we present a simultaneous detection and tracking algorithm that is simpler, faster, and more accurate than the state of the art. Our tracker, CenterTrack, applies a detection model to a pair of images and detections from the prior frame. Given this minimal input, CenterTrack localizes objects and predicts their associations with the previous frame. That's it. CenterTrack is simple, online (no peeking into the future), and realtime. It achieves 67.3% MOTA on the MOT17 challenge at 22 FPS and 89.4% MOTA on the KITTI tracking benchmark at 15 FPS, setting a new state of the art on both datasets. CenterTrack is easily extended to monocular 3D tracking by regressing additional 3D attributes. Using monocular video input, it achieves 28.3% AMOTA@0.2 on the newly released nuScenes 3D tracking benchmark, substantially outperforming the monocular baseline on this benchmark while running at 28 FPS.
 [149] arXiv:2004.01178 [pdf, other]

Title: Unsupervised Realworld Image Super Resolution via Domaindistance Aware TrainingComments: Code will be available at this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV)
These days, unsupervised superresolution (SR) has been soaring due to its practical and promising potential in real scenarios. The philosophy of offtheshelf approaches lies in the augmentation of unpaired data, i.e. first generating synthetic lowresolution (LR) images $\mathcal{Y}^g$ corresponding to realworld highresolution (HR) images $\mathcal{X}^r$ in the realworld LR domain $\mathcal{Y}^r$, and then utilizing the pseudo pairs $\{\mathcal{Y}^g, \mathcal{X}^r\}$ for training in a supervised manner. Unfortunately, since image translation itself is an extremely challenging task, the SR performance of these approaches are severely limited by the domain gap between generated synthetic LR images and real LR images. In this paper, we propose a novel domaindistance aware superresolution (DASR) approach for unsupervised realworld image SR. The domain gap between training data (e.g. $\mathcal{Y}^g$) and testing data (e.g. $\mathcal{Y}^r$) is addressed with our \textbf{domaingap aware training} and \textbf{domaindistance weighted supervision} strategies. Domaingap aware training takes additional benefit from real data in the target domain while domaindistance weighted supervision brings forward the more rational use of labeled source domain data. The proposed method is validated on synthetic and real datasets and the experimental results show that DASR consistently outperforms stateoftheart unsupervised SR approaches in generating SR outputs with more realistic and natural textures.
 [150] arXiv:2004.01180 [pdf, other]

Title: Learning to See Through ObstructionsSubjects: Computer Vision and Pattern Recognition (cs.CV)
We present a learningbased approach for removing unwanted obstructions, such as window reflections, fence occlusions or raindrops, from a short sequence of images captured by a moving camera. Our method leverages the motion differences between the background and the obstructing elements to recover both layers. Specifically, we alternate between estimating dense optical flow fields of the two layers and reconstructing each layer from the flowwarped images via a deep convolutional neural network. The learningbased layer reconstruction allows us to accommodate potential errors in the flow estimation and brittle assumptions such as brightness consistency. We show that training on synthetically generated data transfers well to real images. Our results on numerous challenging scenarios of reflection and fence removal demonstrate the effectiveness of the proposed method.
 [151] arXiv:2004.01181 [pdf, other]

Title: GraphChallenge.org Sparse Deep Neural Network PerformanceAuthors: Jeremy Kepner, Simon Alford, Vijay Gadepally, Michael Jones, Lauren Milechin, Albert Reuther, Ryan Robinett, Sid SamsiComments: 7 pages, 7 figures, 80 references, to be submitted to IEEE HPEC 2020. This work reports new updated results on prior work reported in arXiv:1909.05631. arXiv admin note: substantial text overlap with arXiv:1807.03165, arXiv:1708.02937Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)
The MIT/IEEE/Amazon GraphChallenge.org encourages community approaches to developing new solutions for analyzing graphs and sparse data. Sparse AI analytics present unique scalability difficulties. The Sparse Deep Neural Network (DNN) Challenge draws upon prior challenges from machine learning, high performance computing, and visual analytics to create a challenge that is reflective of emerging sparse AI systems. The sparse DNN challenge is based on a mathematically welldefined DNN inference computation and can be implemented in any programming environment. In 2019 several sparse DNN challenge submissions were received from a wide range of authors and organizations. This paper presents a performance analysis of the best performers of these submissions. These submissions show that their stateoftheart sparse DNN execution time, $T_{\rm DNN}$, is a strong function of the number of DNN operations performed, $N_{\rm op}$. The sparse DNN challenge provides a clear picture of current sparse DNN systems and underscores the need for new innovations to achieve high performance on very large sparse DNNs.
Crosslists for Fri, 3 Apr 20
 [152] arXiv:2001.03327 (crosslist from econ.TH) [pdf, ps, other]

Title: How to Cut a Cake Fairly: A Generalization to GroupsSubjects: Theoretical Economics (econ.TH); Computer Science and Game Theory (cs.GT); Combinatorics (math.CO)
A fundamental result in cake cutting states that for any number of players with arbitrary preferences over a cake, there exists a division of the cake such that every player receives a single contiguous piece and no player is left envious. We generalize this result by showing that it is possible to partition the players into groups of any desired sizes and divide the cake among the groups, so that each group receives a single contiguous piece and no player finds the piece of another group better than that of the player's own group.
 [153] arXiv:2004.00667 (crosslist from stat.ML) [pdf, other]

Title: Projection Pursuit Gaussian Process RegressionSubjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
A primary goal of computer experiments is to reconstruct the function given by the computer code via scattered evaluations. Traditional isotropic Gaussian process models suffer from the curse of dimensionality, when the input dimension is high. Gaussian process models with additive correlation functions are scalable to dimensionality, but they are very restrictive as they only work for additive functions. In this work, we consider a projection pursuit model, in which the nonparametric part is driven by an additive Gaussian process regression. The dimension of the additive function is chosen to be higher than the original input dimension. We show that this dimension expansion can help approximate more complex functions. A gradient descent algorithm is proposed to maximize the likelihood function. Simulation studies show that the proposed method outperforms the traditional Gaussian process models.
 [154] arXiv:2004.00669 (crosslist from econ.GN) [pdf, ps, other]

Title: A Note on the Provision of a Public Service of Different QualitySubjects: General Economics (econ.GN); Computer Science and Game Theory (cs.GT)
We study how the quality dimension affects the social optimum in a model of spatial differentiation where two facilities provide a public service. If quality enters linearly in the individuals' utility function, a symmetric configuration, in which both facilities have the same quality and serve groups of individuals of the same size, does not maximize the social welfare. This is a surprising result as all individuals are symmetrically identical having the same quality valuation. We also show that a symmetric configuration of facilities may maximize the social welfare if the individuals' marginal utility of quality is decreasing.
 [155] arXiv:2004.00707 (crosslist from physics.aoph) [pdf, other]

Title: Datadriven modelling of nonlinear spatiotemporal fluid flows using a deep convolutional generative adversarial networkSubjects: Atmospheric and Oceanic Physics (physics.aoph); Computational Engineering, Finance, and Science (cs.CE); Fluid Dynamics (physics.fludyn)
Deep learning techniques for improving fluid flow modelling have gained significant attention in recent years. Advanced deep learning techniques achieve great progress in rapidly predicting fluid flows without prior knowledge of the underlying physical relationships. Advanced deep learning techniques achieve great progress in rapidly predicting fluid flows without prior knowledge of the underlying physical relationships. However, most of existing researches focused mainly on either sequence learning or spatial learning, rarely on both spatial and temporal dynamics of fluid flows (Reichstein et al., 2019). In this work, an Artificial Intelligence (AI) fluid model based on a general deep convolutional generative adversarial network (DCGAN) has been developed for predicting spatiotemporal flow distributions. In deep convolutional networks, the highdimensional flows can be converted into the lowdimensional "latent" representations. The complex features of flow dynamics can be captured by the adversarial networks. The above DCGAN fluid model enables us to provide reasonable predictive accuracy of flow fields while maintaining a high computational efficiency. The performance of the DCGAN is illustrated for two test cases of Hokkaido tsunami with different incoming waves along the coastal line. It is demonstrated that the results from the DCGAN are comparable with those from the original high fidelity model (Fluidity). The spatiotemporal flow features have been represented as the flow evolves, especially, the wave phases and flow peaks can be captured accurately. In addition, the results illustrate that the online CPU cost is reduced by five orders of magnitude compared to the original high fidelity model simulations. The promising results show that the DCGAN can provide rapid and reliable spatiotemporal prediction for nonlinear fluid flows.
 [156] arXiv:2004.00719 (crosslist from math.OC) [pdf, ps, other]

Title: Fractional Deep Neural Network via Constrained OptimizationSubjects: Optimization and Control (math.OC); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
This paper introduces a novel algorithmic framework for a deep neural network (DNN), which in a mathematically rigorous manner, allows us to incorporate history (or memory) into the network  it ensures all layers are connected to one another. This DNN, called FractionalDNN, can be viewed as a timediscretization of a fractional in time nonlinear ordinary differential equation (ODE). The learning problem then is a minimization problem subject to that fractional ODE as constraints. We emphasize that an analogy between the existing DNN and ODEs, with standard time derivative, is wellknown by now. The focus of our work is the FractionalDNN. Using the Lagrangian approach, we provide a derivation of the backward propagation and the design equations. We test our network on several datasets for classification problems. FractionalDNN offers various advantages over the existing DNN. The key benefits are a significant improvement to the vanishing gradient issue due to the memory effect, and better handling of nonsmooth data due to the network's ability to approximate nonsmooth functions.
 [157] arXiv:2004.00753 (crosslist from eess.IV) [pdf]

Title: Image Denoising Using Sparsifying Transform Learning and Weighted Singular Values MinimizationComments: 17 pages, 10 figures, 5 tablesSubjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
In image denoising (IDN) processing, the lowrank property is usually considered as an important image prior. As a convex relaxation approximation of low rank, nuclear norm based algorithms and their variants have attracted significant attention. These algorithms can be collectively called image domain based methods, whose common drawback is the requirement of great number of iterations for some acceptable solution. Meanwhile, the sparsity of images in a certain transform domain has also been exploited in image denoising problems. Sparsity transform learning algorithms can achieve extremely fast computations as well as desirable performance. By taking both advantages of image domain and transform domain in a general framework, we propose a sparsity transform learning and weighted singular values minimization method (STLWSM) for IDN problems. The proposed method can make full use of the preponderance of both domains. For solving the nonconvex cost function, we also present an efficient alternative solution for acceleration. Experimental results show that the proposed STLWSM achieves improvement both visually and quantitatively with a large margin over stateoftheart approaches based on an alternatively single domain. It also needs much less iteration than all the image domain algorithms.
 [158] arXiv:2004.00771 (crosslist from math.CO) [pdf, ps, other]

Title: Power Hadamard matrices and Plotkinoptimal pary codesSubjects: Combinatorics (math.CO); Information Theory (cs.IT)
A power Hadamard matrix $H(x)$ is a square matrix of dimension $n$ with entries from Laurent polynomial ring $L= \mathbb{Q} [x,x^{1}]$ such that $H(x)H(x^{1})^T=nI \mod f(x)$, where $f$ is some Laurent polynomial of degree greater than $0$. In the first part of this work, some new results on power Hadamard matrices are studied, where we mainly entend the work of Craigen and Woodford. In the second part, codes obtained from ButsonHadamard matrices are discussed and some bounds on the minimum distance of these codes are proved. In particular, we show that the code obtained from a ButsonHadamard matrix meets the Plotkin bound under a nonhomegeneous weight.
 [159] arXiv:2004.00772 (crosslist from physics.socph) [pdf, other]

Title: Community Resilience Optimization Subject to Power Flow Constraints in CyberPhysicalSocial Systems in Power EngineeringSubjects: Physics and Society (physics.socph); Systems and Control (eess.SY)
This paper develops a community resilience optimization method subject to power flow constraints in the CyberPhysicalSocial Systems in Power Engineering, which is solved using a multiagentbased algorithm. The tool that makes the nexus between electricity generation on the physical side and the consumers and the critical loads on the social side is the power flow algorithm. Specifically, the levels of emotion, empathy, cooperation, and the physical health of the consumers, prosumers are modeled in the proposed community resilience optimization approach while accounting for the electric power system constraints and their impact on the critical loads, which include hospitals, shelters, and gas stations, to name a few. The optimization accounts for the fact that the level of satisfaction of the society, the living standards, and the social wellbeing are depended on the supply of energy, including electricity. Evidently, the lack of electric energy resulting from load shedding has an impact on both the mental and the psychical quality of life, which in turn affects the community resilience. The developed constrained community resilience optimization method is applied to two case studies, including a twoarea 6buses system and a modified IEEE RTS 24bus system. Simulation results reveal that a decrease in the initial values of the emotion, the risk perception, and the social media platform effect factor entails an increase in load shedding, which in turn results in a decrease in community resilience. In contrast, an increase in the initial values of cooperation, empathy, physical health, the capacity of microgrids and distributed energy resources results in a decrease in the load shedding, which in turn induces an enhancement of the community resilience.
 [160] arXiv:2004.00787 (crosslist from eess.IV) [pdf, other]

Title: Radial Coverage Strength for Optimization of MultiCamera DeploymentComments: 11 pages, 14 figuresSubjects: Image and Video Processing (eess.IV); Systems and Control (eess.SY)
In this paper, a new concept, radial coverage strength, is first proposed to characterize the visual sensing performance when the orientation of the target pose is considered. In particular, the elevation angle of the optical pose of the visual sensor is taken to decompose the visual coverage strength into effective and ineffective components, motivated by the imaging intuition. An optimization problem is then formulated for a multicamera network to maximize the coverage of the object area based on the strength information fusion along the effective coverage strength direction through the deployment of the angle between radial coverage vector of the camera optical pose. Both simulation and experiments are conducted to validate the proposed approach and comparison with existing methods is also provided.
 [161] arXiv:2004.00814 (crosslist from quantph) [pdf, other]

Title: Single Quantum Deletion ErrorCorrecting CodesComments: 1 figureSubjects: Quantum Physics (quantph); Information Theory (cs.IT)
In this paper, we discuss a construction method of quantum deletion errorcorrecting codes. First of all, we define deletion errors for quantum states, an encoder, a decoder, and two conditions which is expressed by only the combinatorial language. Then, we prove that quantum deletion errorcorrecting codes can be constructed by two sets that satisfy the conditions. In other words, problems that correct the deletion errors for quantum states are reduced to problems that find the sets satisfying the condition by this paper. Also, we performed experiment of the codes over IBM Quantum Experience.
 [162] arXiv:2004.00871 (crosslist from eess.IV) [pdf, other]

Title: EndToEnd Convolutional Neural Network for 3D Reconstruction of Knee Bones From BiPlanar XRay ImagesSubjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
We present an endtoend Convolutional Neural Network (CNN) approach for 3D reconstruction of knee bones directly from two biplanar Xray images. Clinically, capturing the 3D models of the bones is crucial for surgical planning, implant fitting, and postoperative evaluation. Xray imaging significantly reduces the exposure of patients to ionizing radiation compared to Computer Tomography (CT) imaging, and is much more common and inexpensive compared to Magnetic Resonance Imaging (MRI) scanners. However, retrieving 3D models from such 2D scans is extremely challenging. In contrast to the common approach of statistically modeling the shape of each bone, our deep network learns the distribution of the bones' shapes directly from the training images. We train our model with both supervised and unsupervised losses using Digitally Reconstructed Radiograph (DRR) images generated from CT scans. To apply our model to XRay data, we use style transfer to transform between XRay and DRR modalities. As a result, at test time, without further optimization, our solution directly outputs a 3D reconstruction from a pair of biplanar Xray images, while preserving geometric constraints. Our results indicate that our deep learning model is very efficient, generalizes well and produces high quality reconstructions.
 [163] arXiv:2004.00876 (crosslist from math.PR) [pdf, other]

Title: Heavy Traffic Analysis of the Mean Response Time for Load Balancing Policies in the Mean Field RegimeComments: 14 pages, 2 figuresSubjects: Probability (math.PR); Performance (cs.PF)
Mean field models are a popular tool used to analyse load balancing policies. In some exceptional cases the response time distribution of the mean field limit has an explicit form. In most cases it can be computed using either a recursion or a differential equation (for exponential job sizes with mean one). In this paper we study the value of the mean response time $E[R_\lambda]$ as the arrival rate $\lambda$ approaches $1$ (i.e. the system gets close to instability). As $E[R_\lambda]$ diverges to infinity, we scale with $\log(1\lambda)$ and present a method to compute the limit $\lim_{\lambda\rightarrow 1^}E[R_\lambda]/\log(1\lambda)$.
This limit has been previously determined for SQ(d) and LL(d), two wellknown policies that assign an incoming job to a server with either the shortest queue or least work left among $d$ randomly selected servers. However, the derivation of the result for SQ(d) relied on the closed form representation of the mean response time and does not seem to generalize well, moreover the proof for LL(d) is incomplete. In contrast, we present a general result that holds for any policy for which the associated recursion or differential equation satisfies a list of criteria. For SQ(d) and LL(d) these criteria are trivially verified.
We apply our method to SQ(d,K) resp LL(d,K) with exponential job sizes of mean one. For these policies, jobs arrive in batches of size $K$ and join the $K$ servers with the shortest queue resp least amount of work left. For SQ(d,K) we obtain $\frac{1}{\log(d/K)}$ as limiting value, while for LL(d,K) we find the limit to be equal to $\frac{K}{dK}$. We further analyse a policy where SQ(d_i) resp LL($d_i$) is used with probability $p_i$. For the shortest queue variant, we obtain the limit $\frac{1}{\log\left(\sum_{i=1}^np_id_i\right)}$, while for the least loaded variant, we obtain $\frac{1}{\sum_{i=1}^np_id_i1}$.  [164] arXiv:2004.00891 (crosslist from math.PR) [pdf, ps, other]

Title: Kernel autocovariance operators of stationary processes: Estimation and convergenceSubjects: Probability (math.PR); Machine Learning (cs.LG); Functional Analysis (math.FA); Machine Learning (stat.ML)
We consider autocovariance operators of a stationary stochastic process on a Polish space that is embedded into a reproducing kernel Hilbert space. We investigate how empirical estimates of these operators converge along realizations of the process under various conditions. In particular, we examine ergodic and strongly mixing processes and prove several asymptotic results as well as finite sample error bounds with a detailed analysis for the Gaussian kernel. We provide applications of our theory in terms of consistency results for kernel PCA with dependent data and the conditional mean embedding of transition probabilities. Finally, we use our approach to examine the nonparametric estimation of Markov transition operators and highlight how our theory can give a consistency analysis for a large family of spectral analysis methods including kernelbased dynamic mode decomposition.
 [165] arXiv:2004.00910 (crosslist from eess.AS) [pdf, other]

Title: Improving auditory attention decoding performance of linear and nonlinear methods using statespace modelSubjects: Audio and Speech Processing (eess.AS); Machine Learning (cs.LG); Sound (cs.SD); Signal Processing (eess.SP)
Identifying the target speaker in hearing aid applications is crucial to improve speech understanding. Recent advances in electroencephalography (EEG) have shown that it is possible to identify the target speaker from singletrial EEG recordings using auditory attention decoding (AAD) methods. AAD methods reconstruct the attended speech envelope from EEG recordings, based on a linear leastsquares cost function or nonlinear neural networks, and then directly compare the reconstructed envelope with the speech envelopes of speakers to identify the attended speaker using Pearson correlation coefficients. Since these correlation coefficients are highly fluctuating, for a reliable decoding a large correlation window is used, which causes a large processing delay. In this paper, we investigate a statespace model using correlation coefficients obtained with a small correlation window to improve the decoding performance of the linear and the nonlinear AAD methods. The experimental results show that the statespace model significantly improves the decoding performance.
 [166] arXiv:2004.00930 (crosslist from nlin.AO) [pdf, ps, other]

Title: Neuronal Sequence Models for Bayesian Online InferenceSubjects: Adaptation and SelfOrganizing Systems (nlin.AO); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
Sequential neuronal activity underlies a wide range of processes in the brain. Neuroscientific evidence for neuronal sequences has been reported in domains as diverse as perception, motor control, speech, spatial navigation and memory. Consequently, different dynamical principles have been proposed as possible sequencegenerating mechanisms. Combining experimental findings with computational concepts like the Bayesian brain hypothesis and predictive coding leads to the interesting possibility that predictive and inferential processes in the brain are grounded on generative processes which maintain a sequential structure. While probabilistic inference about ongoing sequences is a useful computational model for both the analysis of neuroscientific data and a wide range of problems in artificial recognition and motor control, research on the subject is relatively scarce and distributed over different fields in the neurosciences. Here we review key findings about neuronal sequences and relate these to the concept of online inference on sequences as a model of sensorymotor processing and recognition. We propose that describing sequential neuronal activity as an expression of probabilistic inference over sequences may lead to novel perspectives on brain function. Importantly, it is promising to translate the key idea of probabilistic inference on sequences to machine learning, in order to address challenges in the realtime recognition of speech and human motion.
 [167] arXiv:2004.00932 (crosslist from eess.AS) [pdf, other]

Title: iMetricGAN: Intelligibility Enhancement for SpeechinNoise using Generative Adversarial Networkbased Metric LearningComments: 5 pages, Submitted to INTERSPEECH 2020Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)
The intelligibility of natural speech is seriously degraded when exposed to adverse noisy environments. In this work, we propose a deep learningbased speech modification method to compensate for the intelligibility loss, with the constraint that the root mean square (RMS) level and duration of the speech signal are maintained before and after modifications. Specifically, we utilize an iMetricGAN approach to optimize the speech intelligibility metrics with generative adversarial networks (GANs). Experimental results show that the proposed iMetricGAN outperforms conventional stateoftheart algorithms in terms of objective measures, i.e., speech intelligibility in bits (SIIB) and extended shorttime objective intelligibility (ESTOI), under a Cafeteria noise condition. In addition, formal listening tests reveal significant intelligibility gains when both noise and reverberation exist.
 [168] arXiv:2004.00959 (crosslist from qbio.PE) [pdf, other]

Title: Neural network based country wise risk prediction of COVID19Subjects: Populations and Evolution (qbio.PE); Machine Learning (cs.LG)
The recent worldwide outbreak of the novel coronavirus (COVID19) opened up new challenges to the research community. Artificial intelligence (AI) driven methods can be useful to predict the parameters, risks, and effects of such an epidemic. Such predictions can be helpful to control and prevent the spread of such diseases. The main challenges of applying AI is the small volume of data and the uncertain nature. Here, we propose a shallow Long shortterm memory (LSTM) based neural network to predict the risk category of a country. We have used a Bayesian optimization framework to optimized and automatically design countryspecific networks. We have combined the trend data and weather data together for the prediction. The results show that the proposed pipeline outperforms against stateoftheart methods for 170 countries data and can be a useful tool for such risk categorization. The tool can be used to predict longduration outbreak of such an epidemic such that we can take preventive steps earlier.
 [169] arXiv:2004.00960 (crosslist from eess.AS) [pdf, other]

Title: The RWTH ASR System for TEDLIUM Release 2: Improving Hybrid HMM with SpecAugmentComments: accepted at ICASSP 2020Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)
We present a complete training pipeline to build a stateoftheart hybrid HMMbased ASR system on the 2nd release of the TEDLIUM corpus. Data augmentation using SpecAugment is successfully applied to improve performance on top of our best SAT model using ivectors. By investigating the effect of different maskings, we achieve improvements from SpecAugment on hybrid HMM models without increasing model size and training time. A subsequent sMBR training is applied to finetune the final acoustic model, and both LSTM and Transformer language models are trained and evaluated. Our best system achieves a 5.6% WER on the test set, which outperforms the previous stateoftheart by 27% relative.
 [170] arXiv:2004.00967 (crosslist from eess.AS) [pdf, other]

Title: FullSum Decoding for Hybrid HMM based Speech Recognition using LSTM Language ModelComments: accepted at ICASSP 2020Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)
In hybrid HMM based speech recognition, LSTM language models have been widely applied and achieved large improvements. The theoretical capability of modeling any unlimited context suggests that no recombination should be applied in decoding. This motivates to reconsider full summation over the HMMstate sequences instead of Viterbi approximation in decoding. We explore the potential gain from more accurate probabilities in terms of decision making and apply the fullsum decoding with a modified prefixtree search framework. The proposed fullsum decoding is evaluated on both Switchboard and Librispeech corpora. Different models using CE and sMBR training criteria are used. Additionally, both MAP and confusion network decoding as approximated variants of general Bayes decision rule are evaluated. Consistent improvements over strong baselines are achieved in almost all cases without extra cost. We also discuss tuning effort, efficiency and some limitations of fullsum decoding.
 [171] arXiv:2004.00968 (crosslist from math.OC) [pdf, ps, other]

Title: Using gradient directions to get global convergence of Newtontype methodsComments: 22 pages, 10 FiguresSubjects: Optimization and Control (math.OC); Numerical Analysis (math.NA)
The renewed interest in Steepest Descent (SD) methods following the work of Barzilai and Borwein [IMA Journal of Numerical Analysis, 8 (1988)] has driven us to consider a globalization strategy based on SD, which is applicable to any linesearch method. In particular, we combine Newtontype directions with scaled SD steps to have suitable descent directions. Scaling the SD directions with a suitable step length makes a significant difference with respect to similar globalization approaches, in terms of both theoretical features and computational behavior. We apply our strategy to Newton's method and the BFGS method, with computational results that appear interesting compared with the results of wellestablished globalization strategies devised ad hoc for those methods.
 [172] arXiv:2004.00979 (crosslist from qbio.BM) [pdf, other]

Title: Largescale ligandbased virtual screening for SARSCoV2 inhibitors using deep neural networksAuthors: Markus Hofmarcher, Andreas Mayr, Elisabeth Rumetshofer, Peter Ruch, Philipp Renz, Johannes Schimunek, Philipp Seidl, Andreu Vall, Michael Widrich, Sepp Hochreiter, Günter KlambauerSubjects: Biomolecules (qbio.BM); Machine Learning (cs.LG); Quantitative Methods (qbio.QM); Machine Learning (stat.ML)
Due to the current severe acute respiratory syndrome coronavirus 2 (SARSCoV2) pandemic, there is an urgent need for novel therapies and drugs. We conducted a largescale virtual screening for small molecules that are potential CoV2 inhibitors. To this end, we utilized "ChemAI", a deep neural network trained on more than 220M data points across 3.6M molecules from three public drugdiscovery databases. With ChemAI, we screened and ranked one billion molecules from the ZINC database for favourable effects against CoV2. We then reduced the result to the 30,000 topranked compounds, which are readily accessible and purchasable via the ZINC database. We provide these topranked compounds as a library for further screening with bioassays at https://github.com/mljku/sarscovinhibitorschemai.
 [173] arXiv:2004.00991 (crosslist from qbio.GN) [pdf, other]

Title: Computational Performance of a Germline Variant Calling Pipeline for Next Generation SequencingAuthors: Jie Liu, Xiaotian Wu, Kai Zhang, Bing Liu, Renyi Bao, Xiao Chen, Yiran Cai, Yiming Shen, Xinjun He, Jun Yan, Weixing JiComments: 6 pages, 6 figures, 3 tablesSubjects: Genomics (qbio.GN); Performance (cs.PF)
With the booming of next generation sequencing technology and its implementation in clinical practice and life science research, the need for faster and more efficient data analysis methods becomes pressing in the field of sequencing. Here we report on the evaluation of an optimized germline mutation calling pipeline, HummingBird, by assessing its performance against the widely accepted BWAGATK pipeline. We found that the HummingBird pipeline can significantly reduce the running time of the primary data analysis for whole genome sequencing and whole exome sequencing while without significantly sacrificing the variant calling accuracy. Thus, we conclude that expansion of such software usage will help to improve the primary data analysis efficiency for next generation sequencing.
 [174] arXiv:2004.01004 (crosslist from eess.SP) [pdf, other]

Title: Energyefficient Analog Sensing for Largescale and Highdensity Persistent Wireless MonitoringComments: IEEE Internet of Things Journal, March 2020, pp. 19. arXiv admin note: text overlap with arXiv:1907.05205, arXiv:1907.00968Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)
The research challenge of current Wireless Sensor Networks (WSNs) is to design energyefficient, lowcost, highaccuracy, selfhealing, and scalable systems for applications such as environmental monitoring. Traditional WSNs consist of low density, powerhungry digital motes that are expensive and cannot remain functional for long periods on a single power charge. In order to address these challenges, a dumbsensing and smartprocessing architecture that splits sensing and computation capabilities is proposed. Sensing is exclusively the responsibility of analog substrateconsisting of lowpower, lowcost allanalog sensorsthat sits beneath the traditional WSN comprising of digital nodes, which does all the processing of the sensor data received from analog sensors. A lowpower and lowcost solution for substrate sensors has been proposed using Analog Joint Source Channel Coding (AJSCC) realized via the characteristics of Metal Oxide Semiconductor Field Effect Transistor (MOSFET). Digital nodes (receiver) also estimate the source distribution at the analog sensors (transmitter) using machine learning techniques so as to find the optimal parameters of AJSCC that are communicated back to the analog sensors to adapt their sensing resolution as per the application needs. The proposed techniques have been validated via simulations from MATLAB and LTSpice to show promising performance and indeed prove that our framework can support large scale high density and persistent WSN deployment.
 [175] arXiv:2004.01028 (crosslist from qbio.QM) [pdf]

Title: DeepSIBA: Chemical Structurebased Inference of Biological AlterationsComments: Article: 19 pages, Electronic Supplementary Information (included): 16 pagesSubjects: Quantitative Methods (qbio.QM); Machine Learning (cs.LG); Machine Learning (stat.ML)
Predicting whether a chemical structure shares a desired biological effect can have a significant impact for insilico compound screening in early drug discovery. In this study, we developed a deep learning model where compound structures are represented as graphs and then linked to their biological footprint. To make this complex problem computationally tractable, compound differences were mapped to biological effect alterations using Siamese Graph Convolutional Neural Networks. The proposed model was able to learn new representations from chemical structures and identify structurally dissimilar compounds that affect similar biological processes with high precision. Additionally, by utilizing deep ensembles to estimate uncertainty, we were able to provide reliable and accurate predictions for chemical structures that are very different from the ones used during training. Finally, we present a novel inference approach, where the trained models are used to estimate the signaling pathways affected by a compound perturbation in a specific cell line, using only its chemical structure as input. As a use case, this approach was used to infer signaling pathways affected by FDAapproved anticancer drugs.
 [176] arXiv:2004.01029 (crosslist from eess.IV) [pdf]

Title: Introducing Anisotropic Minkowski Functionals for Local Structure Analysis and Prediction of Biomechanical Strength of Proximal Femur SpecimensAuthors: Titas DeJournalref: Master's Thesis  2013Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
Bone fragility and fracture caused by osteoporosis or injury are prevalent in adults over the age of 50 and can reduce their quality of life. Hence, predicting the biomechanical bone strength, specifically of the proximal femur, through noninvasive imagingbased methods is an important goal for the diagnosis of Osteoporosis as well as estimating fracture risk. Dual Xray absorptiometry (DXA) has been used as a standard clinical procedure for assessment and diagnosis of bone strength and osteoporosis through bone mineral density (BMD) measurements. However, previous studies have shown that quantitative computer tomography (QCT) can be more sensitive and specific to trabecular bone characterization because it reduces the overlap effects and interferences from the surrounding soft tissue and cortical shell.
This study proposes a new method to predict the bone strength of proximal femur specimens from quantitative multidetector computer tomography (MDCT) images. Texture analysis methods such as conventional statistical moments (BMD mean), Isotropic Minkowski Functionals (IMF) and Anisotropic Minkowski Functionals (AMF) are used to quantify BMD properties of the trabecular bone microarchitecture. Combinations of these extracted features are then used to predict the biomechanical strength of the femur specimens using sophisticated machine learning techniques such as multiregression (MultiReg) and support vector regression with linear kernel (SVRlin). The prediction performance achieved with these feature sets is compared to the standard approach that uses the mean BMD of the specimens and multiregression models using root mean square error (RMSE).  [177] arXiv:2004.01054 (crosslist from math.OC) [pdf, ps, other]

Title: Distributed Robust Control Synthesis for Safety and FixedTime Stability in MultiAgent SystemsComments: 8 pages, 5 figures, Submitted to IEEE CDC 2020, under reviewSubjects: Optimization and Control (math.OC); Systems and Control (eess.SY)
This paper presents a control synthesis approach for multiagent systems modeled as a general class of nonlinear, controlaffine dynamics under spatiotemporal constraints. We consider the problem of designing distributed controllers such that each agent reaches their respective goal set within a given fixed time, while always remaining in their respective safe set, which also encodes the maintenance of a safe distance from other agents. We assume that each agent can measure the states of any neighbor agent in their limited sensing radius with some bounded error. In the presence of this uncertainty, we use robust CBFs to encode interagent safety, while temporal specifications are encoded via FixedTime CLFs. We formulate a QP for each agent to compute its control input that fulfills the spatiotemporal specifications, and discuss the feasibility of the QP in the presence of control input constraints.
 [178] arXiv:2004.01061 (crosslist from quantph) [html]

Title: Proceedings 9th International Conference on Quantum Simulation and Quantum WalksAuthors: Giuseppe Di Molfetta (AixMarseille University), Vivien Kendon (Durham University), Yutaka Shikano (Keio University & Chapman University)Journalref: EPTCS 315, 2020Subjects: Quantum Physics (quantph); Formal Languages and Automata Theory (cs.FL); Cellular Automata and Lattice Gases (nlin.CG)
This volume contains a selection of papers presented at the 9th in a series of international conferences on Quantum Simulation and Quantum Walks (QSQW). During this event, we worked on the development of theories based upon quantum walks and quantum simulation models, in order to solve interrelated problems concerning the simulation of standard quantum field theory, quantum gravity and cosmological models, dissipative quantum computing, searching on complex quantum networks, and the topological classification of multiparticle quantum walks.
 [179] arXiv:2004.01081 (crosslist from eess.SP) [pdf, other]

Title: Optical Characterization of UltraLow latency Visible Light Communication System for Intelligent Transportation SystemsComments: 16 pages, 9 figuresSubjects: Signal Processing (eess.SP); Systems and Control (eess.SY); Optics (physics.optics)
This paper reports a detailed experimental characterization of optical performances of Visible Light Communication (VLC) system using a real traffic light for ultralow latency, infrastructuretovehicle (I2V) communications for intelligent transportation systems (ITS) protocols. Despite the implementation of long sought ITS protocols poses the crucial need to detail how the features of optical stages influence the overall performances of a VLC system in realistic configurations, such characterization has rarely been addressed at present. We carried out an experimental investigation in a realistic configuration where a regular traffic light (TX), enabled for VLC transmission, sends digital information towards a receiving stage (RX), composed by an optical condenser and a dedicated amplified photodiode stage. We performed a detailed measurements campaign of VLC performances encompassing a broad set of optical condensers, and for TXRX distances in the range 3  50 m, in terms of both effective field of view (EFOV) and packet error rate (PER). The results show several nontrivial behaviors for different lens sets as a function of position on the measurement grid, highlighting critical aspects as well as identifying most suitable optical configurations depending on the specific application and on the required EFOV. In this paper we also provide a theoretical model for both the signal intensity and the EFOV as a function of several parameters, such as distance, RX orientation and focal length of the specific condenser. Our results could be very relevant in the near future to assess a most suited solution in terms of acceptance angle when designing a VLC system for real applications, where angledependent misalignment effects play a nonnegligible role, and we argue that it could have more general implications with respect to the pristine I2V case mentioned here.
 [180] arXiv:2004.01143 (crosslist from stat.ML) [pdf, other]

Title: Randomized Kernel Multiview Discriminant AnalysisSubjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
In many artificial intelligence and computer vision systems, the same object can be observed at distinct viewpoints or by diverse sensors, which raises the challenges for recognizing objects from different, even heterogeneous views. Multiview discriminant analysis (MvDA) is an effective multiview subspace learning method, which finds a discriminant common subspace by jointly learning multiple viewspecific linear projections for object recognition from multiple views, in a nonpairwise way. In this paper, we propose the kernel version of multiview discriminant analysis, called kernel multiview discriminant analysis (KMvDA). To overcome the wellknown computational bottleneck of kernel methods, we also study the performance of using random Fourier features (RFF) to approximate Gaussian kernels in KMvDA, for large scale learning. Theoretical analysis on stability of this approximation is developed. We also conduct experiments on several popular multiview datasets to illustrate the effectiveness of our proposed strategy.
 [181] arXiv:2004.01148 (crosslist from physics.fludyn) [pdf, other]

Title: Trapped solitarywave interaction for Euler equations with low pressure regionSubjects: Fluid Dynamics (physics.fludyn); Numerical Analysis (math.NA)
Trapped solitarywave interaction is studied under the full Euler equations in the presence of a variable pressure distribution along the free surace. The physical domain is flattened conformally onto a strip and the computations are performed in the canonical domain. Computer simulations display solitary waves that remain trapped in a low pressure region. In terms of confinement we observe that these waves are stable for small perturbations of either their amplitudes or the pressure forcing term. Furthermore multiple solitary waves are considered within the low pressure region without escaping the low pressure region. We identify regimes in which multiple solitary waves remain trapped after several collisions. In particular we display a regime where three solitary waves are trapped and collide several times, before one escapes at a time. The remaining solitary waves stays trapped in the low pressure region.
 [182] arXiv:2004.01149 (crosslist from math.PR) [pdf, other]

Title: Stopping explosion by penalising transmission to hubs in scalefree spatial random graphsSubjects: Probability (math.PR); Social and Information Networks (cs.SI); Combinatorics (math.CO); Populations and Evolution (qbio.PE)
We study the spread of information in finite and infinite inhomogeneous spatial random graphs. We assume that each edge has a transmission cost that is a product of an i.i.d. random variable L and a penalty factor: edges between vertices of expected degrees w_1 and w_2 are penalised by a factor of (w_1w_2)^\mu for all \mu >0. We study this process for scalefree percolation, for (finite and infinite) Geometric Inhomogeneous Random Graphs, and for Hyperbolic Random Graphs, all with power law degree distributions with exponent \tau > 1. For \tau < 3, we find a threshold behaviour, depending on how fast the cumulative distribution function of L decays at zero. If it decays at most polynomially with exponent smaller than (3\tau)/(2\mu) then explosion happens, i.e., with positive probability we can reach infinitely many vertices with finite cost (for the infinite models), or reach a linear fraction of all vertices with bounded costs (for the finite models). On the other hand, if the cdf of L decays at zero at least polynomially with exponent larger than (3\tau)/(2\mu), then no explosion happens. This behaviour is arguably a better representation of information spreading processes in social networks than the case without penalising factor, in which explosion always happens unless the cdf of L is doubly exponentially flat around zero. Finally, we extend the results to other penalty functions, including arbitrary polynomials in w_1 and w_2. In some cases the interesting phenomenon occurs that the model changes behaviour (from explosive to conservative and vice versa) when we reverse the role of w_1 and w_2. Intuitively, this could corresponds to reversing the flow of information: gathering information might take much longer than sending it out.
 [183] arXiv:2004.01157 (crosslist from stat.ML) [pdf, ps, other]

Title: Identification Methods With Arbitrary Interventional Distributions as InputsSubjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
Causal inference quantifies causeeffect relationships by estimating counterfactual parameters from data. This entails using \emph{identification theory} to establish a link between counterfactual parameters of interest and distributions from which data is available. A line of work characterized nonparametric identification for a wide variety of causal parameters in terms of the \emph{observed data distribution}. More recently, identification results have been extended to settings where experimental data from interventional distributions is also available. In this paper, we use Single World Intervention Graphs and a nested factorization of models associated with mixed graphs to give a very simple view of existing identification theory for experimental data. We use this view to yield general identification algorithms for settings where the input distributions consist of an arbitrary set of observational and experimental distributions, including marginal and conditional distributions. We show that for problems where inputs are interventional marginal distributions of a certain type (ancestral marginals), our algorithm is complete.
 [184] arXiv:2004.01163 (crosslist from math.CO) [pdf, other]

Title: A Spectral Approach to the Shortest Path ProblemAuthors: Stefan SteinerbergerSubjects: Combinatorics (math.CO); Computational Geometry (cs.CG); Discrete Mathematics (cs.DM); Spectral Theory (math.SP)
Let $G=(V,E)$ be a simple, connected graph. One is often interested in a short path between two vertices $u,v$. We propose a spectral algorithm: construct the function $\phi:V \rightarrow \mathbb{R}_{\geq 0}$ $$ \phi = \arg\min_{f:V \rightarrow \mathbb{R} \atop f(u) = 0, f \not\equiv 0} \frac{\sum_{(w_1, w_2) \in E}{(f(w_1)f(w_2))^2}}{\sum_{w \in V}{f(w)^2}}.$$ $\phi$ can also be understood as the smallest eigenvector of the Laplacian Matrix $L=DA$ after the $u$th row and column have been removed. We start in the point $v$ and construct a path from $v$ to $u$: at each step, we move to the neighbor for which $\phi$ is the smallest. This algorithm provably terminates and results in a short path from $v$ to $u$, often the shortest. The efficiency of this method is due to a discrete analogue of a phenomenon in Partial Differential Equations that is not well understood. We prove optimality for trees and discuss a number of open questions.
 [185] arXiv:2004.01179 (crosslist from eess.IV) [pdf, other]

Title: SingleImage HDR Reconstruction by Learning to Reverse the Camera PipelineAuthors: YuLun Liu, WeiSheng Lai, YuSheng Chen, YiLung Kao, MingHsuan Yang, YungYu Chuang, JiaBin HuangSubjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
Recovering a high dynamic range (HDR) image from a single low dynamic range (LDR) input image is challenging due to missing details in under/overexposed regions caused by quantization and saturation of camera sensors. In contrast to existing learningbased methods, our core idea is to incorporate the domain knowledge of the LDR image formation pipeline into our model. We model the HDRtoLDR image formation pipeline as the (1) dynamic range clipping, (2) nonlinear mapping from a camera response function, and (3) quantization. We then propose to learn three specialized CNNs to reverse these steps. By decomposing the problem into specific subtasks, we impose effective physical constraints to facilitate the training of individual subnetworks. Finally, we jointly finetune the entire model endtoend to reduce error accumulation. With extensive quantitative and qualitative experiments on diverse image datasets, we demonstrate that the proposed method performs favorably against stateoftheart singleimage HDR reconstruction algorithms.
Replacements for Fri, 3 Apr 20
 [186] arXiv:1707.01458 (replaced) [pdf, ps, other]

Title: The vortex method for 2D ideal flows in exterior domainsSubjects: Analysis of PDEs (math.AP); Mathematical Physics (mathph); Numerical Analysis (math.NA)
 [187] arXiv:1801.04819 (replaced) [pdf]

Title: Robots as Powerful Allies for the Study of Embodied Cognition from the Bottom UpComments: 22 pages, 3 figuresJournalref: in A. Newen, L. de Bruin; & S. Gallagher, ed., 'The Oxford Handbook 4e Cognition', Oxford University Press, pp. 841862 (2018)Subjects: Artificial Intelligence (cs.AI); Robotics (cs.RO); Neurons and Cognition (qbio.NC)
 [188] arXiv:1808.01278 (replaced) [pdf, ps, other]

Title: Coordinate Methods for Accelerating $\ell_\infty$ Regression and Faster Approximate Maximum FlowComments: A preliminary version appeared in FOCS 2018, with an error in the accelerated coordinate descent proof. Originally we claimed $m + \sqrt{ns}/\epsilon$ for our approximate maximum flow runtime; this version obtains $m + (n + \sqrt{ns})/\epsilon$. The $\ell_\infty$ regression results have been substantially improved, with dependence $c$ on column sparsity (formerly $c^{2.5}$)Subjects: Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC)
 [189] arXiv:1808.03114 (replaced) [pdf, other]

Title: ClassifierGuided Visual Correction of Noisy Labels for Image Classification TasksSubjects: Computer Vision and Pattern Recognition (cs.CV); HumanComputer Interaction (cs.HC); Machine Learning (cs.LG)
 [190] arXiv:1810.12959 (replaced) [pdf]

Title: SDFN: Segmentationbased Deep Fusion Network for Thoracic Disease Classification in Chest Xray ImagesComments: 10 pages, 9 figuresJournalref: Comput Med Imaging Graph, 2019Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [191] arXiv:1811.04587 (replaced) [pdf, ps, other]

Title: Analysis of multivariate Gegenbauer approximation in the hypercubeComments: Adv. Comput. Math., to appearSubjects: Numerical Analysis (math.NA)
 [192] arXiv:1811.08982 (replaced) [pdf, other]

Title: Polarity Loss for Zeroshot Object DetectionSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [193] arXiv:1812.00835 (replaced) [pdf, other]

Title: Sobolev gradient flow for the GrossPitaevskii eigenvalue problem: global convergence and computational efficiencySubjects: Numerical Analysis (math.NA)
 [194] arXiv:1812.01967 (replaced) [pdf, other]

Title: Unsupervised Feature Learning Architecture with Multiclustering Integration RBMSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
 [195] arXiv:1901.03571 (replaced) [pdf, ps, other]

Title: Life is Random, Time is Not: Markov Decision Processes with Window ObjectivesComments: Full version of CONCUR'19 paper, accepted in LMCSSubjects: Logic in Computer Science (cs.LO); Artificial Intelligence (cs.AI); Formal Languages and Automata Theory (cs.FL); Computer Science and Game Theory (cs.GT); Probability (math.PR)
 [196] arXiv:1902.08753 (replaced) [pdf, other]

Title: Quantum Learning Boolean Linear Functions w.r.t. Product DistributionsAuthors: Matthias C. CaroComments: 27 pages main text, 12 pages Appendix; 2 figures; improved and extended presentation containing a strengthened quantum sample complexity lower bound; accepted for publication in Quantum Information ProcessingSubjects: Quantum Physics (quantph); Machine Learning (cs.LG)
 [197] arXiv:1903.03232 (replaced) [pdf, other]

Title: SeizureNet: MultiSpectral Deep Feature Learning for Seizure Type ClassificationSubjects: Machine Learning (cs.LG); Neurons and Cognition (qbio.NC); Machine Learning (stat.ML)
 [198] arXiv:1903.03349 (replaced) [pdf]

Title: Computer aided detection of tuberculosis on chest radiographs: An evaluation of the CAD4TB v6 systemAuthors: Keelin Murphy, Shifa Salman Habib, Syed Mohammad Asad Zaidi, Saira Khowaja, Aamir Khan, Jaime Melendez, Ernst T. Scholten, Farhan Amad, Steven Schalekamp, Maurits Verhagen, Rick H. H. M. Philipsen, Annet Meijers, Bram van GinnekenComments: Published in Scientific ReportsJournalref: Scientific Reports 10, 5492 (2020)Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
 [199] arXiv:1903.10438 (replaced) [pdf, ps, other]

Title: Second and ThirdOrder Asymptotics of the ContinuousTime Poisson ChannelComments: 26 pages, to appear in the IEEE Transactions on Information Theory, vol. 66, 2020Subjects: Information Theory (cs.IT)
 [200] arXiv:1904.01352 (replaced) [pdf, other]

Title: Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble ClassifierComments: To be published in Computer Networks at this https URLSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
 [201] arXiv:1904.01381 (replaced) [pdf, ps, other]

Title: The minimal probabilistic and quantum finite automata recognizing uncountably many languages with fixed cutpointsComments: 11 pages, minor revisionsSubjects: Formal Languages and Automata Theory (cs.FL); Computational Complexity (cs.CC); Quantum Physics (quantph)
 [202] arXiv:1904.08128 (replaced) [pdf, other]

Title: Automated Design of Deep Learning Methods for Biomedical Image SegmentationComments: * Fabian Isensee and Paul F. J\"ager share the first authorshipSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [203] arXiv:1905.08572 (replaced) [pdf, ps, other]

Title: Guaranteed a posteriori error bounds for low rank tensor approximate solutionsSubjects: Numerical Analysis (math.NA)
 [204] arXiv:1905.11577 (replaced) [pdf, other]

Title: Towards Interpretable Sparse Graph Representation Learning with Laplacian PoolingComments: 11 pages, with AppendicesSubjects: Machine Learning (cs.LG); Biomolecules (qbio.BM); Machine Learning (stat.ML)
 [205] arXiv:1906.00250 (replaced) [pdf, other]

Title: Metric Learning for Individual FairnessAuthors: Christina IlventoSubjects: Machine Learning (cs.LG); Computers and Society (cs.CY); Machine Learning (stat.ML)
 [206] arXiv:1906.05173 (replaced) [pdf, other]

Title: UCRDNet: Unsupervised Collaborative Representation Deep Network for ClusteringSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
 [207] arXiv:1906.06166 (replaced) [pdf, other]

Title: Online Active Learning of Reject Option ClassifiersSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
 [208] arXiv:1906.11586 (replaced) [pdf, other]

Title: CaDIS: Cataract Dataset for Image SegmentationAuthors: Maria Grammatikopoulou, Evangello Flouty, Abdolrahim Kadkhodamohammadi, Gwenol'e Quellec, Andre Chow, Jean Nehme, Imanol Luengo, Danail StoyanovSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [209] arXiv:1907.05799 (replaced) [pdf, ps, other]

Title: A convergent discretisation method for transition path theory for diffusion processesComments: 25 pages, 4 figures; minor change in wording, title modificationSubjects: Numerical Analysis (math.NA)
 [210] arXiv:1907.07055 (replaced) [pdf, other]

Title: Homophily as a Process Generating Social Networks: Insights from Social Distance Attachment ModelComments: 22 pages; 11 figures. Published version. Introduction, theory and discussion differ somewhat from the earlier preprint versionsJournalref: Journal of Artificial Societies and Social Simulation, 23(2) 6, 2020Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.socph)
 [211] arXiv:1907.07263 (replaced) [pdf, ps, other]

Title: Caching as an Image Characterization Problem using Deep Convolutional Neural NetworksComments: 7 pages, 5 figuresSubjects: Networking and Internet Architecture (cs.NI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
 [212] arXiv:1907.12188 (replaced) [src]

Title: HandGestureRecognition Based Text Input Method for AR/VR Wearable DevicesComments: Information is not correct need to rewriteSubjects: HumanComputer Interaction (cs.HC)
 [213] arXiv:1908.00943 (replaced) [pdf, other]

Title: Prediction and Description of NearFuture Activities in VideoComments: 14 pages, 4 figures, 14 tablesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [214] arXiv:1908.05944 (replaced) [pdf, other]

Title: Parallel Computation of Alpha Complex for BiomoleculesSubjects: Computational Geometry (cs.CG); Distributed, Parallel, and Cluster Computing (cs.DC)
 [215] arXiv:1908.06022 (replaced) [pdf, other]

Title: SCARLETNAS: Bridging the gap between Stability and Scalability in Weightsharing Neural Architecture SearchComments: Make one shot nas scalableSubjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
 [216] arXiv:1908.06069 (replaced) [pdf, other]

Title: A Survey on Computational PoliticsSubjects: Social and Information Networks (cs.SI); Computers and Society (cs.CY)
 [217] arXiv:1908.10725 (replaced) [pdf, other]

Title: VJAGG  A ThickClient SmartPhone Journey Detection AlgorithmSubjects: Information Retrieval (cs.IR); Computers and Society (cs.CY)
 [218] arXiv:1908.11271 (replaced) [pdf, other]

Title: Cubic bent functions outside the completed MaioranaMcFarland classSubjects: Combinatorics (math.CO); Information Theory (cs.IT)
 [219] arXiv:1909.00464 (replaced) [pdf]

Title: Lost or found? Discovering data needed for researchSubjects: Digital Libraries (cs.DL); Computers and Society (cs.CY)
 [220] arXiv:1909.03360 (replaced) [pdf, other]

Title: Episodebased Prototype Generating Network for ZeroShot LearningSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [221] arXiv:1909.08097 (replaced) [pdf, other]

Title: Ensemble Knowledge Distillation for Learning Improved and Efficient NetworksSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [222] arXiv:1909.12581 (replaced) [pdf, other]

Title: An integral equation method for closely interacting surfactantcovered droplets in wallconfined Stokes flowSubjects: Numerical Analysis (math.NA); Computational Physics (physics.compph)
 [223] arXiv:1909.12780 (replaced) [pdf, other]

Title: Learning to Have an Ear for Face SuperResolutionSubjects: Computer Vision and Pattern Recognition (cs.CV); Audio and Speech Processing (eess.AS); Image and Video Processing (eess.IV)
 [224] arXiv:1910.00324 (replaced) [pdf, other]

Title: Graph convolutional networks for learning with few clean and many noisy labelsSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [225] arXiv:1910.07067 (replaced) [pdf, other]

Title: On adversarial patches: realworld attack on ArcFace100 face recognition systemSubjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
 [226] arXiv:1910.09017 (replaced) [pdf, other]

Title: Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph QueriesAuthors: Maciej Besta, Emanuel Peter, Robert Gerstenberger, Marc Fischer, Michał Podstawski, Claude Barthels, Gustavo Alonso, Torsten HoeflerSubjects: Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
 [227] arXiv:1910.09630 (replaced) [pdf, other]

Title: Blind interactive learning of modulation schemes: Multiagent cooperation without codesignComments: 33 pages, 25 figures, code can be found at this https URL, accepted for publication in IEEE AccessSubjects: Signal Processing (eess.SP); Information Theory (cs.IT)
 [228] arXiv:1910.10271 (replaced) [pdf, other]

Title: Restless Hidden Markov Bandits with Linear RewardsSubjects: Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
 [229] arXiv:1910.10793 (replaced) [pdf, other]

Title: We Know Where We Don't Know: 3D Bayesian CNNs for Credible Geometric UncertaintyComments: PreprintSubjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [230] arXiv:1910.10824 (replaced) [pdf, other]

Title: An Inverse Dynamics Approach to Control Lyapunov FunctionsComments: Accepted to the American Control Conference, 2020Subjects: Robotics (cs.RO)
 [231] arXiv:1911.00175 (replaced) [pdf, other]

Title: Hybrid Differential Dynamic Programming for Planar Manipulation PrimitivesSubjects: Robotics (cs.RO)
 [232] arXiv:1911.01429 (replaced) [pdf, other]

Title: The frontier of simulationbased inferenceComments: 10 pages, 3 figures, proceedings for the Sackler Colloquia at the US National Academy of Sciences. v2: fixed typos. v3: clarified text, added referencesSubjects: Machine Learning (stat.ML); Machine Learning (cs.LG); Methodology (stat.ME)
 [233] arXiv:1911.06188 (replaced) [pdf, other]
 [234] arXiv:1911.08731 (replaced) [pdf, other]

Title: Distributionally Robust Neural Networks for Group Shifts: On the Importance of Regularization for WorstCase GeneralizationSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
 [235] arXiv:1911.09565 (replaced) [pdf, other]

Title: A Continuous Teleoperation Subspace with Empirical and Algorithmic Mapping Algorithms for NonAnthropomorphic HandsComments: 15 pages, 6 tables, 8 figures, under review IEEE TASESubjects: Robotics (cs.RO)
 [236] arXiv:1911.10298 (replaced) [pdf, other]

Title: CoverNet: Multimodal Behavior Prediction using Trajectory SetsSubjects: Machine Learning (cs.LG); Robotics (cs.RO); Machine Learning (stat.ML)
 [237] arXiv:1911.10949 (replaced) [pdf, other]

Title: PQNET: A Generative Part Seq2Seq Network for 3D ShapesComments: Accepted to CVPR 2020. Code available at this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR); Machine Learning (cs.LG)
 [238] arXiv:1911.11288 (replaced) [pdf, other]

Title: Autolabeling 3D Objects with Differentiable Rendering of SDF Shape PriorsComments: CVPR 2020 (Oral). 8 pages + supplementary material. The first two authors contributed equally to this workSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [239] arXiv:1911.11834 (replaced) [pdf, other]

Title: Towards Fairness in Visual Recognition: Effective Strategies for Bias MitigationAuthors: Zeyu Wang, Klint Qinami, Ioannis Christos Karakozis, Kyle Genova, Prem Nair, Kenji Hata, Olga RussakovskyComments: To appear in CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [240] arXiv:1911.12207 (replaced) [pdf, other]

Title: Orthogonal Convolutional Neural NetworksComments: To appear in CVPR 2020, project page this http URLSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [241] arXiv:1911.12836 (replaced) [pdf, other]

Title: Siam RCNN: Visual Tracking by ReDetectionComments: CVPR 2020 cameraready versionSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [242] arXiv:1912.00195 (replaced) [pdf, other]

Title: SGAS: Sequential Greedy Architecture SearchComments: Accepted at CVPR'2020. Project website: this https URLSubjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
 [243] arXiv:1912.02783 (replaced) [pdf, other]

Title: SelfSupervised Learning of VideoInduced Visual InvariancesAuthors: Michael Tschannen, Josip Djolonga, Marvin Ritter, Aravindh Mahendran, Xiaohua Zhai, Neil Houlsby, Sylvain Gelly, Mario LucicComments: CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [244] arXiv:1912.05270 (replaced) [pdf, other]

Title: MineGAN: effective knowledge transfer from GANs to target domains with few imagesAuthors: Yaxing Wang, Abel GonzalezGarcia, David Berga, Luis Herranz, Fahad Shahbaz Khan, Joost van de WeijerComments: CVPR2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [245] arXiv:1912.07791 (replaced) [pdf, other]

Title: Quaternion Product Units for Deep Learning on 3D Rotation GroupsComments: CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [246] arXiv:1912.08035 (replaced) [pdf, other]

Title: Towards Generalization Across Depth for Monocular 3D Object DetectionSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [247] arXiv:1912.09916 (replaced) [pdf, other]

Title: Fast hybrid numericalasymptotic boundary element methods for high frequency screen and aperture problems based on leastsquares collocationSubjects: Numerical Analysis (math.NA)
 [248] arXiv:2001.01599 (replaced) [pdf, other]

Title: Multiscale Domainadversarial Multipleinstance CNN for Cancer Subtype Classification with Unannotated Histopathological ImagesAuthors: Noriaki Hashimoto, Daisuke Fukushima, Ryoichi Koga, Yusuke Takagi, Kaho Ko, Kei Kohno, Masato Nakaguro, Shigeo Nakamura, Hidekata Hontani, Ichiro TakeuchiComments: Accepted to CVPR2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
 [249] arXiv:2001.06863 (replaced) [pdf, ps, other]

Title: Infinitary Action Logic with ExponentiationComments: Submitted to a journalSubjects: Logic in Computer Science (cs.LO); Logic (math.LO)
 [250] arXiv:2001.07098 (replaced) [pdf, other]

Title: Audio Summarization with Audio Features and Probability Distribution DivergenceComments: 20th International Conference on Computational Linguistics and Intelligent Text ProcessingSubjects: Computation and Language (cs.CL); Information Retrieval (cs.IR)
 [251] arXiv:2001.07205 (replaced) [pdf, other]

Title: A graphbased spatial temporal logic for knowledge representation and automated reasoning in cognitive robotsSubjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
 [252] arXiv:2001.08826 (replaced) [pdf, other]

Title: An $O(s^r)$Resolution ODE Framework for DiscreteTime Optimization Algorithms and Applications to the Linear Convergence of SaddlePoint ProblemsAuthors: Haihao LuSubjects: Optimization and Control (math.OC); Machine Learning (cs.LG)
 [253] arXiv:2002.01065 (replaced) [pdf, other]

Title: Fake News Detection by means of Uncertainty Weighted Causal GraphsSubjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
 [254] arXiv:2002.02797 (replaced) [pdf, other]

Title: Variational Depth Search in ResNetsComments: Appearing at the 1st ICLR workshop on Neural Architecture Search 2020Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
 [255] arXiv:2002.06673 (replaced) [pdf, other]

Title: Performative PredictionComments: 32 pages, 4 figuresSubjects: Machine Learning (cs.LG); Computer Science and Game Theory (cs.GT); Machine Learning (stat.ML)
 [256] arXiv:2003.00903 (replaced) [pdf, other]

Title: Atomic Crosschain Transactions White PaperComments: 8 pages, 8 figures, 3 code listings. arXiv admin note: substantial text overlap with arXiv:1911.08083Subjects: Cryptography and Security (cs.CR)
 [257] arXiv:2003.01801 (replaced) [pdf, other]

Title: $\text{A}^3$: Activation Anomaly AnalysisComments: The first two authors contributed equally to this workSubjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
 [258] arXiv:2003.01966 (replaced) [pdf, other]

Title: Learning for Video Compression with Hierarchical Quality and Recurrent EnhancementComments: Published in CVPR 2020Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
 [259] arXiv:2003.02739 (replaced) [pdf, other]

Title: ZeroShot CrossLingual Transfer with Meta LearningSubjects: Computation and Language (cs.CL)
 [260] arXiv:2003.04919 (replaced) [pdf, other]

Title: Integrating PhysicsBased Modeling with Machine Learning: A SurveyComments: 11 pages, 4 figures, submitted to IJCAISubjects: Computational Physics (physics.compph); Machine Learning (cs.LG); Machine Learning (stat.ML)
 [261] arXiv:2003.06142 (replaced) [src]

Title: sVector Control of Battery Energy Storage System: Definition and ApplicationAuthors: Zhao YuanComments: not approved by supervisorSubjects: Systems and Control (eess.SY)
 [262] arXiv:2003.08165 (replaced) [pdf, other]

Title: Neuroevolution of SelfInterpretable AgentsComments: To appear at the Genetic and Evolutionary Computation Conference (GECCO 2020) as a full paperSubjects: Neural and Evolutionary Computing (cs.NE); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
 [263] arXiv:2003.08177 (replaced) [pdf, other]

Title: HighOrder Information Matters: Learning Relation and Topology for Occluded Person ReIdentificationAuthors: Guan'an Wang, Shuo Yang, Huanyu Liu, Zhicheng Wang, Yang Yang, Shuliang Wang, Gang Yu, Erjin Zhou, Jian SunComments: accepted by CVPR'20Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [264] arXiv:2003.10218 (replaced) [pdf, ps, other]

Title: Modelling transmission and control of the COVID19 pandemic in AustraliaComments: 27 pages, 13 figures, version 2 includes new Appendix FSubjects: Populations and Evolution (qbio.PE); Multiagent Systems (cs.MA); Quantitative Methods (qbio.QM)
 [265] arXiv:2003.10898 (replaced) [pdf, other]

Title: RNVID: A Feature Fusion Architecture for Video Object DetectionAuthors: Hughes Perreault, Maguelonne Héritier, Pierre Gravel, GuillaumeAlexandre Bilodeau, Nicolas SaunierSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [266] arXiv:2003.11631 (replaced) [pdf, ps, other]

Title: Choice functions based on sets of strict partial orders: an axiomatic characterisationAuthors: Jasper De BockSubjects: Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)
 [267] arXiv:2003.12139 (replaced) [pdf, other]

Title: Integrating Crowdsourcing and Active Learning for Classification of WorkLife Events from TweetsSubjects: Computation and Language (cs.CL); Machine Learning (cs.LG); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
 [268] arXiv:2003.12206 (replaced) [pdf, other]

Title: Improving Reproducibility in Machine Learning Research (A Report from the NeurIPS 2019 Reproducibility Program)Authors: Joelle Pineau, Philippe VincentLamarre, Koustuv Sinha, Vincent Larivière, Alina Beygelzimer, Florence d'AlchéBuc, Emily Fox, Hugo LarochelleSubjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
 [269] arXiv:2003.12308 (replaced) [pdf, other]

Title: On designtheoretic aspects of Boolean and vectorial bent functionsSubjects: Information Theory (cs.IT); Combinatorics (math.CO)
 [270] arXiv:2003.12523 (replaced) [pdf, other]

Title: On the utilization of Macroscopic Information for String Stability of a Vehicular PlatoonAuthors: Marco Mirabilio, Alessio Iovine, Elena De Santis, Maria Domenica Di Benedetto, Giordano PolaSubjects: Systems and Control (eess.SY)
 [271] arXiv:2003.12697 (replaced) [pdf, other]

Title: Semantically Multimodal Image SynthesisComments: To appear in CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [272] arXiv:2003.12824 (replaced) [pdf, other]

Title: Gradientbased Data Augmentation for SemiSupervised LearningAuthors: Hiroshi KaizukaComments: The lower bound of the inequality (line 2 on page 6 ) changed to fit fact 1 (2). Typos in (9) correctedSubjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
 [273] arXiv:2003.13526 (replaced) [pdf, other]

Title: Efficient Blackbox Optimization of Adversarial Windows Malware with Constrained ManipulationsSubjects: Cryptography and Security (cs.CR)
 [274] arXiv:2003.13629 (replaced) [pdf, ps, other]

Title: Building a Shared Resource HPC Center Across University Schools and Institutes: A Case StudyAuthors: Glen MacLachlan, Jason Hurlburt, Marco Suarez, Kai Leung Wong, William Burke, Terrence Lewis, Andrew Gallo, Jaroslav Flidr, Raoul Gabiam, Janis Nicholas, Brian EnsorComments: 5 pages, 2 tables. Submitted to SC16 and XSEDE16Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computers and Society (cs.CY)
 [275] arXiv:2003.13657 (replaced) [pdf, other]

Title: Analysing the Extent of Misinformation in Cancer Related TweetsComments: Proceedings of the 14th International Conference on Web and Social Media (ICWSM20)Subjects: Social and Information Networks (cs.SI); Computation and Language (cs.CL)
 [276] arXiv:2003.13793 (replaced) [pdf, other]

Title: A feedback linearisation algorithm for singletrack models with structural stability propertiesSubjects: Systems and Control (eess.SY)
 [277] arXiv:2003.13853 (replaced) [pdf, other]

Title: Semisupervised Learning for Fewshot ImagetoImage TranslationComments: CVPR2020Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [278] arXiv:2003.13923 (replaced) [pdf, ps, other]

Title: Highorder numerical methods for the Riesz space fractional advectiondispersion equationsComments: 14 pages, 4 figures. This article has been withdrawn from Computers and Mathematics with Applications due to the reason of the guest editorSubjects: Numerical Analysis (math.NA)
 [279] arXiv:2003.14240 (replaced) [pdf, other]

Title: Datadriven Stabilization of SISO Feedback Linearizable SystemsComments: 30 pages, 4 figures. This paper is an extension of the work presented in arXiv:1909.01959. arXiv admin note: text overlap with arXiv:1909.01959Subjects: Systems and Control (eess.SY)
 [280] arXiv:2003.14342 (replaced) [pdf, other]

Title: Fusible numbers and Peano ArithmeticComments: Minor fixes. 23 pages, 5 figures, 3 tablesSubjects: Logic in Computer Science (cs.LO); Combinatorics (math.CO); Logic (math.LO)
 [281] arXiv:2004.00033 (replaced) [pdf, ps, other]

Title: Give your Text Representation Models some Love: the Case for BasqueAuthors: Rodrigo Agerri, Iñaki San Vicente, Jon Ander Campos, Ander Barrena, Xabier Saralegi, Aitor Soroa, Eneko AgirreComments: Accepted at LREC 2020; 8 pages, 7 tablesSubjects: Computation and Language (cs.CL)
 [282] arXiv:2004.00130 (replaced) [pdf, other]

Title: A+ Indexes: Lightweight and Highly Flexible Adjacency Lists for Graph Database Management SystemsSubjects: Databases (cs.DB)
 [283] arXiv:2004.00199 (replaced) [pdf, other]

Title: GitHub Repositories with Links to Academic Papers: Open Access, Traceability, and EvolutionAuthors: Supatsara Wattanakriengkrai, Bodin Chinthanet, Hideaki Hata, Raula Gaikovina Kula, Christoph Treude, Jin Guo, Kenichi MatsumotoComments: 23 pagesSubjects: Software Engineering (cs.SE); Digital Libraries (cs.DL)
 [284] arXiv:2004.00424 (replaced) [pdf, ps, other]

Title: Solving the inverse problem for an ordinary differential equation using conjugationSubjects: Optimization and Control (math.OC); Dynamical Systems (math.DS); Numerical Analysis (math.NA); Chaotic Dynamics (nlin.CD)
 [285] arXiv:2004.00518 (replaced) [pdf, other]

Title: Scheduling ParallelTask Jobs Subject to Packing and Placement ConstraintsSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS); Performance (cs.PF)
 [286] arXiv:2004.00543 (replaced) [pdf, other]

Title: Physically Realizable Adversarial Examples for LiDAR Object DetectionAuthors: James Tu, Mengye Ren, Siva Manivasagam, Ming Liang, Bin Yang, Richard Du, Frank Cheng, Raquel UrtasunComments: Accepted to CVPR 2020Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
 [287] arXiv:2004.00553 (replaced) [pdf, other]

Title: Coronavirus Covid19 spreading in Italy: optimizing an epidemiological model with dynamic social distancing through Differential EvolutionSubjects: Populations and Evolution (qbio.PE); Social and Information Networks (cs.SI); Physics and Society (physics.socph)
 [288] arXiv:2004.00583 (replaced) [pdf, other]

Title: Boosting Deep Hyperspectral Image Classification with Spectral UnmixingSubjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
 [289] arXiv:2004.00603 (replaced) [pdf, ps, other]

Title: Noregret learning dynamics for extensiveform correlated and coarse correlated equilibriaSubjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
 [290] arXiv:2004.00614 (replaced) [pdf, other]

Title: Articulationaware Canonical Surface MappingComments: To appear at CVPR 2020, project page this https URLSubjects: Computer Vision and Pattern Recognition (cs.CV)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)
Links to: arXiv, form interface, find, cs, recent, 2004, contact, help (Access key information)