We gratefully acknowledge support from
the Simons Foundation and member institutions.

Computer Science

New submissions

[ total of 290 entries: 1-290 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Fri, 3 Apr 20

[1]  arXiv:2004.00623 [pdf, other]
Title: Bayesian ODE Solvers: The Maximum A Posteriori Estimate
Subjects: Numerical Analysis (math.NA); Methodology (stat.ME); Machine Learning (stat.ML)

It has recently been established that the numerical solution of ordinary differential equations can be posed as a nonlinear Bayesian inference problem, which can be approximately solved via Gaussian filtering and smoothing, whenever a Gauss--Markov prior is used. In this paper the class of $\nu$ times differentiable linear time invariant Gauss--Markov priors is considered. A taxonomy of Gaussian estimators is established, with the maximum a posteriori estimate at the top of the hierarchy, which can be computed with the iterated extended Kalman smoother. The remaining three classes are termed explicit, semi-implicit, and implicit, which are in similarity with the classical notions corresponding to conditions on the vector field, under which the filter update produces a local maximum a posteriori estimate. The maximum a posteriori estimate corresponds to an optimal interpolant in the reproducing Hilbert space associated with the prior, which in the present case is equivalent to a Sobolev space of smoothness $\nu+1$. Consequently, using methods from scattered data approximation and nonlinear analysis in Sobolev spaces, it is shown that the maximum a posteriori estimate converges to the true solution at a polynomial rate in the fill-distance (maximum step size) subject to mild conditions on the vector field. The methodology developed provides a novel and more natural approach to study the convergence of these estimators than classical methods of convergence analysis. The methods and theoretical results are demonstrated in numerical examples.

[2]  arXiv:2004.00626 [pdf, other]
Title: Background Matting: The World is Your Green Screen
Comments: Accepted to CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose a method for creating a matte -- the per-pixel foreground color and alpha -- of a person by taking photos or videos in an everyday setting with a handheld camera. Most existing matting methods require a green screen background or a manually created trimap to produce a good matte. Automatic, trimap-free methods are appearing, but are not of comparable quality. In our trimap free approach, we ask the user to take an additional photo of the background without the subject at the time of capture. This step requires a small amount of foresight but is far less time-consuming than creating a trimap. We train a deep network with an adversarial loss to predict the matte. We first train a matting network with supervised loss on ground truth data with synthetic composites. To bridge the domain gap to real imagery with no labeling, we train another matting network guided by the first network and by a discriminator that judges the quality of composites. We demonstrate results on a wide variety of photos and videos and show significant improvement over the state of the art.

[3]  arXiv:2004.00642 [pdf, other]
Title: Object-Centric Image Generation with Factored Depths, Locations, and Appearances
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)

We present a generative model of images that explicitly reasons over the set of objects they show. Our model learns a structured latent representation that separates objects from each other and from the background; unlike prior works, it explicitly represents the 2D position and depth of each object, as well as an embedding of its segmentation mask and appearance. The model can be trained from images alone in a purely unsupervised fashion without the need for object masks or depth information. Moreover, it always generates complete objects, even though a significant fraction of training images contain occlusions. Finally, we show that our model can infer decompositions of novel images into their constituent objects, including accurate prediction of depth ordering and segmentation of occluded parts.

[4]  arXiv:2004.00646 [pdf, other]
Title: A Survey on Conversational Recommender Systems
Comments: 35 pages, 5 figures. Submitted for publication
Subjects: Human-Computer Interaction (cs.HC); Artificial Intelligence (cs.AI); Information Retrieval (cs.IR)

Recommender systems are software applications that help users to find items of interest in situations of information overload. Current research often assumes a one-shot interaction paradigm, where the users' preferences are estimated based on past observed behavior and where the presentation of a ranked list of suggestions is the main, one-directional form of user interaction. Conversational recommender systems (CRS) take a different approach and support a richer set of interactions. These interactions can, for example, help to improve the preference elicitation process or allow the user to ask questions about the recommendations and to give feedback. The interest in CRS has significantly increased in the past few years. This development is mainly due to the significant progress in the area of natural language processing, the emergence of new voice-controlled home assistants, and the increased use of chatbot technology. With this paper, we provide a detailed survey of existing approaches to conversational recommendation. We categorize these approaches in various dimensions, e.g., in terms of the supported user intents or the knowledge they use in the background. Moreover, we discuss technological approaches, review how CRS are evaluated, and finally identify a number of gaps that deserve more research in the future.

[5]  arXiv:2004.00648 [pdf, ps, other]
Title: Igbo-English Machine Translation: An Evaluation Benchmark
Comments: 4 pages
Subjects: Computation and Language (cs.CL); Machine Learning (cs.LG)

Although researchers and practitioners are pushing the boundaries and enhancing the capacities of NLP tools and methods, works on African languages are lagging. A lot of focus on well resourced languages such as English, Japanese, German, French, Russian, Mandarin Chinese etc. Over 97% of the world's 7000 languages, including African languages, are low resourced for NLP i.e. they have little or no data, tools, and techniques for NLP research. For instance, only 5 out of 2965, 0.19% authors of full text papers in the ACL Anthology extracted from the 5 major conferences in 2018 ACL, NAACL, EMNLP, COLING and CoNLL, are affiliated to African institutions. In this work, we discuss our effort toward building a standard machine translation benchmark dataset for Igbo, one of the 3 major Nigerian languages. Igbo is spoken by more than 50 million people globally with over 50% of the speakers are in southeastern Nigeria. Igbo is low resourced although there have been some efforts toward developing IgboNLP such as part of speech tagging and diacritic restoration

[6]  arXiv:2004.00655 [pdf, other]
Title: Parameterized Analysis of Assignment Under Multiple Preferences
Comments: 43 pages, 11 figures
Subjects: Data Structures and Algorithms (cs.DS)

The Assignment problem is a fundamental, well-studied problem in the intersection of Social Choice, Computational Economics and Discrete Allocation. In the Assignment problem, we seek a pareto optimal allocation of items to agents given the preferences of the agents. We introduce a generalized version of this problem, where each agent is equipped with multiple incomplete preference lists: each list (called a layer) is a ranking of items in a possibly different way according to a different criterion. We introduce a new concept of pareto optimality, and study the generalized version of the problem from the perspective of Parameterized Complexity. Here, we consider several natural parameters such as the number of layers, number of agents, number of items, and maximal length of a preference list; we present a comprehensive picture of the parameterized complexity of the problem with respect to these parameters.

[7]  arXiv:2004.00658 [pdf, other]
Title: Sequential Feature Classification in the Context of Redundancies
Comments: WIP
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

The problem of all-relevant feature selection is concerned with finding a relevant feature set with preserved redundancies. There exist several approximations to solve this problem but only one could give a distinction between strong and weak relevance. This approach was limited to the case of linear problems. In this work, we present a new solution for this distinction in the non-linear case through the use of random forest models and statistical methods.

[8]  arXiv:2004.00660 [pdf, ps, other]
Title: Network Orchestration in Mobile Networks via a Synergy of Model-driven and AI-based Techniques
Comments: 6 pages, 3 figures, the conference accepted version
Subjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)

As data traffic volume continues to increase, caching of popular content at strategic network locations closer to the end user can enhance not only user experience but ease the utilization of highly congested links in the network. A key challenge in the area of proactive caching is finding the optimal locations to host the popular content items under various optimization criteria. These problems are combinatorial in nature and therefore finding optimal and/or near optimal decisions is computationally expensive. In this paper a framework is proposed to reduce the computational complexity of the underlying integer mathematical program by first predicting decision variables related to optimal locations using a deep convolutional neural network (CNN). The CNN is trained in an offline manner with optimal solutions and is then used to feed a much smaller optimization problems which is amenable for real-time decision making. Numerical investigations reveal that the proposed approach can provide in an online manner high quality decision making; a feature which is crucially important for real-world implementations.

[9]  arXiv:2004.00662 [pdf, other]
Title: Bayesian Safe Learning and Control with Sum-of-Squares Analysis and Polynomial Kernels
Comments: 8 pages, 3 figures. Submission to IEEE CDC 2020
Subjects: Systems and Control (eess.SY)

We propose an iterative method to safely learn the unmodeled dynamics of a nonlinear system using Bayesian Gaussian process (GP) models with polynomial kernel functions. The method maintains safety by ensuring that the system state stays within the region of attraction (ROA) of a stabilizing control policy while collecting data. A quadratic programming based exploration control policy is computed to keep the exploration trajectory inside an inner-approximation of the ROA and to maximize the information gained from the trajectory. A prior GP model, which incorporates prior information about the unknown dynamics, is used to construct an initial stabilizing policy. As the GP model is updated with data, it is used to synthesize a new policy and a larger ROA, which increases the range of safe exploration. The use of polynomial kernels allows us to compute ROA inner-approximations and stabilizing control laws for the model using sum-of-squares programming. We also provide a probabilistic guarantee of safety which ensures that the policy computed using the learned model stabilizes the true dynamics with high confidence.

[10]  arXiv:2004.00663 [pdf, other]
Title: Synchronizing Probability Measures on Rotations via Optimal Transport
Comments: Accepted for publication at CVPR 2020, includes supplementary material. Project website: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR); Machine Learning (cs.LG); Robotics (cs.RO); Machine Learning (stat.ML)

We introduce a new paradigm, $\textit{measure synchronization}$, for synchronizing graphs with measure-valued edges. We formulate this problem as maximization of the cycle-consistency in the space of probability measures over relative rotations. In particular, we aim at estimating marginal distributions of absolute orientations by synchronizing the $\textit{conditional}$ ones, which are defined on the Riemannian manifold of quaternions. Such graph optimization on distributions-on-manifolds enables a natural treatment of multimodal hypotheses, ambiguities and uncertainties arising in many computer vision applications such as SLAM, SfM, and object pose estimation. We first formally define the problem as a generalization of the classical rotation graph synchronization, where in our case the vertices denote probability measures over rotations. We then measure the quality of the synchronization by using Sinkhorn divergences, which reduces to other popular metrics such as Wasserstein distance or the maximum mean discrepancy as limit cases. We propose a nonparametric Riemannian particle optimization approach to solve the problem. Even though the problem is non-convex, by drawing a connection to the recently proposed sparse optimization methods, we show that the proposed algorithm converges to the global optimum in a special case of the problem under certain conditions. Our qualitative and quantitative experiments show the validity of our approach and we bring in new perspectives to the study of synchronization.

[11]  arXiv:2004.00666 [pdf, other]
Title: Generalized Zero-Shot Learning Via Over-Complete Distribution
Comments: 9 pages, 5 figures, Accepted in CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

A well trained and generalized deep neural network (DNN) should be robust to both seen and unseen classes. However, the performance of most of the existing supervised DNN algorithms degrade for classes which are unseen in the training set. To learn a discriminative classifier which yields good performance in Zero-Shot Learning (ZSL) settings, we propose to generate an Over-Complete Distribution (OCD) using Conditional Variational Autoencoder (CVAE) of both seen and unseen classes. In order to enforce the separability between classes and reduce the class scatter, we propose the use of Online Batch Triplet Loss (OBTL) and Center Loss (CL) on the generated OCD. The effectiveness of the framework is evaluated using both Zero-Shot Learning and Generalized Zero-Shot Learning protocols on three publicly available benchmark databases, SUN, CUB and AWA2. The results show that generating over-complete distributions and enforcing the classifier to learn a transform function from overlapping to non-overlapping distributions can improve the performance on both seen and unseen classes.

[12]  arXiv:2004.00668 [pdf, other]
Title: Understanding Global Feature Contributions Through Additive Importance Measures
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

Understanding the inner workings of complex machine learning models is a long-standing problem, with recent research focusing primarily on local interpretability. To assess the role of individual input features in a global sense, we propose a new feature importance method, Shapley Additive Global importancE (SAGE), a model-agnostic measure of feature importance based on the predictive power associated with each feature. SAGE relates to prior work through the novel framework of additive importance measures, a perspective that unifies numerous other feature importance methods and shows that only SAGE properly accounts for complex feature interactions. We define SAGE using the Shapley value from cooperative game theory, which leads to numerous intuitive and desirable properties. Our experiments apply SAGE to eight datasets, including MNIST and breast cancer subtype classification, and demonstrate its advantages through quantitative and qualitative evaluations.

[13]  arXiv:2004.00677 [pdf, other]
Title: Subspace Decomposition for Graphon LQR: Applications to VLSNs of Harmonic Oscillators
Comments: Submitted on Feb 28, 2020
Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)

Graphon control has been proposed and developed in [Gao and Caines CDC 2017, 2018, 2019, TAC 2020) to approximately solve control problems for very large-scale networks of linear dynamical systems. In this paper, linear quadratic regulation (LQR) problems for graphon dynamical systems are studied. Graphon couplings appear in states, controls and cost, and these couplings may be represented by different graphons. Based on invariant subspace decompositions, this work provides a solution method for a class of such problems where the local dynamics is homogeneous but the network couplings are heterogeneous among the coupled subsystems. By exploring a common invariant subspace of the couplings, the original problem is decomposed into a network coupled LQR problem of finite dimension and a decoupled infinite dimensional LQR problem. A centralized optimal solution and a nodal collaborative optimal control solution are established. The complexity of these solutions involves solving one nd X nd dimensional Riccati equation and one n X n Riccati equation, where n is the dimension of each nodal agent state and d is the dimension of the (nontrivial) invariant subspace shared by the coupling operators. For situations where the graphon couplings do not admit exact low-rank representations, approximate control is developed based on low-rank approximations. Finally, an application to the regulation of harmonic oscillators coupled over large networks with uncertainties is demonstrated.

[14]  arXiv:2004.00679 [pdf, ps, other]
Title: LQG Graphon Mean Field Games
Comments: As submitted on March 31, 2020 to the IEEE Conference on Decisions and Control
Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)

This paper formulates infinite dimensional graphon dynamical systems to study the limit problem of linear quadratic Gaussian graphon mean field game (LQG-GMFG). The limit problem is characterized by forward and backward graphon dynamical system equations. Based on this representation, sufficient conditions on the existence of a unique fixed point are established. Furthermore, under the finite rank assumption on the underlying graphon, exact numerical solution methods are presented.

[15]  arXiv:2004.00685 [pdf, other]
Title: A Sensorized Multicurved Robot Finger with Data-driven Touch Sensing via Overlapping Light Signals
Comments: To be published in IEEE/ASME Transactions on Mechatronics. this https URL
Subjects: Robotics (cs.RO)

Despite significant advances in touch and force transduction, tactile sensing is still far from ubiquitous in robotic manipulation. Existing methods for building touch sensors have proven difficult to integrate into robot fingers due to multiple challenges, including difficulty in covering multicurved surfaces, high wire count, or packaging constrains preventing their use in dexterous hands. In this paper, we present a multicurved robotic finger with accurate touch localization and normal force detection over complex, three-dimensional surfaces. The key to our approach is the novel use of overlapping signals from light emitters and receivers embedded in a transparent waveguide layer that covers the functional areas of the finger. By measuring light transport between every emitter and receiver, we show that we can obtain a very rich signal set that changes in response to deformation of the finger due to touch. We then show that purely data-driven deep learning methods are able to extract useful information from such data, such as contact location and applied normal force, without the need for analytical models. The final result is a fully integrated, sensorized robot finger, with a low wire count and using easily accessible manufacturing methods, designed for easy integration into dexterous manipulators.

[16]  arXiv:2004.00686 [pdf, other]
Title: Bias in Machine Learning What is it Good (and Bad) for?
Subjects: Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

In public media as well as in scientific publications, the term \emph{bias} is used in conjunction with machine learning in many different contexts, and with many different meanings. This paper proposes a taxonomy of these different meanings, terminology, and definitions by surveying the, primarily scientific, literature on machine learning. In some cases, we suggest extensions and modifications to promote a clear terminology and completeness. The survey is followed by an analysis and discussion on how different types of biases are connected and depend on each other. We conclude that there is a complex relation between bias occurring in the machine learning pipeline that leads to a model, and the eventual bias of the model (which is typically related to social discrimination). The former bias may or may not influence the latter, in a sometimes bad, and sometime good way.

[17]  arXiv:2004.00689 [pdf, other]
Title: Robots in the Danger Zone: Exploring Public Perception through Engagement
Comments: Accepted in HRI 2020, Keywords: Human robot interaction, robotics, artificial intelligence, public engagement, public perceptions of robots, robotics and society
Journal-ref: In Human-Robot Interaction HRI 2020, ACM, NY, USA, 10 pages
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Human-Computer Interaction (cs.HC); Robotics (cs.RO)

Public perceptions of Robotics and Artificial Intelligence (RAI) are important in the acceptance, uptake, government regulation and research funding of this technology. Recent research has shown that the public's understanding of RAI can be negative or inaccurate. We believe effective public engagement can help ensure that public opinion is better informed. In this paper, we describe our first iteration of a high throughput in-person public engagement activity. We describe the use of a light touch quiz-format survey instrument to integrate in-the-wild research participation into the engagement, allowing us to probe both the effectiveness of our engagement strategy, and public perceptions of the future roles of robots and humans working in dangerous settings, such as in the off-shore energy sector. We critique our methods and share interesting results into generational differences within the public's view of the future of Robotics and AI in hazardous environments. These findings include that older peoples' views about the future of robots in hazardous environments were not swayed by exposure to our exhibit, while the views of younger people were affected by our exhibit, leading us to consider carefully in future how to more effectively engage with and inform older people.

[18]  arXiv:2004.00693 [pdf, other]
Title: The lowest-order stabilizer free Weak Galerkin Finite Element Method
Subjects: Numerical Analysis (math.NA)

Recently, a new stabilizer free weak Galerkin method (SFWG) is proposed, which is easier to implement and more efficient. The main idea is that by letting $j\geq j_{0}$ for some $j_{0}$, where $j$ is the degree of the polynomials used to compute the weak gradients, then the stabilizer term in the regular weak Galerkin method is no longer needed. Later on in \cite{al2019note}, the optimal of such $j_{0}$ for certain types of finite element spaces was given. In this paper, we propose a new efficient SFWG scheme using the lowest possible orders of piecewise polynomials for triangular meshes in $2 D$ with the optimal order of convergence.

[19]  arXiv:2004.00698 [pdf, other]
Title: Adversarial Learning for Personalized Tag Recommendation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Information Retrieval (cs.IR); Machine Learning (cs.LG)

We have recently seen great progress in image classification due to the success of deep convolutional neural networks and the availability of large-scale datasets. Most of the existing work focuses on single-label image classification. However, there are usually multiple tags associated with an image. The existing works on multi-label classification are mainly based on lab curated labels. Humans assign tags to their images differently, which is mainly based on their interests and personal tagging behavior. In this paper, we address the problem of personalized tag recommendation and propose an end-to-end deep network which can be trained on large-scale datasets. The user-preference is learned within the network in an unsupervised way where the network performs joint optimization for user-preference and visual encoding. A joint training of user-preference and visual encoding allows the network to efficiently integrate the visual preference with tagging behavior for a better user recommendation. In addition, we propose the use of adversarial learning, which enforces the network to predict tags resembling user-generated tags. We demonstrate the effectiveness of the proposed model on two different large-scale and publicly available datasets, YFCC100M and NUS-WIDE. The proposed method achieves significantly better performance on both the datasets when compared to the baselines and other state-of-the-art methods. The code is publicly available at https://github.com/vyzuer/ALTReco.

[20]  arXiv:2004.00701 [pdf, other]
Title: An Exploratory Study of Writing and Revising Explicit Programming Strategies
Subjects: Software Engineering (cs.SE); Human-Computer Interaction (cs.HC)

Knowledge sharing plays a crucial role throughout all software application development activities. When programmers learn and share through media like Stack overflow, GitHub, Meetups, videos, discussion forums, wikis, and blogs, every developer benefits. However, there is one kind of knowledge that developers share far less often: strategic knowledge for how to approach programming problems (e.g., how to debug server-side Python errors, how to resolve a merge conflict, how to evaluate the stability of an API one is considering for adoption). In this paper, we investigate the feasibility of developers articulating and sharing their strategic knowledge, and the use of these strategies to support other developers in their problem-solving. We specifically investigate challenges that developers face in articulating strategies in a form in which other developers can use to increase their productivity. To observe this, we simulated a knowledge-sharing platform, asking experts to articulate one of their own strategies and then asked the second set of developers to try to use the strategies and provide feedback on the strategies to authors. During the study, we asked both strategy authors and users to reflect on the challenges they faced. In analyzing the strategies authors created, the use of the strategies, the feedback that users provided to authors, and the difficulties that authors faced addressing this feedback, we found that developers can share strategic knowledge, but authoring strategies require substantial feedback from diverse audiences to be helpful to programmers with varying prior knowledge. Our results also raise challenging questions about how future work should support searching and browsing for strategies that support varying prior knowledge.

[21]  arXiv:2004.00703 [pdf, other]
Title: A Hybrid FeMFET-CMOS Analog Synapse Circuit for Neural Network Training and Inference
Comments: Accepted at ISCAS'20 for oral presentation
Subjects: Emerging Technologies (cs.ET)

An analog synapse circuit based on ferroelectric-metal field-effect transistors is proposed, that offers 6-bit weight precision. The circuit is comprised of volatile least significant bits (LSBs) used solely during training, and non-volatile most significant bits (MSBs) used for both training and inference. The design works at a 1.8V logic-compatible voltage, provides 10^10 endurance cycles, and requires only 250ps update pulses. A variant of LeNet trained with the proposed synapse achieves 98.2% accuracy on MNIST, which is only 0.4% lower than an ideal implementation of the same network with the same bit precision. Furthermore, the proposed synapse offers improvements of up to 26% in area, 44.8% in leakage power, 16.7% in LSB update pulse duration, and two orders of magnitude in endurance cycles, when compared to state-of-the-art hybrid synaptic circuits. Our proposed synapse can be extended to an 8-bit design, enabling a VGG-like network to achieve 88.8% accuracy on CIFAR-10 (only 0.8% lower than an ideal implementation of the same network).

[22]  arXiv:2004.00705 [pdf, other]
Title: Revisiting Pose-Normalization for Fine-Grained Few-Shot Recognition
Comments: To appear in CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Few-shot, fine-grained classification requires a model to learn subtle, fine-grained distinctions between different classes (e.g., birds) based on a few images alone. This requires a remarkable degree of invariance to pose, articulation and background. A solution is to use pose-normalized representations: first localize semantic parts in each image, and then describe images by characterizing the appearance of each part. While such representations are out of favor for fully supervised classification, we show that they are extremely effective for few-shot fine-grained classification. With a minimal increase in model capacity, pose normalization improves accuracy between 10 and 20 percentage points for shallow and deep architectures, generalizes better to new domains, and is effective for multiple few-shot algorithms and network backbones. Code is available at https://github.com/Tsingularity/PoseNorm_Fewshot

[23]  arXiv:2004.00711 [pdf, ps, other]
Title: The Pade Approximant Based Network for Variational Problems
Authors: Chi-Chun Zhou, Yi Liu
Subjects: Numerical Analysis (math.NA); Signal Processing (eess.SP)

In solving the variational problem, the key is to efficiently find the target function that minimizes or maximizes the specified functional. In this paper, by using the Pade approximant, we suggest a methods for the variational problem. By comparing the method with those based on the radial basis function networks (RBF), the multilayer perception networks (MLP), and the Legendre polynomials, we show that the method searches the target function effectively and efficiently.

[24]  arXiv:2004.00713 [pdf, other]
Title: Memory-Efficient Incremental Learning Through Feature Adaptation
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In this work we introduce an approach for incremental learning, which preserves feature descriptors instead of images unlike most existing work. Keeping such low-dimensional embeddings instead of images reduces the memory footprint significantly. We assume that the model is updated incrementally for new classes as new data becomes available sequentially. This requires adapting the previously stored feature vectors to the updated feature space without having access to the corresponding images. Feature adaptation is learned with a multi-layer perceptron, which is trained on feature pairs of an image corresponding to the outputs of the original and updated network. We validate experimentally that such a transformation generalizes well to the features of the previous set of classes, and maps features to a discriminative subspace in the feature space. As a result, the classifier is optimized jointly over new and old classes without requiring old class images. Experimental results show that our method achieves state-of-the-art classification accuracy in incremental learning benchmarks, while having at least an order of magnitude lower memory footprint compared to image preserving strategies.

[25]  arXiv:2004.00716 [pdf, other]
Title: Constrained-Space Optimization and Reinforcement Learning for Complex Tasks
Comments: Accepted for publication in RA-Letters and at ICRA 2020
Journal-ref: IEEE Robotics and Automation Letters, 5(2) (2020) 682-689
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

Learning from Demonstration is increasingly used for transferring operator manipulation skills to robots. In practice, it is important to cater for limited data and imperfect human demonstrations, as well as underlying safety constraints. This paper presents a constrained-space optimization and reinforcement learning scheme for managing complex tasks. Through interactions within the constrained space, the reinforcement learning agent is trained to optimize the manipulation skills according to a defined reward function. After learning, the optimal policy is derived from the well-trained reinforcement learning agent, which is then implemented to guide the robot to conduct tasks that are similar to the experts' demonstrations. The effectiveness of the proposed method is verified with a robotic suturing task, demonstrating that the learned policy outperformed the experts' demonstrations in terms of the smoothness of the joint motion and end-effector trajectories, as well as the overall task completion time.

[26]  arXiv:2004.00722 [pdf, ps, other]
Title: k-Median clustering under discrete Fréchet and Hausdorff distances
Comments: A shorter version to appear in SoCG 2020
Subjects: Computational Geometry (cs.CG)

We give the first near-linear time $(1+\eps)$-approximation algorithm for $k$-median clustering of polygonal trajectories under the discrete Fr\'{e}chet distance, and the first polynomial time $(1+\eps)$-approximation algorithm for $k$-median clustering of finite point sets under the Hausdorff distance, provided the cluster centers, ambient dimension, and $k$ are bounded by a constant. The main technique is a general framework for solving clustering problems where the cluster centers are restricted to come from a \emph{simpler} metric space. We precisely characterize conditions on the simpler metric space of the cluster centers that allow faster $(1+\eps)$-approximations for the $k$-median problem. We also show that the $k$-median problem under Hausdorff distance is \textsc{NP-Hard}.

[27]  arXiv:2004.00732 [pdf, other]
Title: Robust Single Rotation Averaging
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose a novel method for single rotation averaging using the Weiszfeld algorithm. Our contribution is threefold: First, we propose a robust initialization based on the elementwise median of the input rotation matrices. Our initial solution is more accurate and robust than the commonly used chordal $L_2$-mean. Second, we propose an outlier rejection scheme that can be incorporated in the Weiszfeld algorithm to improve the robustness of $L_1$ rotation averaging. Third, we propose a method for approximating the chordal $L_1$-mean using the Weiszfeld algorithm. An extensive evaluation shows that both our method and the state of the art perform equally well with the proposed outlier rejection scheme, but ours is $2-4$ times faster.

[28]  arXiv:2004.00740 [pdf, other]
Title: Monocular Camera Localization in Prior LiDAR Maps with 2D-3D Line Correspondences
Comments: Submitted to IROS 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Light-weight camera localization in existing maps is essential for vision-based navigation. Currently, visual and visual-inertial odometry (VO\&VIO) techniques are well-developed for state estimation but with inevitable accumulated drifts and pose jumps upon loop closure. To overcome these problems, we propose an efficient monocular camera localization method in prior LiDAR maps using directly estimated 2D-3D line correspondences. To handle the appearance differences and modality gaps between untextured point clouds and images, geometric 3D lines are extracted offline from LiDAR maps while robust 2D lines are extracted online from video sequences. With the pose prediction from VIO, we can efficiently obtain coarse 2D-3D line correspondences. After that, the camera poses and 2D-3D correspondences are iteratively optimized by minimizing the projection error of correspondences and rejecting outliers. The experiment results on the EurocMav dataset and our collected dataset demonstrate that the proposed method can efficiently estimate camera poses without accumulated drifts or pose jumps in urban environments. The code and our collected data are available at https://github.com/levenberg/2D-3D-pose-tracking.

[29]  arXiv:2004.00742 [pdf, other]
Title: #ArsonEmergency and Australia's "Black Summer": Polarisation and misinformation on social media
Comments: 15 pages, 8 images, accepted by the 2nd Multidisciplinary International Symposium on Disinformation in Open Online Media (MISDOOM 2020), Leiden University, The Netherlands
Subjects: Social and Information Networks (cs.SI)

During the summer of 2019-20, while Australia suffered unprecedented bushfires across the country, false narratives regarding arson and limited backburning spread quickly on Twitter, particularly using the hashtag #ArsonEmergency. Misinformation and bot- and troll-like behaviour were detected and reported by social media researchers and the news soon reached mainstream media. This paper examines the communication and behaviour of two polarised online communities before and after news of the misinformation became public knowledge. Specifically, the Supporter community actively engaged with others to spread the hashtag, using a variety of news sources pushing the arson narrative, while the Opposer community engaged less, retweeted more, and focused its use of URLs to link to mainstream sources, debunking the narratives and exposing the anomalous behaviour. This influenced the content of the broader discussion. Bot analysis revealed the active accounts were predominantly human, but behavioural and content analysis suggests Supporters engaged in trolling, though both communities used aggressive language.

[30]  arXiv:2004.00749 [pdf]
Title: Learned and Controlled Autonomous Robotic Exploration in an Extreme, Unknown Environment
Comments: Published in: 2019 IEEE Aerospace Conference Date of Conference: 2-9 March 2019 Date Added to IEEE Xplore: 20 June 2019
Subjects: Robotics (cs.RO)

Exploring and traversing extreme terrain with surface robots is difficult, but highly desirable for many applications, including exploration of planetary surfaces, search and rescue, among others. For these applications, to ensure the robot can predictably locomote, the interaction between the terrain and vehicle, terramechanics, must be incorporated into the model of the robot's locomotion. Modeling terramechanic effects is difficult and may be impossible in situations where the terrain is not known a priori. For these reasons, learning a terramechanics model online is desirable to increase the predictability of the robot's motion. A problem with previous implementations of learning algorithms is that the terramechanics model and corresponding generated control policies are not easily interpretable or extensible. If the models were of interpretable form, designers could use the learned models to inform vehicle and/or control design changes to refine the robot architecture for future applications. This paper explores a new method for learning a terramechanics model and a control policy using a model-based genetic algorithm. The proposed method yields an interpretable model, which can be analyzed using preexisting analysis methods. The paper provides simulation results that show for a practical application, the genetic algorithm performance is approximately equal to the performance of a state-of-the-art neural network approach, which does not provide an easily interpretable model.

[31]  arXiv:2004.00750 [pdf, ps, other]
Title: Terrain Visibility Graphs: Persistence is Not Enough
Comments: To appear in SoCG 2020
Subjects: Computational Geometry (cs.CG)

In this paper, we consider the Visibility Graph Recognition and Reconstruction problems in the context of terrains. Here, we are given a graph $G$ with labeled vertices $v_0, v_1, \ldots, v_{n-1}$ such that the labeling corresponds with a Hamiltonian path $H$. $G$ also may contain other edges. We are interested in determining if there is a terrain $T$ with vertices $p_0, p_1, \ldots, p_{n-1}$ such that $G$ is the visibility graph of $T$ and the boundary of $T$ corresponds with $H$. $G$ is said to be persistent if and only if it satisfies the so-called X-property and Bar-property. It is known that every "pseudo-terrain" has a persistent visibility graph and that every persistent graph is the visibility graph for some pseudo-terrain. The connection is not as clear for (geometric) terrains. It is known that the visibility graph of any terrain $T$ is persistent, but it has been unclear whether every persistent graph $G$ has a terrain $T$ such that $G$ is the visibility graph of $T$. There actually have been several papers that claim this to be the case (although no formal proof has ever been published), and recent works made steps towards building a terrain reconstruction algorithm for any persistent graph. In this paper, we show that there exists a persistent graph $G$ that is not the visibility graph for any terrain $T$. This means persistence is not enough by itself to characterize the visibility graphs of terrains, and implies that pseudo-terrains are not stretchable.

[32]  arXiv:2004.00756 [pdf, other]
Title: A County-level Dataset for Informing the United States' Response to COVID-19
Subjects: Computers and Society (cs.CY); Databases (cs.DB); Physics and Society (physics.soc-ph); Populations and Evolution (q-bio.PE)

As the coronavirus disease 2019 (COVID-19) becomes a global pandemic, policy makers must enact interventions to stop its spread. Data driven approaches might supply information to support the implementation of mitigation and suppression strategies. To facilitate research in this direction, we present a machine-readable dataset that aggregates relevant data from governmental, journalistic, and academic sources on the county level. In addition to county-level time-series data from the JHU CSSE COVID-19 Dashboard, our dataset contains more than 300 variables that summarize population estimates, demographics, ethnicity, housing, education, employment and in come, climate, transit scores, and healthcare system-related metrics. Furthermore, we present aggregated out-of-home activity information for various points of interest for each county, including grocery stores and hospitals, summarizing data from SafeGraph. By collecting these data, as well as providing tools to read them, we hope to aid researchers investigating how the disease spreads and which communities are best able to accommodate stay-at-home mitigation efforts. Our dataset and associated code are available at https://github.com/JieYingWu/COVID-19_US_County-level_Summaries.

[33]  arXiv:2004.00759 [pdf, other]
Title: Safe Zero-Shot Model-Based Learning and Control: A Wasserstein Distributionally Robust Approach
Comments: In review for CDC20
Subjects: Systems and Control (eess.SY); Optimization and Control (math.OC)

This paper explores distributionally robust zero-shot model-based learning and control using Wasserstein ambiguity sets. Conventional model-based reinforcement learning algorithms struggle to guarantee feasibility throughout the online learning process. We address this open challenge with the following approach. Using a stochastic model-predictive control (MPC) strategy, we augment safety constraints with affine random variables corresponding to the instantaneous empirical distributions of modeling error. We obtain these distributions by evaluating model residuals in real time throughout the online learning process. By optimizing over the worst case modeling error distribution defined within a Wasserstein ambiguity set centered about our empirical distributions, we can approach the nominal constraint boundary in a provably safe way. We validate the performance of our approach using a case study of lithium-ion battery fast charging, a relevant and safety-critical energy systems control application. Our results demonstrate marked improvements in safety compared to a basic learning model-predictive controller, with constraints satisfied at every instance during online learning and control.

[34]  arXiv:2004.00760 [pdf, other]
Title: Consistent Multiple Sequence Decoding
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Sequence decoding is one of the core components of most visual-lingual models. However, typical neural decoders when faced with decoding multiple, possibly correlated, sequences of tokens resort to simple independent decoding schemes. In this paper, we introduce a consistent multiple sequence decoding architecture, which is while relatively simple, is general and allows for consistent and simultaneous decoding of an arbitrary number of sequences. Our formulation utilizes a consistency fusion mechanism, implemented using message passing in a Graph Neural Network (GNN), to aggregate context from related decoders. This context is then utilized as a secondary input, in addition to previously generated output, to make a prediction at a given step of decoding. Self-attention, in the GNN, is used to modulate the fusion mechanism locally at each node and each step in the decoding process. We show the efficacy of our consistent multiple sequence decoder on the task of dense relational image captioning and illustrate state-of-the-art performance (+ 5.2% in mAP) on the task. More importantly, we illustrate that the decoded sentences, for the same regions, are more consistent (improvement of 9.5%), while across images and regions maintain diversity.

[35]  arXiv:2004.00761 [pdf]
Title: A Primer on Bandwidth Parts in 5G New Radio
Comments: 7 pages, 3 figures, 2 tables
Subjects: Networking and Internet Architecture (cs.NI)

The fifth generation (5G) wireless access technology, known as New Radio (NR), features flexibility to support a variety of usage scenarios. One of the basic concepts in 5G NR is bandwidth part (BWP), which is, at a high level, a set of contiguous resource blocks configured inside a channel bandwidth. BWP spans across many 5G NR specifications developed by the 3rd Generation Partnership Project. Understanding how BWP operates is vital to understanding 5G NR. This article provides an overview of the essentials of BWP in the NR technical specifications. We describe fundamental BWP concepts, BWP configuration methods, and BWP switch mechanisms. We also discuss user equipment capabilities in terms of BWP support and share our thoughts on use cases of BWP for NR deployments.

[36]  arXiv:2004.00762 [pdf, other]
Title: In Automation We Trust: Investigating the Role of Uncertainty in Active Learning Systems
Subjects: Machine Learning (cs.LG); Human-Computer Interaction (cs.HC); Machine Learning (stat.ML)

We investigate how different active learning (AL) query policies coupled with classification uncertainty visualizations affect analyst trust in automated classification systems. A current standard policy for AL is to query the oracle (e.g., the analyst) to refine labels for datapoints where the classifier has the highest uncertainty. This is an optimal policy for the automation system as it yields maximal information gain. However, model-centric policies neglect the effects of this uncertainty on the human component of the system and the consequent manner in which the human will interact with the system post-training. In this paper, we present an empirical study evaluating how AL query policies and visualizations lending transparency to classification influence trust in automated classification of image data. We found that query policy significantly influences an analyst's trust in an image classification system, and we use these results to propose a set of oracle query policies and visualizations for use during AL training phases that can influence analyst trust in classification.

[37]  arXiv:2004.00768 [pdf, other]
Title: Software Language Comprehension using a Program-Derived Semantic Graph
Subjects: Artificial Intelligence (cs.AI); Programming Languages (cs.PL)

Traditional code transformation structures, such as an abstract syntax tree, may have limitations in their ability to extract semantic meaning from code. Others have begun to work on this issue, such as the state-of-the-art Aroma system and its simplified parse tree (SPT). Continuing this research direction, we present a new graphical structure to capture semantics from code using what we refer to as a program-derived semantic graph (PSG). The principle behind the PSG is to provide a single structure that can capture program semantics at many levels of granularity. Thus, the PSG is hierarchical in nature. Moreover, because the PSG may have cycles due to dependencies in semantic layers, it is a graph, not a tree. In this paper, we describe the PSG and its fundamental structural differences to the Aroma's SPT. Although our work in the PSG is in its infancy, our early results indicate it is a promising new research direction to explore to automatically extract program semantics.

[38]  arXiv:2004.00773 [pdf, other]
Title: A Blockchain-based Decentralized Federated Learning Framework with Committee Consensus
Comments: 7 pages, 4 figures and 1 table
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Machine Learning (cs.LG)

Federated learning has been widely studied and applied to various scenarios. In mobile computing scenarios, federated learning protects users from exposing their private data, while cooperatively training the global model for a variety of real-world applications. However, the security of federated learning is increasingly being questioned, due to the malicious clients or central servers' constant attack to the global model or user privacy data. To address these security issues, we proposed a decentralized federated learning framework based on blockchain, i.e., a Blockchain-based Federated Learning framework with Committee consensus (BFLC). The framework uses blockchain for the global model storage and the local model update exchange. To enable the proposed BFLC, we also devised an innovative committee consensus mechanism, which can effectively reduce the amount of consensus computing and reduce malicious attacks. We then discussed the scalability of BFLC, including theoretical security, storage optimization, and incentives. Finally, we performed experiments using real-world datasets to verify the effectiveness of the BFLC framework.

[39]  arXiv:2004.00775 [pdf, other]
Title: Strong Converse for Testing Against Independence over a Noisy channel
Subjects: Information Theory (cs.IT); Statistics Theory (math.ST)

A distributed binary hypothesis testing (HT) problem over a noisy channel studied previously by the authors is investigated from the perspective of the strong converse property. It was shown by Ahlswede and Csisz\'{a}r that a strong converse holds in the above setting when the channel is rate-limited and noiseless. Motivated by this observation, we show that the strong converse continues to hold in the noisy channel setting for a special case of HT known as testing against independence (TAI). The proof utilizes the blowing up lemma and the recent change of measure technique of Tyagi and Watanabe as the key tools.

[40]  arXiv:2004.00779 [pdf, other]
Title: Scene-Adaptive Video Frame Interpolation via Meta-Learning
Comments: CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Video frame interpolation is a challenging problem because there are different scenarios for each video depending on the variety of foreground and background motion, frame rate, and occlusion. It is therefore difficult for a single network with fixed parameters to generalize across different videos. Ideally, one could have a different network for each scenario, but this is computationally infeasible for practical applications. In this work, we propose to adapt the model to each video by making use of additional information that is readily available at test time and yet has not been exploited in previous works. We first show the benefits of `test-time adaptation' through simple fine-tuning of a network, then we greatly improve its efficiency by incorporating meta-learning. We obtain significant performance gains with only a single gradient update without any additional parameters. Finally, we show that our meta-learning framework can be easily employed to any video frame interpolation network and can consistently improve its performance on multiple benchmark datasets.

[41]  arXiv:2004.00783 [pdf, other]
Title: A Literature Review on Mobile Charging Station Technology for Electric Vehicles
Comments: This paper has been accepted for presentation at the 2020 IEEE Transportation Electrification Conference & Expo, to be held in Chicago, Illinois USA from June 24-26, 2020
Subjects: Systems and Control (eess.SY); Signal Processing (eess.SP)

While Electric vehicles (EVs) adoption is accelerating in an unprecedented way, lacking EV charging infrastructure hinders the development of the EV market. To compensate for these shortcomings, Mobile Charging Stations (MCS) could play a prominent role to accelerate EV penetration by providing charging services with no restrictions on the location and time of the charging process. This paper disseminates information on other papers and technical reports on MCS in the literature. It also discusses the benefits of MCS, its challenges, and finally introduces the research gaps in this area.

[42]  arXiv:2004.00784 [pdf, other]
Title: Learning Agile Robotic Locomotion Skills by Imitating Animals
Subjects: Robotics (cs.RO); Machine Learning (cs.LG)

Reproducing the diverse and agile locomotion skills of animals has been a longstanding challenge in robotics. While manually-designed controllers have been able to emulate many complex behaviors, building such controllers involves a time-consuming and difficult development process, often requiring substantial expertise of the nuances of each skill. Reinforcement learning provides an appealing alternative for automating the manual effort involved in the development of controllers. However, designing learning objectives that elicit the desired behaviors from an agent can also require a great deal of skill-specific expertise. In this work, we present an imitation learning system that enables legged robots to learn agile locomotion skills by imitating real-world animals. We show that by leveraging reference motion data, a single learning-based approach is able to automatically synthesize controllers for a diverse repertoire behaviors for legged robots. By incorporating sample efficient domain adaptation techniques into the training process, our system is able to learn adaptive policies in simulation that can then be quickly adapted for real-world deployment. To demonstrate the effectiveness of our system, we train an 18-DoF quadruped robot to perform a variety of agile behaviors ranging from different locomotion gaits to dynamic hops and turns.

[43]  arXiv:2004.00786 [pdf, other]
Title: Graph-based fusion for change detection in multi-spectral images
Comments: Four pages conference paper, four figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In this paper we address the problem of change detection in multi-spectral images by proposing a data-driven framework of graph-based data fusion. The main steps of the proposed approach are: (i) The generation of a multi-temporal pixel based graph, by the fusion of intra-graphs of each temporal data; (ii) the use of Nystr\"om extension to obtain the eigenvalues and eigenvectors of the fused graph, and the selection of the final change map. We validated our approach in two real cases of remote sensing according to both qualitative and quantitative analyses. The results confirm the potential of the proposed graph-based change detection algorithm outperforming state-of-the-art methods.

[44]  arXiv:2004.00794 [pdf, other]
Title: Alleviating Semantic-level Shift: A Semi-supervised Domain Adaptation Method for Semantic Segmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Learning segmentation from synthetic data and adapting to real data can significantly relieve human efforts in labelling pixel-level masks. A key challenge of this task is how to alleviate the data distribution discrepancy between the source and target domains, i.e. reducing domain shift. The common approach to this problem is to minimize the discrepancy between feature distributions from different domains through adversarial training. However, directly aligning the feature distribution globally cannot guarantee consistency from a local view (i.e. semantic-level), which prevents certain semantic knowledge learned on the source domain from being applied to the target domain. To tackle this issue, we propose a semi-supervised approach named Alleviating Semantic-level Shift (ASS), which can successfully promote the distribution consistency from both global and local views. Specifically, leveraging a small number of labeled data from the target domain, we directly extract semantic-level feature representations from both the source and the target domains by averaging the features corresponding to same categories advised by pixel-level masks. We then feed the produced features to the discriminator to conduct semantic-level adversarial learning, which collaborates with the adversarial learning from the global view to better alleviate the domain shift. We apply our ASS to two domain adaptation tasks, from GTA5 to Cityscapes and from Synthia to Cityscapes. Extensive experiments demonstrate that: (1) ASS can significantly outperform the current unsupervised state-of-the-arts by employing a small number of annotated samples from the target domain; (2) ASS can beat the oracle model trained on the whole target dataset by over 3 points by augmenting the synthetic source data with annotated samples from the target domain without suffering from the prevalent problem of overfitting to the source domain.

[45]  arXiv:2004.00797 [pdf, other]
Title: SSHFD: Single Shot Human Fall Detection with Occluded Joints Resilience
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Falling can have fatal consequences for elderly people especially if the fallen person is unable to call for help due to loss of consciousness or any injury. Automatic fall detection systems can assist through prompt fall alarms and by minimizing the fear of falling when living independently at home. Existing vision-based fall detection systems lack generalization to unseen environments due to challenges such as variations in physical appearances, different camera viewpoints, occlusions, and background clutter. In this paper, we explore ways to overcome the above challenges and present Single Shot Human Fall Detector (SSHFD), a deep learning based framework for automatic fall detection from a single image. This is achieved through two key innovations. First, we present a human pose based fall representation which is invariant to appearance characteristics. Second, we present neural network models for 3d pose estimation and fall recognition which are resilient to missing joints due to occluded body parts. Experiments on public fall datasets show that our framework successfully transfers knowledge of 3d pose estimation and fall recognition learnt purely from synthetic data to unseen real-world data, showcasing its generalization capability for accurate fall detection in real-world scenarios.

[46]  arXiv:2004.00798 [pdf]
Title: Mapping Languages: The Corpus of Global Language Use
Authors: Jonathan Dunn
Comments: This is a pre-print of an article published in Language Resources and Evaluation. The final authenticated version is available online at: this https URL
Subjects: Computation and Language (cs.CL)

This paper describes a web-based corpus of global language use with a focus on how this corpus can be used for data-driven language mapping. First, the corpus provides a representation of where national varieties of major languages are used (e.g., English, Arabic, Russian) together with consistently collected data for each variety. Second, the paper evaluates a language identification model that supports more local languages with smaller sample sizes than alternative off-the-shelf models. Improved language identification is essential for moving beyond majority languages. Given the focus on language mapping, the paper analyzes how well this digital language data represents actual populations by (i) systematically comparing the corpus with demographic ground-truth data and (ii) triangulating the corpus with an alternate Twitter-based dataset. In total, the corpus contains 423 billion words representing 148 languages (with over 1 million words from each language) and 158 countries (again with over 1 million words from each country), all distilled from Common Crawl web data. The main contribution of this paper, in addition to describing this publicly-available corpus, is to provide a comprehensive analysis of the relationship between two sources of digital data (the web and Twitter) as well as their connection to underlying populations.

[47]  arXiv:2004.00799 [pdf, ps, other]
Title: Cocktail: Cost-efficient and Data Skew-aware Online In-Network Distributed Machine Learning for Intelligent 5G and Beyond
Subjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)

To facilitate the emerging applications in the 5G networks and beyond, mobile network operators will provide many powerful control functionalities such as RAN slicing and resource scheduling. These control functionalities generally comprise a series of prediction tasks such as channel state information prediction, cellular traffic prediction and user mobility prediction which will be enabled by machine learning (ML) techniques. However, training the ML models offline is inefficient, due to the excessive overhead for forwarding the huge volume of data samples from cellular networks to remote ML training clouds. Thanks to the promising edge computing paradigm, we advocate cooperative online in-network ML training across edge clouds. To alleviate the data skew issue caused by the capacity heterogeneity and dynamics of edge clouds while avoiding excessive overhead, we propose Cocktail, a cost-efficient and data skew-aware online in-network distributed machine learning framework. We build a comprehensive model and formulate an online data scheduling problem to optimize the framework cost while reconciling the data skew from both short-term and long-term perspective. We exploit the stochastic gradient descent to devise an online asymptotically optimal algorithm. As its core building block, we propose optimal policies based on novel graph constructions to respectively solve two subproblems. We also improve the proposed online algorithm with online learning for fast convergence of in-network ML training. A small-scale testbed and large-scale simulations validate the superior performance of our framework.

[48]  arXiv:2004.00801 [pdf, other]
Title: Exploration of Reinforcement Learning for Event Camera using Car-like Robots
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Robotics (cs.RO)

We demonstrate the first reinforcement-learning application for robots equipped with an event camera. Because of the considerably lower latency of the event camera, it is possible to achieve much faster control of robots compared with the existing vision-based reinforcement-learning applications using standard cameras. To handle a stream of events for reinforcement learning, we introduced an image-like feature and demonstrated the feasibility of training an agent in a simulator for two tasks: fast collision avoidance and obstacle tracking. Finally, we set up a robot with an event camera in the real world and then transferred the agent trained in the simulator, resulting in successful fast avoidance of randomly thrown objects. Incorporating event camera into reinforcement learning opens new possibilities for various robotics applications that require swift control, such as autonomous vehicles and drones, through end-to-end learning approaches.

[49]  arXiv:2004.00802 [pdf]
Title: Device-aware inference operations in SONOS nonvolatile memory arrays
Comments: To be presented at IEEE International Physics Reliability Symposium (IRPS) 2020
Subjects: Neural and Evolutionary Computing (cs.NE)

Non-volatile memory arrays can deploy pre-trained neural network models for edge inference. However, these systems are affected by device-level noise and retention issues. Here, we examine damage caused by these effects, introduce a mitigation strategy, and demonstrate its use in fabricated array of SONOS (Silicon-Oxide-Nitride-Oxide-Silicon) devices. On MNIST, fashion-MNIST, and CIFAR-10 tasks, our approach increases resilience to synaptic noise and drift. We also show strong performance can be realized with ADCs of 5-8 bits precision.

[50]  arXiv:2004.00803 [pdf, other]
Title: RisGraph: A Real-Time Streaming System for Evolving Graphs
Subjects: Databases (cs.DB)

Graphs in the real world are constantly changing and of large scale. In processing these evolving graphs, the combination of update workloads (updating vertices and edges in a streaming manner) and analytical (performing graph algorithms incrementally) workloads is ubiquitous. Throughput, latency, and granularity are three key requirements in processing evolving graphs with such combined workloads. Although there are several streaming systems proposed for evolving graphs to improve latency. They usually use batch-update model to improve throughput but hurt granularity. It is still challenging to fulfill all the requirements simultaneously, especially for power-law graphs because they are difficult to be partitioned.
We analyze the computational cost on synthesized power-law graphs and realistic evolving graphs from public datasets. We find that the affected areas are usually small for each update, and there are scheduling opportunities for combined workloads. Based on these observations, we design a real-time streaming system for incremental graph computing called RisGraph. Our novel design on scheduling, trade-offs on data structures and the computing engine make RisGraph satisfy the three requirements at the same time. The evaluation shows RisGraph can ingest millions of updates per second and its 99.9%ile latency is within 20 milliseconds for graphs with hundreds of millions of vertices and billions of edges on a single commodity machine.

[51]  arXiv:2004.00809 [pdf, other]
Title: Mapping Languages and Demographics with Georeferenced Corpora
Comments: Proceedings of GeoComputation 19
Subjects: Computation and Language (cs.CL)

This paper evaluates large georeferenced corpora, taken from both web-crawled and social media sources, against ground-truth population and language-census datasets. The goal is to determine (i) which dataset best represents population demographics; (ii) in what parts of the world the datasets are most representative of actual populations; and (iii) how to weight the datasets to provide more accurate representations of underlying populations. The paper finds that the two datasets represent very different populations and that they correlate with actual populations with values of r=0.60 (social media) and r=0.49 (web-crawled). Further, Twitter data makes better predictions about the inventory of languages used in each country.

[52]  arXiv:2004.00811 [pdf, ps, other]
Title: Fundamental Limits of Distributed Encoding
Subjects: Information Theory (cs.IT)

In general coding theory, we often assume that error is observed in transferring or storing encoded symbols, while the process of encoding itself is error-free. Motivated by recent applications of coding theory, we introduce the problem of distributed encoding which comprises of a set of $K \in \mathbb{N}$ isolated source nodes and $N \in \mathbb{N}$ encoding nodes. Each source node has one symbol from a finite field, which is sent to each of the encoding nodes. Each encoding node stores an encoded symbol from the same field, as a function of the received symbols. However, some of the source nodes are controlled by the adversary and may send different symbols to different encoding nodes. Depending on the number of adversarial nodes, denoted by $\beta \in \mathbb{N}$, and the cardinality of the set of symbols that each one generates, denoted by $v \in \mathbb{N}$, this would make the process of decoding from the encoded symbols impossible. Assume that a decoder connects to an arbitrary subset of $t \in \mathbb{N}$ encoding nodes and wants to decode the symbols of the honest nodes correctly, without necessarily identifying the sets of honest and adversarial nodes. In this paper, we characterize $t^* \in \mathbb{N}$, as the minimum of such $t$, as a function of $K$, $N$, $\beta$, and $v$. We show that for $\beta\geq 1, v\ge 2$, $t^*=K+\beta (v-1)+1$, if $N \geq K+\beta (v-1)+1 $, and $t^*=N$, if $N \le K+\beta (v-1)$. In order to achieve $t^*$, we introduce a nonlinear code. In continue, we focus on linear coding and show that $t^*_{\textrm{linear}}=K+2\beta(v-1)$, if $N\ge K+2\beta(v-1)$, and $t^*_{\textrm{linear}}=N$, if $N\le K+2\beta(v-1)$.

[53]  arXiv:2004.00812 [pdf, other]
Title: Identification of Critical Clusters in Inverter-based Microgrids
Comments: Accepted for the PSCC conference
Subjects: Systems and Control (eess.SY)

In this paper, we investigate the stability properties of inverter-based microgrids by establishing the possible presence of the so-called critical clusters - groups of inverters with their control settings being close to the stability boundary. For this, we consider the spectrum of the weighted admittance matrix of the network and show that its distinct eigenvalues correspond to inverter clusters, whose structure can be revealed by the corresponding eigenvector. We show that the maximum eigenvalue of the weighted admittance matrix corresponds to the cluster, closest to stability boundary. We also establish, that there exists a boundary on the value of this eigenvalue, that corresponds to the stability of the overall system. Thus, we make it possible to certify the stability of the system and find the groups of inverters in which control settings are closest to the stability boundary.

[54]  arXiv:2004.00813 [pdf, other]
Title: Repetition-based NOMA Transmission and Its Outage Probability Analysis
Authors: Jinho Choi
Comments: 10 pages, 8 figures (to be published by IEEE Trans. Vehicular Technology)
Subjects: Information Theory (cs.IT)

In this paper, we discuss a non-orthogonal multiple access (NOMA) scheme to exploit a high diversity gain using repetition, namely repetition-based NOMA. Unlike conventional power-domain NOMA, all the users can have the same transmit power, but different number of repetitions. Thanks to a high diversity gain, a low outage probability can be achieved without instantaneous channel state information (CSI) feedback for power allocation. A closed-form expression for an upper-bound on the outage probability is derived so that the values of key parameters can be decided to maintain the outage probability below a target value. We also consider the average error probability for finite-length codes. Simulation results are compared with the derived bounds and it is shown that the bounds are reasonably tight and can be used to decide key parameters (e.g., code rates) to guarantee target error probabilities.

[55]  arXiv:2004.00817 [pdf, ps, other]
Title: Combating The Machine Ethics Crisis: An Educational Approach
Authors: Tai Vu
Subjects: Computers and Society (cs.CY); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

In recent years, the availability of massive data sets and improved computing power have driven the advent of cutting-edge machine learning algorithms. However, this trend has triggered growing concerns associated with its ethical issues. In response to such a phenomenon, this study proposes a feasible solution that combines ethics and computer science materials in artificial intelligent classrooms. In addition, the paper presents several arguments and evidence in favor of the necessity and effectiveness of this integrated approach.

[56]  arXiv:2004.00819 [pdf, other]
Title: Chattering analysis of Lipschitz continuous sliding-mode controllers
Comments: 7 pages, 9 figures. This paper was submitted to the CDC 2020
Subjects: Systems and Control (eess.SY)

Lipschitz continuous sliding-mode controllers (LCSMC) are developed as the integral of discontinuous SMC, producing control signals of finite slope. Nevertheless, LCSMC still generate chattering in the presence of fast parasitic dynamics. In this paper, an analysis of chattering in systems driven by LCSMC is performed using the Harmonic Balance (HB) approach. Two kinds of LCSMC are considered: the first one is based on a linear sliding variable (LSV) and the second one on a terminal switching variable (TSV). Predictions of the amplitude and frequency of self-excited oscillations allowed to compute the average power consumed by the controller, in order to maintain the trajectories into the real sliding mode. A comparison of LCSMC with the Super-Twisting controller (STC), which produce a continuous control signal with infinite slope, is performed. Theoretical predictions and simulation results confirm that LCSMC may induce fast-oscillations (chattering) of smaller amplitude and average power than those ones caused by the STC. But, surprisingly, the chattering generated by LSV-LCSMC could be smaller than that one caused by TSV-LCSMC, when the actuators are fast enough. On the other hand, it tuns that if the sliding dynamics of the LSV-LCSMC closed-loop is of similar speed as the actuators dynamics, the system can loose even practical stability.

[57]  arXiv:2004.00821 [pdf, ps, other]
Title: Gopala-Hemachandra codes revisited
Subjects: Information Theory (cs.IT); Combinatorics (math.CO); Number Theory (math.NT)

Gopala-Hemachandra codes are a variation of the Fibonacci universal code and have applications in cryptography and data compression. We show that $GH_{a}(n)$ codes always exist for $a=-2,-3$ and $-4$ for any integer $n \geq 1$ and hence are universal codes. We develop two new algorithms to determine whether a GH code exists for a given set of parameters $a$ and $n$. In 2010, Basu and Prasad showed experimentally that in the range $1 \leq n \leq 100$ and $1 \leq k \leq 16$, there are at most $k$ consecutive integers for which $GH_{-(4+k)}(n)$ does not exist. We turn their numerical result into a mathematical theorem and show that it is valid well beyond the limited range considered by them.

[58]  arXiv:2004.00827 [pdf, other]
Title: Approximate Selection with Guarantees using Proxies
Subjects: Databases (cs.DB)

Due to the falling costs of data acquisition and storage, researchers and industry analysts often want to find all instances of rare events in large datasets. For instance, scientists can cheaply capture thousands of hours of video, but are limited by the need to manually inspect all the video to identify relevant objects and events. To reduce this cost, recent work proposes to use cheap proxy models, such as image classifiers, to identify an approximate set of data points satisfying a data selection filter. Unfortunately, this recent work does not provide the statistical accuracy guarantees necessary in scientific and production settings.
In this work, we introduce novel algorithms for approximate selection queries with statistical accuracy guarantees. Namely, given a limited number of exact identifications from an oracle, often a human or an expensive machine learning model, our algorithms meet a minimum precision or recall target with high probability. In contrast, existing approaches can catastrophically fail in satisfying these recall and precision targets. We show that our algorithms can improve query result quality by up to 30$\times$ for both the precision and recall targets in both real and synthetic datasets.

[59]  arXiv:2004.00828 [pdf, other]
Title: Equivariant Filter Design for Kinematic Systems on Lie Groups
Subjects: Systems and Control (eess.SY)

It is known that invariance and equivariance properties for systems on Lie groups can be exploited in the design of high performance and robust observers and filters for real-world robotic systems. This paper proposes an analysis framework that allows any kinematic system on a Lie group to be embedded in a natural manner into an equivariant kinematic system. This framework allows us to characterise the properties of, and relationships between, invariant systems, group affine systems, and equivariant systems. We propose a new filter design, the Equivariant Filter (EqF), that exploits the equivariance properties of the system embedding and can be applied to any kinematic system on a Lie group.

[60]  arXiv:2004.00830 [pdf, other]
Title: Tracking by Instance Detection: A Meta-Learning Approach
Comments: This paper has been accepted by CVPR'20 as an oral
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We consider the tracking problem as a special type of object detection problem, which we call instance detection. With proper initialization, a detector can be quickly converted into a tracker by learning the new instance from a single image. We find that model-agnostic meta-learning (MAML) offers a strategy to initialize the detector that satisfies our needs. We propose a principled three-step approach to build a high-performance tracker. First, pick any modern object detector trained with gradient descent. Second, conduct offline training (or initialization) with MAML. Third, perform domain adaptation using the initial frame. We follow this procedure to build two trackers, named Retina-MAML and FCOS-MAML, based on two modern detectors RetinaNet and FCOS. Evaluations on four benchmarks show that both trackers are competitive against state-of-the-art trackers. On OTB-100, Retina-MAML achieves the highest ever AUC of 0.712. On TrackingNet, FCOS-MAML ranks the first on the leader board with an AUC of 0.757 and the normalized precision of 0.822. Both trackers run in real-time at 40 FPS.

[61]  arXiv:2004.00831 [pdf, other]
Title: Improving 3D Object Detection through Progressive Population Based Augmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Data augmentation has been widely adopted for object detection in 3D point clouds. All previous efforts have focused on manually designing specific data augmentation methods for individual architectures, however no work has attempted to automate the design of data augmentation in 3D detection problems -- as is common in 2D image-based computer vision. In this work, we present the first attempt to automate the design of data augmentation policies for 3D object detection. We present an algorithm, termed Progressive Population Based Augmentation (PPBA). PPBA learns to optimize augmentation strategies by narrowing down the search space and adopting the best parameters discovered in previous iterations. On the KITTI test set, PPBA improves the StarNet detector by substantial margins on the moderate difficulty category of cars, pedestrians, and cyclists, outperforming all current state-of-the-art single-stage detection models. Additional experiments on the Waymo Open Dataset indicate that PPBA continues to effectively improve 3D object detection on a 20x larger dataset compared to KITTI. The magnitude of the improvements may be comparable to advances in 3D perception architectures and the gains come without an incurred cost at inference time. In subsequent experiments, we find that PPBA may be up to 10x more data efficient than baseline 3D detection models without augmentation, highlighting that 3D detection models may achieve competitive accuracy with far fewer labeled examples.

[62]  arXiv:2004.00833 [pdf, other]
Title: Efficient Online Classification and Tracking on Resource-constrained IoT Devices
Comments: This paper is to be published in ACM Transactions on Internet of Things (TIOT)
Subjects: Networking and Internet Architecture (cs.NI)

Timely processing has been increasingly required on smart IoT devices, which leads to directly implementing information processing tasks on an IoT device for bandwidth savings and privacy assurance. Particularly, monitoring and tracking the observed signals in continuous form are common tasks for a variety of near real-time processing IoT devices, such as in smart homes, body-area and environmental sensing applications. However, these systems are likely low-cost resource-constrained embedded systems, equipped with compact memory space, whereby the ability to store the full information state of continuous signals is limited. Hence, in this paper, we develop solutions of efficient timely processing embedded systems for online classification and tracking of continuous signals with compact memory space. Particularly, we focus on the application of smart plugs that are capable of timely classification of appliance types and tracking of appliance behavior in a standalone manner. We implemented a smart plug prototype using low-cost Arduino platform with small amount of memory space to demonstrate the following timely processing operations: (1) learning and classifying the patterns associated with the continuous power consumption signals, and (2) tracking the occurrences of signal patterns using small local memory space. Furthermore, our system designs are also sufficiently generic for timely monitoring and tracking applications in other resource-constrained IoT devices.

[63]  arXiv:2004.00835 [pdf, other]
Title: Adversarial Reinforcement Learning-based Robust Access Point Coordination Against Uncoordinated Interference
Subjects: Networking and Internet Architecture (cs.NI)

This paper proposes a robust adversarial reinforcement learning (RARL)-based multi-access point (AP) coordination method that is robust even against unexpected decentralized operations of uncoordinated APs. Multi-AP coordination is a promising technique towards IEEE 802.11be, and there are studies that use RL for multi-AP coordination. Indeed, a simple RL-based multi-AP coordination method diminishes the collision probability among the APs; therefore, the method is a promising approach to improve time-resource efficiency. However, this method is vulnerable to frame transmissions of uncoordinated APs that are less aware of frame transmissions of other coordinated APs. To help the central agent experience even such unexpected frame transmissions, in addition to the central agent, the proposed method also competitively trains an adversarial AP that disturbs coordinated APs by causing frame collisions intensively. Besides, we propose to exploit a history of frame losses of a coordinated AP to promote reasonable competition between the central agent and adversarial AP. The simulation results indicate that the proposed method can avoid uncoordinated interference and thereby improve the minimum sum of the throughputs in the system compared to not considering the uncoordinated AP.

[64]  arXiv:2004.00843 [pdf, other]
Title: Robust Single-Image Super-Resolution via CNNs and TV-TV Minimization
Comments: Under peer review
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Optimization and Control (math.OC)

Single-image super-resolution is the process of increasing the resolution of an image, obtaining a high-resolution (HR) image from a low-resolution (LR) one. By leveraging large training datasets, convolutional neural networks (CNNs) currently achieve the state-of-the-art performance in this task. Yet, during testing/deployment, they fail to enforce consistency between the HR and LR images: if we downsample the output HR image, it never matches its LR input. Based on this observation, we propose to post-process the CNN outputs with an optimization problem that we call TV-TV minimization, which enforces consistency. As our extensive experiments show, such post-processing not only improves the quality of the images, in terms of PSNR and SSIM, but also makes the super-resolution task robust to operator mismatch, i.e., when the true downsampling operator is different from the one used to create the training dataset.

[65]  arXiv:2004.00844 [pdf]
Title: IoT-Flock: An Open-source Framework for IoT Traffic Generation
Comments: 6 Pages, 2 Figures, 4 Tables. Accepted in IEEE International Conference on Emerging Trends in Smart Technologies(ICETST) 2020
Subjects: Networking and Internet Architecture (cs.NI); Computers and Society (cs.CY)

Network traffic generation is one of the primary techniques that is used to design and analyze the performance of network security systems. However, due to the diversity of IoT networks in terms of devices, applications and protocols, the traditional network traffic generator tools are unable to generate the IoT specific protocols traffic. Hence, the traditional traffic generator tools cannot be used for designing and testing the performance of IoT-specific security solutions. In order to design an IoT-based traffic generation framework, two main challenges include IoT device modelling and generating the IoT normal and attack traffic simultaneously. Therefore, in this work, we propose an open-source framework for IoT traffic generation which supports the two widely used IoT application layer protocols, i.e., MQTT and CoAP. The proposed framework allows a user to create an IoT use case, add customized IoT devices into it and generate normal and malicious IoT traffic over a real-time network. Furthermore, we set up a real-time IoT smart home use case to manifest the applicability of the proposed framework for developing the security solutions for IoT smart home by emulating the real world IoT devices. The experimental results demonstrate that the proposed framework can be effectively used to develop better security solutions for IoT networks without physically deploying the real-time use case.

[66]  arXiv:2004.00845 [pdf, other]
Title: Occlusion-Aware Depth Estimation with Adaptive Normal Constraints
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We present a new learning-based method for multi-frame depth estimation from a color video, which is a fundamental problem in scene understanding, robot navigation or handheld 3D reconstruction. While recent learning-based methods estimate depth at high accuracy, 3D point clouds exported from their depth maps often fail to preserve important geometric feature (e.g., corners, edges, planes) of man-made scenes. Widely-used pixel-wise depth errors do not specifically penalize inconsistency on these features. These inaccuracies are particularly severe when subsequent depth reconstructions are accumulated in an attempt to scan a full environment with man-made objects with this kind of features. Our depth estimation algorithm therefore introduces a Combined Normal Map (CNM) constraint, which is designed to better preserve high-curvature features and global planar regions. In order to further improve the depth estimation accuracy, we introduce a new occlusion-aware strategy that aggregates initial depth predictions from multiple adjacent views into one final depth map and one occlusion probability map for the current reference view. Our method outperforms the state-of-the-art in terms of depth estimation accuracy, and preserves essential geometric features of man-made indoor scenes much better than other algorithms.

[67]  arXiv:2004.00849 [pdf, other]
Title: Pixel-BERT: Aligning Image Pixels with Text by Deep Multi-Modal Transformers
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL); Machine Learning (cs.LG); Multimedia (cs.MM)

We propose Pixel-BERT to align image pixels with text by deep multi-modal transformers that jointly learn visual and language embedding in a unified end-to-end framework. We aim to build a more accurate and thorough connection between image pixels and language semantics directly from image and sentence pairs instead of using region-based image features as the most recent vision and language tasks. Our Pixel-BERT which aligns semantic connection in pixel and text level solves the limitation of task-specific visual representation for vision and language tasks. It also relieves the cost of bounding box annotations and overcomes the unbalance between semantic labels in visual task and language semantic. To provide a better representation for down-stream tasks, we pre-train a universal end-to-end model with image and sentence pairs from Visual Genome dataset and MS-COCO dataset. We propose to use a random pixel sampling mechanism to enhance the robustness of visual representation and to apply the Masked Language Model and Image-Text Matching as pre-training tasks. Extensive experiments on downstream tasks with our pre-trained model show that our approach makes the most state-of-the-arts in downstream tasks, including Visual Question Answering (VQA), image-text retrieval, Natural Language for Visual Reasoning for Real (NLVR). Particularly, we boost the performance of a single model in VQA task by 2.17 points compared with SOTA under fair comparison.

[68]  arXiv:2004.00850 [pdf, ps, other]
Title: Learning control for polynomial systems using sum of squares
Subjects: Systems and Control (eess.SY)

This paper considers the problem of learning control laws for nonlinear polynomial systems directly from data, which are input-output measurements collected in an experiment over a finite time period. Without explicitly identifying the system dynamics, stabilizing laws are directly designed for nonlinear polynomial systems by solving sum of square problems that depend on the experimental data alone. Moreover, the stabilizing state-dependent control gains can be constructed by data-based linear programming.

[69]  arXiv:2004.00857 [pdf, ps, other]
Title: Average Reward Adjusted Discounted Reinforcement Learning: Near-Blackwell-Optimal Policies for Real-World Applications
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

Although in recent years reinforcement learning has become very popular the number of successful applications to different kinds of operations research problems is rather scarce. Reinforcement learning is based on the well-studied dynamic programming technique and thus also aims at finding the best stationary policy for a given Markov Decision Process, but in contrast does not require any model knowledge. The policy is assessed solely on consecutive states (or state-action pairs), which are observed while an agent explores the solution space. The contributions of this paper are manifold. First we provide deep theoretical insights to the widely applied standard discounted reinforcement learning framework, which give rise to the understanding of why these algorithms are inappropriate when permanently provided with non-zero rewards, such as costs or profit. Second, we establish a novel near-Blackwell-optimal reinforcement learning algorithm. In contrary to former method it assesses the average reward per step separately and thus prevents the incautious combination of different types of state values. Thereby, the Laurent Series expansion of the discounted state values forms the foundation for this development and also provides the connection between the two approaches. Finally, we prove the viability of our algorithm on a challenging problem set, which includes a well-studied M/M/1 admission control queuing system. In contrast to standard discounted reinforcement learning our algorithm infers the optimal policy on all tested problems. The insights are that in the operations research domain machine learning techniques have to be adapted and advanced to successfully apply these methods in our settings.

[70]  arXiv:2004.00858 [pdf, other]
Title: Projected Neural Network for a Class of Sparse Regression with Cardinality Penalty
Authors: Wenjing Li, Wei Bian
Subjects: Neural and Evolutionary Computing (cs.NE); Optimization and Control (math.OC)

In this paper, we consider a class of sparse regression problems, whose objective function is the summation of a convex loss function and a cardinality penalty. By constructing a smoothing function for the cardinality function, we propose a projected neural network and design a correction method for solving this problem. The solution of the proposed neural network is unique, global existent, bounded and globally Lipschitz continuous. Besides, we prove that all accumulation points of the proposed neural network have a common support set and a unified lower bound for the nonzero entries. Combining the proposed neural network with the correction method, any corrected accumulation point is a local minimizer of the considered sparse regression problem. Moreover, we analyze the equivalent relationship on the local minimizers between the considered sparse regression problem and another sparse problem. Finally, some numerical experiments are provided to show the efficiency of the proposed neural networks in solving some sparse regression problems in practice.

[71]  arXiv:2004.00860 [pdf, ps, other]
Title: Sampled-Data Control Based Consensus of Fractional-Order Multi-Agent Systems
Comments: Submitted to IEEE Control Systems Letters
Subjects: Systems and Control (eess.SY)

In this paper, we investigate consensus control of fractional-order multi-agent systems with order in (0,1) via sampled-data control. A new scheme to design distributed controllers with rigorous analysis is presented by utilizing the unique properties of fractional-order calculus, namely hereditary and infinite memory. It is established that global boundedness of all closed-loop signals is ensured and asymptotic consensus is realized. Simulation studies are conducted to illustrate the effectiveness of the proposed control method and verify the obtained results.

[72]  arXiv:2004.00862 [pdf, other]
Title: Enabling End-Users to Deploy Flexible Human-Robot Teams to Factories of the Future
Comments: Workshop "Factory of the Future - How to digitalize the robot-aided manufacturing process in Industry 4.0?"; 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, Macao
Subjects: Robotics (cs.RO)

Human-Robot Teams offer the flexibility needed for partial automation in small and medium-sized enterprises (SMEs). They will thus be an integral part of Factories of the Future. Our research targets a particularly flexible teaming mode, where agents share tasks dynamically. Such approaches require cognitive robots with reasoning and sensing capabilities. This results in hardware maintenance demands in terms of sensor calibration. In contrast to intuitive end-user programming, system setup and maintenance are rarely addressed in literature on robot application in SMEs. In this paper, we describe a prototype software toolchain that covers the initial setup, task modelling, and online operation of human-robot teams. We further show, that end-users can setup the system quickly and operate the whole toolchain effortlessly. All in all, this work aims to reduce the concern, that deploying human-robot teams comes with high costs for external expertise.

[73]  arXiv:2004.00865 [pdf, other]
Title: A reconfigurable robot workcell for quick set-up of assembly processes
Subjects: Robotics (cs.RO)

High volume production has been a prerequisite in order to invest into automation of the manufacturing process for decades. The high cost of setup and the inflexibility of classical automation meant that low batch productions, often present in Small and Medium-sized Enterprises (SMEs), were dismissed as potential end user of automation technologies. In this extended abstract we present the results of the ReconCell project whose objective was to develop a new type of highly reconfigurable robot workcell for fast set-up of automated assembly processes in SMEs. The high degree of reconfigurability was achieved by the developed reconfigurable hardware and the complementary reconfigurable software, while fast set-up was achieved with technologies for fast robot programming.

[74]  arXiv:2004.00869 [pdf, other]
Title: An Upgrading Algorithm with Optimal Power Law
Subjects: Information Theory (cs.IT)

Consider a channel $W$ along with a given input distribution $P_X$. In certain settings, such as in the construction of polar codes, the output alphabet of $W$ is `too large', and hence we replace $W$ by a channel $Q$ having a smaller output alphabet. We say that $Q$ is upgraded with respect to $W$ if $W$ is obtained from $Q$ by processing its output. In this case, the mutual information $I(P_X,W)$ between the input and output of $W$ is upper-bounded by the mutual information $I(P_X,Q)$ between the input and output of $Q$. In this paper, we present an algorithm that produces an upgraded channel $Q$ from $W$, as a function of $P_X$ and the required output alphabet size of $Q$, denoted $L$. We show that the difference in mutual informations is `small'. Namely, it is $O(L^{-2/(|\mathcal{X}|-1)})$, where $|\mathcal{X}|$ is the size of the input alphabet. This power law of $L$ is optimal.

[75]  arXiv:2004.00878 [pdf, other]
Title: Exact and Approximate Methods for Proving Unrealizability of Syntax-Guided Synthesis Problems
Journal-ref: PLDI 2020
Subjects: Programming Languages (cs.PL)

We consider the problem of automatically establishing that a given syntax-guided-synthesis (SyGuS) problem is unrealizable (i.e., has no solution). We formulate the problem of proving that a SyGuS problem is unrealizable over a finite set of examples as one of solving a set of equations: the solution yields an overapproximation of the set of possible outputs that any term in the search space can produce on the given examples. If none of the possible outputs agrees with all of the examples, our technique has proven that the given SyGuS problem is unrealizable. We then present an algorithm for exactly solving the set of equations that result from SyGuS problems over linear integer arithmetic (LIA) and LIA with conditionals (CLIA), thereby showing that LIA and CLIA SyGuS problems over finitely many examples are decidable. We implement the proposed technique and algorithms in a tool called Nay. Nay can prove unrealizability for 70/132 existing SyGuS benchmarks, with running times comparable to those of the state-of-the-art tool Nope. Moreover, Nay can solve 11 benchmarks that Nope cannot solve.

[76]  arXiv:2004.00879 [pdf, other]
Title: Enhance the performance of navigation: A two-stage machine learning approach
Comments: 8 pages, under review
Subjects: Signal Processing (eess.SP); Machine Learning (cs.LG)

Real time traffic navigation is an important capability in smart transportation technologies, which has been extensively studied these years. Due to the vast development of edge devices, collecting real time traffic data is no longer a problem. However, real traffic navigation is still considered to be a particularly challenging problem because of the time-varying patterns of the traffic flow and unpredictable accidents/congestion. To give accurate and reliable navigation results, predicting the future traffic flow(speed,congestion,volume,etc) in a fast and accurate way is of great importance. In this paper, we adopt the ideas of ensemble learning and develop a two-stage machine learning model to give accurate navigation results. We model the traffic flow as a time series and apply XGBoost algorithm to get accurate predictions on future traffic conditions(1st stage). We then apply the Top K Dijkstra algorithm to find a set of shortest paths from the give start point to the destination as the candidates of the output optimal path. With the prediction results in the 1st stage, we find one optimal path from the candidates as the output of the navigation algorithm. We show that our navigation algorithm can be greatly improved via EOPF(Enhanced Optimal Path Finding), which is based on neural network(2nd stage). We show that our method can be over 7% better than the method without EOPF in many situations, which indicates the effectiveness of our model.

[77]  arXiv:2004.00880 [pdf]
Title: CLASH WRIST -- A hardware to increase the capability of CLASH fruit gripper to use environment constraints exploration
Comments: IROS 2019, Factory of the Future
Subjects: Robotics (cs.RO)

Humans use environmental constraints (EC) in manipulation to compensate for uncertainties in their world model. The same principle was recently applied to robotics, so that soft underactuated hands improve their grasping capability by using environmental constraints exploitation (ECE) [1]. Due to orientation of the robotic hand for example in the EC wall grasp, the length of the robot wrist plus the hand length gets quite important, if objects are grasp out of a box [2] . Most of the modern cobots have quite long wrist, so we have constructed a two degree of freedom wrist for the CLASH [3], to solve this problem (Fig. 1).

[78]  arXiv:2004.00881 [pdf, other]
Title: How Furiously Can Colourless Green Ideas Sleep? Sentence Acceptability in Context
Comments: 14 pages. Author's final version, accepted for publication in Transactions of the Association for Computational Linguistics
Subjects: Computation and Language (cs.CL)

We study the influence of context on sentence acceptability. First we compare the acceptability ratings of sentences judged in isolation, with a relevant context, and with an irrelevant context. Our results show that context induces a cognitive load for humans, which compresses the distribution of ratings. Moreover, in relevant contexts we observe a discourse coherence effect which uniformly raises acceptability. Next, we test unidirectional and bidirectional language models in their ability to predict acceptability ratings. The bidirectional models show very promising results, with the best model achieving a new state-of-the-art for unsupervised acceptability prediction. The two sets of experiments provide insights into the cognitive aspects of sentence processing and central issues in the computational modelling of text and discourse.

[79]  arXiv:2004.00893 [pdf, other]
Title: A k-hop Collaborate Game Model: Extended to Community Budgets and Adaptive Non-Submodularity
Subjects: Social and Information Networks (cs.SI); Computer Science and Game Theory (cs.GT)

Revenue maximization (RM) is one of the most important problems on online social networks (OSNs), which attempts to find a small subset of users in OSNs that makes the expected revenue maximized. It has been researched intensively before. However, most of exsiting literatures were based on non-adaptive seeding strategy and on simple information diffusion model, such as IC/LT-model. It considered the single influenced user as a measurement unit to quantify the revenue. Until Collaborate Game model appeared, it considered activity as a basic object to compute the revenue. An activity initiated by a user can only influence those users whose distance are within k-hop from the initiator. Based on that, we adopt adaptive seed strategy and formulate the Revenue Maximization under the Size Budget (RMSB) problem. If taking into account the product's promotion, we extend RMSB to the Revenue Maximization under the Community Budget (RMCB) problem, where the influence can be distributed over the whole network. The objective function of RMSB and RMCB is adatpive monotone and not adaptive submodular, but in some special cases, it is adaptive submodular. We study the RMSB and RMCB problem under both the speical submodular cases and general non-submodular cases, and propose RMSBSolver and RMCBSolver to solve them with strong theoretical guarantees, respectively. Especially, we give a data-dependent approximation ratio for RMSB problem under the general non-submodular cases. Finally, we evaluate our proposed algorithms by conducting experiments on real datasets, and show the effectiveness and accuracy of our solutions.

[80]  arXiv:2004.00899 [pdf, other]
Title: Go Fetch: Mobile Manipulation in Unstructured Environments
Comments: Kenneth Blomqvist, Michel Breyer, Andrei Cramariuc, Julian F\"orster, Margarita Grinvald, and Florian Tschopp contributed equally to this work
Subjects: Robotics (cs.RO); Computer Vision and Pattern Recognition (cs.CV)

With humankind facing new and increasingly large-scale challenges in the medical and domestic spheres, automation of the service sector carries a tremendous potential for improved efficiency, quality, and safety of operations. Mobile robotics can offer solutions with a high degree of mobility and dexterity, however these complex systems require a multitude of heterogeneous components to be carefully integrated into one consistent framework. This work presents a mobile manipulation system that combines perception, localization, navigation, motion planning and grasping skills into one common workflow for fetch and carry applications in unstructured indoor environments. The tight integration across the various modules is experimentally demonstrated on the task of finding a commonly available object in an office environment, grasping it, and delivering it to a desired drop-off location. The accompanying video is available at https://youtu.be/e89_Xg1sLnY.

[81]  arXiv:2004.00900 [pdf, other]
Title: Learning to Segment the Tail
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Real-world visual recognition requires handling the extreme sample imbalance in large-scale long-tailed data. We propose a "divide\&conquer" strategy for the challenging LVIS task: divide the whole data into balanced parts and then apply incremental learning to conquer each one. This derives a novel learning paradigm: \textbf{class-incremental few-shot learning}, which is especially effective for the challenge evolving over time: 1) the class imbalance among the old-class knowledge review and 2) the few-shot data in new-class learning. We call our approach \textbf{Learning to Segment the Tail} (LST). In particular, we design an instance-level balanced replay scheme, which is a memory-efficient approximation to balance the instance-level samples from the old-class images. We also propose to use a meta-module for new-class learning, where the module parameters are shared across incremental phases, gaining the learning-to-learn knowledge incrementally, from the data-rich head to the data-poor tail. We empirically show that: at the expense of a little sacrifice of head-class forgetting, we can gain a significant 8.3\% AP improvement for the tail classes with less than 10 instances, achieving an overall 2.0\% AP boost for the whole 1,230 classes\footnote{Code is available at \url{https://github.com/JoyHuYY1412/LST_LVIS}}.

[82]  arXiv:2004.00909 [pdf, other]
Title: Learning Representations For Images With Hierarchical Labels
Authors: Ankit Dhall
Comments: Master thesis
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)

Image classification has been studied extensively but there has been limited work in the direction of using non-conventional, external guidance other than traditional image-label pairs to train such models. In this thesis we present a set of methods to leverage information about the semantic hierarchy induced by class labels. In the first part of the thesis, we inject label-hierarchy knowledge to an arbitrary classifier and empirically show that availability of such external semantic information in conjunction with the visual semantics from images boosts overall performance. Taking a step further in this direction, we model more explicitly the label-label and label-image interactions by using order-preserving embedding-based models, prevalent in natural language, and tailor them to the domain of computer vision to perform image classification. Although, contrasting in nature, both the CNN-classifiers injected with hierarchical information, and the embedding-based models outperform a hierarchy-agnostic model on the newly presented, real-world ETH Entomological Collection image dataset.

[83]  arXiv:2004.00915 [pdf, ps, other]
Title: Safe Reinforcement Learning via Projection on a Safe Set: How to Achieve Optimality?
Comments: Accepted at IFAC 2020
Subjects: Systems and Control (eess.SY); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

For all its successes, Reinforcement Learning (RL) still struggles to deliver formal guarantees on the closed-loop behavior of the learned policy. Among other things, guaranteeing the safety of RL with respect to safety-critical systems is a very active research topic. Some recent contributions propose to rely on projections of the inputs delivered by the learned policy into a safe set, ensuring that the system safety is never jeopardized. Unfortunately, it is unclear whether this operation can be performed without disrupting the learning process. This paper addresses this issue. The problem is analysed in the context of $Q$-learning and policy gradient techniques. We show that the projection approach is generally disruptive in the context of $Q$-learning though a simple alternative solves the issue, while simple corrections can be used in the context of policy gradient methods in order to ensure that the policy gradients are unbiased. The proposed results extend to safe projections based on robust MPC techniques.

[84]  arXiv:2004.00917 [pdf, other]
Title: Controllable Orthogonalization in Training DNNs
Comments: Accepted to CVPR 2020. The Code is available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Orthogonality is widely used for training deep neural networks (DNNs) due to its ability to maintain all singular values of the Jacobian close to 1 and reduce redundancy in representation. This paper proposes a computationally efficient and numerically stable orthogonalization method using Newton's iteration (ONI), to learn a layer-wise orthogonal weight matrix in DNNs. ONI works by iteratively stretching the singular values of a weight matrix towards 1. This property enables it to control the orthogonality of a weight matrix by its number of iterations. We show that our method improves the performance of image classification networks by effectively controlling the orthogonality to provide an optimal tradeoff between optimization benefits and representational capacity reduction. We also show that ONI stabilizes the training of generative adversarial networks (GANs) by maintaining the Lipschitz continuity of a network, similar to spectral normalization (SN), and further outperforms SN by providing controllable orthogonality.

[85]  arXiv:2004.00931 [pdf, other]
Title: Spotting political social bots in Twitter: A use case of the 2019 Spanish general election
Subjects: Social and Information Networks (cs.SI)

While social media has been proved as an exceptionally useful tool to interact with other people and massively and quickly spread helpful information, its great potential has been ill-intentionally leveraged as well to distort political elections and manipulate constituents. In the paper at hand, we analyzed the presence and behavior of social bots on Twitter in the context of the November 2019 Spanish general election. Throughout our study, we classified involved users as social bots or humans, and examined their interactions from a quantitative (i.e., amount of traffic generated and existing relations) and qualitative (i.e., user's political affinity and sentiment towards the most important parties) perspectives. Results demonstrated that a non-negligible amount of those bots actively participated in the election, supporting each of the five principal political parties.

[86]  arXiv:2004.00935 [pdf, other]
Title: Best Practices for Transparency in Machine Generated Personalization
Comments: 8 pages
Subjects: Computers and Society (cs.CY); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)

Machine generated personalization is increasingly used in online systems. Personalization is intended to provide users with relevant content, products, and solutions that address their respective needs and preferences. However, users are becoming increasingly vulnerable to online manipulation due to algorithmic advancements and lack of transparency. Such manipulation decreases users' levels of trust, autonomy, and satisfaction concerning the systems with which they interact. Increasing transparency is an important goal for personalization based systems. Unfortunately, system designers lack guidance in assessing and implementing transparency in their developed systems.
In this work we combine insights from technology ethics and computer science to generate a list of transparency best practices for machine generated personalization. Based on these best practices, we develop a checklist to be used by designers wishing to evaluate and increase the transparency of their algorithmic systems. Adopting a designer perspective, we apply the checklist to prominent online services and discuss its advantages and shortcomings. We encourage researchers to adopt the checklist in various environments and to work towards a consensus-based tool for measuring transparency in the personalization community.

[87]  arXiv:2004.00939 [pdf, other]
Title: CORSICA: Cross-Origin Web Service Identification
Comments: Accepted to ASIACCS2020
Subjects: Cryptography and Security (cs.CR)

Vulnerabilities in private networks are difficult to detect for attackers outside of the network. While there are known methods for port scanning internal hosts that work by luring unwitting internal users to an external web page that hosts malicious JavaScript code, no such method for detailed and precise service identification is known. The reason is that the Same Origin Policy (SOP) prevents access to HTTP responses of other origins by default. We perform a structured analysis of loopholes in the SOP that can be used to identify web applications across network boundaries. For this, we analyze HTML5, CSS, and JavaScript features of standard-compliant web browsers that may leak sensitive information about cross-origin content. The results reveal several novel techniques, including leaking JavaScript function names or styles of cross-origin requests that are available in all common browsers. We implement and test these techniques in a tool called CORSICA. It can successfully identify 31 of 42 (74%) of web services running on different IoT devices as well as the version numbers of the four most widely used content management systems WordPress, Drupal, Joomla, and TYPO3. CORSICA can also determine the patch level on average down to three versions (WordPress), six versions (Drupal), two versions (Joomla), and four versions (TYPO3) with only ten requests on average. Furthermore, CORSICA is able to identify 48 WordPress plugins containing 65 vulnerabilities. Finally, we analyze mitigation strategies and show that the proposed but not yet implemented strategies Cross-Origin Resource Policy (CORP)} and Sec-Metadata would prevent our identification techniques.

[88]  arXiv:2004.00945 [pdf, other]
Title: PaStaNet: Toward Human Activity Knowledge Engine
Comments: Accepted to CVPR 2020, supplementary materials included, code available: this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Machine Learning (cs.LG)

Existing image-based activity understanding methods mainly adopt direct mapping, i.e. from image to activity concepts, which may encounter performance bottleneck since the huge gap. In light of this, we propose a new path: infer human part states first and then reason out the activities based on part-level semantics. Human Body Part States (PaSta) are fine-grained action semantic tokens, e.g. <hand, hold, something>, which can compose the activities and help us step toward human activity knowledge engine. To fully utilize the power of PaSta, we build a large-scale knowledge base PaStaNet, which contains 7M+ PaSta annotations. And two corresponding models are proposed: first, we design a model named Activity2Vec to extract PaSta features, which aim to be general representations for various activities. Second, we use a PaSta-based Reasoning method to infer activities. Promoted by PaStaNet, our method achieves significant improvements, e.g. 6.4 and 13.9 mAP on full and one-shot sets of HICO in supervised learning, and 3.2 and 4.2 mAP on V-COCO and images-based AVA in transfer learning. Code and data are available at this http URL

[89]  arXiv:2004.00946 [pdf, other]
Title: Human-Guided Planner for Non-Prehensile Manipulation
Comments: Presented at "Factory of the Future" workshop, IROS 2019. arXiv admin note: substantial text overlap with arXiv:1904.03748
Subjects: Robotics (cs.RO)

We present a human-guided planner for non-prehensile manipulation in clutter. Most recent approaches to manipulation in clutter employs randomized planning, however, the problem remains a challenging one where the planning times are still in the order of tens of seconds or minutes, and the success rates are low for difficult instances of the problem. We build on these control-based randomized planning approaches, but we investigate using them in conjunction with human-operator input. We show that with a minimal amount of human input, the low-level planner can solve the problem faster and with higher success rates.

[90]  arXiv:2004.00948 [pdf]
Title: A high capacity text steganography scheme based on permutation and color coding
Comments: 15 pages , 8 figures
Subjects: Cryptography and Security (cs.CR)

In this paper, we propose a text steganographic scheme based on color coding and permutation. Given a secret message and a cover text, the proposed scheme embed the secret message in the cover text by making it colored, using a permutation algorithm. The stego-text is then send to the receiver by mail. The results which have been obtained by experiments, show that our model performs a better hiding process in terms of hiding capacity as compared to the scheme of Aruna Malik et al. on which our idea is based.

[91]  arXiv:2004.00963 [pdf, other]
Title: An anytime tree search algorithm for the 2018 ROADEF/EURO challenge glass cutting problem
Subjects: Artificial Intelligence (cs.AI)

In this article, we present the anytime tree search algorithm we designed for the 2018 ROADEF/EURO challenge glass cutting problem proposed by the French company Saint-Gobain. The resulting program was ranked first among 64 participants. Its key components are: a new search algorithm called Memory Bounded A* (MBA*) with guide functions, a symmetry breaking strategy, and a pseudo-dominance rule. We perform a comprehensive study of these components showing that each of them contributes to the algorithm global performances. In addition, we designed a second tree search algorithm fully based on the pseudo-dominance rule and dedicated to some of the challenge instances with strong precedence constraints. On these instances, it finds the best-known solutions very quickly.

[92]  arXiv:2004.00969 [pdf, other]
Title: FaaSten Your Decisions: Classification Framework and Technology Review of Function-as-a-Service Platforms
Subjects: Software Engineering (cs.SE); Distributed, Parallel, and Cluster Computing (cs.DC)

Function-as-a-Service (FaaS) is a cloud service model enabling developers to offload event-driven executable snippets of code. The execution and management of such functions becomes a FaaS provider's responsibility, hereby included their on-demand provisioning and automatic scaling. Key enablers for this cloud service model are FaaS platforms, e.g., AWS Lambda, Microsoft Azure Functions or OpenFaaS. At the same time, the choice of the most appropriate FaaS platform for deploying and running a serverless application is not trivial, as various organizational and technical aspects have to be taken into account. In this work, we present (i) a FaaS platform classification framework derived using a mixed method study and (ii) a systematic technology review of the ten most prominent FaaS platforms, based on the proposed classification framework. Moreover, we present (iii) a FaaS platform selection support system, called \faastener, which helps researchers and practitioners to choose the FaaS platform most suited for their requirements.

[93]  arXiv:2004.00974 [pdf, other]
Title: Deep-n-Cheap: An Automated Search Framework for Low Complexity Deep Learning
Comments: Submitted to ECML-PKDD 2020
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)

We present Deep-n-Cheap -- an open-source AutoML framework to search for deep learning models. This search includes both architecture and training hyperparameters, and supports convolutional neural networks and multi-layer perceptrons. Our framework is targeted for deployment on both benchmark and custom datasets, and as a result, offers a greater degree of search space customizability as compared to a more limited search over only pre-existing models from literature. We also introduce the technique of 'search transfer', which demonstrates the generalization capabilities of the models found by our framework to multiple datasets.
Deep-n-Cheap includes a user-customizable complexity penalty which trades off performance with training time or number of parameters. Specifically, our framework results in models offering performance comparable to state-of-the-art while taking 1-2 orders of magnitude less time to train than models from other AutoML and model search frameworks. Additionally, this work investigates and develops various insights regarding the search process. In particular, we show the superiority of a greedy strategy and justify our choice of Bayesian optimization as the primary search methodology over random / grid search.

[94]  arXiv:2004.00980 [pdf, other]
Title: Action Space Shaping in Deep Reinforcement Learning
Subjects: Artificial Intelligence (cs.AI)

Reinforcement learning (RL) has been successful in training agents in various learning environments, including video-games. However, such work modifies and shrinks the action space from the game's original. This is to avoid trying "pointless" actions and to ease the implementation. Currently, this is mostly done based on intuition, with little systematic research supporting the design decisions. In this work, we aim to gain insight on these action space modifications by conducting extensive experiments in video-game environments. Our results show how domain-specific removal of actions and discretization of continuous actions can be crucial for successful learning. With these insights, we hope to ease the use of RL in new environments, by clarifying what action-spaces are easy to learn.

[95]  arXiv:2004.00981 [pdf, other]
Title: Benchmarking End-to-End Behavioural Cloning on Video Games
Subjects: Artificial Intelligence (cs.AI)

Behavioural cloning, where a computer is taught to perform a task based on demonstrations, has been successfully applied to various video games and robotics tasks, with and without reinforcement learning. This also includes end-to-end approaches, where a computer plays a video game like humans do: by looking at the image displayed on the screen, and sending keystrokes to the game. As a general approach to playing video games, this has many inviting properties: no need for specialized modifications to the game, no lengthy training sessions and the ability to re-use the same tools across different games. However, related work includes game-specific engineering to achieve the results. We take a step towards a general approach and study the general applicability of behavioural cloning on twelve video games, including six modern video games (published after 2010), by using human demonstrations as training data. Our results show that these agents cannot match humans in raw performance but can learn human-like behaviour. We also demonstrate how the quality of the data matters, and how recording data from humans is subject to a state-action mismatch, due to human reflexes.

[96]  arXiv:2004.00993 [pdf]
Title: Augmented Q Imitation Learning (AQIL)
Comments: 5 pages
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

The study of unsupervised learning can be generally divided into two categories: imitation learning and reinforcement learning. In imitation learning the machine learns by mimicking the behavior of an expert system whereas in reinforcement learning the machine learns via direct environment feedback. Traditional deep reinforcement learning takes a significant time before the machine starts to converge to an optimal policy. This paper proposes Augmented Q-Imitation-Learning, a method by which deep reinforcement learning convergence can be accelerated by applying Q-imitation-learning as the initial training process in traditional Deep Q-learning.

[97]  arXiv:2004.00994 [pdf, other]
Title: Learning to Ask Medical Questions using Reinforcement Learning
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)

We propose a novel reinforcement learning-based approach for adaptive and iterative feature selection. Given a masked vector of input features, a reinforcement learning agent iteratively selects certain features to be unmasked, and uses them to predict an outcome when it is sufficiently confident. The algorithm makes use of a novel environment setting, corresponding to a non-stationary Markov Decision Process. A key component of our approach is a guesser network, trained to predict the outcome from the selected features and parametrizing the reward function. Applying our method to a national survey dataset, we show that it not only outperforms strong baselines when requiring the prediction to be made based on a small number of input features, but is also highly more interpretable. Our code is publicly available at \url{https://github.com/ushaham/adaptiveFS}.

[98]  arXiv:2004.00998 [pdf, other]
Title: DeepSumm -- Deep Code Summaries using Neural Transformer Architecture
Authors: Vivek Gupta
Comments: arXiv admin note: substantial text overlap with arXiv:1902.01954 by other authors
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL)

Source code summarizing is a task of writing short, natural language descriptions of source code behavior during run time. Such summaries are extremely useful for software development and maintenance but are expensive to manually author,hence it is done for small fraction of the code that is produced and is often ignored. Automatic code documentation can possibly solve this at a low cost. This is thus an emerging research field with further applications to program comprehension, and software maintenance. Traditional methods often relied on cognitive models that were built in the form of templates and by heuristics and had varying degree of adoption by the developer community. But with recent advancements, end to end data-driven approaches based on neural techniques have largely overtaken the traditional techniques. Much of the current landscape employs neural translation based architectures with recurrence and attention which is resource and time intensive training procedure. In this paper, we employ neural techniques to solve the task of source code summarizing and specifically compare NMT based techniques to more simplified and appealing Transformer architecture on a dataset of Java methods and comments. We bring forth an argument to dispense the need of recurrence in the training procedure. To the best of our knowledge, transformer based models have not been used for the task before. With supervised samples of more than 2.1m comments and code, we reduce the training time by more than 50% and achieve the BLEU score of 17.99 for the test set of examples.

[99]  arXiv:2004.00999 [pdf, other]
Title: Pruned Wasserstein Index Generation Model and wigpy Package
Authors: Fangzhou Xie
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); General Economics (econ.GN)

Recent proposal of Wasserstein Index Generation model (WIG) has shown a new direction for automatically generating indices. However, it is challenging in practice to fit large datasets for two reasons. First, the Sinkhorn distance is notoriously expensive to compute and suffers from dimensionality severely. Second, it requires to compute a full $N\times N$ matrix to be fit into memory, where $N$ is the dimension of vocabulary. When the dimensionality is too large, it is even impossible to compute at all. I hereby propose a Lasso-based shrinkage method to reduce dimensionality for the vocabulary as a pre-processing step prior to fitting the WIG model. After we get the word embedding from Word2Vec model, we could cluster these high-dimensional vectors by $k$-means clustering, and pick most frequent tokens within each cluster to form the "base vocabulary". Non-base tokens are then regressed on the vectors of base token to get a transformation weight and we could thus represent the whole vocabulary by only the "base tokens". This variant, called pruned WIG (pWIG), will enable us to shrink vocabulary dimension at will but could still achieve high accuracy. I also provide a \textit{wigpy} module in Python to carry out computation in both flavor. Application to Economic Policy Uncertainty (EPU) index is showcased as comparison with existing methods of generating time-series sentiment indices.

[100]  arXiv:2004.01002 [pdf, other]
Title: DualConvMesh-Net: Joint Geodesic and Euclidean Convolutions on 3D Meshes
Comments: CVPR 2020 camera-ready version
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose DualConvMesh-Nets (DCM-Net) a family of deep hierarchical convolutional networks over 3D geometric data that combines two types of convolutions. The first type, geodesic convolutions, defines the kernel weights over mesh surfaces or graphs. That is, the convolutional kernel weights are mapped to the local surface of a given mesh. The second type, Euclidean convolutions, is independent of any underlying mesh structure. The convolutional kernel is applied on a neighborhood obtained from a local affinity representation based on the Euclidean distance between 3D points. Intuitively, geodesic convolutions can easily separate objects that are spatially close but have disconnected surfaces, while Euclidean convolutions can represent interactions between nearby objects better, as they are oblivious to object surfaces. To realize a multi-resolution architecture, we borrow well-established mesh simplification methods from the geometry processing domain and adapt them to define mesh-preserving pooling and unpooling operations. We experimentally show that combining both types of convolutions in our architecture leads to significant performance gains for 3D semantic segmentation, and we report competitive results on three scene segmentation benchmarks. Our models and code are publicly available.

[101]  arXiv:2004.01014 [pdf]
Title: The Covid19Impact Survey: Assessing the Pulse of the COVID-19 Pandemic in Spain via 24 questions
Subjects: Computers and Society (cs.CY)

In this paper, we describe the results of analyzing a large-scale survey, called the Covid19Impact survey, to assess citizens feedback on four areas related to the COVID-19 pandemic in Spain: social contact behavior, financial impact, working situation and health status. A total of 24 questions cover the areas of demographics, their home situation, social contact behavior, personal economic impact, their workplace situation and their health. The survey was responded to by 146,728 participants over a period of 44 hours. Such a large response enables us to gain new insights, as well as an unprecedented glimpse at respondents personal experiences and concerns during the current COVID-19 pandemic. From the analysis, we draw 11 implications for the design of public policies related to the management of the COVID-19 pandemic.

[102]  arXiv:2004.01019 [pdf, other]
Title: Face Quality Estimation and Its Correlation to Demographic and Non-Demographic Bias in Face Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Face quality assessment aims at estimating the utility of a face image for the purpose of recognition. It is a key factor to achieve high face recognition performances. Currently, the high performance of these face recognition systems come with the cost of a strong bias against demographic and non-demographic sub-groups. Recent work has shown that face quality assessment algorithms should adapt to the deployed face recognition system, in order to achieve highly accurate and robust quality estimations. However, this could lead to a bias transfer towards the face quality assessment leading to discriminatory effects e.g. during enrolment. In this work, we present an in-depth analysis of the correlation between bias in face recognition and face quality assessment. Experiments were conducted on two publicly available datasets captured under controlled and uncontrolled circumstances with two popular face embeddings. We evaluated four state-of-the-art solutions for face quality assessment towards biases to pose, ethnicity, and age. The experiments showed that the face quality assessment solutions assign significantly lower quality values towards subgroups affected by the recognition bias demonstrating that these approaches are biased as well. This raises ethical questions towards fairness and discrimination which future works have to address.

[103]  arXiv:2004.01022 [pdf, other]
Title: Provable Sample Complexity Guarantees for Learning of Continuous-Action Graphical Games with Nonparametric Utilities
Comments: arXiv admin note: text overlap with arXiv:1911.04225
Subjects: Computer Science and Game Theory (cs.GT); Machine Learning (cs.LG); Machine Learning (stat.ML)

In this paper, we study the problem of learning the exact structure of continuous-action games with non-parametric utility functions. We propose an $\ell_1$ regularized method which encourages sparsity of the coefficients of the Fourier transform of the recovered utilities. Our method works by accessing very few Nash equilibria and their noisy utilities. Under certain technical conditions, our method also recovers the exact structure of these utility functions, and thus, the exact structure of the game. Furthermore, our method only needs a logarithmic number of samples in terms of the number of players and runs in polynomial time. We follow the primal-dual witness framework to provide provable theoretical guarantees.

[104]  arXiv:2004.01023 [pdf, other]
Title: Multi-Modal Video Forensic Platform for Investigating Post-Terrorist Attack Scenarios
Journal-ref: In Proceedings of the 11th ACM Multimedia Systems Conference (MMSys2020), June 06-11, 2020, Istanbul, Turkey
Subjects: Multimedia (cs.MM); Computer Vision and Pattern Recognition (cs.CV); Computers and Society (cs.CY); Sound (cs.SD); Audio and Speech Processing (eess.AS)

The forensic investigation of a terrorist attack poses a significant challenge to the investigative authorities, as often several thousand hours of video footage must be viewed. Large scale Video Analytic Platforms (VAP) assist law enforcement agencies (LEA) in identifying suspects and securing evidence. Current platforms focus primarily on the integration of different computer vision methods and thus are restricted to a single modality. We present a video analytic platform that integrates visual and audio analytic modules and fuses information from surveillance cameras and video uploads from eyewitnesses. Videos are analyzed according their acoustic and visual content. Specifically, Audio Event Detection is applied to index the content according to attack-specific acoustic concepts. Audio similarity search is utilized to identify similar video sequences recorded from different perspectives. Visual object detection and tracking are used to index the content according to relevant concepts. Innovative user-interface concepts are introduced to harness the full potential of the heterogeneous results of the analytical modules, allowing investigators to more quickly follow-up on leads and eyewitness reports.

[105]  arXiv:2004.01024 [pdf, other]
Title: Modeling Dynamic Heterogeneous Network for Link Prediction using Hierarchical Attention with Temporal RNN
Subjects: Social and Information Networks (cs.SI); Machine Learning (cs.LG); Machine Learning (stat.ML)

Network embedding aims to learn low-dimensional representations of nodes while capturing structure information of networks. It has achieved great success on many tasks of network analysis such as link prediction and node classification. Most of existing network embedding algorithms focus on how to learn static homogeneous networks effectively. However, networks in the real world are more complex, e.g., networks may consist of several types of nodes and edges (called heterogeneous information) and may vary over time in terms of dynamic nodes and edges (called evolutionary patterns). Limited work has been done for network embedding of dynamic heterogeneous networks as it is challenging to learn both evolutionary and heterogeneous information simultaneously. In this paper, we propose a novel dynamic heterogeneous network embedding method, termed as DyHATR, which uses hierarchical attention to learn heterogeneous information and incorporates recurrent neural networks with temporal attention to capture evolutionary patterns. We benchmark our method on four real-world datasets for the task of link prediction. Experimental results show that DyHATR significantly outperforms several state-of-the-art baselines.

[106]  arXiv:2004.01025 [pdf, ps, other]
Title: Mirrorless Mirror Descent: A More Natural Discretization of Riemannian Gradient Flow
Comments: 8 pages
Subjects: Machine Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)

We present a direct (primal only) derivation of Mirror Descent as a "partial" discretization of gradient flow on a Riemannian manifold where the metric tensor is the Hessian of the Mirror Descent potential function. We argue that this discretization is more faithful to the geometry than Natural Gradient Descent, which is obtained by a "full" forward Euler discretization. This view helps shed light on the relationship between the methods and allows generalizing Mirror Descent to any Riemannian geometry, even when the metric tensor is not a Hessian, and thus there is no "dual."

[107]  arXiv:2004.01030 [pdf, other]
Title: Objects of violence: synthetic data for practical ML in human rights investigations
Comments: Presented at NeurIPS 2019 in the AI for Social Good track
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

We introduce a machine learning workflow to search for, identify, and meaningfully triage videos and images of munitions, weapons, and military equipment, even when limited training data exists for the object of interest. This workflow is designed to expedite the work of OSINT ("open source intelligence") researchers in human rights investigations. It consists of three components: automatic rendering and annotating of synthetic datasets that make up for a lack of training data; training image classifiers from combined sets of photographic and synthetic data; and mtriage, an open source software that orchestrates these classifiers' deployment to triage public domain media, and visualise predictions in a web interface. We show that synthetic data helps to train classifiers more effectively, and that certain approaches yield better results for different architectures. We then demonstrate our workflow in two real-world human rights investigations: the use of the Triple-Chaser tear gas grenade against civilians, and the verification of allegations of military presence in Ukraine in 2014.

[108]  arXiv:2004.01031 [pdf, other]
Title: Generate Country-Scale Networks of Interaction from Scattered Statistics
Comments: 12 pages. arXiv admin note: substantial text overlap with arXiv:2003.02213
Journal-ref: in Proceedings of The Fifth Conference of the European Social Simulation Association (ESSA'2008), Brescia, Italy
Subjects: Multiagent Systems (cs.MA); Social and Information Networks (cs.SI); Applications (stat.AP)

It is common to define the structure of interactions among a population of agents by a network. Most of agent-based models were shown highly sensitive to that network, so the relevance of simulation results directely depends on the descriptive power of that network. When studying social dynamics in large populations, that network cannot be collected, and is rather generated by algorithms which aim to fit general properties of social networks. However, more precise data is available at a country scale in the form of socio-demographic studies, census or sociological studies. These "scattered statistics" provide rich information, especially on agents' attributes, similar properties of tied agents and affiliations. In this paper, we propose a generic methodology to bring up together these scattered statistics with bayesian networks. We explain how to generate a population of heterogeneous agents, and how to create links by using both scattered statistics and knowledge on social selection processes. The methodology is illustrated by generating an interaction network for rural Kenya which includes familial structure, colleagues and friendship constrained given field studies and statistics.

[109]  arXiv:2004.01032 [pdf, other]
Title: Grammar-Compressed Indexes with Logarithmic Search Time
Comments: arXiv admin note: substantial text overlap with arXiv:1110.4493
Subjects: Data Structures and Algorithms (cs.DS)

Let a text $T[1..n]$ be the only string generated by a context-free grammar with $g$ (terminal and nonterminal) symbols, and of size $G$ (measured as the sum of the lengths of the right-hand sides of the rules). Such a grammar, called a grammar-compressed representation of $T$, can be encoded using essentially $G\lg g$ bits. We introduce the first grammar-compressed index that uses $O(G\lg n)$ bits and can find the $occ$ occurrences of patterns $P[1..m]$ in time $O((m^2+occ)\lg G)$. We implement the index and demonstrate its practicality in comparison with the state of the art, on highly repetitive text collections.

[110]  arXiv:2004.01041 [pdf, other]
Title: Near Optimality and Tractability in Stochastic Nonlinear Control
Comments: arXiv admin note: substantial text overlap with arXiv:2002.10505, arXiv:2002.09478
Subjects: Systems and Control (eess.SY); Robotics (cs.RO)

We consider the problem of nonlinear stochastic optimal control. This is fundamentally intractable owing to Bellman's infamous "curse of dimensionality". We present a "decoupling principle" for the tractable feedback design for such problems, wherein, first, a nominal open-loop problem is solved, followed by a suitable linear feedback design around the open-loop. The performance of the resulting feedback law is shown to be asymptotically close to the true stochastic feedback law to fourth order in a small noise parameter $\epsilon$. The decoupling theory is empirically tested on robotic planning problems under uncertainty.

[111]  arXiv:2004.01045 [pdf, other]
Title: Topological Properties of Multi-Party Blockchain Transactions
Authors: Dongfang Zhao
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC)

The cross-blockchain transaction remains one of the most challenging problems in blockchains. The root cause of the challenge lies in the nondeterministic nature of blockchains: A transaction across multiple blockchains might be partially rolled back due to the potential forks in any of the participating blockchains---eventually, only one fork will survive in the competition among miners. While some effort has recently been made to developing hierarchically distributed commit protocols to make multi-party transactions progress, there is no systematic method to reason about the transaction results. This paper tackles this problem from a perspective of point-set topology. We construct multiple topology spaces for the transactions and blockchain forks, and show that these spaces are internally related through either homeomorphism or continuous functions. Combined together, these tools allow us to reason about the cross-blockchain transactions through the growing-fork topology, an intuitive representation of blockchains. As of writing, this paper is the first study on point-set topological properties of blockchains.

[112]  arXiv:2004.01056 [pdf, other]
Title: Improving Confidence in the Estimation of Values and Norms
Comments: 16 pages, 3 figures, pre-print for the International Workshop on Coordination, Organizations, Institutions, Norms and Ethics for Governance of Multi-Agent Systems (COINE), co-located with AAMAS 2020
Subjects: Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)

Autonomous agents (AA) will increasingly be interacting with us in our daily lives. While we want the benefits attached to AAs, it is essential that their behavior is aligned with our values and norms. Hence, an AA will need to estimate the values and norms of the humans it interacts with, which is not a straightforward task when solely observing an agent's behavior. This paper analyses to what extent an AA is able to estimate the values and norms of a simulated human agent (SHA) based on its actions in the ultimatum game. We present two methods to reduce ambiguity in profiling the SHAs: one based on search space exploration and another based on counterfactual analysis. We found that both methods are able to increase the confidence in estimating human values and norms, but differ in their applicability, the latter being more efficient when the number of interactions with the agent is to be minimized. These insights are useful to improve the alignment of AAs with human values and norms.

[113]  arXiv:2004.01059 [pdf, other]
Title: Effect of Annotation Errors on Drone Detection with YOLOv3
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Following the recent advances in deep networks, object detection and tracking algorithms with deep learning backbones have been improved significantly; however, this rapid development resulted in the necessity of large amounts of annotated labels. Even if the details of such semi-automatic annotation processes for most of these datasets are not known precisely, especially for the video annotations, some automated labeling processes are usually employed. Unfortunately, such approaches might result with erroneous annotations. In this work, different types of annotation errors for object detection problem are simulated and the performance of a popular state-of-the-art object detector, YOLOv3, with erroneous annotations during training and testing stages is examined. Moreover, some inevitable annotation errors in Anti-UAV Challenge dataset is also examined in this manner, while proposing a solution to correct such annotation errors of this valuable data set.

[114]  arXiv:2004.01062 [html]
Title: Proceedings of the 12th International Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software
Authors: Stephanie Balzer (Carnegie Mellon University), Luca Padovani (Università di Torino)
Journal-ref: EPTCS 314, 2020
Subjects: Programming Languages (cs.PL); Distributed, Parallel, and Cluster Computing (cs.DC)

Modern hardware platforms, from the very small to the very large, increasingly provide parallel and distributed computing resources for applications to maximise performance. Many applications therefore need to make effective use of tens, hundreds, and even thousands of compute nodes. Computation in such systems is thus inherently concurrent and communication centric. Effectively programming such applications is challenging; performance, correctness, and scalability are difficult to achieve. The development of effective programming methodologies for this increasingly parallel landscape therefore demands exploration and understanding of a wide variety of foundational and practical ideas. The International Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software (PLACES) is dedicated to work in this area. The workshop offers a forum for researchers from different fields to exchange new ideas about these challenges to modern and future programming, where concurrency and distribution are the norm rather than a marginal concern. This volume contains the proceedings of the 12th edition of PLACES, which was co-located with ETAPS 2020 in Dublin, Ireland.

[115]  arXiv:2004.01071 [pdf, other]
Title: Model-based disentanglement of lens occlusions
Comments: Submitted to conference
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)

With lens occlusions, naive image-to-image networks fail to learn an accurate source to target mapping, due to the partial entanglement of the scene and occlusion domains. We propose an unsupervised model-based disentanglement training, which learns to disentangle scene from lens occlusion and can regress the occlusion model parameters from target database. The experiments demonstrate our method is able to handle varying types of occlusions (raindrops, dirt, watermarks, etc.) and generate highly realistic translations, qualitatively and quantitatively outperforming the state-of-the-art on multiple datasets.

[116]  arXiv:2004.01077 [pdf, other]
Title: Learning Sparse & Ternary Neural Networks with Entropy-Constrained Trained Ternarization (EC2T)
Comments: Under review. Code is available at this https URL
Subjects: Machine Learning (cs.LG); Information Theory (cs.IT); Machine Learning (stat.ML)

Deep neural networks (DNN) have shown remarkable success in a variety of machine learning applications. The capacity of these models (i.e., number of parameters), endows them with expressive power and allows them to reach the desired performance. In recent years, there is an increasing interest in deploying DNNs to resource-constrained devices (i.e., mobile devices) with limited energy, memory, and computational budget. To address this problem, we propose Entropy-Constrained Trained Ternarization (EC2T), a general framework to create sparse and ternary neural networks which are efficient in terms of storage (e.g., at most two binary-masks and two full-precision values are required to save a weight matrix) and computation (e.g., MAC operations are reduced to a few accumulations plus two multiplications). This approach consists of two steps. First, a super-network is created by scaling the dimensions of a pre-trained model (i.e., its width and depth). Subsequently, this super-network is simultaneously pruned (using an entropy constraint) and quantized (that is, ternary values are assigned layer-wise) in a training process, resulting in a sparse and ternary network representation. We validate the proposed approach in CIFAR-10, CIFAR-100, and ImageNet datasets, showing its effectiveness in image classification tasks.

[117]  arXiv:2004.01079 [pdf, other]
Title: Revisiting the linearity in cross-lingual embedding mappings: from a perspective of word analogies
Comments: Comments welcome!
Subjects: Computation and Language (cs.CL)

Most cross-lingual embedding mapping algorithms assume the optimised transformation functions to be linear. Recent studies showed that on some occasions, learning a linear mapping does not work, indicating that the commonly-used assumption may fail. However, it still remains unclear under which conditions the linearity of cross-lingual embedding mappings holds. In this paper, we rigorously explain that the linearity assumption relies on the consistency of analogical relations encoded by multilingual embeddings. We did extensive experiments to validate this claim. Empirical results based on the analogy completion benchmark and the BLI task demonstrate a strong correlation between whether mappings capture analogical information and are linear.

[118]  arXiv:2004.01084 [pdf]
Title: Patterns of population displacement during mega-fires in California detected using Facebook Disaster Maps
Comments: 16 pages with supplemental information
Subjects: Computers and Society (cs.CY)

Facebook Disaster Maps (FBDM) is the first platform providing analysis-ready population change products derived from crowdsourced data targeting disaster relief practices. We evaluate the representativeness of FBDM data using the Mann-Kendall test and emerging hot and cold spots in an anomaly analysis to reveal the trend, magnitude, and agglommeration of population displacement during the Mendocino Complex and Woolsey fires in California, USA. Our results show that the distribution of FBDM pre-crisis users fits well with the total population from different sources. Due to usage habits, the elder population is underrepresented in FBDM data. During the two mega-fires in California, FBDM data effectively captured the temporal change of population arising from the placing and lifting of evacuation orders. Coupled with monotonic trends, the fall and rise of cold and hot spots of population revealed the areas with the greatest population drop and potential places to house the displaced residents. A comparison between the Mendocino Complex and Woolsey fires indicates that a densely populated region can be evacuated faster than a scarcely populated one, possibly due to the better access to transportation. In sparsely populated fire-prone areas, resources should be prioritized to move people to shelters as the displaced residents do not have many alternative options, while their counterparts in densely populated areas can utilize their social connections to seek temporary stay at nearby locations during an evacuation. Integrated with an assessment on underrepresented communities, FBDM data and the derivatives can provide much needed information of near real-time population displacement for crisis response and disaster relief. As applications and data generation mature, FBDM will harness crowdsourced data and aid first responder decision-making.

[119]  arXiv:2004.01090 [pdf, ps, other]
Title: Analysis of Multi-Messages Retransmission Schemes
Subjects: Information Theory (cs.IT)

Hybrid Automatic ReQuest (HARQ) protocol enables reliable communications in wireless systems. Usually, several parallel streams are sent in successive timeslots following a time-sharing approach. Recently, multi-layer HARQ has been proposed by superposing packets within a timeslot. In this paper, we evaluate the potential of this multi-layer HARQ by playing with some design parameters. We show that a gain in throughput is only obtained at mid-Signal-to-Noise Ratio (SNR).

[120]  arXiv:2004.01091 [pdf, other]
Title: Learning Longterm Representations for Person Re-Identification Using Radio Signals
Comments: CVPR 2020. The first three authors contributed equally to this paper
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Person Re-Identification (ReID) aims to recognize a person-of-interest across different places and times. Existing ReID methods rely on images or videos collected using RGB cameras. They extract appearance features like clothes, shoes, hair, etc. Such features, however, can change drastically from one day to the next, leading to inability to identify people over extended time periods. In this paper, we introduce RF-ReID, a novel approach that harnesses radio frequency (RF) signals for longterm person ReID. RF signals traverse clothes and reflect off the human body; thus they can be used to extract more persistent human-identifying features like body size and shape. We evaluate the performance of RF-ReID on longitudinal datasets that span days and weeks, where the person may wear different clothes across days. Our experiments demonstrate that RF-ReID outperforms state-of-the-art RGB-based ReID approaches for long term person ReID. Our results also reveal two interesting features: First since RF signals work in the presence of occlusions and poor lighting, RF-ReID allows for person ReID in such scenarios. Second, unlike photos and videos which reveal personal and private information, RF signals are more privacy-preserving, and hence can help extend person ReID to privacy-concerned domains, like healthcare.

[121]  arXiv:2004.01092 [pdf, ps, other]
Title: NUBES: A Corpus of Negation and Uncertainty in Spanish Clinical Texts
Comments: Accepted at the Twelfth International Conference on Language Resources and Evaluation (LREC 2020)
Subjects: Computation and Language (cs.CL)

This paper introduces the first version of the NUBes corpus (Negation and Uncertainty annotations in Biomedical texts in Spanish). The corpus is part of an on-going research and currently consists of 29,682 sentences obtained from anonymised health records annotated with negation and uncertainty. The article includes an exhaustive comparison with similar corpora in Spanish, and presents the main annotation and design decisions. Additionally, we perform preliminary experiments using deep learning algorithms to validate the annotated dataset. As far as we know, NUBes is the largest publicly available corpus for negation in Spanish and the first that also incorporates the annotation of speculation cues, scopes, and events.

[122]  arXiv:2004.01095 [pdf, other]
Title: MCEN: Bridging Cross-Modal Gap between Cooking Recipes and Dish Images with Latent Variable Model
Comments: Accepted to CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computation and Language (cs.CL)

Nowadays, driven by the increasing concern on diet and health, food computing has attracted enormous attention from both industry and research community. One of the most popular research topics in this domain is Food Retrieval, due to its profound influence on health-oriented applications. In this paper, we focus on the task of cross-modal retrieval between food images and cooking recipes. We present Modality-Consistent Embedding Network (MCEN) that learns modality-invariant representations by projecting images and texts to the same embedding space. To capture the latent alignments between modalities, we incorporate stochastic latent variables to explicitly exploit the interactions between textual and visual features. Importantly, our method learns the cross-modal alignments during training but computes embeddings of different modalities independently at inference time for the sake of efficiency. Extensive experimental results clearly demonstrate that the proposed MCEN outperforms all existing approaches on the benchmark Recipe1M dataset and requires less computational cost.

[123]  arXiv:2004.01097 [pdf, other]
Title: Learning to cooperate: Emergent communication in multi-agent navigation
Subjects: Machine Learning (cs.LG); Computation and Language (cs.CL); Multiagent Systems (cs.MA); Machine Learning (stat.ML)

Emergent communication in artificial agents has been studied to understand language evolution, as well as to develop artificial systems that learn to communicate with humans. We show that agents performing a cooperative navigation task in various gridworld environments learn an interpretable communication protocol that enables them to efficiently, and in many cases, optimally, solve the task. An analysis of the agents' policies reveals that emergent signals spatially cluster the state space, with signals referring to specific locations and spatial directions such as "left", "up", or "upper left room". Using populations of agents, we show that the emergent protocol has basic compositional structure, thus exhibiting a core property of natural language.

[124]  arXiv:2004.01098 [pdf, other]
Title: Information State Embedding in Partially Observable Cooperative Multi-Agent Reinforcement Learning
Comments: Submitted to CDC 2020
Subjects: Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)

Multi-agent reinforcement learning (MARL) under partial observability has long been considered challenging, primarily due to the requirement for each agent to maintain a belief over all other agents' local histories -- a domain that generally grows exponentially over time. In this work, we investigate a partially observable MARL problem in which agents are cooperative. To enable the development of tractable algorithms, we introduce the concept of an information state embedding that serves to compress agents' histories. We quantify how the compression error influences the resulting value functions for decentralized control. Furthermore, we propose three natural embeddings, based on finite-memory truncation, principal component analysis, and recurrent neural networks. The output of these embeddings are then used as the information state, and can be fed into any MARL algorithm. The proposed embed-then-learn pipeline opens the black-box of existing MARL algorithms, allowing us to establish some theoretical guarantees (error bounds of value functions) while still achieving competitive performance with many end-to-end approaches.

[125]  arXiv:2004.01099 [pdf]
Title: Natural Language Processing (NLP) for Requirements Engineering: A Systematic Mapping Study
Comments: 35 pages
Subjects: Software Engineering (cs.SE)

Natural language processing supported requirements engineering is an area of research and development that seeks to apply NLP techniques, tools and resources to a variety of requirements documents or artifacts to support a range of linguistic analysis tasks performed at various RE phases. Such tasks include detecting language issues, identifying key domain concepts and establishing traceability links between requirements. This article surveys the landscape of NLP4RE research to understand the state of the art and identify open problems. The systematic mapping study approach is used to conduct this survey, which identified 404 relevant primary studies and reviewed them according to five research questions, cutting across five aspects of NLP4RE research, concerning the state of the literature, the state of empirical research, the research focus, the state of the practice, and the NLP technologies used. Results: 1) NLP4RE is an active and thriving research area in RE that has amassed a large number of publications and attracted widespread attention from diverse communities; 2) most NLP4RE studies are solution proposals having only been evaluated using a laboratory experiment or an example application; 3) most studies have focused on the analysis phase, with detection as their central linguistic analysis task and requirements specification as their commonly processed document type; 4) 130 new tools have been proposed to support a range of linguistic analysis tasks, but there is little evidence of adoption in the long term, although some industrial applications have been published; 5) 140 NLP techniques, 66 NLP tools and 25 NLP resources are extracted from the selected studies.

[126]  arXiv:2004.01101 [pdf, other]
Title: Map-Enhanced Ego-Lane Detection in the Missing Feature Scenarios
Comments: Submitted to IEEE ACCESS
Subjects: Computer Vision and Pattern Recognition (cs.CV)

As one of the most important tasks in autonomous driving systems, ego-lane detection has been extensively studied and has achieved impressive results in many scenarios. However, ego-lane detection in the missing feature scenarios is still an unsolved problem. To address this problem, previous methods have been devoted to proposing more complicated feature extraction algorithms, but they are very time-consuming and cannot deal with extreme scenarios. Different from others, this paper exploits prior knowledge contained in digital maps, which has a strong capability to enhance the performance of detection algorithms. Specifically, we employ the road shape extracted from OpenStreetMap as lane model, which is highly consistent with the real lane shape and irrelevant to lane features. In this way, only a few lane features are needed to eliminate the position error between the road shape and the real lane, and a search-based optimization algorithm is proposed. Experiments show that the proposed method can be applied to various scenarios and can run in real-time at a frequency of 20 Hz. At the same time, we evaluated the proposed method on the public KITTI Lane dataset where it achieves state-of-the-art performance. Moreover, our code will be open source after publication.

[127]  arXiv:2004.01106 [pdf, other]
Title: The Paradox of Information Access: On Modeling Social-Media-Induced Polarization
Subjects: Social and Information Networks (cs.SI)

The paper develops a stochastic model of drift in human beliefs that shows that today's sheer volume of accessible information, combined with consumers' confirmation bias and natural preference to more outlying content, necessarily lead to increased polarization. The model explains the paradox of growing ideological fragmentation in the age of increased sharing. As social media, search engines, and other real-time information sharing outlets purport to facilitate access to information, a need for content filtering arises due to the ensuing information overload. In general, consumers select information that matches their individual views and values. The bias inherent in such selection is echoed by today's information curation services that maximize user engagement by filtering new content in accordance with observed consumer preferences. Consequently, individuals get exposed to increasingly narrower bands of the ideology spectrum, thus fragmenting society into increasingly ideologically isolated enclaves. We call this dynamic the paradox of information access. The model also suggests the disproportionate damage attainable with a small infusion of well-positioned misinformation. The paper describes the modeling methodology, and evaluates modeling results for different population sizes and parameter settings.

[128]  arXiv:2004.01110 [pdf, other]
Title: An Attention-Based Deep Learning Model for Multiple Pedestrian Attributes Recognition
Comments: Submitted to Image and Vision Computing journal
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

The automatic characterization of pedestrians in surveillance footage is a tough challenge, particularly when the data is extremely diverse with cluttered backgrounds, and subjects are captured from varying distances, under multiple poses, with partial occlusion. Having observed that the state-of-the-art performance is still unsatisfactory, this paper provides a novel solution to the problem, with two-fold contributions: 1) considering the strong semantic correlation between the different full-body attributes, we propose a multi-task deep model that uses an element-wise multiplication layer to extract more comprehensive feature representations. In practice, this layer serves as a filter to remove irrelevant background features, and is particularly important to handle complex, cluttered data; and 2) we introduce a weighted-sum term to the loss function that not only relativizes the contribution of each task (kind of attributed) but also is crucial for performance improvement in multiple-attribute inference settings. Our experiments were performed on two well-known datasets (RAP and PETA) and point for the superiority of the proposed method with respect to the state-of-the-art. The code is available at https://github.com/Ehsan-Yaghoubi/MAN-PAR-.

[129]  arXiv:2004.01113 [pdf, other]
Title: ProxyNCA++: Revisiting and Revitalizing Proxy Neighborhood Component Analysis
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We consider the problem of distance metric learning (DML), where the task is to learn an effective similarity measure between images. We revisit ProxyNCA and incorporate several enhancements. We find that low temperature scaling is a performance-critical component and explain why it works. Besides, we also discover that Global Max Pooling works better in general when compared to Global Average Pooling. Additionally, our proposed fast moving proxies also addresses small gradient issue of proxies, and this component synergizes well with low temperature scaling and Global Max Pooling. Our enhanced model, called ProxyNCA++, achieves a 22.9 percentage point average improvement of Recall@1 across four different zero-shot retrieval datasets compared to the original ProxyNCA algorithm. Furthermore, we achieve state-of-the-art results on the CUB200, Cars196, Sop, and InShop datasets, achieving Recall@1 scores of 72.2, 90.1, 81.4, and 90.9, respectively.

[130]  arXiv:2004.01120 [pdf, other]
Title: On Locating Paths in Compressed Cardinal Trees
Authors: Nicola Prezza
Subjects: Data Structures and Algorithms (cs.DS)

A compressed index is a data structure representing a text within compressed space and supporting fast indexing queries: given a pattern, count/return all positions where the pattern occurs. In recent years, powerful compressed indexes have emerged. These are based on Entropy, the Lempel-Ziv factorization, the run-length Burrows-Wheeler Transform (BWT), context-free grammars and, more recently, string attractors. Trees add a whole new dimension to the problem: one needs not only to compress the labels, but also the tree's topology. On this side, less is known. Jacobson showed how to represent the topology of a tree with $n$ nodes in $2n+o(n)$ bits of space (succinct) while also supporting constant-time navigation queries. Ferragina et al. presented the first entropy-compressed labeled tree representation (the XBWT) able to count, but not locate, paths labeled with a given pattern. Grammars and the Lempel-Ziv factorization have been extended to trees, but those representations do not support indexing queries. In this paper, we extend to cardinal trees (i.e. tries) the most powerful string compression and indexing tools known to date. We start by proposing suitable generalizations of run-length BWT, high-order entropy, and string attractors to cardinal trees. We show that the number $r\leq n$ of XBWT-runs upper-bounds the size of the smallest tree attractor and lower-bounds the trie's high-order worst-case entropy $\mathcal H^{wc}_k$. The main result of this paper is the first tree index able to \emph{locate} in pre-order nodes reached by a path labeled with a given pattern. Our index locates path occurrences in constant time each and takes $2n + o(n) + O(r\log n) \leq 2n + o(n) + O(\mathcal H^{wc}_k\log n)$ bits of space: the reporting time is optimal and the locate machinery fits within compressed space on top of the tree's topology.

[131]  arXiv:2004.01122 [pdf, other]
Title: On the Principles of Differentiable Quantum Programming Languages
Comments: Codes are available at this https URL
Subjects: Programming Languages (cs.PL); Machine Learning (cs.LG); Quantum Physics (quant-ph)

Variational Quantum Circuits (VQCs), or the so-called quantum neural-networks, are predicted to be one of the most important near-term quantum applications, not only because of their similar promises as classical neural-networks, but also because of their feasibility on near-term noisy intermediate-size quantum (NISQ) machines. The need for gradient information in the training procedure of VQC applications has stimulated the development of auto-differentiation techniques for quantum circuits. We propose the first formalization of this technique, not only in the context of quantum circuits but also for imperative quantum programs (e.g., with controls), inspired by the success of differentiable programming languages in classical machine learning. In particular, we overcome a few unique difficulties caused by exotic quantum features (such as quantum no-cloning) and provide a rigorous formulation of differentiation applied to bounded-loop imperative quantum programs, its code-transformation rules, as well as a sound logic to reason about their correctness. Moreover, we have implemented our code transformation in OCaml and demonstrated the resource-efficiency of our scheme both analytically and empirically. We also conduct a case study of training a VQC instance with controls, which shows the advantage of our scheme over existing auto-differentiation for quantum circuits without controls.

[132]  arXiv:2004.01123 [pdf]
Title: Surrogate-assisted performance tuning of knowledge discovery algorithms: application to clinical pathway evolutionary modeling
Subjects: Machine Learning (cs.LG); Mathematical Software (cs.MS); Machine Learning (stat.ML)

The paper proposes an approach for surrogate-assisted tuning of knowledge discovery algorithms. The approach is based on the prediction of both the quality and performance of the target algorithm. The prediction is furtherly used as objectives for the optimization and tuning of the algorithm. The approach is investigated using clinical pathways (CP) discovery problem resolved using the evolutionary-based clustering of electronic health records (EHR). Target algorithm and the proposed approach were applied to the discovery of CPs for Acute Coronary Syndrome patients in 3434 EHRs of patients treated in Almazov National Medical Research Center (Saint Petersburg, Russia). The study investigates the possible acquisition of interpretable clusters of typical CPs within a single disease. It shows how the approach could be used to improve complex data-driven analytical knowledge discovery algorithms. The study of the results includes the feature importance of the best surrogate model and discover how the parameters of input data influence the predictions.

[133]  arXiv:2004.01124 [pdf, other]
Title: Nass: A New Approach to Graph Similarity Search
Authors: Jongik Kim
Subjects: Databases (cs.DB)

In this paper, we study the problem of graph similarity search with graph edit distance (GED) constraints. Due to the NP-hardness of GED computation, existing solutions to this problem adopt the filtering-and-verification framework with a main focus on the filtering phase to generate a small number of candidate graphs. However, they have a limitation that the number of candidates grows extremely rapidly as a GED threshold increases. To address the limitation, we propose a new approach that utilizes GED computation results in generating candidate graphs. The main idea is that whenever we identify a result graph of the query, we immediately regenerate candidate graphs using a subset of pre-computed graphs similar to the identified result graph. To speed up GED computation, we also develop a novel GED computation algorithm. The proposed algorithm reduces the search space for GED computation by utilizing a series of filtering techniques, which have been used to generate candidates in existing solutions. Experimental results on real datasets demonstrate the proposed approach significantly outperforms the state-of-the art techniques.

[134]  arXiv:2004.01130 [pdf, other]
Title: BUDA: Boundless Unsupervised Domain Adaptation in Semantic Segmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In this work, we define and address "Boundless Unsupervised Domain Adaptation" (BUDA), a novel problem in semantic segmentation. BUDA set-up pictures a realistic scenario where unsupervised target domain not only exhibits a data distribution shift w.r.t. supervised source domain but also includes classes that are absent from the latter. Different to "open-set" and "universal domain adaptation", which both regard never-seen objects as "unknown", BUDA aims at explicit test-time prediction for these never-seen classes. To reach this goal, we propose a novel framework leveraging domain adaptation and zero-shot learning techniques to enable "boundless" adaptation on the target domain. Performance is further improved using self-training on target pseudo-labels. For validation, we consider different domain adaptation set-ups, namely synthetic-2-real, country-2-country and dataset-2-dataset. Our framework outperforms the baselines by significant margins, setting competitive standards on all benchmarks for the new task. Code and models are available at:~\url{https://github.com/valeoai/buda}.

[135]  arXiv:2004.01136 [pdf, other]
Title: Hierarchical Adaptive Contextual Bandits for Resource Constraint based Recommendation
Comments: Accepted for publication at WWW (The Web Conference) 2020
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

Contextual multi-armed bandit (MAB) achieves cutting-edge performance on a variety of problems. When it comes to real-world scenarios such as recommendation system and online advertising, however, it is essential to consider the resource consumption of exploration. In practice, there is typically non-zero cost associated with executing a recommendation (arm) in the environment, and hence, the policy should be learned with a fixed exploration cost constraint. It is challenging to learn a global optimal policy directly, since it is a NP-hard problem and significantly complicates the exploration and exploitation trade-off of bandit algorithms. Existing approaches focus on solving the problems by adopting the greedy policy which estimates the expected rewards and costs and uses a greedy selection based on each arm's expected reward/cost ratio using historical observation until the exploration resource is exhausted. However, existing methods are hard to extend to infinite time horizon, since the learning process will be terminated when there is no more resource. In this paper, we propose a hierarchical adaptive contextual bandit method (HATCH) to conduct the policy learning of contextual bandits with a budget constraint. HATCH adopts an adaptive method to allocate the exploration resource based on the remaining resource/time and the estimation of reward distribution among different user contexts. In addition, we utilize full of contextual feature information to find the best personalized recommendation. Finally, in order to prove the theoretical guarantee, we present a regret bound analysis and prove that HATCH achieves a regret bound as low as $O(\sqrt{T})$. The experimental results demonstrate the effectiveness and efficiency of the proposed method on both synthetic data sets and the real-world applications.

[136]  arXiv:2004.01138 [pdf, other]
Title: Numerical analysis of least squares and perceptron learning for classification problems
Authors: L. Beilina
Subjects: Numerical Analysis (math.NA)

This work presents study on regularized and non-regularized versions of perceptron learning and least squares algorithms for classification problems. Fr'echet derivatives for regularized least squares and perceptron learning algorithms are derived. Different techniques for choosing the regularization parameter are discussed. Decision boundaries obtained by non-regularized algorithms to classify simulated and experimental data sets are analyzed.

[137]  arXiv:2004.01141 [pdf, ps, other]
Title: Predictive Bandits
Comments: 10 pages, 4 figures, conference
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

We introduce and study a new class of stochastic bandit problems, referred to as predictive bandits. In each round, the decision maker first decides whether to gather information about the rewards of particular arms (so that their rewards in this round can be predicted). These measurements are costly, and may be corrupted by noise. The decision maker then selects an arm to be actually played in the round. Predictive bandits find applications in many areas; e.g. they can be applied to channel selection problems in radio communication systems. In this paper, we provide the first theoretical results about predictive bandits, and focus on scenarios where the decision maker is allowed to measure at most one arm per round. We derive asymptotic instance-specific regret lower bounds for these problems, and develop algorithms whose regret match these fundamental limits. We illustrate the performance of our algorithms through numerical experiments. In particular, we highlight the gains that can be achieved by using reward predictions, and investigate the impact of the noise in the corresponding measurements.

[138]  arXiv:2004.01142 [pdf, other]
Title: Safe Feedback Motion Planning: A Contraction Theory and $\mathcal{L}_1$-Adaptive Control Based Approach
Comments: Submitted to the Conference on Decision and Control (CDC) 2020
Subjects: Systems and Control (eess.SY); Robotics (cs.RO)

Autonomous robots that are capable of operating safely in the presence of imperfect model knowledge or external disturbances are vital in safety-critical applications. In this paper, we present a planner-agnostic framework to design and certify safe tubes around desired trajectories that the robot is always guaranteed to remain inside of. By leveraging recent results in contraction analysis and $\mathcal{L}_1$-adaptive control we synthesize an architecture that induces safe tubes for nonlinear systems with state and time-varying uncertainties. We demonstrate with a few illustrative examples how contraction theory-based $\mathcal{L}_1$-adaptive control can be used in conjunction with traditional motion planning algorithms to obtain provably safe trajectories.

[139]  arXiv:2004.01144 [pdf, other]
Title: Predicting Injectable Medication Adherence via a Smart Sharps Bin and Machine Learning
Comments: This paper has been accepted by IEEE IoT World Forum
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)

Medication non-adherence is a widespread problem affecting over 50% of people who have chronic illness and need chronic treatment. Non-adherence exacerbates health risks and drives significant increases in treatment costs. In order to address these challenges, the importance of predicting patients' adherence has been recognised. In other words, it is important to improve the efficiency of interventions of the current healthcare system by prioritizing resources to the patients who are most likely to be non-adherent. Our objective in this work is to make predictions regarding individual patients' behaviour in terms of taking their medication on time during their next scheduled medication opportunity. We do this by leveraging a number of machine learning models. In particular, we demonstrate the use of a connected IoT device; a "Smart Sharps Bin", invented by HealthBeacon Ltd.; to monitor and track injection disposal of patients in their home environment. Using extensive data collected from these devices, five machine learning models, namely Extra Trees Classifier, Random Forest, XGBoost, Gradient Boosting and Multilayer Perception were trained and evaluated on a large dataset comprising 165,223 historic injection disposal records collected from 5,915 HealthBeacon units over the course of 3 years. The testing work was conducted on real-time data generated by the smart device over a time period after the model training was complete, i.e. true future data. The proposed machine learning approach demonstrated very good predictive performance exhibiting an Area Under the Receiver Operating Characteristic Curve (ROC AUC) of 0.86.

[140]  arXiv:2004.01156 [pdf, other]
Title: No Repetition: Fast Streaming with Highly Concentrated Hashing
Comments: 10 pages
Subjects: Data Structures and Algorithms (cs.DS)

To get estimators that work within a certain error bound with high probability, a common strategy is to design one that works with constant probability, and then boost the probability using independent repetitions. Important examples of this approach are small space algorithms for estimating the number of distinct elements in a stream, or estimating the set similarity between large sets. Using standard strongly universal hashing to process each element, we get a sketch based estimator where the probability of a too large error is, say, 1/4. By performing $r$ independent repetitions and taking the median of the estimators, the error probability falls exponentially in $r$. However, running $r$ independent experiments increases the processing time by a factor $r$.
Here we make the point that if we have a hash function with strong concentration bounds, then we get the same high probability bounds without any need for repetitions. Instead of $r$ independent sketches, we have a single sketch that is $r$ times bigger, so the total space is the same. However, we only apply a single hash function, so we save a factor $r$ in time, and the overall algorithms just get simpler.
Fast practical hash functions with strong concentration bounds were recently proposed by Aamand em et al. (to appear in STOC 2020). Using their hashing schemes, the algorithms thus become very fast and practical, suitable for online processing of high volume data streams.

[141]  arXiv:2004.01160 [pdf, other]
Title: Multimodal Material Classification for Robots using Spectroscopy and High Resolution Texture Imaging
Comments: 8 pages, 10 figures, 5 tables
Subjects: Robotics (cs.RO); Machine Learning (cs.LG)

Material recognition can help inform robots about how to properly interact with and manipulate real-world objects. In this paper, we present a multimodal sensing technique, leveraging near-infrared spectroscopy and close-range high resolution texture imaging, that enables robots to estimate the materials of household objects. We release a dataset of high resolution texture images and spectral measurements collected from a mobile manipulator that interacted with 144 household objects. We then present a neural network architecture that learns a compact multimodal representation of spectral measurements and texture images. When generalizing material classification to new objects, we show that this multimodal representation enables a robot to recognize materials with greater performance as compared to prior state-of-the-art approaches. Finally, we present how a robot can combine this high resolution local sensing with images from the robot's head-mounted camera to achieve accurate material classification over a scene of objects on a table.

[142]  arXiv:2004.01166 [pdf, other]
Title: Bodies at Rest: 3D Human Pose and Shape Estimation from a Pressure Image using Synthetic Data
Comments: 18 pages, 18 figures, 5 tables. Accepted for oral presentation at CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

People spend a substantial part of their lives at rest in bed. 3D human pose and shape estimation for this activity would have numerous beneficial applications, yet line-of-sight perception is complicated by occlusion from bedding. Pressure sensing mats are a promising alternative, but training data is challenging to collect at scale. We describe a physics-based method that simulates human bodies at rest in a bed with a pressure sensing mat, and present PressurePose, a synthetic dataset with 206K pressure images with 3D human poses and shapes. We also present PressureNet, a deep learning model that estimates human pose and shape given a pressure image and gender. PressureNet incorporates a pressure map reconstruction (PMR) network that models pressure image generation to promote consistency between estimated 3D body models and pressure image input. In our evaluations, PressureNet performed well with real data from participants in diverse poses, even though it had only been trained with synthetic data. When we ablated the PMR network, performance dropped substantially.

[143]  arXiv:2004.01167 [pdf, other]
Title: Sum-product networks: A survey
Comments: 24 pages, 6 figures, 97 references
Subjects: Machine Learning (cs.LG); Artificial Intelligence (cs.AI)

A sum-product network (SPN) is a probabilistic model, based on a rooted acyclic directed graph, in which terminal nodes represent univariate probability distributions and non-terminal nodes represent convex combinations (weighted sums) and products of probability functions. They are closely related to probabilistic graphical models, in particular to Bayesian networks with multiple context-specific independencies. Their main advantage is the possibility of building tractable models from data, i.e., models that can perform several inference tasks in time proportional to the number of links in the graph. They are somewhat similar to neural networks and can address the same kinds of problems, such as image processing and natural language understanding. This paper offers a survey of SPNs, including their definition, the main algorithms for inference and learning from data, the main applications, a brief review of software libraries, and a comparison with related models

[144]  arXiv:2004.01168 [pdf, other]
Title: Improving the Utility of Knowledge Graph Embeddings with Calibration
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (cs.LG)

This paper addresses machine learning models that embed knowledge graph entities and relationships toward the goal of predicting unseen triples, which is an important task because most knowledge graphs are by nature incomplete. We posit that while offline link prediction accuracy using embeddings has been steadily improving on benchmark datasets, such embedding models have limited practical utility in real-world knowledge graph completion tasks because it is not clear when their predictions should be accepted or trusted. To this end, we propose to calibrate knowledge graph embedding models to output reliable confidence estimates for predicted triples. In crowdsourcing experiments, we demonstrate that calibrated confidence scores can make knowledge graph embeddings more useful to practitioners and data annotators in knowledge graph completion tasks. We also release two resources from our evaluation tasks: An enriched version of the FB15K benchmark and a new knowledge graph dataset extracted from Wikidata.

[145]  arXiv:2004.01170 [pdf, other]
Title: DOPS: Learning to Detect 3D Objects and Predict their 3D Shapes
Comments: To appear in CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose DOPS, a fast single-stage 3D object detection method for LIDAR data. Previous methods often make domain-specific design decisions, for example projecting points into a bird-eye view image in autonomous driving scenarios. In contrast, we propose a general-purpose method that works on both indoor and outdoor scenes. The core novelty of our method is a fast, single-pass architecture that both detects objects in 3D and estimates their shapes. 3D bounding box parameters are estimated in one pass for every point, aggregated through graph convolutions, and fed into a branch of the network that predicts latent codes representing the shape of each detected object. The latent shape space and shape decoder are learned on a synthetic dataset and then used as supervision for the end-to-end training of the 3D object detection pipeline. Thus our model is able to extract shapes without access to ground-truth shape information in the target dataset. During experiments, we find that our proposed method achieves state-of-the-art results by ~5% on object detection in ScanNet scenes, and it gets top results by 3.4% in the Waymo Open Dataset, while reproducing the shapes of detected cars.

[146]  arXiv:2004.01174 [pdf, other]
Title: Causal Inference of Script Knowledge
Comments: Pre-Print
Subjects: Computation and Language (cs.CL)

When does a sequence of events define an everyday scenario and how can this knowledge be induced from text? Prior works in inducing such scripts have relied on, in one form or another, measures of correlation between instances of events in a corpus. We argue from both a conceptual and practical sense that a purely correlation-based approach is insufficient, and instead propose an approach to script induction based on the causal effect between events, formally defined via interventions. Through both human and automatic evaluations, we show that the output of our method based on causal effects better matches the intuition of what a script represents

[147]  arXiv:2004.01176 [pdf, other]
Title: Learning Unsupervised Hierarchical Part Decomposition of 3D Objects from a Single RGB Image
Comments: To appear at CVPR 2020, project page this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Humans perceive the 3D world as a set of distinct objects that are characterized by various low-level (geometry, reflectance) and high-level (connectivity, adjacency, symmetry) properties. Recent methods based on convolutional neural networks (CNNs) demonstrated impressive progress in 3D reconstruction, even when using a single 2D image as input. However, the majority of these methods focuses on recovering the local 3D geometry of an object without considering its part-based decomposition or relations between parts. We address this challenging problem by proposing a novel formulation that allows to jointly recover the geometry of a 3D object as a set of primitives as well as their latent hierarchical structure without part-level supervision. Our model recovers the higher level structural decomposition of various objects in the form of a binary tree of primitives, where simple parts are represented with fewer primitives and more complex parts are modeled with more components. Our experiments on the ShapeNet and D-FAUST datasets demonstrate that considering the organization of parts indeed facilitates reasoning about 3D geometry.

[148]  arXiv:2004.01177 [pdf, other]
Title: Tracking Objects as Points
Comments: Code available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Tracking has traditionally been the art of following interest points through space and time. This changed with the rise of powerful deep networks. Nowadays, tracking is dominated by pipelines that perform object detection followed by temporal association, also known as tracking-by-detection. In this paper, we present a simultaneous detection and tracking algorithm that is simpler, faster, and more accurate than the state of the art. Our tracker, CenterTrack, applies a detection model to a pair of images and detections from the prior frame. Given this minimal input, CenterTrack localizes objects and predicts their associations with the previous frame. That's it. CenterTrack is simple, online (no peeking into the future), and real-time. It achieves 67.3% MOTA on the MOT17 challenge at 22 FPS and 89.4% MOTA on the KITTI tracking benchmark at 15 FPS, setting a new state of the art on both datasets. CenterTrack is easily extended to monocular 3D tracking by regressing additional 3D attributes. Using monocular video input, it achieves 28.3% AMOTA@0.2 on the newly released nuScenes 3D tracking benchmark, substantially outperforming the monocular baseline on this benchmark while running at 28 FPS.

[149]  arXiv:2004.01178 [pdf, other]
Title: Unsupervised Real-world Image Super Resolution via Domain-distance Aware Training
Comments: Code will be available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)

These days, unsupervised super-resolution (SR) has been soaring due to its practical and promising potential in real scenarios. The philosophy of off-the-shelf approaches lies in the augmentation of unpaired data, i.e. first generating synthetic low-resolution (LR) images $\mathcal{Y}^g$ corresponding to real-world high-resolution (HR) images $\mathcal{X}^r$ in the real-world LR domain $\mathcal{Y}^r$, and then utilizing the pseudo pairs $\{\mathcal{Y}^g, \mathcal{X}^r\}$ for training in a supervised manner. Unfortunately, since image translation itself is an extremely challenging task, the SR performance of these approaches are severely limited by the domain gap between generated synthetic LR images and real LR images. In this paper, we propose a novel domain-distance aware super-resolution (DASR) approach for unsupervised real-world image SR. The domain gap between training data (e.g. $\mathcal{Y}^g$) and testing data (e.g. $\mathcal{Y}^r$) is addressed with our \textbf{domain-gap aware training} and \textbf{domain-distance weighted supervision} strategies. Domain-gap aware training takes additional benefit from real data in the target domain while domain-distance weighted supervision brings forward the more rational use of labeled source domain data. The proposed method is validated on synthetic and real datasets and the experimental results show that DASR consistently outperforms state-of-the-art unsupervised SR approaches in generating SR outputs with more realistic and natural textures.

[150]  arXiv:2004.01180 [pdf, other]
Title: Learning to See Through Obstructions
Comments: CVPR 2020. Project page: this https URL Code: this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We present a learning-based approach for removing unwanted obstructions, such as window reflections, fence occlusions or raindrops, from a short sequence of images captured by a moving camera. Our method leverages the motion differences between the background and the obstructing elements to recover both layers. Specifically, we alternate between estimating dense optical flow fields of the two layers and reconstructing each layer from the flow-warped images via a deep convolutional neural network. The learning-based layer reconstruction allows us to accommodate potential errors in the flow estimation and brittle assumptions such as brightness consistency. We show that training on synthetically generated data transfers well to real images. Our results on numerous challenging scenarios of reflection and fence removal demonstrate the effectiveness of the proposed method.

[151]  arXiv:2004.01181 [pdf, other]
Title: GraphChallenge.org Sparse Deep Neural Network Performance
Comments: 7 pages, 7 figures, 80 references, to be submitted to IEEE HPEC 2020. This work reports new updated results on prior work reported in arXiv:1909.05631. arXiv admin note: substantial text overlap with arXiv:1807.03165, arXiv:1708.02937
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Machine Learning (stat.ML)

The MIT/IEEE/Amazon GraphChallenge.org encourages community approaches to developing new solutions for analyzing graphs and sparse data. Sparse AI analytics present unique scalability difficulties. The Sparse Deep Neural Network (DNN) Challenge draws upon prior challenges from machine learning, high performance computing, and visual analytics to create a challenge that is reflective of emerging sparse AI systems. The sparse DNN challenge is based on a mathematically well-defined DNN inference computation and can be implemented in any programming environment. In 2019 several sparse DNN challenge submissions were received from a wide range of authors and organizations. This paper presents a performance analysis of the best performers of these submissions. These submissions show that their state-of-the-art sparse DNN execution time, $T_{\rm DNN}$, is a strong function of the number of DNN operations performed, $N_{\rm op}$. The sparse DNN challenge provides a clear picture of current sparse DNN systems and underscores the need for new innovations to achieve high performance on very large sparse DNNs.

Cross-lists for Fri, 3 Apr 20

[152]  arXiv:2001.03327 (cross-list from econ.TH) [pdf, ps, other]
Title: How to Cut a Cake Fairly: A Generalization to Groups
Subjects: Theoretical Economics (econ.TH); Computer Science and Game Theory (cs.GT); Combinatorics (math.CO)

A fundamental result in cake cutting states that for any number of players with arbitrary preferences over a cake, there exists a division of the cake such that every player receives a single contiguous piece and no player is left envious. We generalize this result by showing that it is possible to partition the players into groups of any desired sizes and divide the cake among the groups, so that each group receives a single contiguous piece and no player finds the piece of another group better than that of the player's own group.

[153]  arXiv:2004.00667 (cross-list from stat.ML) [pdf, other]
Title: Projection Pursuit Gaussian Process Regression
Authors: Gecheng Chen, Rui Tuo
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)

A primary goal of computer experiments is to reconstruct the function given by the computer code via scattered evaluations. Traditional isotropic Gaussian process models suffer from the curse of dimensionality, when the input dimension is high. Gaussian process models with additive correlation functions are scalable to dimensionality, but they are very restrictive as they only work for additive functions. In this work, we consider a projection pursuit model, in which the nonparametric part is driven by an additive Gaussian process regression. The dimension of the additive function is chosen to be higher than the original input dimension. We show that this dimension expansion can help approximate more complex functions. A gradient descent algorithm is proposed to maximize the likelihood function. Simulation studies show that the proposed method outperforms the traditional Gaussian process models.

[154]  arXiv:2004.00669 (cross-list from econ.GN) [pdf, ps, other]
Title: A Note on the Provision of a Public Service of Different Quality
Subjects: General Economics (econ.GN); Computer Science and Game Theory (cs.GT)

We study how the quality dimension affects the social optimum in a model of spatial differentiation where two facilities provide a public service. If quality enters linearly in the individuals' utility function, a symmetric configuration, in which both facilities have the same quality and serve groups of individuals of the same size, does not maximize the social welfare. This is a surprising result as all individuals are symmetrically identical having the same quality valuation. We also show that a symmetric configuration of facilities may maximize the social welfare if the individuals' marginal utility of quality is decreasing.

[155]  arXiv:2004.00707 (cross-list from physics.ao-ph) [pdf, other]
Title: Data-driven modelling of nonlinear spatio-temporal fluid flows using a deep convolutional generative adversarial network
Subjects: Atmospheric and Oceanic Physics (physics.ao-ph); Computational Engineering, Finance, and Science (cs.CE); Fluid Dynamics (physics.flu-dyn)

Deep learning techniques for improving fluid flow modelling have gained significant attention in recent years. Advanced deep learning techniques achieve great progress in rapidly predicting fluid flows without prior knowledge of the underlying physical relationships. Advanced deep learning techniques achieve great progress in rapidly predicting fluid flows without prior knowledge of the underlying physical relationships. However, most of existing researches focused mainly on either sequence learning or spatial learning, rarely on both spatial and temporal dynamics of fluid flows (Reichstein et al., 2019). In this work, an Artificial Intelligence (AI) fluid model based on a general deep convolutional generative adversarial network (DCGAN) has been developed for predicting spatio-temporal flow distributions. In deep convolutional networks, the high-dimensional flows can be converted into the low-dimensional "latent" representations. The complex features of flow dynamics can be captured by the adversarial networks. The above DCGAN fluid model enables us to provide reasonable predictive accuracy of flow fields while maintaining a high computational efficiency. The performance of the DCGAN is illustrated for two test cases of Hokkaido tsunami with different incoming waves along the coastal line. It is demonstrated that the results from the DCGAN are comparable with those from the original high fidelity model (Fluidity). The spatio-temporal flow features have been represented as the flow evolves, especially, the wave phases and flow peaks can be captured accurately. In addition, the results illustrate that the online CPU cost is reduced by five orders of magnitude compared to the original high fidelity model simulations. The promising results show that the DCGAN can provide rapid and reliable spatio-temporal prediction for nonlinear fluid flows.

[156]  arXiv:2004.00719 (cross-list from math.OC) [pdf, ps, other]
Title: Fractional Deep Neural Network via Constrained Optimization
Subjects: Optimization and Control (math.OC); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)

This paper introduces a novel algorithmic framework for a deep neural network (DNN), which in a mathematically rigorous manner, allows us to incorporate history (or memory) into the network -- it ensures all layers are connected to one another. This DNN, called Fractional-DNN, can be viewed as a time-discretization of a fractional in time nonlinear ordinary differential equation (ODE). The learning problem then is a minimization problem subject to that fractional ODE as constraints. We emphasize that an analogy between the existing DNN and ODEs, with standard time derivative, is well-known by now. The focus of our work is the Fractional-DNN. Using the Lagrangian approach, we provide a derivation of the backward propagation and the design equations. We test our network on several datasets for classification problems. Fractional-DNN offers various advantages over the existing DNN. The key benefits are a significant improvement to the vanishing gradient issue due to the memory effect, and better handling of nonsmooth data due to the network's ability to approximate non-smooth functions.

[157]  arXiv:2004.00753 (cross-list from eess.IV) [pdf]
Title: Image Denoising Using Sparsifying Transform Learning and Weighted Singular Values Minimization
Comments: 17 pages, 10 figures, 5 tables
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

In image denoising (IDN) processing, the low-rank property is usually considered as an important image prior. As a convex relaxation approximation of low rank, nuclear norm based algorithms and their variants have attracted significant attention. These algorithms can be collectively called image domain based methods, whose common drawback is the requirement of great number of iterations for some acceptable solution. Meanwhile, the sparsity of images in a certain transform domain has also been exploited in image denoising problems. Sparsity transform learning algorithms can achieve extremely fast computations as well as desirable performance. By taking both advantages of image domain and transform domain in a general framework, we propose a sparsity transform learning and weighted singular values minimization method (STLWSM) for IDN problems. The proposed method can make full use of the preponderance of both domains. For solving the non-convex cost function, we also present an efficient alternative solution for acceleration. Experimental results show that the proposed STLWSM achieves improvement both visually and quantitatively with a large margin over state-of-the-art approaches based on an alternatively single domain. It also needs much less iteration than all the image domain algorithms.

[158]  arXiv:2004.00771 (cross-list from math.CO) [pdf, ps, other]
Title: Power Hadamard matrices and Plotkin-optimal p-ary codes
Subjects: Combinatorics (math.CO); Information Theory (cs.IT)

A power Hadamard matrix $H(x)$ is a square matrix of dimension $n$ with entries from Laurent polynomial ring $L= \mathbb{Q} [x,x^{-1}]$ such that $H(x)H(x^{-1})^T=nI \mod f(x)$, where $f$ is some Laurent polynomial of degree greater than $0$. In the first part of this work, some new results on power Hadamard matrices are studied, where we mainly entend the work of Craigen and Woodford. In the second part, codes obtained from Butson-Hadamard matrices are discussed and some bounds on the minimum distance of these codes are proved. In particular, we show that the code obtained from a Butson-Hadamard matrix meets the Plotkin bound under a non-homegeneous weight.

[159]  arXiv:2004.00772 (cross-list from physics.soc-ph) [pdf, other]
Title: Community Resilience Optimization Subject to Power Flow Constraints in Cyber-Physical-Social Systems in Power Engineering
Subjects: Physics and Society (physics.soc-ph); Systems and Control (eess.SY)

This paper develops a community resilience optimization method subject to power flow constraints in the Cyber-Physical-Social Systems in Power Engineering, which is solved using a multi-agent-based algorithm. The tool that makes the nexus between electricity generation on the physical side and the consumers and the critical loads on the social side is the power flow algorithm. Specifically, the levels of emotion, empathy, cooperation, and the physical health of the consumers, prosumers are modeled in the proposed community resilience optimization approach while accounting for the electric power system constraints and their impact on the critical loads, which include hospitals, shelters, and gas stations, to name a few. The optimization accounts for the fact that the level of satisfaction of the society, the living standards, and the social well-being are depended on the supply of energy, including electricity. Evidently, the lack of electric energy resulting from load shedding has an impact on both the mental and the psychical quality of life, which in turn affects the community resilience. The developed constrained community resilience optimization method is applied to two case studies, including a two-area 6-buses system and a modified IEEE RTS 24-bus system. Simulation results reveal that a decrease in the initial values of the emotion, the risk perception, and the social media platform effect factor entails an increase in load shedding, which in turn results in a decrease in community resilience. In contrast, an increase in the initial values of cooperation, empathy, physical health, the capacity of microgrids and distributed energy resources results in a decrease in the load shedding, which in turn induces an enhancement of the community resilience.

[160]  arXiv:2004.00787 (cross-list from eess.IV) [pdf, other]
Title: Radial Coverage Strength for Optimization of Multi-Camera Deployment
Comments: 11 pages, 14 figures
Subjects: Image and Video Processing (eess.IV); Systems and Control (eess.SY)

In this paper, a new concept, radial coverage strength, is first proposed to characterize the visual sensing performance when the orientation of the target pose is considered. In particular, the elevation angle of the optical pose of the visual sensor is taken to decompose the visual coverage strength into effective and ineffective components, motivated by the imaging intuition. An optimization problem is then formulated for a multi-camera network to maximize the coverage of the object area based on the strength information fusion along the effective coverage strength direction through the deployment of the angle between radial coverage vector of the camera optical pose. Both simulation and experiments are conducted to validate the proposed approach and comparison with existing methods is also provided.

[161]  arXiv:2004.00814 (cross-list from quant-ph) [pdf, other]
Title: Single Quantum Deletion Error-Correcting Codes
Comments: 1 figure
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT)

In this paper, we discuss a construction method of quantum deletion error-correcting codes. First of all, we define deletion errors for quantum states, an encoder, a decoder, and two conditions which is expressed by only the combinatorial language. Then, we prove that quantum deletion error-correcting codes can be constructed by two sets that satisfy the conditions. In other words, problems that correct the deletion errors for quantum states are reduced to problems that find the sets satisfying the condition by this paper. Also, we performed experiment of the codes over IBM Quantum Experience.

[162]  arXiv:2004.00871 (cross-list from eess.IV) [pdf, other]
Title: End-To-End Convolutional Neural Network for 3D Reconstruction of Knee Bones From Bi-Planar X-Ray Images
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

We present an end-to-end Convolutional Neural Network (CNN) approach for 3D reconstruction of knee bones directly from two bi-planar X-ray images. Clinically, capturing the 3D models of the bones is crucial for surgical planning, implant fitting, and postoperative evaluation. X-ray imaging significantly reduces the exposure of patients to ionizing radiation compared to Computer Tomography (CT) imaging, and is much more common and inexpensive compared to Magnetic Resonance Imaging (MRI) scanners. However, retrieving 3D models from such 2D scans is extremely challenging. In contrast to the common approach of statistically modeling the shape of each bone, our deep network learns the distribution of the bones' shapes directly from the training images. We train our model with both supervised and unsupervised losses using Digitally Reconstructed Radiograph (DRR) images generated from CT scans. To apply our model to X-Ray data, we use style transfer to transform between X-Ray and DRR modalities. As a result, at test time, without further optimization, our solution directly outputs a 3D reconstruction from a pair of bi-planar X-ray images, while preserving geometric constraints. Our results indicate that our deep learning model is very efficient, generalizes well and produces high quality reconstructions.

[163]  arXiv:2004.00876 (cross-list from math.PR) [pdf, other]
Title: Heavy Traffic Analysis of the Mean Response Time for Load Balancing Policies in the Mean Field Regime
Comments: 14 pages, 2 figures
Subjects: Probability (math.PR); Performance (cs.PF)

Mean field models are a popular tool used to analyse load balancing policies. In some exceptional cases the response time distribution of the mean field limit has an explicit form. In most cases it can be computed using either a recursion or a differential equation (for exponential job sizes with mean one). In this paper we study the value of the mean response time $E[R_\lambda]$ as the arrival rate $\lambda$ approaches $1$ (i.e. the system gets close to instability). As $E[R_\lambda]$ diverges to infinity, we scale with $-\log(1-\lambda)$ and present a method to compute the limit $\lim_{\lambda\rightarrow 1^-}-E[R_\lambda]/\log(1-\lambda)$.
This limit has been previously determined for SQ(d) and LL(d), two well-known policies that assign an incoming job to a server with either the shortest queue or least work left among $d$ randomly selected servers. However, the derivation of the result for SQ(d) relied on the closed form representation of the mean response time and does not seem to generalize well, moreover the proof for LL(d) is incomplete. In contrast, we present a general result that holds for any policy for which the associated recursion or differential equation satisfies a list of criteria. For SQ(d) and LL(d) these criteria are trivially verified.
We apply our method to SQ(d,K) resp LL(d,K) with exponential job sizes of mean one. For these policies, jobs arrive in batches of size $K$ and join the $K$ servers with the shortest queue resp least amount of work left. For SQ(d,K) we obtain $\frac{1}{\log(d/K)}$ as limiting value, while for LL(d,K) we find the limit to be equal to $\frac{K}{d-K}$. We further analyse a policy where SQ(d_i) resp LL($d_i$) is used with probability $p_i$. For the shortest queue variant, we obtain the limit $\frac{1}{\log\left(\sum_{i=1}^np_id_i\right)}$, while for the least loaded variant, we obtain $\frac{1}{\sum_{i=1}^np_id_i-1}$.

[164]  arXiv:2004.00891 (cross-list from math.PR) [pdf, ps, other]
Title: Kernel autocovariance operators of stationary processes: Estimation and convergence
Subjects: Probability (math.PR); Machine Learning (cs.LG); Functional Analysis (math.FA); Machine Learning (stat.ML)

We consider autocovariance operators of a stationary stochastic process on a Polish space that is embedded into a reproducing kernel Hilbert space. We investigate how empirical estimates of these operators converge along realizations of the process under various conditions. In particular, we examine ergodic and strongly mixing processes and prove several asymptotic results as well as finite sample error bounds with a detailed analysis for the Gaussian kernel. We provide applications of our theory in terms of consistency results for kernel PCA with dependent data and the conditional mean embedding of transition probabilities. Finally, we use our approach to examine the nonparametric estimation of Markov transition operators and highlight how our theory can give a consistency analysis for a large family of spectral analysis methods including kernel-based dynamic mode decomposition.

[165]  arXiv:2004.00910 (cross-list from eess.AS) [pdf, other]
Title: Improving auditory attention decoding performance of linear and non-linear methods using state-space model
Subjects: Audio and Speech Processing (eess.AS); Machine Learning (cs.LG); Sound (cs.SD); Signal Processing (eess.SP)

Identifying the target speaker in hearing aid applications is crucial to improve speech understanding. Recent advances in electroencephalography (EEG) have shown that it is possible to identify the target speaker from single-trial EEG recordings using auditory attention decoding (AAD) methods. AAD methods reconstruct the attended speech envelope from EEG recordings, based on a linear least-squares cost function or non-linear neural networks, and then directly compare the reconstructed envelope with the speech envelopes of speakers to identify the attended speaker using Pearson correlation coefficients. Since these correlation coefficients are highly fluctuating, for a reliable decoding a large correlation window is used, which causes a large processing delay. In this paper, we investigate a state-space model using correlation coefficients obtained with a small correlation window to improve the decoding performance of the linear and the non-linear AAD methods. The experimental results show that the state-space model significantly improves the decoding performance.

[166]  arXiv:2004.00930 (cross-list from nlin.AO) [pdf, ps, other]
Title: Neuronal Sequence Models for Bayesian Online Inference
Subjects: Adaptation and Self-Organizing Systems (nlin.AO); Machine Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)

Sequential neuronal activity underlies a wide range of processes in the brain. Neuroscientific evidence for neuronal sequences has been reported in domains as diverse as perception, motor control, speech, spatial navigation and memory. Consequently, different dynamical principles have been proposed as possible sequence-generating mechanisms. Combining experimental findings with computational concepts like the Bayesian brain hypothesis and predictive coding leads to the interesting possibility that predictive and inferential processes in the brain are grounded on generative processes which maintain a sequential structure. While probabilistic inference about ongoing sequences is a useful computational model for both the analysis of neuroscientific data and a wide range of problems in artificial recognition and motor control, research on the subject is relatively scarce and distributed over different fields in the neurosciences. Here we review key findings about neuronal sequences and relate these to the concept of online inference on sequences as a model of sensory-motor processing and recognition. We propose that describing sequential neuronal activity as an expression of probabilistic inference over sequences may lead to novel perspectives on brain function. Importantly, it is promising to translate the key idea of probabilistic inference on sequences to machine learning, in order to address challenges in the real-time recognition of speech and human motion.

[167]  arXiv:2004.00932 (cross-list from eess.AS) [pdf, other]
Title: iMetricGAN: Intelligibility Enhancement for Speech-in-Noise using Generative Adversarial Network-based Metric Learning
Comments: 5 pages, Submitted to INTERSPEECH 2020
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)

The intelligibility of natural speech is seriously degraded when exposed to adverse noisy environments. In this work, we propose a deep learning-based speech modification method to compensate for the intelligibility loss, with the constraint that the root mean square (RMS) level and duration of the speech signal are maintained before and after modifications. Specifically, we utilize an iMetricGAN approach to optimize the speech intelligibility metrics with generative adversarial networks (GANs). Experimental results show that the proposed iMetricGAN outperforms conventional state-of-the-art algorithms in terms of objective measures, i.e., speech intelligibility in bits (SIIB) and extended short-time objective intelligibility (ESTOI), under a Cafeteria noise condition. In addition, formal listening tests reveal significant intelligibility gains when both noise and reverberation exist.

[168]  arXiv:2004.00959 (cross-list from q-bio.PE) [pdf, other]
Title: Neural network based country wise risk prediction of COVID-19
Subjects: Populations and Evolution (q-bio.PE); Machine Learning (cs.LG)

The recent worldwide outbreak of the novel corona-virus (COVID-19) opened up new challenges to the research community. Artificial intelligence (AI) driven methods can be useful to predict the parameters, risks, and effects of such an epidemic. Such predictions can be helpful to control and prevent the spread of such diseases. The main challenges of applying AI is the small volume of data and the uncertain nature. Here, we propose a shallow Long short-term memory (LSTM) based neural network to predict the risk category of a country. We have used a Bayesian optimization framework to optimized and automatically design country-specific networks. We have combined the trend data and weather data together for the prediction. The results show that the proposed pipeline outperforms against state-of-the-art methods for 170 countries data and can be a useful tool for such risk categorization. The tool can be used to predict long-duration outbreak of such an epidemic such that we can take preventive steps earlier.

[169]  arXiv:2004.00960 (cross-list from eess.AS) [pdf, other]
Title: The RWTH ASR System for TED-LIUM Release 2: Improving Hybrid HMM with SpecAugment
Comments: accepted at ICASSP 2020
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)

We present a complete training pipeline to build a state-of-the-art hybrid HMM-based ASR system on the 2nd release of the TED-LIUM corpus. Data augmentation using SpecAugment is successfully applied to improve performance on top of our best SAT model using i-vectors. By investigating the effect of different maskings, we achieve improvements from SpecAugment on hybrid HMM models without increasing model size and training time. A subsequent sMBR training is applied to fine-tune the final acoustic model, and both LSTM and Transformer language models are trained and evaluated. Our best system achieves a 5.6% WER on the test set, which outperforms the previous state-of-the-art by 27% relative.

[170]  arXiv:2004.00967 (cross-list from eess.AS) [pdf, other]
Title: Full-Sum Decoding for Hybrid HMM based Speech Recognition using LSTM Language Model
Comments: accepted at ICASSP 2020
Subjects: Audio and Speech Processing (eess.AS); Sound (cs.SD)

In hybrid HMM based speech recognition, LSTM language models have been widely applied and achieved large improvements. The theoretical capability of modeling any unlimited context suggests that no recombination should be applied in decoding. This motivates to reconsider full summation over the HMM-state sequences instead of Viterbi approximation in decoding. We explore the potential gain from more accurate probabilities in terms of decision making and apply the full-sum decoding with a modified prefix-tree search framework. The proposed full-sum decoding is evaluated on both Switchboard and Librispeech corpora. Different models using CE and sMBR training criteria are used. Additionally, both MAP and confusion network decoding as approximated variants of general Bayes decision rule are evaluated. Consistent improvements over strong baselines are achieved in almost all cases without extra cost. We also discuss tuning effort, efficiency and some limitations of full-sum decoding.

[171]  arXiv:2004.00968 (cross-list from math.OC) [pdf, ps, other]
Title: Using gradient directions to get global convergence of Newton-type methods
Comments: 22 pages, 10 Figures
Subjects: Optimization and Control (math.OC); Numerical Analysis (math.NA)

The renewed interest in Steepest Descent (SD) methods following the work of Barzilai and Borwein [IMA Journal of Numerical Analysis, 8 (1988)] has driven us to consider a globalization strategy based on SD, which is applicable to any line-search method. In particular, we combine Newton-type directions with scaled SD steps to have suitable descent directions. Scaling the SD directions with a suitable step length makes a significant difference with respect to similar globalization approaches, in terms of both theoretical features and computational behavior. We apply our strategy to Newton's method and the BFGS method, with computational results that appear interesting compared with the results of well-established globalization strategies devised ad hoc for those methods.

[172]  arXiv:2004.00979 (cross-list from q-bio.BM) [pdf, other]
Title: Large-scale ligand-based virtual screening for SARS-CoV-2 inhibitors using deep neural networks
Subjects: Biomolecules (q-bio.BM); Machine Learning (cs.LG); Quantitative Methods (q-bio.QM); Machine Learning (stat.ML)

Due to the current severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) pandemic, there is an urgent need for novel therapies and drugs. We conducted a large-scale virtual screening for small molecules that are potential CoV-2 inhibitors. To this end, we utilized "ChemAI", a deep neural network trained on more than 220M data points across 3.6M molecules from three public drug-discovery databases. With ChemAI, we screened and ranked one billion molecules from the ZINC database for favourable effects against CoV-2. We then reduced the result to the 30,000 top-ranked compounds, which are readily accessible and purchasable via the ZINC database. We provide these top-ranked compounds as a library for further screening with bioassays at https://github.com/ml-jku/sars-cov-inhibitors-chemai.

[173]  arXiv:2004.00991 (cross-list from q-bio.GN) [pdf, other]
Title: Computational Performance of a Germline Variant Calling Pipeline for Next Generation Sequencing
Comments: 6 pages, 6 figures, 3 tables
Subjects: Genomics (q-bio.GN); Performance (cs.PF)

With the booming of next generation sequencing technology and its implementation in clinical practice and life science research, the need for faster and more efficient data analysis methods becomes pressing in the field of sequencing. Here we report on the evaluation of an optimized germline mutation calling pipeline, HummingBird, by assessing its performance against the widely accepted BWA-GATK pipeline. We found that the HummingBird pipeline can significantly reduce the running time of the primary data analysis for whole genome sequencing and whole exome sequencing while without significantly sacrificing the variant calling accuracy. Thus, we conclude that expansion of such software usage will help to improve the primary data analysis efficiency for next generation sequencing.

[174]  arXiv:2004.01004 (cross-list from eess.SP) [pdf, other]
Title: Energy-efficient Analog Sensing for Large-scale and High-density Persistent Wireless Monitoring
Comments: IEEE Internet of Things Journal, March 2020, pp. 1-9. arXiv admin note: text overlap with arXiv:1907.05205, arXiv:1907.00968
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)

The research challenge of current Wireless Sensor Networks (WSNs) is to design energy-efficient, low-cost, high-accuracy, self-healing, and scalable systems for applications such as environmental monitoring. Traditional WSNs consist of low density, power-hungry digital motes that are expensive and cannot remain functional for long periods on a single power charge. In order to address these challenges, a dumb-sensing and smart-processing architecture that splits sensing and computation capabilities is proposed. Sensing is exclusively the responsibility of analog substrate---consisting of low-power, low-cost all-analog sensors---that sits beneath the traditional WSN comprising of digital nodes, which does all the processing of the sensor data received from analog sensors. A low-power and low-cost solution for substrate sensors has been proposed using Analog Joint Source Channel Coding (AJSCC) realized via the characteristics of Metal Oxide Semiconductor Field Effect Transistor (MOSFET). Digital nodes (receiver) also estimate the source distribution at the analog sensors (transmitter) using machine learning techniques so as to find the optimal parameters of AJSCC that are communicated back to the analog sensors to adapt their sensing resolution as per the application needs. The proposed techniques have been validated via simulations from MATLAB and LTSpice to show promising performance and indeed prove that our framework can support large scale high density and persistent WSN deployment.

[175]  arXiv:2004.01028 (cross-list from q-bio.QM) [pdf]
Title: DeepSIBA: Chemical Structure-based Inference of Biological Alterations
Comments: Article: 19 pages, Electronic Supplementary Information (included): 16 pages
Subjects: Quantitative Methods (q-bio.QM); Machine Learning (cs.LG); Machine Learning (stat.ML)

Predicting whether a chemical structure shares a desired biological effect can have a significant impact for in-silico compound screening in early drug discovery. In this study, we developed a deep learning model where compound structures are represented as graphs and then linked to their biological footprint. To make this complex problem computationally tractable, compound differences were mapped to biological effect alterations using Siamese Graph Convolutional Neural Networks. The proposed model was able to learn new representations from chemical structures and identify structurally dissimilar compounds that affect similar biological processes with high precision. Additionally, by utilizing deep ensembles to estimate uncertainty, we were able to provide reliable and accurate predictions for chemical structures that are very different from the ones used during training. Finally, we present a novel inference approach, where the trained models are used to estimate the signaling pathways affected by a compound perturbation in a specific cell line, using only its chemical structure as input. As a use case, this approach was used to infer signaling pathways affected by FDA-approved anticancer drugs.

[176]  arXiv:2004.01029 (cross-list from eess.IV) [pdf]
Title: Introducing Anisotropic Minkowski Functionals for Local Structure Analysis and Prediction of Biomechanical Strength of Proximal Femur Specimens
Authors: Titas De
Journal-ref: Master's Thesis - 2013
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)

Bone fragility and fracture caused by osteoporosis or injury are prevalent in adults over the age of 50 and can reduce their quality of life. Hence, predicting the biomechanical bone strength, specifically of the proximal femur, through non-invasive imaging-based methods is an important goal for the diagnosis of Osteoporosis as well as estimating fracture risk. Dual X-ray absorptiometry (DXA) has been used as a standard clinical procedure for assessment and diagnosis of bone strength and osteoporosis through bone mineral density (BMD) measurements. However, previous studies have shown that quantitative computer tomography (QCT) can be more sensitive and specific to trabecular bone characterization because it reduces the overlap effects and interferences from the surrounding soft tissue and cortical shell.
This study proposes a new method to predict the bone strength of proximal femur specimens from quantitative multi-detector computer tomography (MDCT) images. Texture analysis methods such as conventional statistical moments (BMD mean), Isotropic Minkowski Functionals (IMF) and Anisotropic Minkowski Functionals (AMF) are used to quantify BMD properties of the trabecular bone micro-architecture. Combinations of these extracted features are then used to predict the biomechanical strength of the femur specimens using sophisticated machine learning techniques such as multiregression (MultiReg) and support vector regression with linear kernel (SVRlin). The prediction performance achieved with these feature sets is compared to the standard approach that uses the mean BMD of the specimens and multiregression models using root mean square error (RMSE).

[177]  arXiv:2004.01054 (cross-list from math.OC) [pdf, ps, other]
Title: Distributed Robust Control Synthesis for Safety and Fixed-Time Stability in Multi-Agent Systems
Comments: 8 pages, 5 figures, Submitted to IEEE CDC 2020, under review
Subjects: Optimization and Control (math.OC); Systems and Control (eess.SY)

This paper presents a control synthesis approach for multi-agent systems modeled as a general class of nonlinear, control-affine dynamics under spatiotemporal constraints. We consider the problem of designing distributed controllers such that each agent reaches their respective goal set within a given fixed time, while always remaining in their respective safe set, which also encodes the maintenance of a safe distance from other agents. We assume that each agent can measure the states of any neighbor agent in their limited sensing radius with some bounded error. In the presence of this uncertainty, we use robust CBFs to encode inter-agent safety, while temporal specifications are encoded via Fixed-Time CLFs. We formulate a QP for each agent to compute its control input that fulfills the spatiotemporal specifications, and discuss the feasibility of the QP in the presence of control input constraints.

[178]  arXiv:2004.01061 (cross-list from quant-ph) [html]
Title: Proceedings 9th International Conference on Quantum Simulation and Quantum Walks
Authors: Giuseppe Di Molfetta (Aix-Marseille University), Vivien Kendon (Durham University), Yutaka Shikano (Keio University & Chapman University)
Journal-ref: EPTCS 315, 2020
Subjects: Quantum Physics (quant-ph); Formal Languages and Automata Theory (cs.FL); Cellular Automata and Lattice Gases (nlin.CG)

This volume contains a selection of papers presented at the 9th in a series of international conferences on Quantum Simulation and Quantum Walks (QSQW). During this event, we worked on the development of theories based upon quantum walks and quantum simulation models, in order to solve interrelated problems concerning the simulation of standard quantum field theory, quantum gravity and cosmological models, dissipative quantum computing, searching on complex quantum networks, and the topological classification of multi-particle quantum walks.

[179]  arXiv:2004.01081 (cross-list from eess.SP) [pdf, other]
Title: Optical Characterization of Ultra-Low latency Visible Light Communication System for Intelligent Transportation Systems
Comments: 16 pages, 9 figures
Subjects: Signal Processing (eess.SP); Systems and Control (eess.SY); Optics (physics.optics)

This paper reports a detailed experimental characterization of optical performances of Visible Light Communication (VLC) system using a real traffic light for ultra-low latency, infrastructure-to-vehicle (I2V) communications for intelligent transportation systems (ITS) protocols. Despite the implementation of long sought ITS protocols poses the crucial need to detail how the features of optical stages influence the overall performances of a VLC system in realistic configurations, such characterization has rarely been addressed at present. We carried out an experimental investigation in a realistic configuration where a regular traffic light (TX), enabled for VLC transmission, sends digital information towards a receiving stage (RX), composed by an optical condenser and a dedicated amplified photodiode stage. We performed a detailed measurements campaign of VLC performances encompassing a broad set of optical condensers, and for TX-RX distances in the range 3 - 50 m, in terms of both effective field of view (EFOV) and packet error rate (PER). The results show several nontrivial behaviors for different lens sets as a function of position on the measurement grid, highlighting critical aspects as well as identifying most suitable optical configurations depending on the specific application and on the required EFOV. In this paper we also provide a theoretical model for both the signal intensity and the EFOV as a function of several parameters, such as distance, RX orientation and focal length of the specific condenser. Our results could be very relevant in the near future to assess a most suited solution in terms of acceptance angle when designing a VLC system for real applications, where angle-dependent misalignment effects play a non-negligible role, and we argue that it could have more general implications with respect to the pristine I2V case mentioned here.

[180]  arXiv:2004.01143 (cross-list from stat.ML) [pdf, other]
Title: Randomized Kernel Multi-view Discriminant Analysis
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)

In many artificial intelligence and computer vision systems, the same object can be observed at distinct viewpoints or by diverse sensors, which raises the challenges for recognizing objects from different, even heterogeneous views. Multi-view discriminant analysis (MvDA) is an effective multi-view subspace learning method, which finds a discriminant common subspace by jointly learning multiple view-specific linear projections for object recognition from multiple views, in a non-pairwise way. In this paper, we propose the kernel version of multi-view discriminant analysis, called kernel multi-view discriminant analysis (KMvDA). To overcome the well-known computational bottleneck of kernel methods, we also study the performance of using random Fourier features (RFF) to approximate Gaussian kernels in KMvDA, for large scale learning. Theoretical analysis on stability of this approximation is developed. We also conduct experiments on several popular multi-view datasets to illustrate the effectiveness of our proposed strategy.

[181]  arXiv:2004.01148 (cross-list from physics.flu-dyn) [pdf, other]
Title: Trapped solitary-wave interaction for Euler equations with low pressure region
Subjects: Fluid Dynamics (physics.flu-dyn); Numerical Analysis (math.NA)

Trapped solitary-wave interaction is studied under the full Euler equations in the presence of a variable pressure distribution along the free surace. The physical domain is flattened conformally onto a strip and the computations are performed in the canonical domain. Computer simulations display solitary waves that remain trapped in a low pressure region. In terms of confinement we observe that these waves are stable for small perturbations of either their amplitudes or the pressure forcing term. Furthermore multiple solitary waves are considered within the low pressure region without escaping the low pressure region. We identify regimes in which multiple solitary waves remain trapped after several collisions. In particular we display a regime where three solitary waves are trapped and collide several times, before one escapes at a time. The remaining solitary waves stays trapped in the low pressure region.

[182]  arXiv:2004.01149 (cross-list from math.PR) [pdf, other]
Title: Stopping explosion by penalising transmission to hubs in scale-free spatial random graphs
Subjects: Probability (math.PR); Social and Information Networks (cs.SI); Combinatorics (math.CO); Populations and Evolution (q-bio.PE)

We study the spread of information in finite and infinite inhomogeneous spatial random graphs. We assume that each edge has a transmission cost that is a product of an i.i.d. random variable L and a penalty factor: edges between vertices of expected degrees w_1 and w_2 are penalised by a factor of (w_1w_2)^\mu for all \mu >0. We study this process for scale-free percolation, for (finite and infinite) Geometric Inhomogeneous Random Graphs, and for Hyperbolic Random Graphs, all with power law degree distributions with exponent \tau > 1. For \tau < 3, we find a threshold behaviour, depending on how fast the cumulative distribution function of L decays at zero. If it decays at most polynomially with exponent smaller than (3-\tau)/(2\mu) then explosion happens, i.e., with positive probability we can reach infinitely many vertices with finite cost (for the infinite models), or reach a linear fraction of all vertices with bounded costs (for the finite models). On the other hand, if the cdf of L decays at zero at least polynomially with exponent larger than (3-\tau)/(2\mu), then no explosion happens. This behaviour is arguably a better representation of information spreading processes in social networks than the case without penalising factor, in which explosion always happens unless the cdf of L is doubly exponentially flat around zero. Finally, we extend the results to other penalty functions, including arbitrary polynomials in w_1 and w_2. In some cases the interesting phenomenon occurs that the model changes behaviour (from explosive to conservative and vice versa) when we reverse the role of w_1 and w_2. Intuitively, this could corresponds to reversing the flow of information: gathering information might take much longer than sending it out.

[183]  arXiv:2004.01157 (cross-list from stat.ML) [pdf, ps, other]
Title: Identification Methods With Arbitrary Interventional Distributions as Inputs
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)

Causal inference quantifies cause-effect relationships by estimating counterfactual parameters from data. This entails using \emph{identification theory} to establish a link between counterfactual parameters of interest and distributions from which data is available. A line of work characterized non-parametric identification for a wide variety of causal parameters in terms of the \emph{observed data distribution}. More recently, identification results have been extended to settings where experimental data from interventional distributions is also available. In this paper, we use Single World Intervention Graphs and a nested factorization of models associated with mixed graphs to give a very simple view of existing identification theory for experimental data. We use this view to yield general identification algorithms for settings where the input distributions consist of an arbitrary set of observational and experimental distributions, including marginal and conditional distributions. We show that for problems where inputs are interventional marginal distributions of a certain type (ancestral marginals), our algorithm is complete.

[184]  arXiv:2004.01163 (cross-list from math.CO) [pdf, other]
Title: A Spectral Approach to the Shortest Path Problem
Subjects: Combinatorics (math.CO); Computational Geometry (cs.CG); Discrete Mathematics (cs.DM); Spectral Theory (math.SP)

Let $G=(V,E)$ be a simple, connected graph. One is often interested in a short path between two vertices $u,v$. We propose a spectral algorithm: construct the function $\phi:V \rightarrow \mathbb{R}_{\geq 0}$ $$ \phi = \arg\min_{f:V \rightarrow \mathbb{R} \atop f(u) = 0, f \not\equiv 0} \frac{\sum_{(w_1, w_2) \in E}{(f(w_1)-f(w_2))^2}}{\sum_{w \in V}{f(w)^2}}.$$ $\phi$ can also be understood as the smallest eigenvector of the Laplacian Matrix $L=D-A$ after the $u-$th row and column have been removed. We start in the point $v$ and construct a path from $v$ to $u$: at each step, we move to the neighbor for which $\phi$ is the smallest. This algorithm provably terminates and results in a short path from $v$ to $u$, often the shortest. The efficiency of this method is due to a discrete analogue of a phenomenon in Partial Differential Equations that is not well understood. We prove optimality for trees and discuss a number of open questions.

[185]  arXiv:2004.01179 (cross-list from eess.IV) [pdf, other]
Title: Single-Image HDR Reconstruction by Learning to Reverse the Camera Pipeline
Comments: CVPR 2020. Project page: this https URL Code: this https URL
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)

Recovering a high dynamic range (HDR) image from a single low dynamic range (LDR) input image is challenging due to missing details in under-/over-exposed regions caused by quantization and saturation of camera sensors. In contrast to existing learning-based methods, our core idea is to incorporate the domain knowledge of the LDR image formation pipeline into our model. We model the HDRto-LDR image formation pipeline as the (1) dynamic range clipping, (2) non-linear mapping from a camera response function, and (3) quantization. We then propose to learn three specialized CNNs to reverse these steps. By decomposing the problem into specific sub-tasks, we impose effective physical constraints to facilitate the training of individual sub-networks. Finally, we jointly fine-tune the entire model end-to-end to reduce error accumulation. With extensive quantitative and qualitative experiments on diverse image datasets, we demonstrate that the proposed method performs favorably against state-of-the-art single-image HDR reconstruction algorithms.

Replacements for Fri, 3 Apr 20

[186]  arXiv:1707.01458 (replaced) [pdf, ps, other]
Title: The vortex method for 2D ideal flows in exterior domains
Subjects: Analysis of PDEs (math.AP); Mathematical Physics (math-ph); Numerical Analysis (math.NA)
[187]  arXiv:1801.04819 (replaced) [pdf]
Title: Robots as Powerful Allies for the Study of Embodied Cognition from the Bottom Up
Comments: 22 pages, 3 figures
Journal-ref: in A. Newen, L. de Bruin; & S. Gallagher, ed., 'The Oxford Handbook 4e Cognition', Oxford University Press, pp. 841-862 (2018)
Subjects: Artificial Intelligence (cs.AI); Robotics (cs.RO); Neurons and Cognition (q-bio.NC)
[188]  arXiv:1808.01278 (replaced) [pdf, ps, other]
Title: Coordinate Methods for Accelerating $\ell_\infty$ Regression and Faster Approximate Maximum Flow
Comments: A preliminary version appeared in FOCS 2018, with an error in the accelerated coordinate descent proof. Originally we claimed $m + \sqrt{ns}/\epsilon$ for our approximate maximum flow runtime; this version obtains $m + (n + \sqrt{ns})/\epsilon$. The $\ell_\infty$ regression results have been substantially improved, with dependence $c$ on column sparsity (formerly $c^{2.5}$)
Subjects: Data Structures and Algorithms (cs.DS); Optimization and Control (math.OC)
[189]  arXiv:1808.03114 (replaced) [pdf, other]
Title: Classifier-Guided Visual Correction of Noisy Labels for Image Classification Tasks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Human-Computer Interaction (cs.HC); Machine Learning (cs.LG)
[190]  arXiv:1810.12959 (replaced) [pdf]
Title: SDFN: Segmentation-based Deep Fusion Network for Thoracic Disease Classification in Chest X-ray Images
Comments: 10 pages, 9 figures
Journal-ref: Comput Med Imaging Graph, 2019
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[191]  arXiv:1811.04587 (replaced) [pdf, ps, other]
Title: Analysis of multivariate Gegenbauer approximation in the hypercube
Comments: Adv. Comput. Math., to appear
Subjects: Numerical Analysis (math.NA)
[192]  arXiv:1811.08982 (replaced) [pdf, other]
Title: Polarity Loss for Zero-shot Object Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[193]  arXiv:1812.00835 (replaced) [pdf, other]
Title: Sobolev gradient flow for the Gross-Pitaevskii eigenvalue problem: global convergence and computational efficiency
Subjects: Numerical Analysis (math.NA)
[194]  arXiv:1812.01967 (replaced) [pdf, other]
Title: Unsupervised Feature Learning Architecture with Multi-clustering Integration RBM
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[195]  arXiv:1901.03571 (replaced) [pdf, ps, other]
Title: Life is Random, Time is Not: Markov Decision Processes with Window Objectives
Comments: Full version of CONCUR'19 paper, accepted in LMCS
Subjects: Logic in Computer Science (cs.LO); Artificial Intelligence (cs.AI); Formal Languages and Automata Theory (cs.FL); Computer Science and Game Theory (cs.GT); Probability (math.PR)
[196]  arXiv:1902.08753 (replaced) [pdf, other]
Title: Quantum Learning Boolean Linear Functions w.r.t. Product Distributions
Authors: Matthias C. Caro
Comments: 27 pages main text, 12 pages Appendix; 2 figures; improved and extended presentation containing a strengthened quantum sample complexity lower bound; accepted for publication in Quantum Information Processing
Subjects: Quantum Physics (quant-ph); Machine Learning (cs.LG)
[197]  arXiv:1903.03232 (replaced) [pdf, other]
Title: SeizureNet: Multi-Spectral Deep Feature Learning for Seizure Type Classification
Subjects: Machine Learning (cs.LG); Neurons and Cognition (q-bio.NC); Machine Learning (stat.ML)
[198]  arXiv:1903.03349 (replaced) [pdf]
Title: Computer aided detection of tuberculosis on chest radiographs: An evaluation of the CAD4TB v6 system
Comments: Published in Scientific Reports
Journal-ref: Scientific Reports 10, 5492 (2020)
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
[199]  arXiv:1903.10438 (replaced) [pdf, ps, other]
Title: Second- and Third-Order Asymptotics of the Continuous-Time Poisson Channel
Comments: 26 pages, to appear in the IEEE Transactions on Information Theory, vol. 66, 2020
Subjects: Information Theory (cs.IT)
[200]  arXiv:1904.01352 (replaced) [pdf, other]
Title: Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier
Comments: To be published in Computer Networks at this https URL
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[201]  arXiv:1904.01381 (replaced) [pdf, ps, other]
Title: The minimal probabilistic and quantum finite automata recognizing uncountably many languages with fixed cutpoints
Comments: 11 pages, minor revisions
Subjects: Formal Languages and Automata Theory (cs.FL); Computational Complexity (cs.CC); Quantum Physics (quant-ph)
[202]  arXiv:1904.08128 (replaced) [pdf, other]
Title: Automated Design of Deep Learning Methods for Biomedical Image Segmentation
Comments: * Fabian Isensee and Paul F. J\"ager share the first authorship
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[203]  arXiv:1905.08572 (replaced) [pdf, ps, other]
Title: Guaranteed a posteriori error bounds for low rank tensor approximate solutions
Subjects: Numerical Analysis (math.NA)
[204]  arXiv:1905.11577 (replaced) [pdf, other]
Title: Towards Interpretable Sparse Graph Representation Learning with Laplacian Pooling
Comments: 11 pages, with Appendices
Subjects: Machine Learning (cs.LG); Biomolecules (q-bio.BM); Machine Learning (stat.ML)
[205]  arXiv:1906.00250 (replaced) [pdf, other]
Title: Metric Learning for Individual Fairness
Subjects: Machine Learning (cs.LG); Computers and Society (cs.CY); Machine Learning (stat.ML)
[206]  arXiv:1906.05173 (replaced) [pdf, other]
Title: UCRDNet: Unsupervised Collaborative Representation Deep Network for Clustering
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[207]  arXiv:1906.06166 (replaced) [pdf, other]
Title: Online Active Learning of Reject Option Classifiers
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[208]  arXiv:1906.11586 (replaced) [pdf, other]
Title: CaDIS: Cataract Dataset for Image Segmentation
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[209]  arXiv:1907.05799 (replaced) [pdf, ps, other]
Title: A convergent discretisation method for transition path theory for diffusion processes
Comments: 25 pages, 4 figures; minor change in wording, title modification
Subjects: Numerical Analysis (math.NA)
[210]  arXiv:1907.07055 (replaced) [pdf, other]
Title: Homophily as a Process Generating Social Networks: Insights from Social Distance Attachment Model
Comments: 22 pages; 11 figures. Published version. Introduction, theory and discussion differ somewhat from the earlier preprint versions
Journal-ref: Journal of Artificial Societies and Social Simulation, 23(2) 6, 2020
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[211]  arXiv:1907.07263 (replaced) [pdf, ps, other]
Title: Caching as an Image Characterization Problem using Deep Convolutional Neural Networks
Comments: 7 pages, 5 figures
Subjects: Networking and Internet Architecture (cs.NI); Machine Learning (cs.LG); Social and Information Networks (cs.SI)
[212]  arXiv:1907.12188 (replaced) [src]
Title: Hand-Gesture-Recognition Based Text Input Method for AR/VR Wearable Devices
Comments: Information is not correct need to rewrite
Subjects: Human-Computer Interaction (cs.HC)
[213]  arXiv:1908.00943 (replaced) [pdf, other]
Title: Prediction and Description of Near-Future Activities in Video
Comments: 14 pages, 4 figures, 14 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[214]  arXiv:1908.05944 (replaced) [pdf, other]
Title: Parallel Computation of Alpha Complex for Biomolecules
Subjects: Computational Geometry (cs.CG); Distributed, Parallel, and Cluster Computing (cs.DC)
[215]  arXiv:1908.06022 (replaced) [pdf, other]
Title: SCARLET-NAS: Bridging the gap between Stability and Scalability in Weight-sharing Neural Architecture Search
Comments: Make one shot nas scalable
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[216]  arXiv:1908.06069 (replaced) [pdf, other]
Title: A Survey on Computational Politics
Subjects: Social and Information Networks (cs.SI); Computers and Society (cs.CY)
[217]  arXiv:1908.10725 (replaced) [pdf, other]
Title: VJAGG -- A Thick-Client Smart-Phone Journey Detection Algorithm
Subjects: Information Retrieval (cs.IR); Computers and Society (cs.CY)
[218]  arXiv:1908.11271 (replaced) [pdf, other]
Title: Cubic bent functions outside the completed Maiorana-McFarland class
Subjects: Combinatorics (math.CO); Information Theory (cs.IT)
[219]  arXiv:1909.00464 (replaced) [pdf]
Title: Lost or found? Discovering data needed for research
Subjects: Digital Libraries (cs.DL); Computers and Society (cs.CY)
[220]  arXiv:1909.03360 (replaced) [pdf, other]
Title: Episode-based Prototype Generating Network for Zero-Shot Learning
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[221]  arXiv:1909.08097 (replaced) [pdf, other]
Title: Ensemble Knowledge Distillation for Learning Improved and Efficient Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[222]  arXiv:1909.12581 (replaced) [pdf, other]
Title: An integral equation method for closely interacting surfactant-covered droplets in wall-confined Stokes flow
Subjects: Numerical Analysis (math.NA); Computational Physics (physics.comp-ph)
[223]  arXiv:1909.12780 (replaced) [pdf, other]
Title: Learning to Have an Ear for Face Super-Resolution
Subjects: Computer Vision and Pattern Recognition (cs.CV); Audio and Speech Processing (eess.AS); Image and Video Processing (eess.IV)
[224]  arXiv:1910.00324 (replaced) [pdf, other]
Title: Graph convolutional networks for learning with few clean and many noisy labels
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[225]  arXiv:1910.07067 (replaced) [pdf, other]
Title: On adversarial patches: real-world attack on ArcFace-100 face recognition system
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[226]  arXiv:1910.09017 (replaced) [pdf, other]
Title: Demystifying Graph Databases: Analysis and Taxonomy of Data Organization, System Designs, and Graph Queries
Subjects: Databases (cs.DB); Distributed, Parallel, and Cluster Computing (cs.DC)
[227]  arXiv:1910.09630 (replaced) [pdf, other]
Title: Blind interactive learning of modulation schemes: Multi-agent cooperation without co-design
Comments: 33 pages, 25 figures, code can be found at this https URL, accepted for publication in IEEE Access
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT)
[228]  arXiv:1910.10271 (replaced) [pdf, other]
Title: Restless Hidden Markov Bandits with Linear Rewards
Subjects: Machine Learning (cs.LG); Signal Processing (eess.SP); Machine Learning (stat.ML)
[229]  arXiv:1910.10793 (replaced) [pdf, other]
Title: We Know Where We Don't Know: 3D Bayesian CNNs for Credible Geometric Uncertainty
Comments: Preprint
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[230]  arXiv:1910.10824 (replaced) [pdf, other]
Title: An Inverse Dynamics Approach to Control Lyapunov Functions
Comments: Accepted to the American Control Conference, 2020
Subjects: Robotics (cs.RO)
[231]  arXiv:1911.00175 (replaced) [pdf, other]
Title: Hybrid Differential Dynamic Programming for Planar Manipulation Primitives
Subjects: Robotics (cs.RO)
[232]  arXiv:1911.01429 (replaced) [pdf, other]
Title: The frontier of simulation-based inference
Comments: 10 pages, 3 figures, proceedings for the Sackler Colloquia at the US National Academy of Sciences. v2: fixed typos. v3: clarified text, added references
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG); Methodology (stat.ME)
[233]  arXiv:1911.06188 (replaced) [pdf, other]
Title: SiamFC++: Towards Robust and Accurate Visual Tracking with Target Estimation Guidelines
Comments: Accepted by AAAI 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[234]  arXiv:1911.08731 (replaced) [pdf, other]
Title: Distributionally Robust Neural Networks for Group Shifts: On the Importance of Regularization for Worst-Case Generalization
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[235]  arXiv:1911.09565 (replaced) [pdf, other]
Title: A Continuous Teleoperation Subspace with Empirical and Algorithmic Mapping Algorithms for Non-Anthropomorphic Hands
Comments: 15 pages, 6 tables, 8 figures, under review IEEE T-ASE
Subjects: Robotics (cs.RO)
[236]  arXiv:1911.10298 (replaced) [pdf, other]
Title: CoverNet: Multimodal Behavior Prediction using Trajectory Sets
Subjects: Machine Learning (cs.LG); Robotics (cs.RO); Machine Learning (stat.ML)
[237]  arXiv:1911.10949 (replaced) [pdf, other]
Title: PQ-NET: A Generative Part Seq2Seq Network for 3D Shapes
Comments: Accepted to CVPR 2020. Code available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV); Graphics (cs.GR); Machine Learning (cs.LG)
[238]  arXiv:1911.11288 (replaced) [pdf, other]
Title: Autolabeling 3D Objects with Differentiable Rendering of SDF Shape Priors
Comments: CVPR 2020 (Oral). 8 pages + supplementary material. The first two authors contributed equally to this work
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[239]  arXiv:1911.11834 (replaced) [pdf, other]
Title: Towards Fairness in Visual Recognition: Effective Strategies for Bias Mitigation
Comments: To appear in CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[240]  arXiv:1911.12207 (replaced) [pdf, other]
Title: Orthogonal Convolutional Neural Networks
Comments: To appear in CVPR 2020, project page this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[241]  arXiv:1911.12836 (replaced) [pdf, other]
Title: Siam R-CNN: Visual Tracking by Re-Detection
Comments: CVPR 2020 camera-ready version
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[242]  arXiv:1912.00195 (replaced) [pdf, other]
Title: SGAS: Sequential Greedy Architecture Search
Comments: Accepted at CVPR'2020. Project website: this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[243]  arXiv:1912.02783 (replaced) [pdf, other]
Title: Self-Supervised Learning of Video-Induced Visual Invariances
Comments: CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[244]  arXiv:1912.05270 (replaced) [pdf, other]
Title: MineGAN: effective knowledge transfer from GANs to target domains with few images
Comments: CVPR2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[245]  arXiv:1912.07791 (replaced) [pdf, other]
Title: Quaternion Product Units for Deep Learning on 3D Rotation Groups
Comments: CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[246]  arXiv:1912.08035 (replaced) [pdf, other]
Title: Towards Generalization Across Depth for Monocular 3D Object Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[247]  arXiv:1912.09916 (replaced) [pdf, other]
Title: Fast hybrid numerical-asymptotic boundary element methods for high frequency screen and aperture problems based on least-squares collocation
Subjects: Numerical Analysis (math.NA)
[248]  arXiv:2001.01599 (replaced) [pdf, other]
Title: Multi-scale Domain-adversarial Multiple-instance CNN for Cancer Subtype Classification with Unannotated Histopathological Images
Comments: Accepted to CVPR2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[249]  arXiv:2001.06863 (replaced) [pdf, ps, other]
Title: Infinitary Action Logic with Exponentiation
Comments: Submitted to a journal
Subjects: Logic in Computer Science (cs.LO); Logic (math.LO)
[250]  arXiv:2001.07098 (replaced) [pdf, other]
Title: Audio Summarization with Audio Features and Probability Distribution Divergence
Comments: 20th International Conference on Computational Linguistics and Intelligent Text Processing
Subjects: Computation and Language (cs.CL); Information Retrieval (cs.IR)
[251]  arXiv:2001.07205 (replaced) [pdf, other]
Title: A graph-based spatial temporal logic for knowledge representation and automated reasoning in cognitive robots
Subjects: Logic in Computer Science (cs.LO); Formal Languages and Automata Theory (cs.FL)
[252]  arXiv:2001.08826 (replaced) [pdf, other]
Title: An $O(s^r)$-Resolution ODE Framework for Discrete-Time Optimization Algorithms and Applications to the Linear Convergence of Saddle-Point Problems
Authors: Haihao Lu
Subjects: Optimization and Control (math.OC); Machine Learning (cs.LG)
[253]  arXiv:2002.01065 (replaced) [pdf, other]
Title: Fake News Detection by means of Uncertainty Weighted Causal Graphs
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[254]  arXiv:2002.02797 (replaced) [pdf, other]
Title: Variational Depth Search in ResNets
Comments: Appearing at the 1st ICLR workshop on Neural Architecture Search 2020
Subjects: Machine Learning (stat.ML); Machine Learning (cs.LG)
[255]  arXiv:2002.06673 (replaced) [pdf, other]
Title: Performative Prediction
Comments: 32 pages, 4 figures
Subjects: Machine Learning (cs.LG); Computer Science and Game Theory (cs.GT); Machine Learning (stat.ML)
[256]  arXiv:2003.00903 (replaced) [pdf, other]
Title: Atomic Crosschain Transactions White Paper
Comments: 8 pages, 8 figures, 3 code listings. arXiv admin note: substantial text overlap with arXiv:1911.08083
Subjects: Cryptography and Security (cs.CR)
[257]  arXiv:2003.01801 (replaced) [pdf, other]
Title: $\text{A}^3$: Activation Anomaly Analysis
Comments: The first two authors contributed equally to this work
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
[258]  arXiv:2003.01966 (replaced) [pdf, other]
Title: Learning for Video Compression with Hierarchical Quality and Recurrent Enhancement
Comments: Published in CVPR 2020
Subjects: Image and Video Processing (eess.IV); Computer Vision and Pattern Recognition (cs.CV)
[259]  arXiv:2003.02739 (replaced) [pdf, other]
Title: Zero-Shot Cross-Lingual Transfer with Meta Learning
Subjects: Computation and Language (cs.CL)
[260]  arXiv:2003.04919 (replaced) [pdf, other]
Title: Integrating Physics-Based Modeling with Machine Learning: A Survey
Comments: 11 pages, 4 figures, submitted to IJCAI
Subjects: Computational Physics (physics.comp-ph); Machine Learning (cs.LG); Machine Learning (stat.ML)
[261]  arXiv:2003.06142 (replaced) [src]
Title: s-Vector Control of Battery Energy Storage System: Definition and Application
Authors: Zhao Yuan
Comments: not approved by supervisor
Subjects: Systems and Control (eess.SY)
[262]  arXiv:2003.08165 (replaced) [pdf, other]
Title: Neuroevolution of Self-Interpretable Agents
Comments: To appear at the Genetic and Evolutionary Computation Conference (GECCO 2020) as a full paper
Subjects: Neural and Evolutionary Computing (cs.NE); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG)
[263]  arXiv:2003.08177 (replaced) [pdf, other]
Title: High-Order Information Matters: Learning Relation and Topology for Occluded Person Re-Identification
Comments: accepted by CVPR'20
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[264]  arXiv:2003.10218 (replaced) [pdf, ps, other]
Title: Modelling transmission and control of the COVID-19 pandemic in Australia
Comments: 27 pages, 13 figures, version 2 includes new Appendix F
Subjects: Populations and Evolution (q-bio.PE); Multiagent Systems (cs.MA); Quantitative Methods (q-bio.QM)
[265]  arXiv:2003.10898 (replaced) [pdf, other]
Title: RN-VID: A Feature Fusion Architecture for Video Object Detection
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[266]  arXiv:2003.11631 (replaced) [pdf, ps, other]
Title: Choice functions based on sets of strict partial orders: an axiomatic characterisation
Authors: Jasper De Bock
Subjects: Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)
[267]  arXiv:2003.12139 (replaced) [pdf, other]
Title: Integrating Crowdsourcing and Active Learning for Classification of Work-Life Events from Tweets
Subjects: Computation and Language (cs.CL); Machine Learning (cs.LG); Social and Information Networks (cs.SI); Machine Learning (stat.ML)
[268]  arXiv:2003.12206 (replaced) [pdf, other]
Title: Improving Reproducibility in Machine Learning Research (A Report from the NeurIPS 2019 Reproducibility Program)
Subjects: Machine Learning (cs.LG); Machine Learning (stat.ML)
[269]  arXiv:2003.12308 (replaced) [pdf, other]
Title: On design-theoretic aspects of Boolean and vectorial bent functions
Subjects: Information Theory (cs.IT); Combinatorics (math.CO)
[270]  arXiv:2003.12523 (replaced) [pdf, other]
Title: On the utilization of Macroscopic Information for String Stability of a Vehicular Platoon
Subjects: Systems and Control (eess.SY)
[271]  arXiv:2003.12697 (replaced) [pdf, other]
Title: Semantically Multi-modal Image Synthesis
Comments: To appear in CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[272]  arXiv:2003.12824 (replaced) [pdf, other]
Title: Gradient-based Data Augmentation for Semi-Supervised Learning
Authors: Hiroshi Kaizuka
Comments: The lower bound of the inequality (line 2 on page 6 ) changed to fit fact 1 (2). Typos in (9) corrected
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
[273]  arXiv:2003.13526 (replaced) [pdf, other]
Title: Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations
Subjects: Cryptography and Security (cs.CR)
[274]  arXiv:2003.13629 (replaced) [pdf, ps, other]
Title: Building a Shared Resource HPC Center Across University Schools and Institutes: A Case Study
Comments: 5 pages, 2 tables. Submitted to SC16 and XSEDE16
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computers and Society (cs.CY)
[275]  arXiv:2003.13657 (replaced) [pdf, other]
Title: Analysing the Extent of Misinformation in Cancer Related Tweets
Comments: Proceedings of the 14th International Conference on Web and Social Media (ICWSM-20)
Subjects: Social and Information Networks (cs.SI); Computation and Language (cs.CL)
[276]  arXiv:2003.13793 (replaced) [pdf, other]
Title: A feedback linearisation algorithm for single-track models with structural stability properties
Subjects: Systems and Control (eess.SY)
[277]  arXiv:2003.13853 (replaced) [pdf, other]
Title: Semi-supervised Learning for Few-shot Image-to-Image Translation
Comments: CVPR2020
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[278]  arXiv:2003.13923 (replaced) [pdf, ps, other]
Title: High-order numerical methods for the Riesz space fractional advection-dispersion equations
Comments: 14 pages, 4 figures. This article has been withdrawn from Computers and Mathematics with Applications due to the reason of the guest editor
Subjects: Numerical Analysis (math.NA)
[279]  arXiv:2003.14240 (replaced) [pdf, other]
Title: Data-driven Stabilization of SISO Feedback Linearizable Systems
Comments: 30 pages, 4 figures. This paper is an extension of the work presented in arXiv:1909.01959. arXiv admin note: text overlap with arXiv:1909.01959
Subjects: Systems and Control (eess.SY)
[280]  arXiv:2003.14342 (replaced) [pdf, other]
Title: Fusible numbers and Peano Arithmetic
Comments: Minor fixes. 23 pages, 5 figures, 3 tables
Subjects: Logic in Computer Science (cs.LO); Combinatorics (math.CO); Logic (math.LO)
[281]  arXiv:2004.00033 (replaced) [pdf, ps, other]
Title: Give your Text Representation Models some Love: the Case for Basque
Comments: Accepted at LREC 2020; 8 pages, 7 tables
Subjects: Computation and Language (cs.CL)
[282]  arXiv:2004.00130 (replaced) [pdf, other]
Title: A+ Indexes: Lightweight and Highly Flexible Adjacency Lists for Graph Database Management Systems
Subjects: Databases (cs.DB)
[283]  arXiv:2004.00199 (replaced) [pdf, other]
Title: GitHub Repositories with Links to Academic Papers: Open Access, Traceability, and Evolution
Comments: 23 pages
Subjects: Software Engineering (cs.SE); Digital Libraries (cs.DL)
[284]  arXiv:2004.00424 (replaced) [pdf, ps, other]
Title: Solving the inverse problem for an ordinary differential equation using conjugation
Subjects: Optimization and Control (math.OC); Dynamical Systems (math.DS); Numerical Analysis (math.NA); Chaotic Dynamics (nlin.CD)
[285]  arXiv:2004.00518 (replaced) [pdf, other]
Title: Scheduling Parallel-Task Jobs Subject to Packing and Placement Constraints
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS); Performance (cs.PF)
[286]  arXiv:2004.00543 (replaced) [pdf, other]
Title: Physically Realizable Adversarial Examples for LiDAR Object Detection
Comments: Accepted to CVPR 2020
Subjects: Computer Vision and Pattern Recognition (cs.CV); Cryptography and Security (cs.CR); Machine Learning (cs.LG); Robotics (cs.RO)
[287]  arXiv:2004.00553 (replaced) [pdf, other]
Title: Coronavirus Covid-19 spreading in Italy: optimizing an epidemiological model with dynamic social distancing through Differential Evolution
Subjects: Populations and Evolution (q-bio.PE); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[288]  arXiv:2004.00583 (replaced) [pdf, other]
Title: Boosting Deep Hyperspectral Image Classification with Spectral Unmixing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Machine Learning (cs.LG); Image and Video Processing (eess.IV)
[289]  arXiv:2004.00603 (replaced) [pdf, ps, other]
Title: No-regret learning dynamics for extensive-form correlated and coarse correlated equilibria
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI); Machine Learning (cs.LG); Multiagent Systems (cs.MA)
[290]  arXiv:2004.00614 (replaced) [pdf, other]
Title: Articulation-aware Canonical Surface Mapping
Comments: To appear at CVPR 2020, project page this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[ total of 290 entries: 1-290 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2004, contact, help  (Access key information)