We gratefully acknowledge support from
the Simons Foundation
and member institutions

Computer Science

New submissions

[ total of 251 entries: 1-251 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Tue, 22 Aug 17

[1]  arXiv:1708.05711 [pdf]
Title: Computer-aided position planning of miniplates to treat facial bone defects
Comments: 19 pages, 13 Figures, 2 Tables
Journal-ref: PLoS ONE 12(8): e0182839 (2017)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Computational Engineering, Finance, and Science (cs.CE); Computational Geometry (cs.CG)

In this contribution, a software system for computer-aided position planning of miniplates to treat facial bone defects is proposed. The intra-operatively used bone plates have to be passively adapted on the underlying bone contours for adequate bone fragment stabilization. However, this procedure can lead to frequent intra-operatively performed material readjustments especially in complex surgical cases. Our approach is able to fit a selection of common implant models on the surgeon's desired position in a 3D computer model. This happens with respect to the surrounding anatomical structures, always including the possibility of adjusting both the direction and the position of the used osteosynthesis material. By using the proposed software, surgeons are able to pre-plan the out coming implant in its form and morphology with the aid of a computer-visualized model within a few minutes. Further, the resulting model can be stored in STL file format, the commonly used format for 3D printing. Using this technology, surgeons are able to print the virtual generated implant, or create an individually designed bending tool. This method leads to adapted osteosynthesis materials according to the surrounding anatomy and requires further a minimum amount of money and time.

[2]  arXiv:1708.05714 [pdf, other]
Title: A Stronger Foundation for Computer Science and P=NP
Authors: Mark Inman
Comments: 21 pages, 1 figure
Subjects: Computational Complexity (cs.CC); Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)

This article constructs a Turing Machine which can solve for $\beta^{'}$ which is RE-complete. Such a machine is only possible if there is something wrong with the foundations of computer science and mathematics. We therefore check our work by looking very closely at Cantor's diagonalization and construct a novel formal language as an Abelian group which allows us, through equivalence relations, to provide a non-trivial counterexample to Cantor's argument. As if that wasn't enough, we then discover that the impredicative nature of G\"odel's diagonalization lemma leads to logical tautology, invalidating any meaning behind the method, leaving no doubt that diagonalization is flawed. Our discovery in regards to these foundational arguments opens the door to solving the P vs NP problem.

[3]  arXiv:1708.05719 [pdf, other]
Title: Cross-Lingual Dependency Parsing for Closely Related Languages - Helsinki's Submission to VarDial 2017
Authors: Jörg Tiedemann
Journal-ref: In Proceedings of the Fourth Workshop on NLP for Similar Languages, Varieties and Dialects at EACL 2017, Valencia/Spain, pp. 131-136
Subjects: Computation and Language (cs.CL)

This paper describes the submission from the University of Helsinki to the shared task on cross-lingual dependency parsing at VarDial 2017. We present work on annotation projection and treebank translation that gave good results for all three target languages in the test set. In particular, Slovak seems to work well with information coming from the Czech treebank, which is in line with related work. The attachment scores for cross-lingual models even surpass the fully supervised models trained on the target language treebank. Croatian is the most difficult language in the test set and the improvements over the baseline are rather modest. Norwegian works best with information coming from Swedish whereas Danish contributes surprisingly little.

[4]  arXiv:1708.05729 [pdf, ps, other]
Title: Neural machine translation for low-resource languages
Comments: rejected from EMNLP 2017
Subjects: Computation and Language (cs.CL)

Neural machine translation (NMT) approaches have improved the state of the art in many machine translation settings over the last couple of years, but they require large amounts of training data to produce sensible output. We demonstrate that NMT can be used for low-resource languages as well, by introducing more local dependencies and using word alignments to learn sentence reordering during translation. In addition to our novel model, we also present an empirical evaluation of low-resource phrase-based statistical machine translation (SMT) and NMT to investigate the lower limits of the respective technologies. We find that while SMT remains the best option for low-resource settings, our method can produce acceptable translations with only 70000 tokens of training data, a level where the baseline NMT system fails completely.

[5]  arXiv:1708.05732 [pdf, other]
Title: Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones
Comments: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)
Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE); Robotics (cs.RO)

Inter-connected objects, either via public or private networks are the near future of modern societies. Such inter-connected objects are referred to as Internet-of-Things (IoT) and/or Cyber-Physical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to high-sensitive, such as, prompt pizza or shopping deliveries to your homes to battlefield deployment for reconnaissance and combat missions. Drones, as we refer to UAVs in this paper, either can operate individually (solo missions) or part of a fleet (group missions), with and without constant connection with the base station. The base station acts as the command centre to manage the activities of the drones. However, an independent, localised and effective fleet control is required, potentially based on swarm intelligence, for the reasons: 1) increase in the number of drone fleets, 2) number of drones in a fleet might be multiple of tens, 3) time-criticality in making decisions by such fleets in the wild, 4) potential communication congestions/lag, and 5) in some cases working in challenging terrains that hinders or mandates-limited communication with control centre (i.e., operations spanning long period of times or military usage of such fleets in enemy territory). This self-ware, mission-focused and independent fleet of drones that potential utilises swarm intelligence for a) air-traffic and/or flight control management, b) obstacle avoidance, c) self-preservation while maintaining the mission criteria, d) collaboration with other fleets in the wild (autonomously) and e) assuring the security, privacy and safety of physical (drones itself) and virtual (data, software) assets. In this paper, we investigate the challenges faced by fleet of drones and propose a potential course of action on how to overcome them.

[6]  arXiv:1708.05741 [pdf, other]
Title: Dynamic Connectivity Game for Adversarial Internet of Battlefield Things Systems
Comments: 10 pages, 6 figures
Subjects: Information Theory (cs.IT); Computer Science and Game Theory (cs.GT)

In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender's payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker's and defender's actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 62% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 57% compared to a baseline equal probability policy.

[7]  arXiv:1708.05746 [pdf, other]
Title: Sparkle: Optimizing Spark for Large Memory Machines and Analytics
Comments: 14 pages, 18 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)

Spark is an in-memory analytics platform that targets commodity server environments today. It relies on the Hadoop Distributed File System (HDFS) to persist intermediate checkpoint states and final processing results. In Spark, immutable data are used for storing data updates in each iteration, making it inefficient for long running, iterative workloads. A non-deterministic garbage collector further worsens this problem. Sparkle is a library that optimizes memory usage in Spark. It exploits large shared memory to achieve better data shuffling and intermediate storage. Sparkle replaces the current TCP/IP-based shuffle with a shared memory approach and proposes an off-heap memory store for efficient updates. We performed a series of experiments on scale-out clusters and scale-up machines. The optimized shuffle engine leveraging shared memory provides 1.3x to 6x faster performance relative to Vanilla Spark. The off-heap memory store along with the shared-memory shuffle engine provides more than 20x performance increase on a probabilistic graph processing workload that uses a large-scale real-world hyperlink graph. While Sparkle benefits at most from running on large memory machines, it also achieves 1.6x to 5x performance improvements over scale out cluster with equivalent hardware setting.

[8]  arXiv:1708.05763 [pdf, other]
Title: The Natural Stories Corpus
Subjects: Computation and Language (cs.CL)

It is now a common practice to compare models of human language processing by predicting participant reactions (such as reading times) to corpora consisting of rich naturalistic linguistic materials. However, many of the corpora used in these studies are based on naturalistic text and thus do not contain many of the low-frequency syntactic constructions that are often required to distinguish processing theories. Here we describe a new corpus consisting of English texts edited to contain many low-frequency syntactic constructions while still sounding fluent to native speakers. The corpus is annotated with hand-corrected parse trees and includes self-paced reading time data. Here we give an overview of the content of the corpus and release the data.

[9]  arXiv:1708.05769 [pdf, ps, other]
Title: Deterministic coding theorems for blind sensing: optimal measurement rate and fractal dimension
Comments: 14 pages
Subjects: Information Theory (cs.IT)

Completely blind sensing is the problem of recovering bandlimited signals from measurements, without any spectral information beside an upper bound on the measure of the whole support set in the frequency domain. Determining the number of measurements necessary and sufficient for reconstruction has been an open problem, and usually partially blind sensing is performed, assuming to have some partial spectral information available a priori. In this paper, the minimum number of measurements that guarantees perfect recovery in the absence of measurement error, and robust recovery in the presence of measurement error, is determined in a completely blind setting. Results show that a factor of two in the measurement rate is the price pay for blindness, compared to reconstruction with full spectral knowledge. The minimum number of measurements is also related to the fractal (Minkowski-Bouligand) dimension of a discrete approximating set, defined in terms of the Kolmogorov $\epsilon$-entropy. These results are analogous to a deterministic coding theorem, where an operational quantity defined in terms of minimum measurement rate is shown to be equal to an information-theoretic one. A comparison with parallel results in compressed sensing is illustrated, where the relevant dimensionality notion in a stochastic setting is the information (R\'{e}nyi) dimension, defined in terms of the Shannon entropy.

[10]  arXiv:1708.05786 [pdf, other]
Title: Boolean Unateness Testing with $\widetilde{O}(n^{3/4})$ Adaptive Queries
Subjects: Computational Complexity (cs.CC)

We give an adaptive algorithm which tests whether an unknown Boolean function $f\colon \{0, 1\}^n \to\{0, 1\}$ is unate, i.e. every variable of $f$ is either non-decreasing or non-increasing, or $\epsilon$-far from unate with one-sided error using $\widetilde{O}(n^{3/4}/\epsilon^2)$ queries. This improves on the best adaptive $O(n/\epsilon)$-query algorithm from Baleshzar, Chakrabarty, Pallavoor, Raskhodnikova and Seshadhri when $1/\epsilon \ll n^{1/4}$. Combined with the $\widetilde{\Omega}(n)$-query lower bound for non-adaptive algorithms with one-sided error of [CWX17, BCPRS17], we conclude that adaptivity helps for the testing of unateness with one-sided error. A crucial component of our algorithm is a new subroutine for finding bi-chromatic edges in the Boolean hypercube called adaptive edge search.

[11]  arXiv:1708.05790 [pdf, other]
Title: University Twitter Engagement: Using Twitter Followers to Rank Universities
Comments: 14 pages, 4 figures
Subjects: Digital Libraries (cs.DL); Social and Information Networks (cs.SI)

We examine and rank a set of 264 U.S. universities extracted from the National Collegiate Athletic Association (NCAA) Division I membership and global lists published in U.S. News, Times Higher Education, Academic Ranking of World Universities, and Money Magazine. Our University Twitter Engagement (UTE) rank is based on the friend and extended follower network of primary and affiliated secondary Twitter accounts referenced on a university's home page. In rank-to-rank comparisons we observed a significant, positive rank correlation ({\tau}=0.6018) between UTE and an aggregate reputation ranking which indicates that UTE could be a viable proxy for ranking atypical institutions normally excluded from traditional lists. In addition, we significantly reduce the cost of data collection needed to rank each institution by using only web-based artifacts and a publicly accessible Twitter application programming interface (API).

[12]  arXiv:1708.05797 [pdf, other]
Title: CLaC @ QATS: Quality Assessment for Text Simplification
Comments: In Proceedings of the Workshop Shared task on Quality Assessment for Text Simplification (QATS-2016), a workshop of the 10th Language Resources and Evaluation Conference (LREC-2016), pp. 53-56, May 23-28, Portoroz, Slovenia
Subjects: Computation and Language (cs.CL)

This paper describes our approach to the 2016 QATS quality assessment shared task. We trained three independent Random Forest classifiers in order to assess the quality of the simplified texts in terms of grammaticality, meaning preservation and simplicity. We used the language model of Google-Ngram as feature to predict the grammaticality. Meaning preservation is predicted using two complementary approaches based on word embedding and WordNet synonyms. A wider range of features including TF-IDF, sentence length and frequency of cue phrases are used to evaluate the simplicity aspect. Overall, the accuracy of the system ranges from 33.33% for the overall aspect to 58.73% for grammaticality.

[13]  arXiv:1708.05798 [pdf, ps, other]
Title: The CLaC Discourse Parser at CoNLL-2016
Comments: In Proceedings of the Twentieth Conference on Computational Natural Language Learning: Shared Task. pp 92-99. July 7-12, 2016. Berlin, Germany
Subjects: Computation and Language (cs.CL)

This paper describes our submission "CLaC" to the CoNLL-2016 shared task on shallow discourse parsing. We used two complementary approaches for the task. A standard machine learning approach for the parsing of explicit relations, and a deep learning approach for non-explicit relations. Overall, our parser achieves an F1-score of 0.2106 on the identification of discourse relations (0.3110 for explicit relations and 0.1219 for non-explicit relations) on the blind CoNLL-2016 test set.

[14]  arXiv:1708.05800 [pdf, ps, other]
Title: On the Contribution of Discourse Structure on Text Complexity Assessment
Comments: In Proceedings of the 17th Annual SigDial Meeting on Discourse and Dialogue (SigDial 2016). pp 166-174. September 13-15. Los Angeles, USA
Subjects: Computation and Language (cs.CL)

This paper investigates the influence of discourse features on text complexity assessment. To do so, we created two data sets based on the Penn Discourse Treebank and the Simple English Wikipedia corpora and compared the influence of coherence, cohesion, surface, lexical and syntactic features to assess text complexity.
Results show that with both data sets coherence features are more correlated to text complexity than the other types of features. In addition, feature selection revealed that with both data sets the top most discriminating feature is a coherence feature.

[15]  arXiv:1708.05801 [pdf, other]
Title: ClaC: Semantic Relatedness of Words and Phrases
Comments: In Proceedings of the Second Joint Conference on Lexical and Computational Semantics (*SEM), Volume 2: Proceedings of the Seventh International Workshop on Semantic Evaluation (SemEval 2013),June, Atlanta, Georgia, USA, pp. 108-113
Subjects: Computation and Language (cs.CL)

The measurement of phrasal semantic relatedness is an important metric for many natural language processing applications. In this paper, we present three approaches for measuring phrasal semantics, one based on a semantic network model, another on a distributional similarity model, and a hybrid between the two. Our hybrid approach achieved an F-measure of 77.4% on the task of evaluating the semantic similarity of words and compositional phrases.

[16]  arXiv:1708.05803 [pdf, ps, other]
Title: Measuring the Effect of Discourse Relations on Blog Summarization
Comments: In Proceedings of the 6th International Joint Conference on Natural Language Processing (IJCNLP 2013), pages 1401-1409, October 2013, Nagoya, Japan
Subjects: Computation and Language (cs.CL)

The work presented in this paper attempts to evaluate and quantify the use of discourse relations in the context of blog summarization and compare their use to more traditional and factual texts. Specifically, we measured the usefulness of 6 discourse relations - namely comparison, contingency, illustration, attribution, topic-opinion, and attributive for the task of text summarization from blogs. We have evaluated the effect of each relation using the TAC 2008 opinion summarization dataset and compared them with the results with the DUC 2007 dataset. The results show that in both textual genres, contingency, comparison, and illustration relations provide a significant improvement on summarization content; while attribution, topic-opinion, and attributive relations do not provide a consistent and significant improvement. These results indicate that, at least for summarization, discourse relations are just as useful for informal and affective texts as for more traditional news articles.

[17]  arXiv:1708.05805 [pdf, other]
Title: Design Space of Programming Tools on Mobile Touchscreen Devices
Comments: 11 pages, includes one-page table
Subjects: Human-Computer Interaction (cs.HC)

While mobile touchscreen devices are ubiquitous and present opportunities for novel applications, they have seen little adoption as tools for computer programming. In this literature survey, we bring together the diverse research work on programming-related tasks supported by mobile touchscreen devices to explore the design space for applying them to programming situations. We used the Grounded theory approach to identify themes and classify previous work. We present these themes and how each paper contributes to the theme, and we outline the remaining challenges in and opportunities for using mobile touchscreen devices in programming applications.

[18]  arXiv:1708.05811 [pdf, other]
Title: Secure Search on the Cloud via Coresets and Sketches
Comments: 25 pages, 2 figures
Subjects: Cryptography and Security (cs.CR)

\emph{Secure Search} is the problem of retrieving from a database table (or any unsorted array) the records matching specified attributes, as in SQL SELECT queries, but where the database and the query are encrypted. Secure search has been the leading example for practical applications of Fully Homomorphic Encryption (FHE) starting in Gentry's seminal work; however, to the best of our knowledge all state-of-the-art secure search algorithms to date are realized by a polynomial of degree $\Omega(m)$ for $m$ the number of records, which is typically too slow in practice even for moderate size $m$.
In this work we present the first algorithm for secure search that is realized by a polynomial of degree polynomial in $\log m$. We implemented our algorithm in an open source library based on HELib implementation for the Brakerski-Gentry-Vaikuntanthan's FHE scheme, and ran experiments on Amazon's EC2 cloud. Our experiments show that we can retrieve the first match in a database of millions of entries in less than an hour using a single machine; the time reduced almost linearly with the number of machines.
Our result utilizes a new paradigm of employing coresets and sketches, which are modern data summarization techniques common in computational geometry and machine learning, for efficiency enhancement for homomorphic encryption. As a central tool we design a novel sketch that returns the first positive entry in a (not necessarily sparse) array; this sketch may be of independent interest.

[19]  arXiv:1708.05812 [pdf, other]
Title: Discovery of Visual Semantics by Unsupervised and Self-Supervised Representation Learning
Authors: Gustav Larsson
Comments: Ph.D. thesis
Subjects: Computer Vision and Pattern Recognition (cs.CV)

The success of deep learning in computer vision is rooted in the ability of deep networks to scale up model complexity as demanded by challenging visual tasks. As complexity is increased, so is the need for large amounts of labeled data to train the model. This is associated with a costly human annotation effort. To address this concern, with the long-term goal of leveraging the abundance of cheap unlabeled data, we explore methods of unsupervised "pre-training." In particular, we propose to use self-supervised automatic image colorization.
We show that traditional methods for unsupervised learning, such as layer-wise clustering or autoencoders, remain inferior to supervised pre-training. In search for an alternative, we develop a fully automatic image colorization method. Our method sets a new state-of-the-art in revitalizing old black-and-white photography, without requiring human effort or expertise. Additionally, it gives us a method for self-supervised representation learning. In order for the model to appropriately re-color a grayscale object, it must first be able to identify it. This ability, learned entirely self-supervised, can be used to improve other visual tasks, such as classification and semantic segmentation. As a future direction for self-supervision, we investigate if multiple proxy tasks can be combined to improve generalization. This turns out to be a challenging open problem. We hope that our contributions to this endeavor will provide a foundation for future efforts in making self-supervision compete with supervised pre-training.

[20]  arXiv:1708.05815 [pdf, other]
Title: Minimum Hidden Guarding of Histogram Polygons
Subjects: Computational Geometry (cs.CG)

A hidden guard set $ G $ is a set of point guards in polygon $ P $ that all points of the polygon are visible from some guards in $ G $ under the constraint that no two guards may see each other. In this paper, we consider the problem for finding minimum hidden guard sets in histogram polygons under orthogonal visibility. Two points $ p $ and $ q $ are orthogonally visible if the orthogonal bounding rectangle for $ p $ and $ q $ lies within $ P $. It is known that the problem is NP-hard for simple polygon with general visibility and it is true for simple orthogonal polygon. We proposed a linear time exact algorithm for finding minimum hidden guard set in histogram polygons under orthogonal visibility. In our algorithm, it is allowed that guards place everywhere in the polygon.

[21]  arXiv:1708.05821 [pdf, other]
Title: Analysing Soccer Games with Clustering and Conceptors
Comments: To appear in RoboCup 2017: Robot World Cup XXI; Springer, 2018
Subjects: Learning (cs.LG)

We present a new approach for identifying situations and behaviours, which we call "moves", from soccer games in the 2D simulation league. Being able to identify key situations and behaviours are useful capabilities for analysing soccer matches, anticipating opponent behaviours to aid selection of appropriate tactics, and also as a prerequisite for automatic learning of behaviours and policies. To support a wide set of strategies, our goal is to identify situations from data, in an unsupervised way without making use of pre-defined soccer specific concepts such as "pass" or "dribble". The recurrent neural networks we use in our approach act as a high-dimensional projection of the recent history of a situation on the field. Similar situations, i.e., with similar histories, are found by clustering of network states. The same networks are also used to learn so-called conceptors, that are lower-dimensional manifolds that describe trajectories through a high-dimensional state space that enable situation-specific predictions from the same neural network. With the proposed approach, we can segment games into sequences of situations that are learnt in an unsupervised way, and learn conceptors that are useful for the prediction of the near future of the respective situation.

[22]  arXiv:1708.05824 [pdf]
Title: Applying Deep Bidirectional LSTM and Mixture Density Network for Basketball Trajectory Prediction
Subjects: Artificial Intelligence (cs.AI)

Data analytics helps basketball teams to create tactics. However, manual data collection and analytics are costly and ineffective. Therefore, we applied a deep bidirectional long short-term memory (BLSTM) and mixture density network (MDN) approach. This model is not only capable of predicting a basketball trajectory based on real data, but it also can generate new trajectory samples. It is an excellent application to help coaches and players decide when and where to shoot. Its structure is particularly suitable for dealing with time series problems. BLSTM receives forward and backward information at the same time, while stacking multiple BLSTMs further increases the learning ability of the model. Combined with BLSTMs, MDN is used to generate a multi-modal distribution of outputs. Thus, the proposed model can, in principle, represent arbitrary conditional probability distributions of output variables. We tested our model with two experiments on three-pointer datasets from NBA SportVu data. In the hit-or-miss classification experiment, the proposed model outperformed other models in terms of the convergence speed and accuracy. In the trajectory generation experiment, eight model-generated trajectories at a given time closely matched real trajectories.

[23]  arXiv:1708.05826 [pdf, other]
Title: Ensemble Of Deep Neural Networks For Acoustic Scene Classification
Comments: Detection and Classification of Acoustic Scenes and Events 2017
Subjects: Sound (cs.SD)

Deep neural networks (DNNs) have recently achieved great success in a multitude of classification tasks. Ensembles of DNNs have been shown to improve the performance. In this paper, we explore the recent state-of-the-art DNNs used for image classification. We modified these DNNs and applied them to the task of acoustic scene classification. We conducted a number of experiments on the TUT Acoustic Scenes 2017 dataset to empirically compare these methods. Finally, we show that the ensemble of these DNNs improves the baseline score for DCASE-2017 Task 1 by 10%.

[24]  arXiv:1708.05827 [pdf, other]
Title: Visual Forecasting by Imitating Dynamics in Natural Sequences
Comments: 10 pages, 9 figures, accepted to ICCV 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We introduce a general framework for visual forecasting, which directly imitates visual sequences without additional supervision. As a result, our model can be applied at several semantic levels and does not require any domain knowledge or handcrafted features. We achieve this by formulating visual forecasting as an inverse reinforcement learning (IRL) problem, and directly imitate the dynamics in natural sequences from their raw pixel values. The key challenge is the high-dimensional and continuous state-action space that prohibits the application of previous IRL algorithms. We address this computational bottleneck by extending recent progress in model-free imitation with trainable deep feature representations, which (1) bypasses the exhaustive state-action pair visits in dynamic programming by using a dual formulation and (2) avoids explicit state sampling at gradient computation using a deep feature reparametrization. This allows us to apply IRL at scale and directly imitate the dynamics in high-dimensional continuous visual sequences from the raw pixel values. We evaluate our approach at three different level-of-abstraction, from low level pixels to higher level semantics: future frame generation, action anticipation, visual story forecasting. At all levels, our approach outperforms existing methods.

[25]  arXiv:1708.05828 [pdf]
Title: High Voltage Insulator Surface Evaluation Using Image Processing
Comments: 2017 International Symposium on Electrical Insulating Materials, September 12-15, 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

High voltage insulators are widely deployed in power systems to isolate the live- and dead-part of overhead lines as well as to support the power line conductors mechanically. Permanent, secure and safe operation of power transmission lines require that the high voltage insulators are inspected and monitor, regularly. Severe environment conditions will influence insulator surface and change creepage distance. Consequently, power utilities and transmission companies face significant problem in operation due to insulator damage or contamination. In this study, a new technique is developed for real-time inspection of insulator and estimating the snow, ice and water over the insulator surface which can be a potential risk of operation breakdown. To examine the proposed system, practical experiment is conducted using ceramic insulator for capturing the images with snow, ice and wet surface conditions. Gabor and Standard deviation filters are utilized for image feature extraction. The best achieved recognition accuracy rate was 87% using statistical approach the Standard deviation.

[26]  arXiv:1708.05831 [pdf, other]
Title: Real Time Prediction of Drive by Download Attacks on Twitter
Comments: 17 pages
Subjects: Social and Information Networks (cs.SI)

The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a drive-by- download. In a drive-by-download a user's computer system is infected while interacting with the malicious endpoint, often without them being made aware, the attack has taken place. An attacker can gain control of the system by exploiting unpatched system vulnerabilities and this form of attack currently represents one of the most common methods employed. In this paper, we build a machine learning model using machine activity data and tweet meta data to move beyond post-execution classification of such URLs as malicious, to predict a URL will be malicious with 99.2% F-measure (using 10-fold cross validation) and 83.98% (using an unseen test set) at 1 second into the interaction with the URL. Thus providing a basis from which to kill the connection to the server before an attack has completed and proactively blocking and preventing an attack, rather than reacting and repairing at a later date.

[27]  arXiv:1708.05844 [pdf, other]
Title: NIZKCTF: A Non-Interactive Zero-Knowledge Capture the Flag Platform
Comments: Preprint submitted to Middleware 2017 Industry Track
Subjects: Cryptography and Security (cs.CR)

Capture the Flag (CTF) competitions are educational and professional tools for the cybersecurity community. Unfortunately, CTF platforms suffer from the same security issues as other software components, what may give advantage to competitors who target the actual platform instead of the challenges. While it is arguable that successful attacks against the platform demonstrate relevant skills, the organizers may be interested into enforcing rules and rewarding solutions of the contest problems, due to sponsorship duties or focused recruiting efforts. To mitigate this, we present NIZKCTF, the first open-audit CTF platform based on non-interactive zero-knowledge proofs. NIZKCTF is publicly available for anyone who wants to run a CTF competition and provides strong transparency guarantees through the protocol, allowing any entity to verify the contest progression and outcome by employing a Git-based transaction log, a continuous integration service and zero-knowledge proofs. Using NIZKCTF, we conducted a competition for 10 invited teams. This competition had a bug bounty program, with cash prizes for teams able to exploit and compromise the CTF result. In this experiment, we observed that attacks carried by the teams against the platform were unsuccessful.

[28]  arXiv:1708.05847 [pdf, other]
Title: Unbounded product-form Petri nets
Comments: 31 pages
Subjects: Performance (cs.PF); Discrete Mathematics (cs.DM); Logic in Computer Science (cs.LO)

Computing steady-state distributions in infinite-state stochastic systems is in general a very dificult task. Product-form Petri nets are those Petri nets for which the steady-state distribution can be described as a natural product corresponding, up to a normalising constant, to an exponentiation of the markings. However, even though some classes of nets are known to have a product-form distribution, computing the normalising constant can be hard. The class of (closed) {\Pi}3-nets has been proposed in an earlier work, for which it is shown that one can compute the steady-state distribution efficiently. However these nets are bounded. In this paper, we generalise queuing Markovian networks and closed {\Pi}3-nets to obtain the class of open {\Pi}3-nets, that generate infinite-state systems. We show interesting properties of these nets: (1) we prove that liveness can be decided in polynomial time, and that reachability in live {\Pi}3-nets can be decided in polynomial time; (2) we show that we can decide ergodicity of such nets in polynomial time as well; (3) we provide a pseudo-polynomial time algorithm to compute the normalising constant.

[29]  arXiv:1708.05849 [pdf, other]
Title: Dependences in Strategy Logic
Subjects: Logic in Computer Science (cs.LO)

Strategy Logic (SL) is a very expressive logic for specifying and verifying properties of multi-agent systems: in SL, one can quantify over strategies, assign them to agents, and express properties of the resulting plays. Such a powerful framework has two drawbacks: first, model checking SL has non-elementary complexity; second, the exact semantics of SL is rather intricate, and may not correspond to what is expected. In this paper, we focus on strategy dependences in SL, by tracking how existentially-quantified strategies in a formula may (or may not) depend on other strategies selected in the formula. We study different kinds of dependences, refining the approach of [Mogavero et al., Reasoning about strategies: On the model-checking problem, 2014], and prove that they give rise to different satisfaction relations. In the setting where strategies may only depend on what they have observed, we identify a large fragment of SL for which we prove model checking can be performed in 2EXPTIME.

[30]  arXiv:1708.05851 [pdf, ps, other]
Title: Image2song: Song Retrieval via Bridging Image Content and Lyric Words
Comments: 13 pages, 13 figures, accepted by ICCV 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV); Information Retrieval (cs.IR); Multimedia (cs.MM)

Image is usually taken for expressing some kinds of emotions or purposes, such as love, celebrating Christmas. There is another better way that combines the image and relevant song to amplify the expression, which has drawn much attention in the social network recently. Hence, the automatic selection of songs should be expected. In this paper, we propose to retrieve semantic relevant songs just by an image query, which is named as the image2song problem. Motivated by the requirements of establishing correlation in semantic/content, we build a semantic-based song retrieval framework, which learns the correlation between image content and lyric words. This model uses a convolutional neural network to generate rich tags from image regions, a recurrent neural network to model lyric, and then establishes correlation via a multi-layer perceptron. To reduce the content gap between image and lyric, we propose to make the lyric modeling focus on the main image content via a tag attention. We collect a dataset from the social-sharing multimodal data to study the proposed problem, which consists of (image, music clip, lyric) triplets. We demonstrate that our proposed model shows noticeable results in the image2song retrieval task and provides suitable songs. Besides, the song2image task is also performed.

[31]  arXiv:1708.05855 [pdf, other]
Title: Practical Distance Functions for Path-Planning in Planar Domains
Subjects: Robotics (cs.RO)

Path planning is an important problem in robotics. One way to plan a path between two points $x,y$ within a (not necessarily simply-connected) planar domain $\Omega$, is to define a non-negative distance function $d(x,y)$ on $\Omega\times\Omega$ such that following the (descending) gradient of this distance function traces such a path. This presents two equally important challenges: A mathematical challenge -- to define $d$ such that $d(x,y)$ has a single minimum for any fixed $y$ (and this is when $x=y$), since a local minimum is in effect a "dead end", A computational challenge -- to define $d$ such that it may be computed efficiently. In this paper, given a description of $\Omega$, we show how to assign coordinates to each point of $\Omega$ and define a family of distance functions between points using these coordinates, such that both the mathematical and the computational challenges are met. This is done using the concepts of \emph{harmonic measure} and \emph{$f$-divergences}.
In practice, path planning is done on a discrete network defined on a finite set of \emph{sites} sampled from $\Omega$, so any method that works well on the continuous domain must be adapted so that it still works well on the discrete domain. Given a set of sites sampled from $\Omega$, we show how to define a network connecting these sites such that a \emph{greedy routing} algorithm (which is the discrete equivalent of continuous gradient descent) based on the distance function mentioned above is guaranteed to generate a path in the network between any two such sites. In many cases, this network is close to a (desirable) planar graph, especially if the set of sites is dense.

[32]  arXiv:1708.05857 [pdf, other]
Title: The CLaC Discourse Parser at CoNLL-2015
Comments: Proceedings of the Nineteenth Conference on Computational Natural Language Learning Shared Task (CoNLL 2015). Beijing, China
Subjects: Computation and Language (cs.CL)

This paper describes our submission (kosseim15) to the CoNLL-2015 shared task on shallow discourse parsing. We used the UIMA framework to develop our parser and used ClearTK to add machine learning functionality to the UIMA framework. Overall, our parser achieves a result of 17.3 F1 on the identification of discourse relations on the blind CoNLL-2015 test set, ranking in sixth place.

[33]  arXiv:1708.05866 [pdf, other]
Title: A Brief Survey of Deep Reinforcement Learning
Comments: To appear in IEEE Signal Processing Magazine, Special Issue on Deep Learning for Image Understanding
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)

Deep reinforcement learning is poised to revolutionise the field of AI and represents a step towards building autonomous systems with a higher level understanding of the visual world. Currently, deep learning is enabling reinforcement learning to scale to problems that were previously intractable, such as learning to play video games directly from pixels. Deep reinforcement learning algorithms are also applied to robotics, allowing control policies for robots to be learned directly from camera inputs in the real world. In this survey, we begin with an introduction to the general field of reinforcement learning, then progress to the main streams of value-based and policy-based methods. Our survey will cover central algorithms in deep reinforcement learning, including the deep $Q$-network, trust region policy optimisation, and asynchronous advantage actor-critic. In parallel, we highlight the unique advantages of deep neural networks, focusing on visual understanding via reinforcement learning. To conclude, we describe several current areas of research within the field.

[34]  arXiv:1708.05867 [pdf, other]
Title: Power Allocation for Adaptive OFDM Index Modulation in Cooperative Networks
Subjects: Information Theory (cs.IT)

In this paper, we propose a power allocation strategy for the adaptive orthogonal frequency-division multiplexing (OFDM) index modulation (IM) in cooperative networks. The allocation strategy is based on the Karush-Kuhn-Tucker (KKT) conditions, and aims at maximizing the average network capacity according to the instantaneous channel state information (CSI). As the transmit power at source and relay is constrained separately, we can thus formulate an optimization problem by allocating power to active subcarriers. Compared to the conventional uniform power allocation strategy, the proposed dynamic strategy can lead to a higher average network capacity, especially in the low signal-to-noise ratio (SNR) region. The analysis is also verified by numerical results produced by Monte Carlo simulations. By applying the proposed power allocation strategy, the efficiency of adaptive OFDM IM can be enhanced in practice, which paves the way for its implementation in the future, especially for cell-edge communications.

[35]  arXiv:1708.05868 [pdf, other]
Title: Outage Performance Analysis of Multicarrier Relay Selection for Cooperative Networks
Subjects: Information Theory (cs.IT)

In this paper, we analyze the outage performance of two multicarrier relay selection schemes, i.e. bulk and per-subcarrier selections, for two-hop orthogonal frequency-division multiplexing (OFDM) systems. To provide a comprehensive analysis, three forwarding protocols: decode-and-forward (DF), fixed-gain (FG) amplify-and-forward (AF) and variable-gain (VG) AF relay systems are considered. We obtain closed-form approximations for the outage probability and closed-form expressions for the asymptotic outage probability in the high signal-to-noise ratio (SNR) region for all cases. Our analysis is verified by Monte Carlo simulations, and provides an analytical framework for multicarrier systems with relay selection.

[36]  arXiv:1708.05869 [pdf, other]
Title: UE4Sim: A Photo-Realistic Simulator for Computer Vision Applications
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We present a photo-realistic training and evaluation simulator (UE4Sim) with extensive applications across various fields of computer vision. Built on top of the Unreal Engine, the simulator integrates full featured physics based cars, unmanned aerial vehicles (UAVs), and animated human actors in diverse urban and suburban 3D environments. We demonstrate the versatility of the simulator with two case studies: autonomous UAV-based tracking of moving objects and autonomous driving using supervised learning. The simulator fully integrates both several state-of-the-art tracking algorithms with a benchmark evaluation tool and a deep neural network (DNN) architecture for training vehicles to drive autonomously. It generates synthetic photo-realistic datasets with automatic ground truth annotations to easily extend existing real-world datasets and provides extensive synthetic data variety through its ability to reconfigure synthetic worlds on the fly using an automatic world generation tool.

[37]  arXiv:1708.05870 [pdf, ps, other]
Title: The Spatial Outage Capacity of Wireless Networks
Comments: 32 pages, 9 figures
Subjects: Information Theory (cs.IT)

We address a fundamental question in wireless networks that, surprisingly, has not been studied before: what is the maximum density of concurrently active links that satisfy a certain outage constraint? We call this quantity the spatial outage capacity (SOC), give a rigorous definition, and analyze it for Poisson bipolar networks with ALOHA. Specifically, we provide exact analytical and approximate expressions for the density of links satisfying an outage constraint and give simple upper and lower bounds on the SOC. In the high-reliability regime where the target outage probability is close to zero, we obtain an exact closed-form expression of the SOC, which reveals the interesting and perhaps counter-intuitive result that all transmitters need to be always active to achieve the SOC, i.e., the transmit probability needs to be set to 1 to achieve the SOC.

[38]  arXiv:1708.05872 [pdf]
Title: Agent-based computing from multi-agent systems to agent-based Models: a visual survey
Comments: 30 pages, 11 figures, 9 tables
Journal-ref: Scientometrics 89.2 (2011): 479
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Digital Libraries (cs.DL); Multiagent Systems (cs.MA); Adaptation and Self-Organizing Systems (nlin.AO)

Agent-Based Computing is a diverse research domain concerned with the building of intelligent software based on the concept of "agents". In this paper, we use Scientometric analysis to analyze all sub-domains of agent-based computing. Our data consists of 1,064 journal articles indexed in the ISI web of knowledge published during a twenty year period: 1990-2010. These were retrieved using a topic search with various keywords commonly used in sub-domains of agent-based computing. In our proposed approach, we have employed a combination of two applications for analysis, namely Network Workbench and CiteSpace - wherein Network Workbench allowed for the analysis of complex network aspects of the domain, detailed visualization-based analysis of the bibliographic data was performed using CiteSpace. Our results include the identification of the largest cluster based on keywords, the timeline of publication of index terms, the core journals and key subject categories. We also identify the core authors, top countries of origin of the manuscripts along with core research institutes. Finally, our results have interestingly revealed the strong presence of agent-based computing in a number of non-computing related scientific domains including Life Sciences, Ecological Sciences and Social Sciences.

[39]  arXiv:1708.05873 [pdf, other]
Title: What Drives the International Development Agenda? An NLP Analysis of the United Nations General Debate 1970-2016
Subjects: Computation and Language (cs.CL); Social and Information Networks (cs.SI)

There is surprisingly little known about agenda setting for international development in the United Nations (UN) despite it having a significant influence on the process and outcomes of development efforts. This paper addresses this shortcoming using a novel approach that applies natural language processing techniques to countries' annual statements in the UN General Debate. Every year UN member states deliver statements during the General Debate on their governments' perspective on major issues in world politics. These speeches provide invaluable information on state preferences on a wide range of issues, including international development, but have largely been overlooked in the study of global politics. This paper identifies the main international development topics that states raise in these speeches between 1970 and 2016, and examine the country-specific drivers of international development rhetoric.

[40]  arXiv:1708.05875 [pdf]
Title: A novel agent-based simulation framework for sensing in complex adaptive environments
Comments: 8 pages
Journal-ref: IEEE Sensors Journal 11.2 (2011): 404-412
Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA); Software Engineering (cs.SE); Adaptation and Self-Organizing Systems (nlin.AO)

In this paper we present a novel Formal Agent-Based Simulation framework (FABS). FABS uses formal specification as a means of clear description of wireless sensor networks (WSN) sensing a Complex Adaptive Environment. This specification model is then used to develop an agent-based model of both the wireless sensor network as well as the environment. As proof of concept, we demonstrate the application of FABS to a boids model of self-organized flocking of animals monitored by a random deployment of proximity sensors.

[41]  arXiv:1708.05878 [pdf]
Title: Event-Radar: Real-time Local Event Detection System for Geo-Tagged Tweet Streams
Comments: 12 pages
Subjects: Information Retrieval (cs.IR)

The local event detection is to use posting messages with geotags on social networks to reveal the related ongoing events and their locations. Recent studies have demonstrated that the geo-tagged tweet stream serves as an unprecedentedly valuable source for local event detection. Nevertheless, how to effectively extract local events from large geo-tagged tweet streams in real time remains challenging. A robust and efficient cloud-based real-time local event detection software system would benefit various aspects in the real-life society, from shopping recommendation for customer service providers to disaster alarming for emergency departments. We use the preliminary research GeoBurst as a starting point, which proposed a novel method to detect local events. GeoBurst+ leverages a novel cross-modal authority measure to identify several pivots in the query window. Such pivots reveal different geo-topical activities and naturally attract related tweets to form candidate events. It further summarises the continuous stream and compares the candidates against the historical summaries to pinpoint truly interesting local events. We mainly implement a website demonstration system Event-Radar with an improved algorithm to show the real-time local events online for public interests. Better still, as the query window shifts, our method can update the event list with little time cost, thus achieving continuous monitoring of the stream.

[42]  arXiv:1708.05884 [pdf, other]
Title: Teaching UAVs to Race Using UE4Sim
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Automating the navigation of unmanned aerial vehicles (UAVs) in diverse scenarios has gained much attention in the recent years. However, teaching UAVs to fly in challenging environments remains an unsolved problem, mainly due to the lack of data for training. In this paper, we develop a photo-realistic simulator that can afford the generation of large amounts of training data (both images rendered from the UAV camera and its controls) to teach a UAV to autonomously race through challenging tracks. We train a deep neural network to predict UAV controls from raw image data for the task of autonomous UAV racing. Training is done through imitation learning enabled by data augmentation to allow for the correction of navigation mistakes. Extensive experiments demonstrate that our trained network (when sufficient data augmentation is used) outperforms state-of-the-art methods and flies more consistently than many human pilots.

[43]  arXiv:1708.05887 [pdf, other]
Title: LTE PHY Layer Vulnerability Analysis and Testing Using Open-Source SDR Tools
Comments: 7 pages, 7 figures. Publication accepted at IEEE MILCOM, 2017
Subjects: Networking and Internet Architecture (cs.NI)

This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply our methodology to 4G LTE downlink by considering each control channel as a subsystem. We also develop open-source software enabling research and education using software-defined radios. We present experimental results with open-source LTE systems and shows how the different subsystems behave under targeted interference. The analysis for the LTE downlink shows that the synchronization signals (PSS/SSS) are very resilient to interference, whereas the downlink pilots or Cell-Specific Reference signals (CRS) are the most susceptible to a synchronized protocol-aware interferer. We also analyze the severity of control channel attacks for different LTE configurations. Our methodology and tools allow rapid evaluation of the PHY layer reliability in harsh signaling environments, which is an asset to improve current standards and develop new robust wireless protocols.

[44]  arXiv:1708.05889 [pdf, other]
Title: Analysis of Solar Energy Aggregation under Various Billing Mechanisms
Comments: 8 pages
Subjects: Systems and Control (cs.SY)

Ongoing reductions in the cost of solar photovoltaic (PV) systems are driving increased residential households installations. Various incentive programs such as feed-in tariff, net metering, net purchase and sale that allow the consumers to sell their generated electricity to the grid are also powering this trend. In this paper, we investigate sharing of PV systems among a set of households who can also benefit further by pooling their production. We first find conditions under which such sharing decreases their net total cost. Next, we develop allocation rules such that the joint net electricity consumption cost is allocated to the participants based on cost causation principle. The joint cost also satisfies standalone cost principle thus promoting PV solar aggregation.

[45]  arXiv:1708.05891 [pdf, other]
Title: Arabic Multi-Dialect Segmentation: bi-LSTM-CRF vs. SVM
Subjects: Computation and Language (cs.CL)

Arabic word segmentation is essential for a variety of NLP applications such as machine translation and information retrieval. Segmentation entails breaking words into their constituent stems, affixes and clitics. In this paper, we compare two approaches for segmenting four major Arabic dialects using only several thousand training examples for each dialect. The two approaches involve posing the problem as a ranking problem, where an SVM ranker picks the best segmentation, and as a sequence labeling problem, where a bi-LSTM RNN coupled with CRF determines where best to segment words. We are able to achieve solid segmentation results for all dialects using rather limited training data. We also show that employing Modern Standard Arabic data for domain adaptation and assuming context independence improve overall results.

[46]  arXiv:1708.05896 [pdf, other]
Title: A Cointuitionistic Adjoint Logic
Comments: 54 pages
Subjects: Logic in Computer Science (cs.LO)

One leading question with respect to Bi-intuitionistic logic (BINT) is, what does BINT look like across the three arcs -- logic, typed $\lambda$-calculi, and category theory -- of the Curry-Howard-Lambek correspondence? Categorically, BINT can be seen as a mixing of two worlds: the first being intuitionistic logic (IL), which is modeled by a cartesian closed category, and the second being the dual to intuitionistic logic called cointuitionistic logic (coIL), which is modeled by a cocartesian coclosed category. Crolard showed that combining these two categories into the same category results in it degenerating to a poset. However, this degeneration does not occur when both logics are linear. We propose that IL and coIL need to be separated, and then mixed in a controlled way using the modalities from linear logic. This separation can be ultimately achieved by an adjoint formalization of bi-intuitionistic logic. This formalization consists of three worlds instead of two: the first is intuitionistic logic, the second is linear bi-intuitionistic (Bi-ILL), and the third is cointuitionistic logic. They are then related via two adjunctions. The adjunction between IL and ILL is known as a Linear/Non-linear model (LNL model) of ILL, and is due to Benton. However, the dual to LNL models which would amount to the adjunction between coILL and coIL has yet to appear in the literature. In this paper we fill this gap by studying the dual to LNL models which we call dual LNL models. We show that dual LNL models correspond to dual linear categories, the dual to Bierman's linear categories proposed by Bellin. Then we give the definition of bi-LNL models by combining our model with LNL models to obtain a new model of bi-intuitionistic logic. Finally, we give a corresponding sequent calculus, natural deduction, and term assignment for dual LNL models.

[47]  arXiv:1708.05897 [pdf]
Title: Computer-aided diagnosis of lung nodule using gradient tree boosting and Bayesian optimization
Comments: 29 pages, 4 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We aimed to evaluate computer-aided diagnosis (CADx) system for lung nodule classification focusing on (i) usefulness of gradient tree boosting (XGBoost) and (ii) effectiveness of parameter optimization using Bayesian optimization (Tree Parzen Estimator, TPE) and random search. 99 lung nodules (62 lung cancers and 37 benign lung nodules) were included from public databases of CT images. A variant of local binary pattern was used for calculating feature vectors. Support vector machine (SVM) or XGBoost was trained using the feature vectors and their labels. TPE or random search was used for parameter optimization of SVM and XGBoost. Leave-one-out cross-validation was used for optimizing and evaluating the performance of our CADx system. Performance was evaluated using area under the curve (AUC) of receiver operating characteristic analysis. AUC was calculated 10 times and, its average was obtained. The best averaged AUC of SVM and XGBoost were 0.850 and 0.896, respectively; both were obtained using TPE. XGBoost was generally superior to SVM. Optimal parameters for achieving high AUC were obtained with fewer numbers of trials when using TPE, compared with random search. In conclusion, XGBoost was better than SVM for classifying lung nodules. TPE was more efficient than random search for parameter optimization.

[48]  arXiv:1708.05903 [pdf, other]
Title: An FPT algorithm for planar multicuts with sources and sinks on the outer face
Authors: Cédric Bentz
Comments: 15 pages, 1 figure
Subjects: Data Structures and Algorithms (cs.DS)

Given a list of k source-sink pairs in an edge-weighted graph G, the minimum multicut problem consists in selecting a set of edges of minimum total weight in G, such that removing these edges leaves no path from each source to its corresponding sink. To the best of our knowledge, no non-trivial FPT result for special cases of this problem, which is APX-hard in general graphs for any fixed k>2, is known with respect to k only. When the graph G is planar, this problem is known to be polynomial-time solvable if k=O(1), but cannot be FPT with respect to k under the Exponential Time Hypothesis.
In this paper, we show that, if G is planar and in addition all sources and sinks lie on the outer face, then this problem does admit an FPT algorithm when parameterized by k (although it remains APX-hard when k is part of the input, even in stars). To do this, we provide a new characterization of optimal solutions in this case, and then use it to design a "divide-and-conquer" approach: namely, some edges that are part of any such solution actually define an optimal solution for a polynomial-time solvable multiterminal variant of the problem on some of the sources and sinks (which can be identified thanks to a reduced enumeration phase). Removing these edges from the graph cuts it into several smaller instances, which can then be solved recursively.

[49]  arXiv:1708.05904 [pdf, other]
Title: Modular Safety Verification for Stateful Networks
Authors: Kalev Alpernas (Tel Aviv University), Roman Manevich (Ben-Gurion University of the Negev), Aurojit Panda (UC Berkeley), Mooly Sagiv (Tel Aviv University), Scott Shenker (UC Berkeley), Sharon Shoham (Tel Aviv University), Yaron Velner (Hebrew University of Jerusalem)
Subjects: Programming Languages (cs.PL)

Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification.
We describe a new algorithm for conservatively checking the safety of stateful networks. Our algorithm is modular in the sense that it repeatedly analyzes each middlebox separately w.r.t. an intermediate global state view. Its asymptotic complexity is polynomial in the size of the network, albeit being exponential in the maximal number of queries of the local state that a middlebox can do, which is often small.
Our algorithm is sound, i.e., it can never miss a violation of safety but may fail to verify some properties. The algorithm performs on-the fly abstract interpretation by (1) abstracting away the order of packet processing, (2) abstracting away correlations between states of different middleboxes and channel contents, and (3) representing middlebox states by their effect on each packet separately, rather than taking into account the entire state space. We show that the abstractions do not lose precision when the middlebox may reset in any state. This is encouraging since many real middleboxes reset, e.g., after some session timeout is reached or due to hardware failure.

[50]  arXiv:1708.05905 [pdf, other]
Title: Designing for Pragmatists and Fundamentalists: Privacy Concerns and Attitudes on the Internet of Things
Comments: Brazilian Symposium on Human Factors in Computing Systems (HC'17), October 23-27, 2017, Joinville, SC, Brazil. 10 pages, 5 figures
Subjects: Human-Computer Interaction (cs.HC)

Internet of Things (IoT) systems have aroused enthusiasm and concerns. Enthusiasm comes from their utilities in people daily life, and concerns may be associated with privacy issues. By using two IoT systems as case-studies, we examine users' privacy beliefs, concerns and attitudes. We focus on four major dimensions: the collection of personal data, the inference of new information, the exchange of information to third parties, and the risk-utility trade-off posed by the features of the system. Altogether, 113 Brazilian individuals answered a survey about such dimensions. Although their perceptions seem to be dependent on the context, there are recurrent patterns. Our results suggest that IoT users can be classified into unconcerned, fundamentalists and pragmatists. Most of them exhibit a pragmatist profile and believe in privacy as a right guaranteed by law. One of the most privacy concerning aspect is the exchange of personal information to third parties. Individuals' perceived risk is negatively correlated with their perceived utility in the features of the system. We discuss practical implications of these results and suggest heuristics to cope with privacy concerns when designing IoT systems.

[51]  arXiv:1708.05907 [pdf, other]
Title: Electricity Theft Detection using Machine Learning
Authors: Niklas Dahringer
Subjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Learning (cs.LG)

Non-technical losses (NTL) in electric power grids arise through electricity theft, broken electric meters or billing errors. They can harm the power supplier as well as the whole economy of a country through losses of up to 40% of the total power distribution. For NTL detection, researchers use artificial intelligence to analyse data. This work is about improving the extraction of more meaningful features from a data set. With these features, the prediction quality will increase.

[52]  arXiv:1708.05908 [pdf, other]
Title: Designing virus-resistant, high-performance networks: a game-formation approach
Comments: accepted for publication in IEEE Transactions on Control of Network Systems
Subjects: Computer Science and Game Theory (cs.GT); Networking and Internet Architecture (cs.NI); Systems and Control (cs.SY)

Designing an optimal network topology while balancing multiple, possibly conflicting objectives like cost, performance, and resiliency to viruses is a challenging endeavor, let alone in the case of decentralized network formation. We therefore propose a game-formation technique where each player aims to minimize its cost in installing links, the probability of being infected by a virus and the sum of hopcounts on its shortest paths to all other nodes.
In this article, we (1) determine the Nash Equilibria and the Price of Anarchy for our novel network formation game, (2) demonstrate that the Price of Anarchy (PoA) is usually low, which suggests that (near-)optimal topologies can be formed in a decentralized way, and (3) give suggestions for practitioners for those cases where the PoA is high and some centralized control/incentives are advisable.

[53]  arXiv:1708.05918 [pdf, other]
Title: Adaptive Sampling for Rapidly Matching Histograms
Subjects: Databases (cs.DB)

In exploratory data analysis, analysts often have a need to identify histograms that possess a specific distribution, among a large class of candidate histograms, e.g., find histograms of countries whose income distribution is most similar to that of Greece. This distribution could be a new one that the user is curious about, or a known distribution from an existing histogram visualization. At present, this process of identification is brute-force, requiring the manual generation and evaluation of a large number of histograms. We present FastMatch: an end-to-end architecture for interactively retrieving the histogram visualizations that are most similar to a user-specified target, from a large collection of histograms. The primary technical contribution underlying FastMatch is a sublinear algorithm, HistSim, a theoretically sound sampling-based approach to identify the top-$k$ closest histograms under $\ell_1$ distance. While HistSim can be used independently, within FastMatch we couple HistSim with a novel system architecture that is aware of practical considerations, employing block-based sampling policies and asynchronous statistics and computation, building on lightweight sampling engines developed in recent work. In our experiments on several real-world datasets, FastMatch obtains near-perfect accuracy with up to $100\times$ speedups over less sophisticated approaches.

[54]  arXiv:1708.05922 [pdf, other]
Title: 360-degree Video Stitching for Dual-fisheye Lens Cameras Based On Rigid Moving Least Squares
Comments: Preprint version
Subjects: Multimedia (cs.MM)

Dual-fisheye lens cameras are becoming popular for 360-degree video capture, especially for User-generated content (UGC), since they are affordable and portable. Images generated by the dual-fisheye cameras have limited overlap and hence require non-conventional stitching techniques to produce high-quality 360x180-degree panoramas. This paper introduces a novel method to align these images using interpolation grids based on rigid moving least squares. Furthermore, jitter is the critical issue arising when one applies the image-based stitching algorithms to video. It stems from the unconstrained movement of stitching boundary from one frame to another. Therefore, we also propose a new algorithm to maintain the temporal coherence of stitching boundary to provide jitter-free 360-degree videos. Results show that the method proposed in this paper can produce higher quality stitched images and videos than prior work.

[55]  arXiv:1708.05924 [pdf, other]
Title: A Deep Q-Network for the Beer Game with Partial Information
Subjects: Learning (cs.LG); Multiagent Systems (cs.MA)

The beer game is a decentralized, multi-agent, cooperative problem that can be modeled as a serial supply chain network in which agents cooperatively attempt to minimize the total cost of the network even though each agent can only observe its own local information. We develop a variant of the Deep Q-Network algorithm to solve this problem. Extensive numerical experiment show the effectiveness of our algorithm. Unlike most algorithms in literature, our algorithm does not have any limits on the parameter values, and it provides good solutions even if the agents do not follow a rational policy. The algorithm can be extended to other decentralized multi-agent cooperative games with partially observed information, which is a common type of situation in supply chain problems.

[56]  arXiv:1708.05926 [pdf, other]
Title: Tamper-Evident Complex Genomic Networks
Comments: 14 pages, 8 figures
Subjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)

Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamper-evident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamper-evident networks using a combination of Cryptographic and Ego-based Network analytic methods. Using actual published data-sets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.

[57]  arXiv:1708.05929 [pdf, other]
Title: X-PACS: eXPlaining Anomalies by Characterizing Subspaces
Comments: 10 pages, 5 figures, 5 tables
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

Anomaly detection has numerous critical applications in finance, security, etc. and has been vastly studied. In this paper, we tap into a gap in the literature and consider a complementary problem: anomaly description. Interpretation of anomalies has important implications for decision makers, from being able to troubleshoot and prioritize their actions to making policy changes for prevention. We present a new method called X-PACS which "reverse-engineers" the known anomalies in a dataset by identifying a few anomalous patterns that they form along with the characterizing subspace of features that separates them from normal instances. From a descriptive data mining perspective, our solution has five key desired properties. It can unearth anomalous patterns (i) of multiple different types, (ii) hidden in arbitrary subspaces of a high dimensional space, (iii) interpretable by the end-users, (iv) succinct, providing the shortest data description, and finally (v) different from normal patterns of the data. There is no existing work on anomaly description that satisfy all of these desiderata simultaneously. While not our primary goal, anomalous patterns X-PACS finds can further be seen as multiple, interpretable "signatures" and can be used for detection. We show the effectiveness of X-PACS in explanation as well as detection tasks on 9 real-world datasets.

[58]  arXiv:1708.05930 [pdf, ps, other]
Title: Solving a New 3D Bin Packing Problem with Deep Reinforcement Learning Method
Comments: 7 pages, 1 figures
Subjects: Artificial Intelligence (cs.AI)

In this paper, a new type of 3D bin packing problem (BPP) is proposed, in which a number of cuboid-shaped items must be put into a bin one by one orthogonally. The objective is to find a way to place these items that can minimize the surface area of the bin. This problem is based on the fact that there is no fixed-sized bin in many real business scenarios and the cost of a bin is proportional to its surface area. Our research shows that this problem is NP-hard. Based on previous research on 3D BPP, the surface area is determined by the sequence, spatial locations and orientations of items. Among these factors, the sequence of items plays a key role in minimizing the surface area. Inspired by recent achievements of deep reinforcement learning (DRL) techniques, especially Pointer Network, on combinatorial optimization problems such as TSP, a DRL-based method is applied to optimize the sequence of items to be packed into the bin. Numerical results show that the method proposed in this paper achieve about 5% improvement than heuristic method.

[59]  arXiv:1708.05935 [pdf]
Title: Software-Defined Robotics -- Idea & Approach
Authors: Ali Al-Bayaty
Comments: 4 pages, 4 figures, robotics and automation, Software-Defined Robotics
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI)

The methodology of Software-Defined Robotics hierarchical-based and stand-alone framework can be designed and implemented to program and control different sets of robots, regardless of their manufacturers' parameters and specifications, with unified commands and communications. This framework approach will increase the capability of (re)programming a specific group of robots during the runtime without affecting the others as desired in the critical missions and industrial operations, expand the shared bandwidth, enhance the reusability of code, leverage the computational processing power, decrease the unnecessary analyses of vast supplemental electrical components for each robot, as well as get advantages of the most state-of-the-art industrial trends in the cloud-based computing, Virtual Machines (VM), and Robot-as-a-Service (RaaS) technologies.

[60]  arXiv:1708.05939 [pdf, other]
Title: Message Passing in C-RAN: Joint User Activity and Signal Detection
Comments: Conference, 6 pages, 7 figures, accepted by IEEE Globecom 2017
Subjects: Information Theory (cs.IT)

In cloud radio access network (C-RAN), remote radio heads (RRHs) and users are uniformly distributed in a large area such that the channel matrix can be considered as sparse. Based on this phenomenon, RRHs only need to detect the relatively strong signals from nearby users and ignore the weak signals from far users, which is helpful to develop low-complexity detection algorithms without causing much performance loss. However, before detection, RRHs require to obtain the realtime user activity information by the dynamic grant procedure, which causes the enormous latency. To address this issue, in this paper, we consider a grant-free C-RAN system and propose a low-complexity Bernoulli-Gaussian message passing (BGMP) algorithm based on the sparsified channel, which jointly detects the user activity and signal. Since active users are assumed to transmit Gaussian signals at any time, the user activity can be regarded as a Bernoulli variable and the signals from all users obey a Bernoulli-Gaussian distribution. In the BGMP, the detection functions for signals are designed with respect to the Bernoulli-Gaussian variable. Numerical results demonstrate the robustness and effectivity of the BGMP. That is, for different sparsified channels, the BGMP can approach the mean-square error (MSE) of the genie-aided sparse minimum mean-square error (GA-SMMSE) which exactly knows the user activity information. Meanwhile, the fast convergence and strong recovery capability for user activity of the BGMP are also verified.

[61]  arXiv:1708.05942 [pdf, other]
Title: The Helsinki Neural Machine Translation System
Comments: Proceedings of the Second Conference on Machine Translation (WMT 2017) at EMNLP 2017, Copenhagen/Danmark
Subjects: Computation and Language (cs.CL)

We introduce the Helsinki Neural Machine Translation system (HNMT) and how it is applied in the news translation task at WMT 2017, where it ranked first in both the human and automatic evaluations for English--Finnish. We discuss the success of English--Finnish translations and the overall advantage of NMT over a strong SMT baseline. We also discuss our submissions for English--Latvian, English--Chinese and Chinese--English.

[62]  arXiv:1708.05943 [pdf, other]
Title: Neural Machine Translation with Extended Context
Comments: Proceedings of the Third Workshop on Discourse in Machine Translation (DiscoMT 2017) at EMNLP 2017, Copenhagen/Danmark
Subjects: Computation and Language (cs.CL)

We investigate the use of extended context in attention-based neural machine translation. We base our experiments on translated movie subtitles and discuss the effect of increasing the segments beyond single translation units. We study the use of extended source language context as well as bilingual context extensions. The models learn to distinguish between information from different segments and are surprisingly robust with respect to translation quality. In this pilot study, we observe interesting cross-sentential attention patterns that improve textual coherence in translation at least in some selected cases.

[63]  arXiv:1708.05947 [pdf, ps, other]
Title: Golden Angle Modulation
Authors: Peter Larsson
Comments: 4 pages, 4 figures. Submitted for possible publication in wireless communication letters. Extract from draft PhD thesis chapter
Subjects: Information Theory (cs.IT)

Quadrature amplitude modulation (QAM) exhibits a shaping-loss of $\pi \mathrm{e}/6$, ($\approx1.53$ dB) compared to the AWGN Shannon capacity. With inspiration gained from special (leaf, flower petal, and seed) packing arrangements (spiral phyllotaxis) found among plants, a novel, shape-versatile, circular symmetric, modulation scheme, the Golden Angle Modulation (GAM) is introduced. Disc-shaped, and complex Gaussian approximating bell-shaped, GAM-signal constellations are considered. For bell-GAM, a high-rate approximation, and a mutual information optimization formulation, are developed. Bell-GAM overcomes the asymptotic shaping-loss seen in QAM, and offers Shannon capacity approaching performance. Transmitter resource limited links, such as space probe-to-earth, and mobile-to-basestation, are cases where GAM could be particularly valuable.

[64]  arXiv:1708.05956 [pdf, other]
Title: An End-to-End Trainable Neural Network Model with Belief Tracking for Task-Oriented Dialog
Authors: Bing Liu, Ian Lane
Comments: Published at Interspeech 2017
Subjects: Computation and Language (cs.CL)

We present a novel end-to-end trainable neural network model for task-oriented dialog systems. The model is able to track dialog state, issue API calls to knowledge base (KB), and incorporate structured KB query results into system responses to successfully complete task-oriented dialogs. The proposed model produces well-structured system responses by jointly learning belief tracking and KB result processing conditioning on the dialog history. We evaluate the model in a restaurant search domain using a dataset that is converted from the second Dialog State Tracking Challenge (DSTC2) corpus. Experiment results show that the proposed model can robustly track dialog state given the dialog history. Moreover, our model demonstrates promising results in producing appropriate system responses, outperforming prior end-to-end trainable neural network models using per-response accuracy evaluation metrics.

[65]  arXiv:1708.05959 [pdf, other]
Title: Kirchhoff Index As a Measure of Edge Centrality in Weighted Networks: Nearly Linear Time Algorithms
Subjects: Data Structures and Algorithms (cs.DS); Social and Information Networks (cs.SI)

Most previous work of centralities focuses on metrics of vertex importance and methods for identifying powerful vertices, while related work for edges is much lesser, especially for weighted networks, due to the computational challenge. In this paper, we propose to use the well-known Kirchhoff index as the measure of edge centrality in weighted networks, called $\theta$-Kirchhoff edge centrality. The Kirchhoff index of a network is defined as the sum of effective resistances over all vertex pairs. The centrality of an edge $e$ is reflected in the increase of Kirchhoff index of the network when the edge $e$ is partially deactivated, characterized by a parameter $\theta$. We define two equivalent measures for $\theta$-Kirchhoff edge centrality. Both are global metrics and have a better discriminating power than commonly used measures, based on local or partial structural information of networks, e.g. edge betweenness and spanning edge centrality.
Despite the strong advantages of Kirchhoff index as a centrality measure and its wide applications, computing the exact value of Kirchhoff edge centrality for each edge in a graph is computationally demanding. To solve this problem, for each of the $\theta$-Kirchhoff edge centrality metrics, we present an efficient algorithm to compute its $\epsilon$-approximation for all the $m$ edges in nearly linear time in $m$. The proposed $\theta$-Kirchhoff edge centrality is the first global metric of edge importance that can be provably approximated in nearly-linear time. Moreover, according to the $\theta$-Kirchhoff edge centrality, we present a $\theta$-Kirchhoff vertex centrality measure, as well as a fast algorithm that can compute $\epsilon$-approximate Kirchhoff vertex centrality for all the $n$ vertices in nearly linear time in $m$.

[66]  arXiv:1708.05965 [pdf, other]
Title: On the topology effects in wireless sensor networks based prognostics and health management
Comments: 19th IEEE International Conference on Computational Science and Engineering
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computers and Society (cs.CY)

In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from the network. This will lead to broken links and data loss. It is therefore important to keep the network running for as long as possible by preserving the energy held by the nodes. Indeed, saving the quality of service (QoS) of a wireless sensor network for a long period is very important in order to ensure accurate data. Then, the area diagnosing will be more accurate. From another side, packet transmission is the phase that consumes the highest amount of energy comparing to other activities in the network. Therefore, we can see that the network topology has an important impact on energy efficiency, and thus on data and diagnosis accuracies. In this paper, we study and compare four network topologies: distributed, hierarchical, centralized, and decentralized topology and show their impact on the resulting estimation of diagnostics. We have used six diagnostic algorithms, to evaluate both prognostic and health management with the variation of type of topology in WSN.

[67]  arXiv:1708.05966 [pdf, other]
Title: Incremental Import Vector Machines for Classifying Hyperspectral Data
Journal-ref: IEEE Transactions on Geoscience and Remote Sensing, Vol.50, No.09, September 2012, 3463-3473
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In this paper we propose an incremental learning strategy for import vector machines (IVM), which is a sparse kernel logistic regression approach. We use the procedure for the concept of self-training for sequential classification of hyperspectral data. The strategy comprises the inclusion of new training samples to increase the classification accuracy and the deletion of non-informative samples to be memory- and runtime-efficient. Moreover, we update the parameters in the incremental IVM model without re-training from scratch. Therefore, the incremental classifier is able to deal with large data sets. The performance of the IVM in comparison to support vector machines (SVM) is evaluated in terms of accuracy and experiments are conducted to assess the potential of the probabilistic outputs of the IVM. Experimental results demonstrate that the IVM and SVM perform similar in terms of classification accuracy. However, the number of import vectors is significantly lower when compared to the number of support vectors and thus, the computation time during classification can be decreased. Moreover, the probabilities provided by IVM are more reliable, when compared to the probabilistic information, derived from an SVM's output. In addition, the proposed self-training strategy can increase the classification accuracy. Overall, the IVM and the its incremental version is worthwhile for the classification of hyperspectral data.

[68]  arXiv:1708.05969 [pdf, other]
Title: Applying Data Augmentation to Handwritten Arabic Numeral Recognition Using Deep Learning Neural Networks
Comments: 5 pages, 6 figures, 3 tables, Accepted on 4th International Conference on Advances in Electrical Engineering (ICAEE)
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Handwritten character recognition has been the center of research and a benchmark problem in the sector of pattern recognition and artificial intelligence, and it continues to be a challenging research topic. Due to its enormous application many works have been done in this field focusing on different languages. Arabic, being a diversified language has a huge scope of research with potential challenges. A convolutional neural network model for recognizing handwritten numerals in Arabic language is proposed in this paper, where the dataset is subject to various augmentation in order to add robustness needed for deep learning approach. The proposed method is empowered by the presence of dropout regularization to do away with the problem of data overfitting. Moreover, suitable change is introduced in activation function to overcome the problem of vanishing gradient. With these modifications, the proposed system achieves an accuracy of 99.4\% which performs better than every previous work on the dataset.

[69]  arXiv:1708.05970 [pdf, other]
Title: An improved watermarking scheme for Internet applications
Comments: Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 20-25, 2010. pp. 119-124
Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Information Theory (cs.IT)

In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hidden channels, and social search engines. By using Reed Solomon error correcting codes and wavelets domain, we show that this data hiding scheme can be improved to solve issues and requirements raised by these Internet fields.

[70]  arXiv:1708.05974 [pdf, other]
Title: Shapelet-based Sparse Representation for Landcover Classification of Hyperspectral Images
Journal-ref: IEEE Transactions on Geoscience and Remote Sensing, Volume: 54, Issue: 3, March 2016, 1623 - 1634
Subjects: Computer Vision and Pattern Recognition (cs.CV)

This paper presents a sparse representation-based classification approach with a novel dictionary construction procedure. By using the constructed dictionary sophisticated prior knowledge about the spatial nature of the image can be integrated. The approach is based on the assumption that each image patch can be factorized into characteristic spatial patterns, also called shapelets, and patch-specific spectral information. A set of shapelets is learned in an unsupervised way and spectral information are embodied by training samples. A combination of shapelets and spectral information are represented in an undercomplete spatial-spectral dictionary for each individual patch, where the elements of the dictionary are linearly combined to a sparse representation of the patch. The patch-based classification is obtained by means of the representation error. Experiments are conducted on three well-known hyperspectral image datasets. They illustrate that our proposed approach shows superior results in comparison to sparse representation-based classifiers that use only limited spatial information and behaves competitively with or better than state-of-the-art classifiers utilizing spatial information and kernelized sparse representation-based classifiers.

[71]  arXiv:1708.05978 [pdf, other]
Title: Stochastic Primal-Dual Proximal ExtraGradient Descent for Compositely Regularized Optimization
Subjects: Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)

We consider a wide range of regularized stochastic minimization problems with two regularization terms, one of which is composed with a linear function. This optimization model abstracts a number of important applications in artificial intelligence and machine learning, such as fused Lasso, fused logistic regression, and a class of graph-guided regularized minimization. The computational challenges of this model are in two folds. On one hand, the closed-form solution of the proximal mapping associated with the composed regularization term or the expected objective function is not available. On the other hand, the calculation of the full gradient of the expectation in the objective is very expensive when the number of input data samples is considerably large. To address these issues, we propose a stochastic variant of extra-gradient type methods, namely \textsf{Stochastic Primal-Dual Proximal ExtraGradient descent (SPDPEG)}, and analyze its convergence property for both convex and strongly convex objectives. For general convex objectives, the uniformly average iterates generated by \textsf{SPDPEG} converge in expectation with $O(1/\sqrt{t})$ rate. While for strongly convex objectives, the uniformly and non-uniformly average iterates generated by \textsf{SPDPEG} converge with $O(\log(t)/t)$ and $O(1/t)$ rates, respectively. The order of the rate of the proposed algorithm is known to match the best convergence rate for first-order stochastic algorithms. Experiments on fused logistic regression and graph-guided regularized logistic regression problems show that the proposed algorithm performs very efficiently and consistently outperforms other competing algorithms.

[72]  arXiv:1708.05979 [pdf, other]
Title: An Efficient Single Chord-based Accumulation Technique (SCA) to Detect More Reliable Corners
Comments: 5 pages, 7 figures, 2 tables, Accepted on 4th International Conference on Advances in Electrical Engineering (ICAEE)
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Corner detection is a vital operation in numerous computer vision applications. The Chord-to-Point Distance Accumulation (CPDA) detector is recognized as the contour-based corner detector producing the lowest localization error while localizing corners in an image. However, in our experiment part, we demonstrate that CPDA detector often misses some potential corners. Moreover, the detection algorithm of CPDA is computationally costly. In this paper, We focus on reducing localization error as well as increasing average repeatability. The preprocessing and refinements steps of proposed process are similar to CPDA. Our experimental results will show the effectiveness and robustness of proposed process over CPDA.

[73]  arXiv:1708.05980 [pdf, other]
Title: Attentive Semantic Video Generation using Captions
Subjects: Computer Vision and Pattern Recognition (cs.CV)

This paper proposes a network architecture to perform variable length semantic video generation using captions. We adopt a new perspective towards video generation where we allow the captions to be combined with the long-term and short-term dependencies between video frames and thus generate a video in an incremental manner. Our experiments demonstrate our network architecture's ability to distinguish between objects, actions and interactions in a video and combine them to generate videos for unseen captions. The network also exhibits the capability to perform spatio-temporal style transfer when asked to generate videos for a sequence of captions. We also show that the network's ability to learn a latent representation allows it generate videos in an unsupervised manner and perform other tasks such as action recognition.

[74]  arXiv:1708.05987 [pdf, ps, other]
Title: Perceptual audio loss function for deep learning
Subjects: Sound (cs.SD); Learning (cs.LG)

PESQ and POLQA , are standards are standards for automated assessment of voice quality of speech as experienced by human beings. The predictions of those objective measures should come as close as possible to subjective quality scores as obtained in subjective listening tests. Wavenet is a deep neural network originally developed as a deep generative model of raw audio wave-forms. Wavenet architecture is based on dilated causal convolutions, which exhibit very large receptive fields. In this short paper we suggest using the Wavenet architecture, in particular its large receptive filed in order to learn PESQ algorithm. By doing so we can use it as a differentiable loss function for speech enhancement.

[75]  arXiv:1708.05992 [pdf, other]
Title: LSTM Network for Inflected Abbreviation Expansion
Authors: Piotr Żelasko
Subjects: Computation and Language (cs.CL)

In this paper, the problem of recovery of morphological information lost in abbreviated forms is addressed with a focus on highly inflected languages. Evidence is presented that the correct inflected form of an expanded abbreviation can in many cases be deduced solely from morphosyntactic tags of the context. The prediction model is a deep bidirectional LSTM network with tag embedding. The network is trained on over 10 million words from the Polish Sejm Corpus and achieves 74.2\% prediction accuracy on a smaller, but more general National Corpus of Polish. Analysis of errors suggests that performance in this task may improve if some prior knowledge about the abbreviated word is incorporated into the model.

[76]  arXiv:1708.05997 [pdf, ps, other]
Title: A Batch Noise Contrastive Estimation Approach for Training Large Vocabulary Language Models
Comments: Accepted for publication at INTERSPEECH'17. The paper is 5 pages long in a two-column format
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)

Training large vocabulary Neural Network Language Models (NNLMs) is a difficult task due to the explicit requirement of the output layer normalization, which typically involves the evaluation of the full softmax function over the complete vocabulary. This paper proposes a Batch Noise Contrastive Estimation (B-NCE) approach to alleviate this problem. This is achieved by reducing the vocabulary, at each time step, to the target words in the batch and then replacing the softmax by the noise contrastive estimation approach, where these words play the role of targets and noise samples at the same time. In doing so, the proposed approach can be fully formulated and implemented using optimal dense matrix operations. Applying B-NCE to train different NNLMs on the Large Text Compression Benchmark (LTCB) and the One Billion Word Benchmark (OBWB) shows a significant reduction of the training time with no noticeable degradation of the models performance. This paper also presents a new baseline comparative study of different standard NNLMs on the large OBWB on a single Titan-X GPU.

[77]  arXiv:1708.05999 [pdf, other]
Title: Jointly Optimal Routing and Caching for Arbitrary Network Topologies
Comments: This is the extended version of the paper "Jointly Optimal Routing and Caching for Arbitrary Network Topologies", appearing in the 4th ACM Conference on Information-Centric Networking (ICN 2017), Berlin, Sep. 26-28, 2017
Subjects: Networking and Internet Architecture (cs.NI)

We study a problem of fundamental importance to ICNs, namely, minimizing routing costs by jointly optimizing caching and routing decisions over an arbitrary network topology. We consider both source routing and hop-by-hop routing settings. The respective offline problems are NP-hard. Nevertheless, we show that there exist polynomial time approximation algorithms producing solutions within a constant approximation from the optimal. We also produce distributed, adaptive algorithms with the same approximation guarantees. We simulate our adaptive algorithms over a broad array of different topologies. Our algorithms reduce routing costs by several orders of magnitude compared to prior art, including algorithms optimizing caching under fixed routing.

[78]  arXiv:1708.06000 [pdf, other]
Title: Efficient Online Inference for Infinite Evolutionary Cluster models with Applications to Latent Social Event Discovery
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Social and Information Networks (cs.SI)

The Recurrent Chinese Restaurant Process (RCRP) is a powerful statistical method for modeling evolving clusters in large scale social media data. With the RCRP, one can allow both the number of clusters and the cluster parameters in a model to change over time. However, application of the RCRP has largely been limited due to the non-conjugacy between the cluster evolutionary priors and the Multinomial likelihood. This non-conjugacy makes inference di cult and restricts the scalability of models which use the RCRP, leading to the RCRP being applied only in simple problems, such as those that can be approximated by a single Gaussian emission. In this paper, we provide a novel solution for the non-conjugacy issues for the RCRP and an example of how to leverage our solution for one speci c problem - the social event discovery problem. By utilizing Sequential Monte Carlo methods in inference, our approach can be massively paralleled and is highly scalable, to the extent it can work on tens of millions of documents. We are able to generate high quality topical and location distributions of the clusters that can be directly interpreted as real social events, and our experimental results suggest that the approaches proposed achieve much better predictive performance than techniques reported in prior work. We also demonstrate how the techniques we develop can be used in a much more general ways toward similar problems.

[79]  arXiv:1708.06004 [pdf, other]
Title: Boltzmann machines for time-series
Authors: Takayuki Osogami
Comments: 32 pages. The topics covered in this paper are presented in Part III of IJCAI-17 tutorial on energy-based machine learning. this https URL
Subjects: Neural and Evolutionary Computing (cs.NE)

We review Boltzmann machines extended for time-series. These models often have recurrent structure, and back propagration through time (BPTT) is used to learn their parameters. The per-step computational complexity of BPTT in online learning, however, grows linearly with respect to the length of preceding time-series (i.e., learning rule is not local in time), which limits the applicability of BPTT in online learning. We then review dynamic Boltzmann machines (DyBMs), whose learning rule is local in time. DyBM's learning rule relates to spike-timing dependent plasticity (STDP), which has been postulated and experimentally confirmed for biological neural networks.

[80]  arXiv:1708.06008 [pdf, other]
Title: Boltzmann machines and energy-based models
Authors: Takayuki Osogami
Comments: 36 pages. The topics covered in this paper are presented in Part I of IJCAI-17 tutorial on energy-based machine learning. this https URL
Subjects: Neural and Evolutionary Computing (cs.NE)

We review Boltzmann machines and energy-based models. A Boltzmann machine defines a probability distribution over binary-valued patterns. One can learn parameters of a Boltzmann machine via gradient based approaches in a way that log likelihood of data is increased. The gradient and Laplacian of a Boltzmann machine admit beautiful mathematical representations, although computing them is in general intractable. This intractability motivates approximate methods, including Gibbs sampler and contrastive divergence, and tractable alternatives, namely energy-based models.

[81]  arXiv:1708.06010 [pdf, ps, other]
Title: The Universal Process
Authors: Yuxi Fu
Subjects: Logic in Computer Science (cs.LO)

A universal process of a process calculus is one that, given the G\"{o}del index of a process of a certain type, produces a process equivalent to the encoded process. This paper demonstrates how universal processes can be formally defined and how a universal process of the value-passing calculus can be constructed. The existence of such a universal process in a process model can be explored to implement higher order communications, security protocols, and programming languages in the process model. A process version of the S-m-n theorem is stated to showcase how to embed the recursion theory in a process calculus.

[82]  arXiv:1708.06011 [pdf, ps, other]
Title: Modelling Word Burstiness in Natural Language: A Generalised Polya Process for Document Language Models in Information Retrieval
Authors: Ronan Cummins
Comments: 12 pages
Subjects: Information Retrieval (cs.IR)

We introduce a generalised multivariate Polya process for document language modelling. The framework outlined here generalises a number of statistical language models used in information retrieval for modelling document generation. In particular, we show that the choice of replacement matrix M ultimately defines the type of random process and therefore defines a particular type of document language model. We show that a particular variant of the general model is useful for modelling term-specific burstiness. Furthermore, via experimentation we show that this variant significantly improves retrieval effectiveness over a strong baseline on a number of small test collections.

[83]  arXiv:1708.06012 [pdf, ps, other]
Title: Product Matrix Minimum Storage Regenerating Codes with Flexible Number of Helpers
Comments: IEEE Information Theory Workshop (ITW) 2017
Subjects: Information Theory (cs.IT)

In coding for distributed storage systems, efficient data reconstruction and repair through accessing a predefined number of arbitrarily chosen storage nodes is guaranteed by regenerating codes. Traditionally, code parameters, specially the number of helper nodes participating in a repair process, are predetermined. However, depending on the state of the system and network traffic, it is desirable to adapt such parameters accordingly in order to minimize the cost of repair. In this work a class of regenerating codes with minimum storage is introduced that can simultaneously operate at the optimal repair bandwidth, for a wide range of exact repair mechanisms, based on different number of helper nodes.

[84]  arXiv:1708.06013 [pdf, other]
Title: Robust and Scalable Power System State Estimation via Composite Optimization
Comments: 9 pages, 3 figures
Subjects: Systems and Control (cs.SY)

In today's cyber-enabled smart grids, high penetration of uncertain renewables, purposeful manipulation of meter readings, and the need for wide-area situational awareness, call for fast, accurate, and robust power system state estimation. The least-absolute-value (LAV) estimator is known for its robustness relative to the weighted least-squares (WLS) one. However, due to nonconvexity and nonsmoothness, existing LAV solvers based on linear programming are typically slow, hence inadequate for real-time system monitoring. This paper develops two novel algorithms for efficient LAV estimation, which draw from recent advances in composite optimization. The first is a deterministic linear proximal scheme that handles a sequence of convex quadratic problems, each efficiently solvable either via off-the-shelf algorithms or through the alternating direction method of multipliers. Leveraging the sparse connectivity inherent to power networks, the second scheme is stochastic, and updates only \emph{a few} entries of the complex voltage state vector per iteration. In particular, when voltage magnitude and (re)active power flow measurements are used only, this number reduces to one or two, \emph{regardless of} the number of buses in the network. This computational complexity evidently scales well to large-size power systems. Furthermore, by carefully \emph{mini-batching} the voltage and power flow measurements, accelerated implementation of the stochastic iterations becomes possible. The developed algorithms are numerically evaluated using a variety of benchmark power networks. Simulated tests corroborate that improved robustness can be attained at comparable or markedly reduced computation times for medium- or large-size networks relative to the "workhorse" WLS-based Gauss-Newton iterations.

[85]  arXiv:1708.06019 [pdf, other]
Title: A Capacity Scaling Law for Artificial Neural Networks
Comments: 13 pages, 4 figures, 2 listings of source code
Subjects: Neural and Evolutionary Computing (cs.NE); Learning (cs.LG)

In this article, we derive the calculation of two critical numbers that quantify the capabilities of artificial neural networks with gating functions, such as sign, sigmoid, or rectified linear units. First, we derive the calculation of the Vapnik-Chervonenkis dimension of a network with binary output layer, which is the theoretical limit for perfect fitting of the training data. Second, we derive what we call the MacKay dimension of the network. This is a theoretical limit indicating necessary catastrophic forgetting i.e., the upper limit for most uses of the network. Our derivation of the capacity is embedded into a Shannon communication model, which allows measuring the capacities of neural networks in bits. We then compare our theoretical derivations with experiments using different network configurations, diverse neural network implementations, varying activation functions, and several learning algorithms to confirm our upper bound. The result is that the capacity of a fully connected perceptron network scales strictly linear with the number of weights.

[86]  arXiv:1708.06020 [pdf, ps, other]
Title: Improving Deep Learning using Generic Data Augmentation
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

Deep artificial neural networks require a large corpus of training data in order to effectively learn, where collection of such training data is often expensive and laborious. Data augmentation overcomes this issue by artificially inflating the training set with label preserving transformations. Recently there has been extensive use of generic data augmentation to improve Convolutional Neural Network (CNN) task performance. This study benchmarks various popular data augmentation schemes to allow researchers to make informed decisions as to which training methods are most appropriate for their data sets. Various geometric and photometric schemes are evaluated on a coarse-grained data set using a relatively simple CNN. Experimental results, run using 4-fold cross-validation and reported in terms of Top-1 and Top-5 accuracy, indicate that cropping in geometric augmentation significantly increases CNN task performance.

[87]  arXiv:1708.06022 [pdf, other]
Title: Learning to Paraphrase for Question Answering
Comments: EMNLP 2017
Subjects: Computation and Language (cs.CL)

Question answering (QA) systems are sensitive to the many different ways natural language expresses the same information need. In this paper we turn to paraphrases as a means of capturing this knowledge and present a general framework which learns felicitous paraphrases for various QA tasks. Our method is trained end-to-end using question-answer pairs as a supervision signal. A question and its paraphrases serve as input to a neural scoring model which assigns higher weights to linguistic expressions most likely to yield correct answers. We evaluate our approach on QA over Freebase and answer sentence selection. Experimental results on three datasets show that our framework consistently improves performance, achieving competitive results despite the use of simple QA models.

[88]  arXiv:1708.06023 [pdf, other]
Title: Joint Multi-view Face Alignment in the Wild
Comments: submit to IEEE Transactions on Image Processing
Subjects: Computer Vision and Pattern Recognition (cs.CV)

The de facto algorithm for facial landmark estimation involves running a face detector with a subsequent deformable model fitting on the bounding box. This encompasses two basic problems: i) the detection and deformable fitting steps are performed independently, while the detector might not provide best-suited initialisation for the fitting step, ii) the face appearance varies hugely across different poses, which makes the deformable face fitting very challenging and thus distinct models have to be used (\eg, one for profile and one for frontal faces). In this work, we propose the first, to the best of our knowledge, joint multi-view convolutional network to handle large pose variations across faces in-the-wild, and elegantly bridge face detection and facial landmark localisation tasks. Existing joint face detection and landmark localisation methods focus only on a very small set of landmarks. By contrast, our method can detect and align a large number of landmarks for semi-frontal (68 landmarks) and profile (39 landmarks) faces. We evaluate our model on a plethora of datasets including standard static image datasets such as IBUG, 300W, COFW, and the latest Menpo Benchmark for both semi-frontal and profile faces. Significant improvement over state-of-the-art methods on deformable face tracking is witnessed on 300VW benchmark. We also demonstrate state-of-the-art results for face detection on FDDB and MALF datasets.

[89]  arXiv:1708.06025 [pdf, ps, other]
Title: Portuguese Word Embeddings: Evaluating on Word Analogies and Natural Language Tasks
Comments: 7 pages, STIL 2017 Full paper
Subjects: Computation and Language (cs.CL)

Word embeddings have been found to provide meaningful representations for words in an efficient way; therefore, they have become common in Natural Language Processing sys- tems. In this paper, we evaluated different word embedding models trained on a large Portuguese corpus, including both Brazilian and European variants. We trained 31 word embedding models using FastText, GloVe, Wang2Vec and Word2Vec. We evaluated them intrinsically on syntactic and semantic analogies and extrinsically on POS tagging and sentence semantic similarity tasks. The obtained results suggest that word analogies are not appropriate for word embedding evaluation; task-specific evaluations appear to be a better option.

[90]  arXiv:1708.06026 [pdf]
Title: DeepBreath: Deep Learning of Breathing Patterns for Automatic Stress Recognition using Low-Cost Thermal Imaging in Unconstrained Settings
Comments: Submitted to "2017 7th International Conference on Affective Computing and Intelligent Interaction (ACII)" - ACII 2017
Subjects: Human-Computer Interaction (cs.HC); Computer Vision and Pattern Recognition (cs.CV); Medical Physics (physics.med-ph)

We propose DeepBreath, a deep learning model which automatically recognises people's psychological stress level (mental overload) from their breathing patterns. Using a low cost thermal camera, we track a person's breathing patterns as temperature changes around his/her nostril. The paper's technical contribution is threefold. First of all, instead of creating hand-crafted features to capture aspects of the breathing patterns, we transform the uni-dimensional breathing signals into two dimensional respiration variability spectrogram (RVS) sequences. The spectrograms easily capture the complexity of the breathing dynamics. Second, a spatial pattern analysis based on a deep Convolutional Neural Network (CNN) is directly applied to the spectrogram sequences without the need of hand-crafting features. Finally, a data augmentation technique, inspired from solutions for over-fitting problems in deep learning, is applied to allow the CNN to learn with a small-scale dataset from short-term measurements (e.g., up to a few hours). The model is trained and tested with data collected from people exposed to two types of cognitive tasks (Stroop Colour Word Test, Mental Computation test) with sessions of different difficulty levels. Using normalised self-report as ground truth, the CNN reaches 84.59% accuracy in discriminating between two levels of stress and 56.52% in discriminating between three levels. In addition, the CNN outperformed powerful shallow learning methods based on a single layer neural network. Finally, the dataset of labelled thermal images will be open to the community.

[91]  arXiv:1708.06027 [pdf, other]
Title: An evaluation of intrusive instrumental intelligibility metrics
Comments: Currently under peer-review
Subjects: Sound (cs.SD)

Instrumental intelligibility metrics are commonly used as an alternative to intelligibility listening tests. This paper evaluates 12 existing monaural intrusive instrumental intelligibility metrics: SII, HEGP, CSII, HASPI, NCM, QSTI, STOI, ESTOI, MIKNN, SIMI, SIIB, and $\mathrm{sEPSM^{corr}}$. The intelligibility data used in the evaluation were obtained from ten listening tests described in the literature. The stimuli included speech that was distorted by additive noise, reverberation, competing talkers, pre-processing enhancement, and post-processing enhancement. STOI, which is arguably the most popular intelligibility metric, achieved a correlation with listening test scores on average of $\rho=0.80$, and its successor, ESTOI, achieved $\rho=0.86$. The metrics with the highest overall performance were SIIB ($\rho=0.92$) and HASPI ($\rho=0.89$). The results show that many intelligibility metrics perform poorly on data sets that were not used during their development, thus caution should be taken when using intelligibility metrics to replace listening tests, especially in situations where the accuracy of the metric has not been verified.

[92]  arXiv:1708.06034 [pdf, other]
Title: Perceptual Studies for Foveated Light Field Displays
Subjects: Graphics (cs.GR)

The human visual system can resolve higher spatial frequencies in the fovea than in the periphery. This property has been harnessed by recent 2D foveated rendering methods to reduce computation cost while maintaining perceptual quality. Inspired by this, we have conducted psycho-physical experiments to study foveation of human visual systems for 4D light fields and evaluate our prototype system described in [Sun et al. 2017].
We measure, for the first time, the blur detection/discrimination and light field depth perception thresholds in up to 15 degree of visual eccentricity, and reject the idea of replacing the peripheral rendering with 2D billboards - 4D light fields are still required. The psycho-physical data can also guide other foveated rendering approaches.

[93]  arXiv:1708.06039 [pdf, other]
Title: More cat than cute? Interpretable Prediction of Adjective-Noun Pairs
Comments: Oral paper at ACM Multimedia 2017 Workshop on Multimodal Understanding of Social, Affective and Subjective Attributes (MUSA2)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Multimedia (cs.MM)

The increasing availability of affect-rich multimedia resources has bolstered interest in understanding sentiment and emotions in and from visual content. Adjective-noun pairs (ANP) are a popular mid-level semantic construct for capturing affect via visually detectable concepts such as "cute dog" or "beautiful landscape". Current state-of-the-art methods approach ANP prediction by considering each of these compound concepts as individual tokens, ignoring the underlying relationships in ANPs. This work aims at disentangling the contributions of the `adjectives' and `nouns' in the visual prediction of ANPs. Two specialised classifiers, one trained for detecting adjectives and another for nouns, are fused to predict 553 different ANPs. The resulting ANP prediction model is more interpretable as it allows us to study contributions of the adjective and noun components. Source code and models are available at https://imatge-upc.github.io/affective-2017-musa2/ .

[94]  arXiv:1708.06040 [pdf, other]
Title: Neural Block Sampling
Comments: 10 pages
Subjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)

Efficient Monte Carlo inference often requires manual construction of model-specific proposals. We propose an approach to automated proposal construction by training neural networks to provide fast approximations to block Gibbs conditionals. The learned proposals generalize to occurrences of common structural motifs both within a given model and across models, allowing for the construction of a library of learned inference primitives that can accelerate inference on unseen models with no model-specific training required. We explore several applications including open-universe Gaussian mixture models, in which our learned proposals outperform a hand-tuned sampler, and a real-world named entity recognition task, in which our sampler's ability to escape local modes yields higher final F1 scores than single-site Gibbs.

[95]  arXiv:1708.06042 [pdf, other]
Title: Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates
Subjects: Information Theory (cs.IT)

Motivated by applications of distributed storage systems to cloud-based key-value stores, the multi-version coding problem has been recently formulated to store frequently updated data in asynchronous distributed storage systems. Inspired by consistency requirements in distributed computing, the main goal in multi-version coding is to ensure that the latest possible version of the data is decodable, even if all the data updates have not reached all the servers in the system. In this paper, we study the storage cost of ensuring consistency for the case where the various versions of the data are correlated, in contrast to previous work where versions were treated as being independent. We provide multi-version code constructions that show that the storage cost can be significantly smaller than the previous constructions depending on the degree of correlation between the different versions of the data. Our constructions are based on update-efficient codes, Reed-Solomon code, random binning coding and BCH codes.
Specifically, we consider the multi-version coding setting with $n$ servers and $\nu$ versions, with a failure tolerance of $n-c$, where the $\nu$ message versions form a Markov chain. The message version is distributed uniformly over all binary vectors of length $K$, and given a version, the subsequent version is uniformly distributed in a Hamming ball of radius $\delta_K K$ centered around that given version. Previously derived achievable schemes have a per-server storage cost of at least $ \frac{1}{2}\frac{\nu K}{c}-o(K)$ when $\nu \leq c$, whereas we propose a scheme that has a storage cost of $\frac{K}{c} + \frac{\nu-1}{c}\log Vol(\delta_KK, K)$, where $Vol(r, K)$ is the volume of a ball of radius $r$ in the $K$ dimensional Hamming cube. Through a converse result, we show that our multi-version code constructions are nearly-optimal in certain correlation regimes.

[96]  arXiv:1708.06046 [pdf, other]
Title: nuts-flow/ml: data pre-processing for deep learning
Subjects: Learning (cs.LG); Software Engineering (cs.SE)

Data preprocessing is a fundamental part of any machine learning application and frequently the most time-consuming aspect when developing a machine learning solution. Preprocessing for deep learning is characterized by pipelines that lazily load data and perform data transformation, augmentation, batching and logging. Many of these functions are common across applications but require different arrangements for training, testing or inference. Here we introduce a novel software framework named nuts-flow/ml that encapsulates common preprocessing operations as components, which can be flexibly arranged to rapidly construct efficient preprocessing pipelines for deep learning.

[97]  arXiv:1708.06048 [pdf]
Title: Efficient algorithms for scheduling equal-length jobs with processing set restrictions on uniform parallel batch machines
Authors: Shuguang Li
Subjects: Data Structures and Algorithms (cs.DS)

We consider the problem of scheduling jobs with equal lengths on uniform parallel batch machines with non-identical capacities where each job can only be processed on a specified subset of machines called its processing set. For the case of equal release times, we give efficient exact algorithms for various objective functions. For the case of unequal release times, we give efficient exact algorithms for minimizing makespan.

[98]  arXiv:1708.06056 [pdf, other]
Title: Integrating asymptotically-optimal path planning with local optimization
Subjects: Robotics (cs.RO)

Many robots operating in unpredictable environments require an online path planning algorithm that can quickly compute high quality paths. Asymptotically optimal planners are capable of finding the optimal path, but can be slow to converge. Local optimisation algorithms are capable of quickly improving a solution, but are not guaranteed to converge to the optimal solution. In this paper we develop a new way to integrate an asymptotically optimal planners with a local optimiser. We test our approach using RRTConnect* with a short-cutting local optimiser. Our approach results in a significant performance improvement when compared with the state-of-the-art RRTConnect* asymptotically optimal planner and computes paths that are 31\% faster to execute when both are given 3 seconds of planning time.

[99]  arXiv:1708.06062 [pdf, other]
Title: Balanced partitions of 3-colored geometric sets in the plane
Comments: This paper was published in Discrete Applied Mathematics, 181:21--32, 2015
Subjects: Computational Geometry (cs.CG)

Let $S$ be a finite set of geometric objects partitioned into classes or \emph{colors}. A subset $S'\subseteq S$ is said to be \emph{balanced} if $S'$ contains the same amount of elements of $S$ from each of the colors. We study several problems on partitioning $3$-colored sets of points and lines in the plane into two balanced subsets: (a) We prove that for every 3-colored arrangement of lines there exists a segment that intersects exactly one line of each color, and that when there are $2m$ lines of each color, there is a segment intercepting $m$ lines of each color. (b) Given $n$ red points, $n$ blue points and $n$ green points on any closed Jordan curve $\gamma$, we show that for every integer $k$ with $0 \leq k \leq n$ there is a pair of disjoint intervals on $\gamma$ whose union contains exactly $k$ points of each color. (c) Given a set $S$ of $n$ red points, $n$ blue points and $n$ green points in the integer lattice satisfying certain constraints, there exist two rays with common apex, one vertical and one horizontal, whose union splits the plane into two regions, each one containing a balanced subset of $S$.

[100]  arXiv:1708.06063 [pdf, other]
Title: Helly Numbers of Polyominoes
Comments: This paper was published in Graphs and Combinatorics, September 2013, Volume 29, Issue 5, pp 1221-1234
Subjects: Computational Geometry (cs.CG)

We define the Helly number of a polyomino $P$ as the smallest number $h$ such that the $h$-Helly property holds for the family of symmetric and translated copies of $P$ on the integer grid. We prove the following: (i) the only polyominoes with Helly number 2 are the rectangles, (ii) there does not exist any polyomino with Helly number 3, (iii) there exist polyominoes of Helly number $k$ for any $k\neq 1,3$.

[101]  arXiv:1708.06064 [pdf, other]
Title: Geodesic Order Types
Comments: This paper was published in Algorithmica, September 2014, Volume 70, Issue 1, pp 112-128
Subjects: Computational Geometry (cs.CG)

The geodesic between two points $a$ and $b$ in the interior of a simple polygon~$P$ is the shortest polygonal path inside $P$ that connects $a$ to $b$. It is thus the natural generalization of straight line segments on unconstrained point sets to polygonal environments. In this paper we use this extension to generalize the concept of the order type of a set of points in the Euclidean plane to geodesic order types. In particular, we show that, for any set $S$ of points and an ordered subset $\mathcal{B} \subseteq S$ of at least four points, one can always construct a polygon $P$ such that the points of $\mathcal{B}$ define the geodesic hull of~$S$ w.r.t.~$P$, in the specified order. Moreover, we show that an abstract order type derived from the dual of the Pappus arrangement can be realized as a geodesic order type.

[102]  arXiv:1708.06067 [pdf, other]
Title: Finding shorter paths for robot arms using their redundancy
Subjects: Robotics (cs.RO)

Many robot arms can accomplish one task using many different joint configurations. Often only one of these configurations is used as a goal by the path planner. Ideally the robot's path planner would be able to use the extra configurations to find higher quality paths. In this paper we use the extra goal configurations to find significantly shorter paths that are faster to execute compared to a planner that chooses one goal configuration arbitrarily. In a grape vine pruning robot arm experiment our proposed approach reduced execution times by 58%.

[103]  arXiv:1708.06068 [pdf, other]
Title: Vector Space Model as Cognitive Space for Text Classification
Comments: 6 pages, 6 figures, 3 tables
Subjects: Computation and Language (cs.CL)

In this era of digitization, knowing the user's sociolect aspects have become essential features to build the user specific recommendation systems. These sociolect aspects could be found by mining the user's language sharing in the form of text in social media and reviews. This paper describes about the experiment that was performed in PAN Author Profiling 2017 shared task. The objective of the task is to find the sociolect aspects of the users from their tweets. The sociolect aspects considered in this experiment are user's gender and native language information. Here user's tweets written in a different language from their native language are represented as Document - Term Matrix with document frequency as the constraint. Further classification is done using the Support Vector Machine by taking gender and native language as target classes. This experiment attains the average accuracy of 73.42% in gender prediction and 76.26% in the native language identification task.

[104]  arXiv:1708.06073 [pdf, other]
Title: The Microsoft 2017 Conversational Speech Recognition System
Subjects: Computation and Language (cs.CL)

We describe the 2017 version of Microsoft's conversational speech recognition system, in which we update our 2016 system with recent developments in neural-network-based acoustic and language modeling to further advance the state of the art on the Switchboard speech recognition task. The system adds a CNN-BLSTM acoustic model to the set of model architectures we combined previously, and includes character-based and dialog session aware LSTM language models in rescoring. For system combination we adopt a two-stage approach, whereby subsets of acoustic models are first combined at the senone/frame level, followed by a word-level voting via confusion networks. We also added a confusion network rescoring step after system combination. The resulting system yields a 5.1\% word error rate on the 2000 Switchboard evaluation set.

[105]  arXiv:1708.06075 [pdf, other]
Title: Scientific Information Extraction with Semi-supervised Neural Tagging
Comments: accepted by EMNLP 2017
Subjects: Computation and Language (cs.CL)

This paper addresses the problem of extracting keyphrases from scientific articles and categorizing them as corresponding to a task, process, or material. We cast the problem as sequence tagging and introduce semi-supervised methods to a neural tagging model, which builds on recent advances in named entity recognition. Since annotated training data is scarce in this domain, we introduce a graph-based semi-supervised algorithm together with a data selection scheme to leverage unannotated articles. Both inductive and transductive semi-supervised learning strategies outperform state-of-the-art information extraction performance on the 2017 SemEval Task 10 ScienceIE task.

[106]  arXiv:1708.06081 [pdf, ps, other]
Title: Block Markov Superposition Transmission of BCH Codes with Iterative Erasures-and-Errors Decoders
Comments: submitted to IEEE Transactions on Communications
Subjects: Information Theory (cs.IT)

In this paper, we present the block Markov superposition transmission of BCH (BMST-BCH) codes, which can be constructed to obtain a very low error floor. To reduce the implementation complexity, we design a low complexity iterative sliding-window decoding algorithm, in which only binary and/or erasure messages are processed and exchanged between processing units. The error floor can be predicted by a genie-aided lower bound, while the waterfall performance can be analyzed by the density evolution method. To evaluate the error floor of the constructed BMST-BCH codes at a very low bit error rate (BER) region, we propose a fast simulation approach. Numerical results show that, at a target BER of $10^{-15}$, the hard-decision decoding of the BMST-BCH codes with overhead $25\%$ can achieve a net coding gain (NCG) of $10.55$ dB. Furthermore, the soft-decision decoding can yield an NCG of $10.74$ dB. The construction of BMST-BCH codes is flexible to trade off latency against performance at all overheads of interest and may find applications in optical transport networks as an attractive~candidate.

[107]  arXiv:1708.06118 [pdf, other]
Title: Distantly Supervised Road Segmentation
Comments: Accepted for ICCV workshop CVRSUAD2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We present an approach for road segmentation that only requires image-level annotations at training time. We leverage distant supervision, which allows us to train our model using images that are different from the target domain. Using large publicly available image databases as distant supervisors, we develop a simple method to automatically generate weak pixel-wise road masks. These are used to iteratively train a fully convolutional neural network, which produces our final segmentation model. We evaluate our method on the Cityscapes dataset, where we compare it with a fully supervised approach. Further, we discuss the trade-off between annotation cost and performance. Overall, our distantly supervised approach achieves 93.8% of the performance of the fully supervised approach, while using orders of magnitude less annotation work.

[108]  arXiv:1708.06121 [pdf, ps, other]
Title: The satisfiability problem for Boolean set theory with a choice correspondence(Extended version)
Subjects: Logic in Computer Science (cs.LO)

Given a set $U$ of alternatives, a choice (correspondence) on $U$ is a contractive map $c$ defined on a family $\Omega$ of nonempty subsets of $U$. Semantically, a choice $c$ associates to each menu $A \in \Omega$ a nonempty subset $c(A) \subseteq A$ comprising all elements of $A$ that are deemed selectable by an agent. A choice on $U$ is total if its domain is the powerset of $U$ minus the empty set, and partial otherwise. According to the theory of revealed preferences, a choice is rationalizable if it can be retrieved from a binary relation on $U$ by taking all maximal elements of each menu. It is well-known that rationalizable choices are characterized by the satisfaction of suitable axioms of consistency, which codify logical rules of selection within menus. For instance, WARP (Weak Axiom of Revealed Preference) characterizes choices rationalizable by a transitive relation. Here we study the satisfiability problem for unquantified formulae of an elementary fragment of set theory involving a choice function symbol $\mathtt{c}$, the Boolean set operators and the singleton, the equality and inclusion predicates, and the propositional connectives. In particular, we consider the cases in which the interpretation of $\mathtt{c}$ satisfies any combination of two specific axioms of consistency, whose conjunction is equivalent to WARP. In two cases we prove that the related satisfiability problem is NP-complete, whereas in the remaining cases we obtain NP-completeness under the additional assumption that the number of choice terms is constant.

[109]  arXiv:1708.06126 [pdf, other]
Title: e-Counterfeit: a mobile-server platform for document counterfeit detection
Comments: 6 pages, 5 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)

This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as IDs or banknotes. The main contribution of this work is the end-to-end mobile-server architecture, which provides a service for non-expert users and therefore can be used in several scenarios. The system also provides a crowdsourcing mode so labeled images can be gathered, generating databases for incremental training of the algorithms.

[110]  arXiv:1708.06127 [pdf, other]
Title: Practical Minimum Cut Algorithms
Subjects: Data Structures and Algorithms (cs.DS); Distributed, Parallel, and Cluster Computing (cs.DC)

The minimum cut problem for an undirected edge-weighted graph asks us to divide its set of nodes into two blocks while minimizing the weight sum of the cut edges. Here, we introduce a linear-time algorithm to compute near-minimum cuts. Our algorithm is based on cluster contraction using label propagation and Padberg and Rinaldi's contraction heuristics [SIAM Review, 1991]. We give both sequential and shared-memory parallel implementations of our algorithm. Extensive experiments on both real-world and generated instances show that our algorithm finds the optimal cut on nearly all instances significantly faster than other state-of-the-art algorithms while our error rate is lower than that of other heuristic algorithms. In addition, our parallel algorithm shows good scalability.

[111]  arXiv:1708.06128 [pdf, other]
Title: Revisiting knowledge transfer for training object class detectors
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose to revisit knowledge transfer for training object detectors on target classes with only weakly supervised training images. We present a unified knowledge transfer framework based on training a single neural network multi-class object detector over all source classes, organized in a semantic hierarchy. This provides proposal scoring functions at multiple levels in the hierarchy, which we use to guide object localization in the target training set. Compared to works using a manually engineered class-generic objectness measure as a vehicle for transfer, our learned top-level scoring function for 'entity' is much stronger. Compared to works that perform class-specific transfer from a few most related source classes to the target class, our framework enables to explore a broad rage of generality of transfer. Experiments on 200 object classes in the ILSVRC 2013 dataset show that our technique (1) leads to much greater performance improvements than manually engineered objectness; (2) outperforms the best reported transfer learning results on this dataset by a wide margin (+40% correct localization on the target training set, and +14% mAP on the target test set).

[112]  arXiv:1708.06131 [pdf, other]
Title: Evasion Attacks against Machine Learning at Test Time
Comments: In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimum-distance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely re-used in developing attacks against deep networks (even if not always referring to the ideas reported in this work). arXiv admin note: text overlap with arXiv:1401.7727
Journal-ref: ECML PKDD, Part III, vol. 8190, LNCS, pp. 387--402. Springer, 2013
Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)

In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present a simple but effective gradient-based approach that can be exploited to systematically assess the security of several, widely-used classification algorithms against evasion attacks. Following a recently proposed framework for security evaluation, we simulate attack scenarios that exhibit different risk levels for the classifier by increasing the attacker's knowledge of the system and her ability to manipulate attack samples. This gives the classifier designer a better picture of the classifier performance under evasion attacks, and allows him to perform a more informed model selection (or parameter setting). We evaluate our approach on the relevant security task of malware detection in PDF files, and show that such systems can be easily evaded. We also sketch some countermeasures suggested by our analysis.

[113]  arXiv:1708.06145 [pdf, other]
Title: Knock Knock, Who's There? Membership Inference on Aggregate Location Data
Subjects: Cryptography and Security (cs.CR)

Aggregate location data is often used to support smart services and applications, such as generating live traffic maps or predicting visits to businesses. In this paper, we present the first study on the feasibility of membership inference attacks on aggregate location time-series. We introduce a game-based definition of the adversarial task, and cast it as a classification problem where machine learning can be used to distinguish whether or not a target user is part of the aggregates. We empirically evaluate the power of these attacks on both raw and differentially private aggregates using two real-world mobility datasets. We find that membership inference is a serious privacy threat, and show how its effectiveness depends on the adversary's prior knowledge, the characteristics of the underlying location data, as well as the number of users and the timeframe on which aggregation is performed. Although differentially private defenses can indeed reduce the extent of the attacks, they also yield a significant loss in utility. Moreover, a strategic adversary mimicking the behavior of the defense mechanism can greatly limit the protection they provide. Overall, our work presents a novel methodology geared to evaluate membership inference on aggregate location data in real-world settings and can be used by providers to assess the quality of privacy protection before data release or by regulators to detect violations.

[114]  arXiv:1708.06151 [pdf, other]
Title: Scalable Kernelization for Maximum Independent Sets
Subjects: Data Structures and Algorithms (cs.DS); Distributed, Parallel, and Cluster Computing (cs.DC)

The most efficient algorithms for finding maximum independent sets in both theory and practice use reduction rules to obtain a much smaller problem instance called a kernel. The kernel can then be solved quickly using exact or heuristic algorithms - or by repeatedly kernelizing recursively in the branch-and-reduce paradigm. It is of critical importance for these algorithms that kernelization is fast and returns a small kernel. Current algorithms are either slow but produce a small kernel, or fast and give a large kernel. We attempt to accomplish both of these goals simultaneously, by giving an efficient parallel kernelization algorithm based on graph partitioning and parallel bipartite maximum matching. We combine our parallelization techniques with two techniques to accelerate kernelization further: dependency checking that prunes reductions that cannot be applied, and reduction tracking that allows us to stop kernelization when reductions become less fruitful. Our algorithm produces kernels that are orders of magnitude smaller than the fastest kernelization methods, while having a similar execution time. Furthermore, our algorithm is able to compute kernels with size comparable to the smallest known kernels, but up to two orders of magnitude faster than previously possible. Finally, we show that our kernelization algorithm can be used to accelerate existing state-of-the-art heuristic algorithms, allowing us to find larger independent sets faster on large real-world networks and synthetic instances.

[115]  arXiv:1708.06173 [pdf, ps, other]
Title: To Infinity and Beyond
Authors: Ines Klimann (IRIF)
Subjects: Formal Languages and Automata Theory (cs.FL); Group Theory (math.GR)

We prove that if a group generated by a bireversible Mealy automaton contains an element of infinite order, its growth blows up and is necessarily exponential. As a direct consequence, Z cannot be generated by a bireversible Mealy automaton.

[116]  arXiv:1708.06183 [pdf, other]
Title: Optimally Gathering Two Robots
Authors: Adam Heriban (NPA), Xavier Défago (TITECH), Sébastien Tixeuil (NPA, IUF, LINCS)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Performance (cs.PF); Robotics (cs.RO)

We present an algorithm that ensures in finite time the gathering of two robots in the non-rigid ASYNC model. To circumvent established impossibility results, we assume robots are equipped with 2-colors lights and are able to measure distances between one another. Aside from its light, a robot has no memory of its past actions, and its protocol is deterministic. Since, in the same model, gathering is impossible when lights have a single color, our solution is optimal with respect to the number of used colors.

[117]  arXiv:1708.06185 [pdf, other]
Title: Seernet at EmoInt-2017: Tweet Emotion Intensity Estimator
Comments: In Proceedings of the EMNLP 2017 Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media (WASSA), September 2017, Copenhagen, Denmark
Subjects: Computation and Language (cs.CL)

The paper describes experiments on estimating emotion intensity in tweets using a generalized regressor system. The system combines lexical, syntactic and pre-trained word embedding features, trains them on general regressors and finally combines the best performing models to create an ensemble. The proposed system stood 3rd out of 22 systems in the leaderboard of WASSA-2017 Shared Task on Emotion Intensity.

[118]  arXiv:1708.06196 [pdf, other]
Title: 3D Visibility Representations of 1-planar Graphs
Comments: Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017)
Subjects: Computational Geometry (cs.CG)

We prove that every 1-planar graph G has a z-parallel visibility representation, i.e., a 3D visibility representation in which the vertices are isothetic disjoint rectangles parallel to the xy-plane, and the edges are unobstructed z-parallel visibilities between pairs of rectangles. In addition, the constructed representation is such that there is a plane that intersects all the rectangles, and this intersection defines a bar 1-visibility representation of G.

[119]  arXiv:1708.06197 [pdf, other]
Title: Segmentation of retinal cysts from Optical Coherence Tomography volumes via selective enhancement
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Automated and accurate segmentation of cystoid structures in Optical Coherence Tomography (OCT) is of interest in the early detection of retinal diseases. It is, however, a challenging task. We propose a novel method for localizing cysts in 3D OCT volumes. The proposed work is biologically inspired and based on selective enhancement of the cysts, by inducing motion to a given OCT slice. A Convolutional Neural Network (CNN) is designed to learn a mapping function that combines the result of multiple such motions to produce a probability map for cyst locations in a given slice. The final segmentation of cysts is obtained via simple clustering of the detected cyst locations. The proposed method is evaluated on two public datasets and one private dataset. The public datasets include the one released for the OPTIMA Cyst segmentation challenge (OCSC) in MICCAI 2015 and the DME dataset. After training on the OCSC train set, the method achieves a mean Dice Coefficient (DC) of 0.71 on the OCSC test set. The robustness of the algorithm was examined by cross-validation on the DME and AEI (private) datasets and a mean DC values obtained were 0.69 and 0.79, respectively. Overall, the proposed system outperforms all benchmarks. These results underscore the strengths of the proposed method in handling variations in both data acquisition protocols and scanners.

[120]  arXiv:1708.06199 [pdf, ps, other]
Title: Algorithm Substitution Attacks from a Steganographic Perspective
Comments: CCS 2017, 12 pages, double-column
Subjects: Cryptography and Security (cs.CR)

The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a subverted one which allows to leak private information while generating output indistinguishable from the honest output. Bellare, Paterson, and Rogaway provided at CRYPTO'14 a formal security model to capture this kind of attacks and constructed practically implementable ASAs against a large class of symmetric encryption schemes. At CCS'15, Ateniese, Magri, and Venturi extended this model to allow the attackers to work in a fully-adaptive and continuous fashion and proposed subversion attacks against digital signature schemes. Both papers also showed the impossibility of ASAs in cases where the cryptographic tools are deterministic. Also at CCS'15, Bellare, Jaeger, and Kane strengthened the original model and proposed a universal ASA against sufficiently random encryption schemes. In this paper we analyze ASAs from the perspective of steganography - the well known concept of hiding the presence of secret messages in legal communications. While a close connection between ASAs and steganography is known, this lacks a rigorous treatment. We consider the common computational model for secret-key steganography and prove that successful ASAs correspond to secure stegosystems on certain channels and vice versa. This formal proof allows us to conclude that ASAs are stegosystems and to "rediscover" several results concerning ASAs known in the steganographic literature.

[121]  arXiv:1708.06207 [pdf]
Title: Givers & Receivers perceive handover tasks differently: Implications for Human-Robot collaborative system design
Comments: 16 pages, 8 figures, Keywords - Joint action, Human-Robot Collaboration, Human-Robot Handover, Designing Cobots, Human-Factors in Repetitive Task, Warehouse robots, Supermarket
Subjects: Human-Computer Interaction (cs.HC); Computers and Society (cs.CY); Robotics (cs.RO); Systems and Control (cs.SY)

Human-human joint-action in short-cycle repetitive handover tasks was investigated for a bottle handover task using a three-fold approach: work-methods field studies in multiple supermarkets, simulation analysis using an ergonomics software package and by conducting an in-house lab experiment on human-human collaboration by re-creating the environment and conditions of a supermarket. Evaluation included both objective and subjective measures. Subjective evaluation was done taking a psychological perspective and showcases among other things, the differences in the way a common joint-action is being perceived by individual team partners depending upon their role (giver or receiver). The proposed approach can provide a systematic method to analyze similar tasks. Combining the results of all the three analyses, this research gives insight into the science of joint-action for short-cycle repetitive tasks and its implications for human-robot collaborative system design.

[122]  arXiv:1708.06209 [pdf]
Title: On the Nanocommunications at THz Band in Graphene-Enabled Wireless Network-on-Chip
Comments: 13 pages, 8 figures
Journal-ref: Mathematical Problems in Engineering (Hindawi), Vol. 2017, Article ID 9768604, 13 pages
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)

One of the main challenges towards the growing computation-intensive applications with scalable bandwidth requirement is the deployment of a dense number of on-chip cores within a chip package. To this end, this paper investigates the Wireless Network- on-Chip (WiNoC), which is enabled by graphene-based nanoantennas (GNAs) in Terahertz frequency band. We first develop a channel model between the GNAs taking into account the practical issues of the propagation medium, such as transmission frequency, operating temperature, ambient pressure, and distance between the GNAs. In the Terahertz band, not only dielectric propagation loss but also molecular absorption attenuation (MAA) caused by various molecules and their isotopologues within the chip package constitutes the signal transmission loss. We further propose an optimal power allocation to achieve the channel capacity. The proposed channel model shows that the MAA significantly degrades the performance at certain frequency ranges compared to the conventional channel model, even when the GNAs are very closely located. More specifically, at transmission frequency of 1 THz, the channel capacity of the proposed model is shown to be much lower than that of the conventional model over the whole range of temperature and ambient pressure of up to 26.8% and 25%, respectively.

[123]  arXiv:1708.06215 [pdf, other]
Title: Analysis of Statistical QoS in Half Duplex and Full Duplex Dense Heterogeneous Cellular Networks
Comments: arXiv admin note: substantial text overlap with arXiv:1604.00588
Subjects: Information Theory (cs.IT)

Statistical QoS provisioning as an important performance metric in analyzing next generation mobile cellular network, aka 5G, is investigated. In this context, by quantifying the performance in terms of the effective capacity, we introduce a lower bound for the system performance that facilitates an efficient analysis. Based on the proposed lower bound, which is mainly built on a per resource block analysis, we build a basic mathematical framework to analyze effective capacity in an ultra dense heterogeneous cellular network. We use our proposed scalable approach to give insights about the possible enhancements of the statistical QoS experienced by the end users if heterogeneous cellular networks migrate from a conventional half duplex to an imperfect full duplex mode of operation. Numerical results and analysis are provided, where the network is modeled as a Matern point process. The results demonstrate the accuracy and computational efficiency of the proposed scheme, especially in large scale wireless systems. Moreover, the minimum level of self interference cancellation for the full duplex system to start outperforming its half duplex counterpart is investigated.

[124]  arXiv:1708.06219 [pdf, other]
Title: On the approximation by single hidden layer feedforward neural networks with fixed weights
Comments: 17 pages, 5 figures, submitted; for associated SageMath worksheet, see this https URL
Subjects: Neural and Evolutionary Computing (cs.NE); Information Theory (cs.IT); Numerical Analysis (math.NA)

Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the probability of the considered network to give precise results. In this note, we constructively prove that SLFNs with the fixed weight $1$ and two neurons in the hidden layer can approximate any continuous function on a compact subset of the real line. The applicability of this result is demonstrated in various numerical examples. Finally, we show that SLFNs with fixed weights cannot approximate all continuous multivariate functions.

[125]  arXiv:1708.06226 [html]
Title: Proceedings 15th International Conference on Automata and Formal Languages
Journal-ref: EPTCS 252, 2017
Subjects: Formal Languages and Automata Theory (cs.FL)

The 15th International Conference on Automata and Formal Languages (AFL 2017) was held in Debrecen, Hungary, from September 4 to 6, 2017. The conference was organized by the Faculty of Informatics of the University of Debrecen and the Faculty of Informatics of the E\"otv\"os Lor\'and University of Budapest. Topics of interest covered all aspects of automata and formal languages, including theory and applications.

[126]  arXiv:1708.06227 [pdf, other]
Title: Recognizing Involuntary Actions from 3D Skeleton Data Using Body States
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Human action recognition has been one of the most active fields of research in computer vision for last years. Two dimensional action recognition methods are facing serious challenges such as occlusion and missing the third dimension of data. Development of depth sensors has made it feasible to track positions of human body joints over time. This paper proposes a novel method of action recognition which uses temporal 3D skeletal Kinect data. This method introduces the definition of body states and then every action is modeled as a sequence of these states. The learning stage uses Fisher Linear Discriminant Analysis (LDA) to construct discriminant feature space for discriminating the body states. Moreover, this paper suggests the use of the Mahalonobis distance as an appropriate distance metric for the classification of the states of involuntary actions. Hidden Markov Model (HMM) is then used to model the temporal transition between the body states in each action. According to the results, this method significantly outperforms other popular methods, with recognition rate of 88.64% for eight different actions and up to 96.18% for classifying fall actions.

[127]  arXiv:1708.06228 [pdf, other]
Title: An efficient algorithm to decide periodicity of b-recognisable sets using LSDF convention
Authors: Victor Marsault
Comments: 40 pages
Subjects: Formal Languages and Automata Theory (cs.FL)

Given an integer base b>1, a set of integers is represented in base b by a language over {0,1,...,b-1}. The set is said to be b-recognisable if its representation is a regular language. It is known that ultimately periodic sets are b-recognisable in every base b, and Cobham's theorem implies the converse: no other set is b-recognisable in every base b.
We are interested in deciding whether a b-recognisable set of integers (given as a finite automaton) is eventually periodic. Honkala showed in 1986 that this problem is decidable. Leroux used in 2005 the convention to write integers with the least significant digit first (LSDF), and designed a quadratic algorithm to solve a more general problem.
We use here LSDF convention as well and give a structural description of the minimal automata that accept periodic sets of integers. We then show that it can be verified in linear time if a given minimal automaton meets this description. This yields a O(bn log(n)) procedure to decide whether a general deterministic automaton accepts an ultimately periodic set of numbers.

[128]  arXiv:1708.06233 [pdf, other]
Title: Fake News in Social Networks
Subjects: Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph); Economics (q-fin.EC)

We model the spread of news as a social learning game on a network. Agents can either endorse or oppose a claim made in a piece of news, which itself may be either true or false. Agents base their decision on a private signal and their neighbors' past actions. Given these inputs, agents follow strategies derived via multi-agent deep reinforcement learning and receive utility from acting in accordance with the veracity of claims. Our framework yields strategies with agent utility close to a theoretical, Bayes optimal benchmark, while remaining flexible to model re-specification. Optimized strategies allow agents to correctly identify most false claims, when all agents receive unbiased private signals. However, an adversary's attempt to spread fake news by targeting a subset of agents with a biased private signal can be successful. Even more so when the adversary has information about agents' network position or private signal. When agents are aware of the presence of an adversary they re-optimize their strategies in the training stage and the adversary's attack is less effective. Hence, exposing agents to the possibility of fake news can be an effective way to curtail the spread of fake news in social networks. Our results also highlight that information about the users' private beliefs and their social network structure can be extremely valuable to adversaries and should be well protected.

[129]  arXiv:1708.06238 [pdf, ps, other]
Title: Stochastic IMT (insulator-metal-transition) neurons: An interplay of thermal and threshold noise at bifurcation
Subjects: Emerging Technologies (cs.ET); Neural and Evolutionary Computing (cs.NE)

A stochastic neuron, a key hardware kernel for implementing stochastic neural networks, is constructed using an insulator-metal-transition (IMT) device based on electrically induced phase-transition in series with a tunable resistance. We show that such an IMT neuron has dynamics similar to a piecewise linear FitzHugh-Nagumo (FHN) neuron. Spiking statistics of such neurons are demonstrated experimentally using Vanadium Dioxide (VO$_{2}$) based IMT neurons, and modeled as an Ornstein-Uhlenbeck (OU) process with a fluctuating boundary. The stochastic spiking is explained by thermal noise and threshold fluctuations acting as precursors of bifurcation which result in a sigmoid-like transfer function. Moments of interspike intervals are calculated analytically by extending the first-passage-time (FPT) models for Ornstein-Uhlenbeck (OU) process to include a fluctuating boundary. We find that the coefficient of variation of interspike intervals depend on the relative proportion of thermal and threshold noise. In the current experimental demonstrations where both kinds of noise are present, the coefficient of variation is about an order of magnitude higher compared to the case where only thermal noise were present.

[130]  arXiv:1708.06242 [pdf]
Title: Prevalence and citation advantage of gold open access in the subject areas of the Scopus database
Comments: 31 pages, 2 figures, 7 tables, 3 annex
Subjects: Digital Libraries (cs.DL)

The potential benefit of open access (OA) in relation to citation impact has been discussed in the literature in depth. The methodology used to test the OA citation advantage includes comparing OA vs. non-OA journal impact factors and citations of OA versus non-OA articles published in the same non-OA journals. However, one problem with many studies is that they are small -restricted to a discipline or set of journals-. Moreover, conclusions are not entirely consistent among research areas and 'early view' and 'selection bias' have been suggested as possible explications. In the present paper, an analysis of gold OA from across all areas of research -the 27 subject areas of the Scopus database- is realized. As a novel contribution, this paper takes a journal-level approach to assessing the OA citation advantage, whereas many others take a paper-level approach. Data were obtained from Scimago Lab, sorted using Scopus database, and tagged as OA/non-OA using the DOAJ list. Jointly with the OA citation advantage, the OA prevalence as well as the differences between access types (OA vs. non-OA) in production and referencing are tested. A total of 3,737 OA journals (16.8%) and 18,485 non-OA journals (83.2%) published in 2015 are considered. As the main conclusion, there is no generalizable gold OA citation advantage at journal level.

[131]  arXiv:1708.06243 [pdf]
Title: General Backpropagation Algorithm for Training Second-order Neural Networks
Comments: 5 pages, 7 figures, 19 references
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

The artificial neural network is a popular framework in machine learning. To empower individual neurons, we recently suggested that the current type of neurons could be upgraded to 2nd order counterparts, in which the linear operation between inputs to a neuron and the associated weights is replaced with a nonlinear quadratic operation. A single 2nd order neurons already has a strong nonlinear modeling ability, such as implementing basic fuzzy logic operations. In this paper, we develop a general backpropagation (BP) algorithm to train the network consisting of 2nd-order neurons. The numerical studies are performed to verify of the generalized BP algorithm.

[132]  arXiv:1708.06246 [pdf, other]
Title: Comparative Benchmarking of Causal Discovery Techniques
Comments: arXiv admin note: text overlap with arXiv:1506.07669, arXiv:1611.03977 by other authors
Subjects: Artificial Intelligence (cs.AI); Machine Learning (stat.ML)

In this paper we present a comprehensive view of prominent causal discovery algorithms, categorized into two main categories (1) assuming acyclic and no latent variables, and (2) allowing both cycles and latent variables, along with experimental results comparing them from three perspectives: (a) structural accuracy, (b) standard predictive accuracy, and (c) accuracy of counterfactual inference. For (b) and (c) we train causal Bayesian networks with structures as predicted by each causal discovery technique to carry out counterfactual or standard predictive inference. We compare causal algorithms on two pub- licly available and one simulated datasets having different sample sizes: small, medium and large. Experiments show that structural accuracy of a technique does not necessarily correlate with higher accuracy of inferencing tasks. Fur- ther, surveyed structure learning algorithms do not perform well in terms of structural accuracy in case of datasets having large number of variables.

[133]  arXiv:1708.06248 [pdf, other]
Title: GraphR: Accelerating Graph Processing Using ReRAM
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Hardware Architecture (cs.AR)

This paper presents GRAPHR, the first ReRAM-based graph processing accelerator. GRAPHR follows the principle of near-data processing but explores the opportunity of per-forming massive parallel operations with low hardware and energy cost. Compared to recent works in applying ReRAM to more regular neural computations, we are faced with several challenges: 1) The graph data are stored in the com-pressed format, instead of matrix forms, making it impossible to perform direct in-situ computations in memory; 2) It is less intuitive to map various graph algorithms to ReRAM with hardware constrains; 3) Coordinating data movements among ReRAM crossbars and memory to achieve high throughput. GRAPHR is a novel accelerator architecture consisting of two major components: memory ReRAM and graph engine (GE). The core graph computations are performed in sparse matrix format in GEs (ReRAM crossbars), which perform efficient matrix-vector multiplications. The vector/matrix-based graph computation is not new, but ReRAM offers the unique opportunity to realize the massive parallelism with unprecedented energy efficiency and low hardware cost. Due to the same cost/performance tradeoff, with ReRAM, the gain of performing parallel operations overshadows the wastes due to sparsity in matrix view within a small subgraph. Moreover, it naturally enables near data processing with reduced data movements. The experiment results show that GRAPHR achieves a16.01x (up to132.67x) speedup and an33.82x energy saving on geometric mean compared to a CPU baseline system.

[134]  arXiv:1708.06250 [pdf, other]
Title: Pillar Networks++: Distributed non-parametric deep and wide networks
Comments: arXiv admin note: substantial text overlap with arXiv:1707.06923
Subjects: Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Computation (stat.CO); Machine Learning (stat.ML)

In recent work, it was shown that combining multi-kernel based support vector machines (SVMs) can lead to near state-of-the-art performance on an action recognition dataset (HMDB-51 dataset). This was 0.4\% lower than frameworks that used hand-crafted features in addition to the deep convolutional feature extractors. In the present work, we show that combining distributed Gaussian Processes with multi-stream deep convolutional neural networks (CNN) alleviate the need to augment a neural network with hand-crafted features. In contrast to prior work, we treat each deep neural convolutional network as an expert wherein the individual predictions (and their respective uncertainties) are combined into a Product of Experts (PoE) framework.

[135]  arXiv:1708.06252 [pdf, other]
Title: Mixture Reduction on Matrix Lie Groups
Comments: IEEE Signal Processing Letters
Subjects: Systems and Control (cs.SY); Robotics (cs.RO)

Many physical systems evolve on matrix Lie groups and mixture filtering designed for such manifolds represent an inevitable tool for challenging estimation problems. However, mixture filtering faces the issue of a constantly growing number of components, hence require appropriate mixture reduction techniques. In this letter we propose a mixture reduction approach for distributions on matrix Lie groups, called the concentrated Gaussian distributions (CGDs). This entails appropriate reparametrization of CGD parameters to compute the KL divergence, pick and merge the mixture components. Furthermore, we also introduce a multitarget tracking filter on Lie groups as a mixture filtering study example for the proposed reduction method. In particular, we implemented the probability hypothesis density filter on matrix Lie groups. We validate the filter performance using the optimal subpattern assignment metric on a synthetic dataset consisting of 100 randomly generated multitarget scenarios.

[136]  arXiv:1708.06257 [pdf, other]
Title: Notes: A Continuous Model of Neural Networks. Part I: Residual Networks
Authors: Zhen Li, Zuoqiang Shi
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)

In this series of notes, we try to model neural networks as as discretizations of continuous flows on the space of data, which can be called flow model. The idea comes from an observation of their similarity in mathematical structures. This conceptual analogy has not been proven useful yet, but it seems interesting to explore.
In this part, we start with a linear transport equation (with nonlinear transport velocity field) and obtain a class of residual type neural networks. If the transport velocity field has a special form, the obtained network is found similar to the original ResNet. This neural network can be regarded as a discretization of the continuous flow defined by the transport flow.
In the end, a summary of the correspondence between neural networks and transport equations is presented, followed by some general discussions.

[137]  arXiv:1708.06266 [pdf, other]
Title: Probabilistic Relation Induction in Vector Space Embeddings
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)

Word embeddings have been found to capture a surprisingly rich amount of syntactic and semantic knowledge. However, it is not yet sufficiently well-understood how the relational knowledge that is implicitly encoded in word embeddings can be extracted in a reliable way. In this paper, we propose two probabilistic models to address this issue. The first model is based on the common relations-as-translations view, but is cast in a probabilistic setting. Our second model is based on the much weaker assumption that there is a linear relationship between the vector representations of related words. Compared to existing approaches, our models lead to more accurate predictions, and they are more explicit about what can and cannot be extracted from the word embedding.

[138]  arXiv:1708.06268 [pdf, other]
Title: Partial-Duplex Amplify-and-Forward Relaying: Spectral Efficiency Analysis under Self-Interference
Comments: Submitted to IEEE Transactions on Wireless Communications
Subjects: Information Theory (cs.IT)

We propose a novel mode of operation for Amplify-and-Forward relays in which the spectra of the relay input and output signals partially overlap. This partial-duplex relaying mode encompasses half-duplex and full-duplex as particular cases. By viewing the partial-duplex relay as a bandwidth-preserving Linear Periodic Time-Varying system, an analysis of the spectral efficiency in the presence of self-interference is developed. In contrast with previous works, self-interference is regarded as a useful information-bearing component rather than simply assimilated to noise. This approach reveals that previous results regarding the impact of self-interference on (full-duplex) relay performance are overly pessimistic. Based on a frequency-domain interpretation of the effect of self-interference, a number of suboptimal decoding architectures at the destination node are also discussed. It is found that the partial-duplex relaying mode may provide an attractive tradeoff between spectral efficiency and receiver complexity.

[139]  arXiv:1708.06274 [pdf, other]
Title: This Far, No Further: Introducing Virtual Borders to Mobile Robots Using a Laser Pointer
Comments: 8 pages, 8 figures, supplementary video: this https URL
Subjects: Robotics (cs.RO)

In this paper, we address the problem of controlling the workspace of a 3-DoF mobile robot. This problem arises due to the emerging coexistence between humans and robots resulting in a shared space. In such an environment, robots should navigate in a human-acceptable way according to the users' demands. For this purpose, we propose a method that gives a non-expert user the possibility to intuitively define virtual borders by means of a laser pointer. In detail, we contribute a method and implementation based on a previously developed framework using a laser pointer as human-robot interface to change the robot's navigational behavior. Furthermore, we extend the framework to increase the flexibility by considering different types of virtual borders, i.e. polygons and curves separating an area. We qualitatively and quantitatively evaluated our method concerning correctness, accuracy and teaching effort. The experimental results revealed a high accuracy and low teaching effort while correctly incorporating the virtual borders into the robot's navigational map.

[140]  arXiv:1708.06275 [pdf, other]
Title: Simple and Near-Optimal Distributed Coloring for Sparse Graphs
Subjects: Data Structures and Algorithms (cs.DS)

Graph coloring is one of the central problems in distributed graph algorithms. Much of the research on this topic has focused on coloring with $\Delta+1$ colors, where $\Delta$ denotes the maximum degree. Using $\Delta+1$ colors may be unsatisfactory in sparse graphs, where not all nodes have such a high degree; it would be more desirable to use a number of colors that improves with sparsity. A standard measure that captures sparsity is arboricity, which is the smallest number of forests into which the edges of the graph can be partitioned.
We present simple randomized distributed algorithms that, with high probability, color any $n$-node $\alpha$-arboricity graph:
- using $(2+\varepsilon)\cdot \alpha$ colors, for constant $\varepsilon>0$, in $O(\log n)$ rounds, if $\alpha=\tilde{\Omega}(\log n)$, or
- using $O(\alpha \log \alpha )$ colors, in $O(\log n)$ rounds, or
- using $O(\alpha)$ colors, in $O(\log n \cdot \min\{\log\log n,\; \log \alpha\})$ rounds.
These algorithms are nearly-optimal, as it is known by results of Linial [FOCS'87] and Barenboim and Elkin [PODC'08] that coloring with $\Theta(\alpha)$ colors, or even poly$(\alpha)$ colors, requires $\Omega(\log_{\alpha} n)$ rounds. The previously best-known $O(\log n)$-time result was a deterministic algorithm due to Barenboim and Elkin [PODC'08], which uses $\Theta(\alpha ^2)$ colors. Barenboim and Elkin stated improving this number of colors as an open problem in their Distributed Graph Coloring Book.

[141]  arXiv:1708.06276 [pdf, other]
Title: The CARESSES EU-Japan project: making assistive robots culturally competent
Comments: Paper presented at: Ambient Assisted Living, Italian Forum. Genova, Italy, June 12--15, 2017
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); Human-Computer Interaction (cs.HC)

The nursing literature shows that cultural competence is an important requirement for effective healthcare. We claim that personal assistive robots should likewise be culturally competent, that is, they should be aware of general cultural characteristics and of the different forms they take in different individuals, and take these into account while perceiving, reasoning, and acting. The CARESSES project is an Europe-Japan collaborative effort that aims at designing, developing and evaluating culturally competent assistive robots. These robots will be able to adapt the way they behave, speak and interact to the cultural identity of the person they assist. This paper describes the approach taken in the CARESSES project, its initial steps, and its future plans.

[142]  arXiv:1708.06290 [pdf, other]
Title: Parallel solver for shifted systems in a hybrid CPU-GPU framework
Subjects: Mathematical Software (cs.MS)

This paper proposes a combination of a hybrid CPU--GPU and a pure GPU software implementation of a direct algorithm for solving shifted linear systems $(A - \sigma I)X = B$ with large number of complex shifts $\sigma$ and multiple right-hand sides. Such problems often appear e.g. in control theory when evaluating the transfer function, or as a part of an algorithm performing interpolatory model reduction, as well as when computing pseudospectra and structured pseudospectra, or solving large linear systems of ordinary differential equations. The proposed algorithm first jointly reduces the general full $n\times n$ matrix $A$ and the $n\times m$ full right-hand side matrix $B$ to the controller Hessenberg canonical form that facilitates efficient solution: $A$ is transformed to a so-called $m$-Hessenberg form and $B$ is made upper-triangular. This is implemented as blocked highly parallel CPU--GPU hybrid algorithm; individual blocks are reduced by the CPU, and the necessary updates of the rest of the matrix are split among the cores of the CPU and the GPU. To enhance parallelization, the reduction and the updates are overlapped. In the next phase, the reduced $m$-Hessenberg--triangular systems are solved entirely on the GPU, with shifts divided into batches. The benefits of such load distribution are demonstrated by numerical experiments. In particular, we show that our proposed implementation provides an excellent basis for efficient implementations of computational methods in systems and control theory, from evaluation of transfer function to the interpolatory model reduction.

[143]  arXiv:1708.06293 [pdf, ps, other]
Title: Neville's algorithm revisited
Authors: M. de Jong
Comments: 3 pages
Subjects: Other Computer Science (cs.OH)

Neville's algorithm is known to provide an efficient and numerically stable solution for polynomial interpolations. In this paper, an extension of this algorithm is presented which includes the derivatives of the interpolating polynomial.

[144]  arXiv:1708.06297 [pdf, other]
Title: Employing Weak Annotations for Medical Image Analysis Problems
Subjects: Computer Vision and Pattern Recognition (cs.CV)

To efficiently establish training databases for machine learning methods, collaborative and crowdsourcing platforms have been investigated to collectively tackle the annotation effort. However, when this concept is ported to the medical imaging domain, reading expertise will have a direct impact on the annotation accuracy. In this study, we examine the impact of expertise and the amount of available annotations on the accuracy outcome of a liver segmentation problem in an abdominal computed tomography (CT) image database. In controlled experiments, we study this impact for different types of weak annotations. To address the decrease in accuracy associated with lower expertise, we propose a method for outlier correction making use of a weakly labelled atlas. Using this approach, we demonstrate that weak annotations subject to high error rates can achieve a similarly high accuracy as state-of-the-art multi-atlas segmentation approaches relying on a large amount of expert manual segmentations. Annotations of this nature can realistically be obtained from a non-expert crowd and can potentially enable crowdsourcing of weak annotation tasks for medical image analysis.

[145]  arXiv:1708.06301 [pdf, other]
Title: Dense Disparity Estimation in Ego-motion Reduced Search Space
Subjects: Robotics (cs.RO)

Depth estimation from stereo images remains a challenge even though studied for decades. The KITTI benchmark shows that the state-of-the-art solutions offer accurate depth estimation, but are still computationally complex and often require a GPU or FPGA implementation. In this paper we aim at increasing the accuracy of depth map estimation and reducing the computational complexity by using information from previous frames. We propose to transform the disparity map of the previous frame into the current frame, relying on the estimated ego-motion, and use this map as the prediction for the Kalman filter in the disparity space. Then, we update the predicted disparity map using the newly matched one. This way we reduce disparity search space and flickering between consecutive frames, thus increasing the computational efficiency of the algorithm. In the end, we validate the proposed approach on real-world data from the KITTI benchmark suite and show that the proposed algorithm yields more accurate results, while at the same time reducing the disparity search space.

[146]  arXiv:1708.06303 [pdf, other]
Title: Network Model Selection for Task-Focused Attributed Network Inference
Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI)

Networks are models representing relationships between entities. Often these relationships are explicitly given, or we must learn a representation which generalizes and predicts observed behavior in underlying individual data (e.g. attributes or labels). Whether given or inferred, choosing the best representation affects subsequent tasks and questions on the network. This work focuses on model selection to evaluate network representations from data, focusing on fundamental predictive tasks on networks. We present a modular methodology using general, interpretable network models, task neighborhood functions found across domains, and several criteria for robust model selection. We demonstrate our methodology on three online user activity datasets and show that network model selection for the appropriate network task vs. an alternate task increases performance by an order of magnitude in our experiments.

[147]  arXiv:1708.06308 [pdf, other]
Title: Detecting Location Fraud in Indoor Mobile Crowdsensing
Comments: 6 pages
Subjects: Cryptography and Security (cs.CR)

Mobile crowdsensing allows a large number of mobile devices to measure phenomena of common interests and form a body of knowledge about natural and social environments. In order to get location annotations for indoor mobile crowdsensing, reference tags are usually deployed which are susceptible to tampering and compromises by attackers. In this work, we consider three types of location-related attacks including tag forgery, tag misplacement, and tag removal. Different detection algorithms are proposed to deal with these attacks. First, we introduce location-dependent fingerprints as supplementary information for better location identification. A truth discovery algorithm is then proposed to detect falsified data. Moreover, visiting patterns are utilized for the detection of tag misplacement and removal. Experiments on both crowdsensed and emulated dataset show that the proposed algorithms can detect all three types of attacks with high accuracy.

[148]  arXiv:1708.06309 [pdf, other]
Title: ConStance: Modeling Annotation Contexts to Improve Stance Classification
Comments: To appear at EMNLP 2017
Subjects: Social and Information Networks (cs.SI)

Manual annotations are a prerequisite for many applications of machine learning. However, weaknesses in the annotation process itself are easy to overlook. In particular, scholars often choose what information to give to annotators without examining these decisions empirically. For subjective tasks such as sentiment analysis, sarcasm, and stance detection, such choices can impact results. Here, for the task of political stance detection on Twitter, we show that providing too little context can result in noisy and uncertain annotations, whereas providing too strong a context may cause it to outweigh other signals. To characterize and reduce these biases, we develop ConStance, a general model for reasoning about annotations across information conditions. Given conflicting labels produced by multiple annotators seeing the same instances with different contexts, ConStance simultaneously estimates gold standard labels and also learns a classifier for new instances. We show that the classifier learned by ConStance outperforms a variety of baselines at predicting political stance, while the model's interpretable parameters shed light on the effects of each context.

[149]  arXiv:1708.06312 [pdf, other]
Title: Verifying Quantum Programs: From Quipper to QPMC
Comments: Long version
Subjects: Logic in Computer Science (cs.LO)

In this paper we present a translation from the quantum programming language Quipper to the QPMC model checker, with the main aim of verifying Quipper programs. Quipper is an embedded functional programming language for quantum computation. It is above all a circuit description language, for this reason it uses the vector state formalism and its main purpose is to make circuit implementation easy providing high level operations for circuit manipulation. Quipper provides both an high-level circuit building interface and a simulator. QPMC is a model checker for quantum protocols based on the density matrix formalism. QPMC extends the probabilistic model checker IscasMC allowing to formally verify properties specified in the temporal logic QCTL on Quantum Markov Chains. We implemented and tested our translation on several quantum algorithms, including Grover's quantum search.

[150]  arXiv:1708.06313 [pdf, other]
Title: A survey on fiber nonlinearity compensation for 400 Gbps and beyond optical communication systems
Comments: Accepted in the IEEE Communications Surveys and Tutorials
Subjects: Networking and Internet Architecture (cs.NI)

Optical communication systems represent the backbone of modern communication networks. Since their deployment, different fiber technologies have been used to deal with optical fiber impairments such as dispersion-shifted fibers and dispersion-compensation fibers. In recent years, thanks to the introduction of coherent detection based systems, fiber impairments can be mitigated using digital signal processing (DSP) algorithms. Coherent systems are used in the current 100 Gbps wavelength-division multiplexing (WDM) standard technology. They allow the increase of spectral efficiency by using multi-level modulation formats, and are combined with DSP techniques to combat the linear fiber distortions. In addition to linear impairments, the next generation 400 Gbps/1 Tbps WDM systems are also more affected by the fiber nonlinearity due to the Kerr effect. At high input power, the fiber nonlinear effects become more important and their compensation is required to improve the transmission performance. Several approaches have been proposed to deal with the fiber nonlinearity. In this paper, after a brief description of the Kerr-induced nonlinear effects, a survey on the fiber nonlinearity compensation (NLC) techniques is provided. We focus on the well-known NLC techniques and discuss their performance, as well as their implementation and complexity. An extension of the inter-subcarrier nonlinear interference canceler approach is also proposed. A performance evaluation of the well-known NLC techniques and the proposed approach is provided in the context of Nyquist and super-Nyquist superchannel systems.

[151]  arXiv:1708.06320 [pdf, other]
Title: Learning Spread-out Local Feature Descriptors
Comments: ICCV 2017. 9 pages, 7 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We propose a simple, yet powerful regularization technique that can be used to significantly improve both the pairwise and triplet losses in learning local feature descriptors. The idea is that in order to fully utilize the expressive power of the descriptor space, good local feature descriptors should be sufficiently "spread-out" over the space. In this work, we propose a regularization term to maximize the spread in feature descriptor inspired by the property of uniform distribution. We show that the proposed regularization with triplet loss outperforms existing Euclidean distance based descriptor learning techniques by a large margin. As an extension, the proposed regularization technique can also be used to improve image-level deep feature embedding.

[152]  arXiv:1708.06333 [pdf]
Title: SigViewer: Visualizing Multimodal Signals Stored in XDF (Extensible Data Format) Files
Comments: 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society
Subjects: Other Computer Science (cs.OH)

Multimodal biosignal acquisition is facilitated by recently introduced software solutions such as LabStreaming Layer (LSL) and its associated data format XDF (Extensible Data Format). However, there are no stand-alone applications that can visualize multimodal time series stored in XDF files. We extended SigViewer, an open source cross-platform Qt C++ application with the capability of loading, resampling, annotating, and visualizing signals stored in XDF files and successfully applied the tool for post-hoc visual verification of the accuracy of a system that aims to predict the phase of alpha oscillations within the electroencephalogram in real-time.

[153]  arXiv:1708.06334 [pdf, other]
Title: An Intelligent Cloud Storage Gateway for Medical Imaging
Comments: Preprint to be published in Journal of Medical Systems. 8 pages, 5 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)

Historically, medical imaging repositories have been supported by indoor infrastructures. However, the amount of diagnostic imaging procedures has continuously increased over the last decades, imposing several challenges associated with the storage volume, data redundancy and availability. Cloud platforms are focused on delivering hardware and software services over the Internet, becoming an appealing solution for repository outsourcing. Although this option may bring financial and technological benefits, it also presents new challenges. In medical imaging scenarios, communication latency is a critical issue that still hinders the adoption of this paradigm. This paper proposes an intelligent Cloud storage gateway that optimizes data access times. This is achieved through a new cache architecture that combines static rules and pattern recognition for eviction and prefetching. The evaluation results, obtained through simulations over a real-world dataset, show that cache hit ratios can reach around 80%, leading reductions of image retrieval times by over 60%. The combined use of eviction and prefetching policies pro- posed can significantly reduce communication latency, even when using a small cache in comparison to the total size of the repository. Apart from the performance gains, the proposed system is capable of adjusting to specific workflows of different institutions.

[154]  arXiv:1708.06336 [pdf, ps, other]
Title: SER for Optimal Combining in Rician Fading with Co-channel Interference
Subjects: Information Theory (cs.IT)

Approximate Symbol error rate (SER) expressions are derived for receive diversity system employing optimum combining, when both the desired and the interfering signals are subjected to Rician fading, for the case of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary number of receive antennas and interferers and for any QAM constellation. Furthermore, we derive a simple closed form expression for SER in the interference-limited regime, for the special case of Rayleigh faded interferers. A close match is observed between the SER result obtained through the derived analytical expression and the one obtained from Monte-Carlo simulations, for a variety of QAM constellations.

[155]  arXiv:1708.06343 [pdf]
Title: Aerial Rock Fragmentation Analysis in Low-Light Condition Using UAV Technology
Comments: 8 pages, 6 figures, 2 tables, Application of Computers and Operations Research in the Mining Industry (APCOM)
Subjects: Robotics (cs.RO)

In recent years, Unmanned Aerial Vehicle (UAV) technology has been introduced into the mining industry to conduct terrain surveying. This work investigates the application of UAVs with artificial lighting for measurement of rock fragmentation under poor lighting conditions, representing night shifts in surface mines or working conditions in underground mines. The study relies on indoor and outdoor experiments for rock fragmentation analysis using a quadrotor UAV. Comparison of the rock size distributions in both cases show that adequate artificial lighting enables similar accuracy to ideal lighting conditions.

Cross-lists for Tue, 22 Aug 17

[156]  arXiv:1708.05768 (cross-list from stat.ML) [pdf, other]
Title: Data-Driven Tree Transforms and Metrics
Comments: 16 pages, 5 figures. Accepted to IEEE Transactions on Signal and Information Processing over Networks
Subjects: Machine Learning (stat.ML); Learning (cs.LG); Quantitative Methods (q-bio.QM)

We consider the analysis of high dimensional data given in the form of a matrix with columns consisting of observations and rows consisting of features. Often the data is such that the observations do not reside on a regular grid, and the given order of the features is arbitrary and does not convey a notion of locality. Therefore, traditional transforms and metrics cannot be used for data organization and analysis. In this paper, our goal is to organize the data by defining an appropriate representation and metric such that they respect the smoothness and structure underlying the data. We also aim to generalize the joint clustering of observations and features in the case the data does not fall into clear disjoint groups. For this purpose, we propose multiscale data-driven transforms and metrics based on trees. Their construction is implemented in an iterative refinement procedure that exploits the co-dependencies between features and observations. Beyond the organization of a single dataset, our approach enables us to transfer the organization learned from one dataset to another and to integrate several datasets together. We present an application to breast cancer gene expression analysis: learning metrics on the genes to cluster the tumor samples into cancer sub-types and validating the joint organization of both the genes and the samples. We demonstrate that using our approach to combine information from multiple gene expression cohorts, acquired by different profiling technologies, improves the clustering of tumor samples.

[157]  arXiv:1708.05788 (cross-list from physics.flu-dyn) [pdf, other]
Title: Computer Algebra for Microhydrodynamics
Authors: Jonas Einarsson
Subjects: Fluid Dynamics (physics.flu-dyn); Mathematical Software (cs.MS)

I describe a method for computer algebra that helps with laborious calculations typically encountered in theoretical microhydrodynamics. The program mimics how humans calculate by matching patterns and making replacements according to the rules of algebra and calculus. This note gives an overview and walks through an example, while the accompanying code repository contains the implementation details, a tutorial, and more examples. The code repository is attached as supplementary material to this note, and maintained at https://github.com/jeinarsson/matte

[158]  arXiv:1708.05789 (cross-list from stat.ML) [pdf, other]
Title: Semi-supervised Conditional GANs
Subjects: Machine Learning (stat.ML); Learning (cs.LG)

We introduce a new model for building conditional generative models in a semi-supervised setting to conditionally generate data given attributes by adapting the GAN framework. The proposed semi-supervised GAN (SS-GAN) model uses a pair of stacked discriminators to learn the marginal distribution of the data, and the conditional distribution of the attributes given the data respectively. In the semi-supervised setting, the marginal distribution (which is often harder to learn) is learned from the labeled + unlabeled data, and the conditional distribution is learned purely from the labeled data. Our experimental results demonstrate that this model performs significantly better compared to existing semi-supervised conditional GAN models.

[159]  arXiv:1708.05840 (cross-list from stat.ML) [pdf, other]
Title: A Data and Model-Parallel, Distributed and Scalable Framework for Training of Deep Networks in Apache Spark
Comments: 12 pages
Subjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC); Learning (cs.LG)

Training deep networks is expensive and time-consuming with the training period increasing with data size and growth in model parameters. In this paper, we provide a framework for distributed training of deep networks over a cluster of CPUs in Apache Spark. The framework implements both Data Parallelism and Model Parallelism making it suitable to use for deep networks which require huge training data and model parameters which are too big to fit into the memory of a single machine. It can be scaled easily over a cluster of cheap commodity hardware to attain significant speedup and obtain better results making it quite economical as compared to farm of GPUs and supercomputers. We have proposed a new algorithm for training of deep networks for the case when the network is partitioned across the machines (Model Parallelism) along with detailed cost analysis and proof of convergence of the same. We have developed implementations for Fully-Connected Feedforward Networks, Convolutional Neural Networks, Recurrent Neural Networks and Long Short-Term Memory architectures. We present the results of extensive simulations demonstrating the speedup and accuracy obtained by our framework for different sizes of the data and model parameters with variation in the number of worker cores/partitions; thereby showing that our proposed framework can achieve significant speedup (upto 11X for CNN) and is also quite scalable.

[160]  arXiv:1708.05864 (cross-list from math.CO) [pdf, ps, other]
Title: A plurality problem with three colors and query size three
Comments: 29 pages
Subjects: Combinatorics (math.CO); Discrete Mathematics (cs.DM)

The Plurality problem - introduced by Aigner \cite{A2004} - has many variants. In this article we deal with the following version: suppose we are given $n$ balls, each of them colored by one of three colors. A \textit{plurality ball} is one such that its color class is strictly larger than any other color class. Questioner wants to find a plurality ball as soon as possible or state there is no, by asking triplets (or $k$-sets, in general), while Adversary partition the triplets into color classes as an answer for the queries and wants to postpone the possibility of determining a plurality ball (or stating there is no).
We denote by $A_p(n,3)$ the largest number of queries needed to ask if both play optimally (and Questioner asks triplets). We provide an almost precise result in case of even $n$ by proving that for $n \ge 4$ even we have $$\frac{3}{4}n-2 \le A_p(n,3) \le \frac{3}{4}n-\frac{1}{2},$$ and for $n \ge 3$ odd we have $$\frac{3}{4}n-O(\log n) \le A_p(n,3) \le \frac{3}{4}n-\frac{1}{2}.$$
We also prove some bounds on the number of queries needed to ask for larger $k$.

[161]  arXiv:1708.05917 (cross-list from stat.ML) [pdf, ps, other]
Title: Accelerating Kernel Classifiers Through Borders Mapping
Authors: Peter Mills
Comments: Stuck even deeper in peer-review limbo
Subjects: Machine Learning (stat.ML); Learning (cs.LG)

Support vector machines (SVM) and other kernel techniques represent a family of powerful statistical classification methods with high accuracy and broad applicability. Because they use all or a significant portion of the training data, however, they can be slow, especially for large problems. Piecewise linear classifiers are similarly versatile, yet have the additional advantages of simplicity, ease of interpretation and, if the number of component linear classifiers is not too large, speed. Here we show how a simple, piecewise linear classifier can be trained from a kernel-based classifier in order to improve the classification speed. The method works by finding the root of the difference in conditional probabilities between pairs of opposite classes to build up a representation of the decision boundary. When tested on 17 different datasets, it succeeded in improving the classification speed of a SVM for 9 of them by factors as high as 88 times or more. The method is best suited to problems with continuum features data and smooth probability functions. Because the component linear classifiers are built up individually from an existing classifier, rather than through a simultaneous optimization procedure, the classifier is also fast to train.

[162]  arXiv:1708.05932 (cross-list from stat.ML) [pdf, other]
Title: Fundamental Limits of Weak Recovery with Applications to Phase Retrieval
Comments: 46 pages, 3 figures
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT)

In phase retrieval we want to recover an unknown signal $\boldsymbol x\in\mathbb C^d$ from $n$ quadratic measurements of the form $y_i = |\langle\boldsymbol a_i,\boldsymbol x\rangle|^2+w_i$ where $\boldsymbol a_i\in \mathbb C^d$ are known sensing vectors and $w_i$ is measurement noise. We ask the following weak recovery question: what is the minimum number of measurements $n$ needed to produce an estimator $\hat{\boldsymbol x}(\boldsymbol y)$ that is positively correlated with the signal $\boldsymbol x$? We consider the case of Gaussian vectors $\boldsymbol a_i$. We prove that - in the high-dimensional limit - a sharp phase transition takes place, and we locate the threshold in the regime of vanishingly small noise. For $n\le d-o(d)$ no estimator can do significantly better than random and achieve a strictly positive correlation. For $n\ge d+o(d)$ a simple spectral estimator achieves a positive correlation. Surprisingly, numerical simulations with the same spectral estimator demonstrate promising performances with realistic sensing matrices as well. Spectral methods are used to initialize non-convex optimization algorithms in phase retrieval, and our approach can boost performances in this setting as well.
Our impossibility result is based on classical information-theory arguments. The spectral algorithm computes the leading eigenvector of a weighted empirical covariance matrix. We obtain a sharp characterization of the spectral properties of this random matrix using tools from free probability and generalizing a recent result by Lu and Li. Both the upper and lower bound generalize beyond phase retrieval to measurements $y_i$ produced according to a generalized linear model.

[163]  arXiv:1708.05950 (cross-list from math.CO) [pdf, ps, other]
Title: New extremal singly even self-dual codes of lengths $64$ and $66$
Comments: 13 pages. arXiv admin note: text overlap with arXiv:1706.01694
Subjects: Combinatorics (math.CO); Information Theory (cs.IT)

For lengths $64$ and $66$, we construct extremal singly even self-dual codes with weight enumerators for which no extremal singly even self-dual codes were previously known to exist. We also construct new $40$ inequivalent extremal doubly even self-dual $[64,32,12]$ codes with covering radius $12$ meeting the Delsarte bound.

[164]  arXiv:1708.05963 (cross-list from stat.ML) [pdf, ps, other]
Title: Neural Networks Compression for Language Modeling
Comments: Keywords: LSTM, RNN, language modeling, low-rank factorization, pruning, quantization. Published by Springer in the LNCS series, 7th International Conference on Pattern Recognition and Machine Intelligence, 2017
Subjects: Machine Learning (stat.ML); Computation and Language (cs.CL); Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)

In this paper, we consider several compression techniques for the language modeling problem based on recurrent neural networks (RNNs). It is known that conventional RNNs, e.g, LSTM-based networks in language modeling, are characterized with either high space complexity or substantial inference time. This problem is especially crucial for mobile applications, in which the constant interaction with the remote server is inappropriate. By using the Penn Treebank (PTB) dataset we compare pruning, quantization, low-rank factorization, tensor train decomposition for LSTM networks in terms of model size and suitability for fast inference.

[165]  arXiv:1708.05976 (cross-list from math.NT) [pdf, ps, other]
Title: On the construction of small subsets containing special elements in a finite field
Authors: Jiyou Li
Comments: 10 pages
Subjects: Number Theory (math.NT); Computational Complexity (cs.CC); Combinatorics (math.CO)

In this note we construct a series of small subsets containing a non-d-th power element in a finite field by applying certain bounds on incomplete character sums.
Precisely, let $h=\lfloor q^{\delta}\rfloor>1$ and $d\mid q^h-1$. If $q^h-1$ has a prime divisor $r$ with $r=O((h\log q)^c)$, then there is a constant $0<\epsilon<1$ such that for a ratio at least $\frac 1 {q^{\epsilon h}}$ of $\alpha\in \mathbb{F}_{q^{h}} \backslash\mathbb{F}_{q}$, the set $S=\{ \alpha-x^t, x\in\mathbb{F}_{q}\}$ of cardinality $O(q^{\frac 12 +\delta_c})$ contains a non-d-th power in $\mathbb{F}_{q^{\lfloor q^\delta\rfloor}}$, where $t$ is the largest power of $r$ such that $t<\sqrt{q}/h$. For odd $q$, the choice of $\delta=\frac 12-d, d=o(1)>0$ shows that there exists an explicit subset of cardinality $q^{1-d}=O(\log^{2+\epsilon'}(q^h))$ containing a non-quadratic element in $\mathbb{F}_{q^h}$. On the other hand, the choice of $h=2$ shows that for any odd prime power $q$, there is an explicit subset of cardinality $O(\sqrt{q})$ containing a non-quadratic element in $\mathbb{F}_{q^2}$, essentially improving a $O(q)$ construction by Coulter and Kosick \cite{CK}.
In addition, we obtain a similar construction for small sets containing a primitive element. The construction works well provided $\phi(q^h-1)$ is very small, where $\phi$ is the Euler's totient function.

[166]  arXiv:1708.06002 (cross-list from quant-ph) [pdf, ps, other]
Title: Quantum state certification
Subjects: Quantum Physics (quant-ph); Data Structures and Algorithms (cs.DS)

We consider the problem of quantum state certification, where one is given $n$ copies of an unknown $d$-dimensional quantum mixed state $\rho$, and one wants to test whether $\rho$ is equal to some known mixed state $\sigma$ or else is $\epsilon$-far from $\sigma$. The goal is to use notably fewer copies than the $\Omega(d^2)$ needed for full tomography on $\rho$ (i.e., density estimation). We give two robust state certification algorithms: one with respect to fidelity using $n = O(d/\epsilon)$ copies, and one with respect to trace distance using $n = O(d/\epsilon^2)$ copies. The latter algorithm also applies when $\sigma$ is unknown as well. These copy complexities are optimal up to constant factors.

[167]  arXiv:1708.06018 (cross-list from math.NA) [pdf, ps, other]
Title: Conversion of Mersenne Twister to double-precision floating-point numbers
Authors: Shin Harase
Comments: 14 pages
Subjects: Numerical Analysis (math.NA); Numerical Analysis (cs.NA); Computation (stat.CO)

The 32-bit Mersenne Twister generator MT19937 is a widely used random number generator. To generate numbers with more than 32 bits in bit length, and particularly when converting into 53-bit double-precision floating-point numbers in $[0,1)$ in the IEEE 754 format, the typical implementation concatenates two successive 32-bit integers and divides them by a power of $2$. In this case, the 32-bit MT19937 is optimized in terms of its equidistribution properties (the so-called dimension of equidistribution with $v$-bit accuracy) under the assumption that one will mainly be using 32-bit output values, and hence the concatenation sometimes degrades the dimension of equidistribution compared with the simple use of 32-bit outputs. In this paper, we analyze such phenomena by investigating hidden $\mathbb{F}_2$-linear relations among the bits of high-dimensional outputs. Accordingly, we report that MT19937 with a specific lag set fails several statistical tests, such as the overlapping collision test, matrix rank test, and Hamming independence test.

[168]  arXiv:1708.06070 (cross-list from math.GN) [pdf, ps, other]
Title: On Atiyah-Singer and Atiyah-Bott for finite abstract simplicial complexes
Authors: Oliver Knill
Comments: 12 pages
Subjects: General Topology (math.GN); Discrete Mathematics (cs.DM)

A linear or multi-linear valuation on a finite abstract simplicial complex can be expressed as an analytic index dim(ker(D)) -dim(ker(D^*)) of a differential complex D:E -> F. In the discrete, a complex D can be called elliptic if a McKean-Singer spectral symmetry applies as this implies str(exp(-t D^2)) is t-independent. In that case, the analytic index of D is the sum of (-1)^k b_k(D), where b_k(D) is the k'th Betti number, which by Hodge is the nullity of the (k+1)'th block of the Hodge operator L=D^2. It can also be written as a topological index summing K(v) over the set of zero-dimensional simplices in G and where K is an Euler type curvature defined by G and D. This can be interpreted as a Atiyah-Singer type correspondence between analytic and topological index. Examples are the de Rham differential complex for the Euler characteristic X(G) or the connection differential complex for Wu characteristic w_k(G). Given an endomorphism T of an elliptic complex, the Lefschetz number X(T,G,D) is defined as the super trace of T acting on cohomology defined by E. It is equal to the sum i(v) over V which are contained in fixed simplices of T, and i is a Brouwer type index. This Atiyah-Bott result generalizes the Brouwer-Lefschetz fixed point theorem for an endomorphism of the simplicial complex G. In both the static and dynamic setting, the proof is done by heat deforming the Koopman operator U(T) to get the cohomological picture str(exp(-t D^2) U(T)) in the limit t to infinity and then use Hodge, and then by applying a discrete gradient flow to the simplex data defining the valuation to push str(U(T)) to V, getting curvature K(v) or the Brouwer type index i(v).

[169]  arXiv:1708.06077 (cross-list from math.ST) [pdf, ps, other]
Title: ExSIS: Extended Sure Independence Screening for Ultrahigh-dimensional Linear Models
Comments: 22 pages (single-column version); 10 figures; submitted for journal publication
Subjects: Statistics Theory (math.ST); Information Theory (cs.IT); Machine Learning (stat.ML)

Statistical inference can be computationally prohibitive in ultrahigh-dimensional linear models. Correlation-based variable screening, in which one leverages marginal correlations for removal of irrelevant variables from the model prior to statistical inference, can be used to overcome this challenge. Prior works on correlation-based variable screening either impose strong statistical priors on the linear model or assume specific post-screening inference methods. This paper first extends the analysis of correlation-based variable screening to arbitrary linear models and post-screening inference techniques. In particular, ($i$) it shows that a condition---termed the screening condition---is sufficient for successful correlation-based screening of linear models, and ($ii$) it provides insights into the dependence of marginal correlation-based screening on different problem parameters. Numerical experiments confirm that these insights are not mere artifacts of analysis; rather, they are reflective of the challenges associated with marginal correlation-based variable screening. Second, the paper explicitly derives the screening condition for two families of linear models, namely, sub-Gaussian linear models and arbitrary (random or deterministic) linear models. In the process, it establishes that---under appropriate conditions---it is possible to reduce the dimension of an ultrahigh-dimensional, arbitrary linear model to almost the sample size even when the number of active variables scales almost linearly with the sample size.

[170]  arXiv:1708.06160 (cross-list from stat.AP) [pdf]
Title: Economic Design of Memory-Type Control Charts: The Fallacy of the Formula Proposed by Lorenzen and Vance (1986)
Subjects: Applications (stat.AP); Computational Engineering, Finance, and Science (cs.CE); Mathematical Software (cs.MS); Optimization and Control (math.OC); Economics (q-fin.EC)

The memory-type control charts, such as EWMA and CUSUM, are powerful tools for detecting small quality changes in univariate and multivariate processes. Many papers on economic design of these control charts use the formula proposed by Lorenzen and Vance (1986) [Lorenzen, T. J., & Vance, L. C. (1986). The economic design of control charts: A unified approach. Technometrics, 28(1), 3-10, DOI: 10.2307/1269598]. This paper shows that this formula is not correct for memory-type control charts and its values can significantly deviate from the original values even if the ARL values used in this formula are accurately computed. Consequently, the use of this formula can result in charts that are not economically optimal. The formula is corrected for memory-type control charts, but unfortunately the modified formula is not a helpful tool from a computational perspective. We show that simulation-based optimization is a possible alternative method.

[171]  arXiv:1708.06216 (cross-list from physics.flu-dyn) [pdf, other]
Title: Molecular dynamic simulation of water vapor interaction with blind pore of dead-end and saccate type
Comments: 4 pages, 6 figures
Subjects: Fluid Dynamics (physics.flu-dyn); Soft Condensed Matter (cond-mat.soft); Computational Engineering, Finance, and Science (cs.CE)

One of the varieties of pores, often found in natural or artificial building materials, are the so-called blind pores of dead-end or saccate type. Three-dimensional model of such kind of pore has been developed in this work. This model has been used for simulation of water vapor interaction with individual pore by molecular dynamics in combination with the diffusion equation method. Special investigations have been done to find dependencies between thermostats implementations and conservation of thermodynamic and statistical values of water vapor - pore system. The two types of evolution of water-pore system have been investigated: drying and wetting of the pore. Full research of diffusion coefficient, diffusion velocity and other diffusion parameters has been made.

[172]  arXiv:1708.06235 (cross-list from stat.ML) [pdf, other]
Title: Deep Convolutional Neural Networks for Massive MIMO Fingerprint-Based Positioning
Comments: Accepted in the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2017
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT)

This paper provides an initial investigation on the application of convolutional neural networks (CNNs) for fingerprint-based positioning using measured massive MIMO channels. When represented in appropriate domains, massive MIMO channels have a sparse structure which can be efficiently learned by CNNs for positioning purposes. We evaluate the positioning accuracy of state-of-the-art CNNs with channel fingerprints generated from a channel model with a rich clustered structure: the COST 2100 channel model. We find that moderately deep CNNs can achieve fractional-wavelength positioning accuracies, provided that an enough representative data set is available for training.

[173]  arXiv:1708.06298 (cross-list from quant-ph) [pdf, other]
Title: Bounds on absolutely maximally entangled states from shadow inequalities, and the quantum MacWilliams identity
Comments: 10 pages, 3 figures
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT)

A pure multipartite quantum state is called absolutely maximally entangled (AME), if all reductions obtained by tracing out at least half of its parties are maximally mixed. However, the existence of such states is in many cases unclear. With the help of the weight enumerator machinery known from quantum error correcting codes and the generalized shadow inequalities, we obtain new bounds on the existence of AME states in higher dimensions. To complete the treatment on the weight enumerator machinery, the quantum MacWilliams identity is derived in the Bloch representation.

Replacements for Tue, 22 Aug 17

[174]  arXiv:1503.06911 (replaced) [pdf, other]
Title: A Unified Stochastic Hybrid System Approach to Aggregate Modeling of Responsive Loads
Authors: Lin Zhao, Wei Zhang
Subjects: Systems and Control (cs.SY); Dynamical Systems (math.DS)
[175]  arXiv:1512.02456 (replaced) [pdf, other]
Title: A study of Time-varying Cost Parameter Estimation Methods in Traffic Networks for Mobile Robots
Comments: A shorter version of this article is published in ETFA'2016
Subjects: Robotics (cs.RO)
[176]  arXiv:1603.09051 (replaced) [pdf, other]
Title: Phoenix: A Self-Optimizing Chess Engine
Comments: Accepted in CICN 2015. Preprint
Subjects: Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
[177]  arXiv:1603.09095 (replaced) [pdf, other]
Title: Learning Local Descriptors by Optimizing the Keypoint-Correspondence Criterion
Comments: v3: presented at ICPR2016 v4: additional experiments on the HPatches benchmark
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[178]  arXiv:1605.06814 (replaced) [pdf, other]
Title: Space-Time Tradeoffs for Distributed Verification
Comments: Pre-proceedings version of paper presented at the 24th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2017)
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computational Complexity (cs.CC)
[179]  arXiv:1605.08151 (replaced) [pdf, other]
Title: Predicting Visual Exemplars of Unseen Classes for Zero-Shot Learning
Comments: ICCV2017 camera-ready
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[180]  arXiv:1605.08285 (replaced) [pdf, other]
Title: Solving Systems of Random Quadratic Equations via Truncated Amplitude Flow
Comments: 37 Pages, 16 figures
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT); Optimization and Control (math.OC)
[181]  arXiv:1607.03766 (replaced) [pdf, other]
Title: AudioPairBank: Towards A Large-Scale Tag-Pair-Based Audio Content Analysis
Comments: This paper is a revised version of "AudioSentibank: Large-scale Semantic Ontology of Acoustic Concepts for Audio Content Analysis"
Subjects: Sound (cs.SD); Computation and Language (cs.CL)
[182]  arXiv:1608.02191 (replaced) [pdf, other]
Title: Bound-Based Power Optimization for Multi-Hop Heterogeneous Wireless Industrial Networks Under Statistical Delay Constraints
Subjects: Performance (cs.PF); Networking and Internet Architecture (cs.NI)
[183]  arXiv:1609.00110 (replaced) [pdf, other]
Title: A Decomposition Method for Global Evaluation of Shannon Entropy and Local Estimations of Algorithmic Complexity
Comments: 43 pages, 11 figures, 4 tables
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC)
[184]  arXiv:1611.03968 (replaced) [pdf, other]
Title: Online Generative-Discriminative Model for Object Detection in Video: An Unsupervised Learning Framework
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[185]  arXiv:1611.07890 (replaced) [pdf, other]
Title: Image-based localization using LSTMs for structured feature correlation
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[186]  arXiv:1611.10314 (replaced) [pdf, other]
Title: Sync-DRAW: Automatic Video Generation using Deep Recurrent Attentive Architectures
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[187]  arXiv:1612.00738 (replaced) [pdf, other]
Title: Action Recognition with Dynamic Image Networks
Comments: 14 pages, 9 figures, 9 tables
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[188]  arXiv:1612.01401 (replaced) [pdf, other]
Title: Learning Adversary-Resistant Deep Neural Networks
Subjects: Learning (cs.LG)
[189]  arXiv:1612.04350 (replaced) [pdf, ps, other]
Title: LoPub: High-Dimensional Crowdsourced Data Publication with Local Differential Privacy
Subjects: Cryptography and Security (cs.CR)
[190]  arXiv:1612.05002 (replaced) [pdf, other]
Title: A coalgebraic treatment of conditional transition systems with upgrades
Comments: Prerequisite for LMCS submission
Subjects: Logic in Computer Science (cs.LO)
[191]  arXiv:1612.09223 (replaced) [pdf, other]
Title: A revised completeness result for the simply typed $λμ$-calculus using realizability semantics
Comments: arXiv admin note: text overlap with arXiv:0905.0357
Subjects: Logic (math.LO); Logic in Computer Science (cs.LO)
[192]  arXiv:1612.09508 (replaced) [pdf, other]
Title: Feedback Networks
Comments: See a video describing the method at this https URL and the website at this http URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[193]  arXiv:1701.02292 (replaced) [src]
Title: On short cycle enumeration in biregular bipartite graphs
Authors: Ian Blake, Shu Lin
Comments: One of the results has been shown invalid via counterexample
Subjects: Information Theory (cs.IT); Combinatorics (math.CO)
[194]  arXiv:1701.05654 (replaced) [pdf, other]
Title: Bayesian Network Learning via Topological Order
Subjects: Machine Learning (stat.ML); Data Structures and Algorithms (cs.DS)
[195]  arXiv:1701.06368 (replaced) [pdf, other]
Title: An Upper Bound to Zero-Delay Rate Distortion via Kalman Filtering for Vector Gaussian Sources
Comments: 7 pages, 6 figures, accepted for publication in IEEE Information Theory Workshop (ITW)
Subjects: Information Theory (cs.IT)
[196]  arXiv:1702.02258 (replaced) [pdf, other]
Title: Generating Multiple Diverse Hypotheses for Human 3D Pose Consistent with 2D Joint Detections
Comments: accepted to ICCV 2017 (PeopleCap)
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Multimedia (cs.MM); Machine Learning (stat.ML)
[197]  arXiv:1702.03196 (replaced) [pdf, other]
Title: Universal Semantic Parsing
Comments: 16 pages with supplementary, EMNLP 2017
Subjects: Computation and Language (cs.CL)
[198]  arXiv:1702.06997 (replaced) [pdf, other]
Title: Beyond Talagrand Functions: New Lower Bounds for Testing Monotonicity and Unateness
Subjects: Computational Complexity (cs.CC)
[199]  arXiv:1702.08435 (replaced) [pdf, other]
Title: Statistical Anomaly Detection via Composite Hypothesis Testing for Markov Models
Comments: Preprint submitted to the IEEE Transactions on Signal Processing
Subjects: Systems and Control (cs.SY); Optimization and Control (math.OC); Machine Learning (stat.ML)
[200]  arXiv:1703.01986 (replaced) [pdf, other]
Title: Learning from Experience: A Dynamic Closed-Loop QoE Optimization for Video Adaptation and Delivery
Comments: 8 pages
Subjects: Multimedia (cs.MM)
[201]  arXiv:1703.03315 (replaced) [pdf, other]
Title: Self-Stabilizing Disconnected Components Detection and Rooted Shortest-Path Tree Maintenance in Polynomial Steps *
Authors: Stéphane Devismes, David Ilcinkas (LaBRI), Colette Johnen (LaBRI)
Comments: Discrete Mathematics and Theoretical Computer Science DMTCS, 2015, ISS
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
[202]  arXiv:1703.04115 (replaced) [pdf, other]
Title: BetaRun Soccer Simulation League Team: Variety, Complexity, and Learning
Comments: A sketch for a new team for RoboCup 2D simulation league, currently planned for 2018
Subjects: Artificial Intelligence (cs.AI)
[203]  arXiv:1703.06986 (replaced) [pdf, other]
Title: CacheZoom: How SGX Amplifies The Power of Cache Attacks
Comments: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17)
Subjects: Cryptography and Security (cs.CR)
[204]  arXiv:1703.07418 (replaced) [pdf, other]
Title: Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of Things
Comments: To appear in IEEE Transactions on Wireless Communications, 2017
Subjects: Information Theory (cs.IT)
[205]  arXiv:1703.08390 (replaced) [pdf, ps, other]
Title: Smart Meter Privacy with Renewable Energy and an Energy Storage Device
Comments: to appear, IEEE Transactions on Information Forensics and Security
Subjects: Information Theory (cs.IT)
[206]  arXiv:1703.08836 (replaced) [pdf, other]
Title: Learned Multi-Patch Similarity
Comments: 10 pages, 7 figures, Accepted at ICCV 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG)
[207]  arXiv:1703.10089 (replaced) [pdf, other]
Title: Position-based Content Attention for Time Series Forecasting with Sequence-to-sequence RNNs
Subjects: Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
[208]  arXiv:1703.10594 (replaced) [pdf, other]
Title: The Dynamics of Rank-Maximal and Popular Matchings
Subjects: Data Structures and Algorithms (cs.DS)
[209]  arXiv:1704.02310 (replaced) [pdf, other]
Title: Matrix Scaling and Balancing via Box Constrained Newton's Method and Interior Point Methods
Comments: To appear in FOCS 2017
Subjects: Data Structures and Algorithms (cs.DS)
[210]  arXiv:1704.02665 (replaced) [pdf, ps, other]
Title: Supervised Infinite Feature Selection
Subjects: Learning (cs.LG)
[211]  arXiv:1704.03549 (replaced) [pdf, other]
Title: Attention-based Extraction of Structured Information from Street View Imagery
Comments: Updated references, added link to the source code
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[212]  arXiv:1704.04565 (replaced) [pdf, other]
Title: Neural Paraphrase Identification of Questions with Noisy Pretraining
Subjects: Computation and Language (cs.CL)
[213]  arXiv:1704.04795 (replaced) [pdf, other]
Title: Root Mean Square Error of Neural Spike Train Sequence Matching with Optogenetics
Comments: 6 pages, 5 figures. Will be presented at IEEE Global Communications Conference (IEEE GLOBECOM 2017) in December 2017
Subjects: Neurons and Cognition (q-bio.NC); Information Theory (cs.IT); Biological Physics (physics.bio-ph)
[214]  arXiv:1704.04848 (replaced) [pdf, other]
Title: The Power of Waiting for More than One Response in Minimizing the Age-of-Information
Authors: Yu Sang, Bin Li, Bo Ji
Subjects: Networking and Internet Architecture (cs.NI)
[215]  arXiv:1704.06870 (replaced) [pdf, ps, other]
Title: Algorithms for Covering Multiple Barriers
Comments: A preliminary version appeared in WADS 2017
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
[216]  arXiv:1704.07050 (replaced) [pdf, other]
Title: Using Global Constraints and Reranking to Improve Cognates Detection
Comments: 10 pages, 6 figures, 6 tables; published in the Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pages 1983-1992, Vancouver, Canada, July 2017
Journal-ref: In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pages 1983-1992, Vancouver, Canada, July 2017. Association for Computational Linguistics
Subjects: Computation and Language (cs.CL); Learning (cs.LG); Machine Learning (stat.ML)
[217]  arXiv:1705.00097 (replaced) [pdf, ps, other]
Title: A lambda calculus for density matrices with classical and probabilistic controls
Comments: Accepted in APLAS 2017 (to appear in LNCS). This version includes a 12-pages appendix with proofs
Subjects: Logic in Computer Science (cs.LO)
[218]  arXiv:1705.01861 (replaced) [pdf, other]
Title: Action Tubelet Detector for Spatio-Temporal Action Localization
Comments: 9 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[219]  arXiv:1705.06070 (replaced) [pdf, ps, other]
Title: Rank 3 Inhabitation of Intersection Types Revisited (Extended Version)
Subjects: Logic in Computer Science (cs.LO); Computational Complexity (cs.CC)
[220]  arXiv:1705.07120 (replaced) [pdf, other]
Title: VAE with a VampPrior
Comments: 16 pages, new results (two additional datasets) comparing to the previous version + the text was re-organized and re-written
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
[221]  arXiv:1705.07450 (replaced) [pdf, other]
Title: Image Segmentation by Iterative Inference from Conditional Score Estimation
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[222]  arXiv:1705.08417 (replaced) [pdf, other]
Title: Reinforcement Learning with a Corrupted Reward Channel
Comments: A shorter version of this report was accepted to IJCAI 2017 AI and Autonomy track
Subjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)
[223]  arXiv:1705.09218 (replaced) [pdf, other]
Title: Finding Robust Solutions to Stable Marriage
Comments: IJCAI 2017 proceedings
Subjects: Artificial Intelligence (cs.AI)
[224]  arXiv:1706.01382 (replaced) [pdf, other]
Title: Neuro-RAM Unit with Applications to Similarity Testing and Compression in Spiking Neural Networks
Subjects: Neural and Evolutionary Computing (cs.NE); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS); Neurons and Cognition (q-bio.NC)
[225]  arXiv:1706.01570 (replaced) [pdf, other]
Title: Acquisition of Translation Lexicons for Historically Unwritten Languages via Bridging Loanwords
Comments: 5 pages, 1 figure, 1 table; published in the Proceedings of the 10th Workshop on Building and Using Comparable Corpora, pages 21-25, Vancouver, Canada, August 2017
Journal-ref: In Proceedings of the 10th Workshop on Building and Using Comparable Corpora, pages 21-25, Vancouver, Canada, August 2017. Association for Computational Linguistics
Subjects: Computation and Language (cs.CL)
[226]  arXiv:1706.03675 (replaced) [pdf, other]
Title: Post-processing partitions to identify domains of modularity optimization
Comments: this http URL
Journal-ref: Algorithms 10, no. 3: 93 (2017)
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)
[227]  arXiv:1706.04034 (replaced) [pdf, other]
Title: Probabilistic RGB-D Odometry based on Points, Lines and Planes Under Depth Uncertainty
Comments: 30 pages, corrected equation 24 and typos
Subjects: Computer Vision and Pattern Recognition (cs.CV); Robotics (cs.RO)
[228]  arXiv:1706.05101 (replaced) [pdf, other]
Title: On M-ary Distributed Detection for Power Constraint Wireless Sensor Networks
Comments: arXiv admin note: text overlap with arXiv:cs/0703046 by other authors
Subjects: Information Theory (cs.IT)
[229]  arXiv:1706.07418 (replaced) [pdf, ps, other]
Title: Optimal General Matchings
Subjects: Data Structures and Algorithms (cs.DS)
[230]  arXiv:1706.08502 (replaced) [pdf, other]
Title: Natural Language Does Not Emerge 'Naturally' in Multi-Agent Dialog
Comments: 9 pages, 7 figures, 2 tables, accepted at EMNLP 2017 as short paper
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
[231]  arXiv:1706.09152 (replaced) [pdf, other]
Title: Generative Bridging Network in Neural Sequence Prediction
Comments: A submission for AAAI 2018
Subjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)
[232]  arXiv:1707.01227 (replaced) [pdf, other]
Title: Exponential random graphs behave like mixtures of stochastic block models
Subjects: Probability (math.PR); Social and Information Networks (cs.SI); Mathematical Physics (math-ph); Combinatorics (math.CO); Statistics Theory (math.ST)
[233]  arXiv:1707.03017 (replaced) [pdf, other]
Title: Learning Visual Reasoning Without Strong Priors
Comments: This work was presented at ICML 2017's Machine Learning in Speech and Language Processing Workshop
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (stat.ML)
[234]  arXiv:1707.05501 (replaced) [pdf, other]
Title: Story Generation from Sequence of Independent Short Descriptions
Comments: Accepted in SIGKDD Workshop on Machine Learning for Creativity (ML4Creativity), 2017
Subjects: Computation and Language (cs.CL)
[235]  arXiv:1707.05740 (replaced) [pdf, other]
Title: Skeleton Based Human Action Recognition with Global Context-Aware Attention LSTM Networks
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[236]  arXiv:1707.06168 (replaced) [pdf, other]
Title: Channel Pruning for Accelerating Very Deep Neural Networks
Comments: To be appear at ICCV 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[237]  arXiv:1707.06381 (replaced) [pdf]
Title: Adaptive Learning Rule for Hardware-based Deep Neural Networks Using Electronic Synapse Devices
Subjects: Neural and Evolutionary Computing (cs.NE); Emerging Technologies (cs.ET)
[238]  arXiv:1707.06766 (replaced) [pdf, other]
Title: Outcome-Oriented Predictive Process Monitoring: Review and Benchmark
Subjects: Artificial Intelligence (cs.AI)
[239]  arXiv:1707.07716 (replaced) [pdf, other]
Title: Stochastic Gradient Descent for Relational Logistic Regression via Partial Network Crawls
Comments: 7 pages, 3 figures, Proceedings of the Seventh International Workshop on Statistical Relational AI (StarAI 2017)
Subjects: Machine Learning (stat.ML); Learning (cs.LG)
[240]  arXiv:1707.09979 (replaced) [pdf, other]
Title: Rational invariants of ternary forms under the orthogonal group
Comments: Typos and references corrected. 34 pages, 5 figures
Subjects: Symbolic Computation (cs.SC)
[241]  arXiv:1708.01383 (replaced) [pdf, other]
Title: Convergence of Variance-Reduced Stochastic Learning under Random Reshuffling
Subjects: Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
[242]  arXiv:1708.01666 (replaced) [pdf]
Title: An Effective Training Method For Deep Convolutional Neural Network
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
[243]  arXiv:1708.03310 (replaced) [pdf, other]
Title: Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs
Subjects: Artificial Intelligence (cs.AI)
[244]  arXiv:1708.03604 (replaced) [pdf, other]
Title: Porting of the DBCSR library for Sparse Matrix-Matrix Multiplications to Intel Xeon Phi systems
Comments: Submitted to the ParCo2017 conference, Bologna, Italy 12-15 September 2017
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[245]  arXiv:1708.04418 (replaced) [pdf]
Title: An Exploratory Study of Health Habit Formation Through Gamification
Authors: Anna Iurchenko
Comments: 5 pages, 2 tables, 2 figures
Subjects: Human-Computer Interaction (cs.HC)
[246]  arXiv:1708.04754 (replaced) [pdf, other]
Title: Specification and Implementation of Replicated List: The Jupiter Protocol Revisited
Comments: 17 pages, 10 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
[247]  arXiv:1708.04866 (replaced) [pdf, other]
Title: Economic Factors of Vulnerability Trade and Exploitation: Empirical Evidence from a Prominent Russian Cybercrime Market
Authors: Luca Allodi
Comments: To appear in the Proceedings of ACM CCS 2017. 17 pages, 11 figures, 14 tables
Subjects: Cryptography and Security (cs.CR)
[248]  arXiv:1708.05234 (replaced) [pdf, other]
Title: FaceBoxes: A CPU Real-time Face Detector with High Accuracy
Comments: Accepted by IJCB 2017; Added references
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[249]  arXiv:1708.05473 (replaced) [pdf, other]
Title: Dilated Residual Network for Image Denoising
Comments: 8 pages
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[250]  arXiv:1708.05517 (replaced) [pdf, other]
Title: EveTAR: Building a Large-Scale Multi-Task Test Collection over Arabic Tweets
Subjects: Information Retrieval (cs.IR)
[251]  arXiv:1708.05636 (replaced) [pdf, other]
Title: What does a convolutional neural network recognize in the moon?
Authors: Daigo Shoji
Comments: 13 pages, 6 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV); Earth and Planetary Astrophysics (astro-ph.EP); Geophysics (physics.geo-ph)
[ total of 251 entries: 1-251 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)