We gratefully acknowledge support from
the Simons Foundation
and member institutions

Computer Science

New submissions

[ total of 142 entries: 1-142 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Thu, 19 Oct 17

[1]  arXiv:1710.06451 [pdf, other]
Title: Understanding Generalization and Stochastic Gradient Descent
Comments: 11 pages, 8 figures
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)

This paper tackles two related questions at the heart of machine learning; how can we predict if a minimum will generalize to the test set, and why does stochastic gradient descent find minima that generalize well? Our work is inspired by Zhang et al. (2017), who showed deep networks can easily memorize randomly labeled training data, despite generalizing well when shown real labels of the same inputs. We show here that the same phenomenon occurs in small linear models. These observations are explained by evaluating the Bayesian evidence in favor of each model, which penalizes sharp minima. Next, we explore the "generalization gap" between small and large batch training, identifying an optimum batch size which maximizes the test set accuracy. Noise in the gradient updates is beneficial, driving the dynamics towards robust minima for which the evidence is large. Interpreting stochastic gradient descent as a stochastic differential equation, we predict the optimum batch size is proportional to both the learning rate and the size of the training set, and verify these predictions empirically.

[2]  arXiv:1710.06454 [pdf, other]
Title: Optimal Control of Interdependent Epidemics in Complex Networks
Comments: 8 figures. Oral presentation at SIAM Workshop in Network Science 16 in joint with SIAM Annual Meeting
Subjects: Systems and Control (cs.SY)

Optimal control of interdependent epidemics spreading over complex networks is a critical issue. We first establish a framework to capture the coupling between two epidemics, and then analyze the system's equilibrium states by categorizing them into three classes, and deriving their stability conditions. The designed control strategy globally optimizes the trade-off between the control cost and the severity of epidemics in the network. A gradient descent algorithm based on a fixed point iterative scheme is proposed to find the optimal control strategy. The optimal control will lead to switching between equilibria of the interdependent epidemics network. Case studies are used to corroborate the theoretical results finally.

[3]  arXiv:1710.06463 [pdf, other]
Title: Learning Inverse Statics Models Efficiently
Subjects: Learning (cs.LG)

Online Goal Babbling and Direction Sampling are recently proposed methods for direct learning of inverse kinematics mappings from scratch even in high-dimensional sensorimotor spaces following the paradigm of "learning while behaving". To learn inverse statics mappings - primarily for gravity compensation - from scratch and without using any closed-loop controller, we modify and enhance the Online Goal Babbling and Direction Sampling schemes. Moreover, we exploit symmetries in the inverse statics mappings to drastically reduce the number of samples required for learning inverse statics models. Results for a 2R planar robot, a 3R simplified human arm, and a 4R humanoid robot arm clearly demonstrate that their inverse statics mappings can be learned successfully with our modified online Goal Babbling scheme. Furthermore, we show that the number of samples required for the 2R and 3R arms can be reduced by a factor of at least 8 and 16 resp. -depending on the number of discovered symmetries.

[4]  arXiv:1710.06471 [pdf, other]
Title: Coded Fourier Transform
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Information Theory (cs.IT); Learning (cs.LG)

We consider the problem of computing the Fourier transform of high-dimensional vectors, distributedly over a cluster of machines consisting of a master node and multiple worker nodes, where the worker nodes can only store and process a fraction of the inputs. We show that by exploiting the algebraic structure of the Fourier transform operation and leveraging concepts from coding theory, one can efficiently deal with the straggler effects. In particular, we propose a computation strategy, named as coded FFT, which achieves the optimal recovery threshold, defined as the minimum number of workers that the master node needs to wait for in order to compute the output. This is the first code that achieves the optimum robustness in terms of tolerating stragglers or failures for computing Fourier transforms. Furthermore, the reconstruction process for coded FFT can be mapped to MDS decoding, which can be solved efficiently. Moreover, we extend coded FFT to settings including computing general $n$-dimensional Fourier transforms, and provide the optimal computing strategy for those settings.

[5]  arXiv:1710.06473 [pdf, other]
Title: Superpixels Based Marker Tracking Vs. Hue Thresholding In Rodent Biomechanics Application
Comments: This paper has been accepted for 2017 Asilomar conference, IEEE
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Examining locomotion has improved our basic understanding of motor control and aided in treating motor impairment. Mice and rats are premier models of human disease and increasingly the model systems of choice for basic neuroscience. High frame rates (250 Hz) are needed to quantify the kinematics of these running rodents. Manual tracking, especially for multiple markers, becomes time-consuming and impossible for large sample sizes. Therefore, the need for automatic segmentation of these markers has grown in recent years. We propose two methods to segment and track these markers: first, using SLIC superpixels segmentation with a tracker based on position, speed, shape, and color information of the segmented region in the previous frame; second, using a thresholding on hue channel following up with the same tracker. The comparison showed that the SLIC superpixels method was superior because the segmentation was more reliable and based on both color and spatial information.

[6]  arXiv:1710.06481 [pdf, other]
Title: Constructing Datasets for Multi-hop Reading Comprehension Across Documents
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)

Most Reading Comprehension methods limit themselves to queries which can be answered using a single sentence, paragraph, or document. Enabling models to combine disjoint pieces of textual evidence would extend the scope of machine comprehension methods, but currently there exist no resources to train and test this capability. We propose a novel task to encourage the development of models for text understanding across multiple documents and to investigate the limits of existing methods. In our task, a model learns to seek and combine evidence - effectively performing multi-hop (alias multi-step) inference. We devise a methodology to produce datasets for this task, given a collection of query-answer pairs and thematically linked documents. Two datasets from different domains are induced, and we identify potential pitfalls and devise circumvention strategies. We evaluate two previously proposed competitive models and find that one can integrate information across documents. However, both models struggle to select relevant information, as providing documents guaranteed to be relevant greatly improves their performance. While the models outperform several strong baselines, their best accuracy reaches 42.9% compared to human performance at 74.0% - leaving ample room for improvement.

[7]  arXiv:1710.06482 [pdf, ps, other]
Title: Successive Four-Dimensional Stokes-Space Direct Detection
Comments: Submitted on October 10, 2017, to the Optical Fiber Communications Conference and Exhibition, OFC 2018
Subjects: Information Theory (cs.IT)

We present a successive detection scheme for the fourth dimension in a four-dimensional Stokes-space direct detection receiver. At the expense of a small number of electrical-domain computations, the additional information rate can be substantial.

[8]  arXiv:1710.06494 [pdf, ps, other]
Title: Privacy by typing in the $π$-calculus
Comments: 43 pages
Subjects: Logic in Computer Science (cs.LO); Cryptography and Security (cs.CR)

In this paper we propose a formal framework for studying privacy in information systems. The proposal follows a two-axes schema where the first axis considers privacy as a taxonomy of rights and the second axis involves the ways an information system stores and manipulates information. We develop a correspondence between the above schema and an associated model of computation. In particular, we propose the \Pcalc, a calculus based on the $\pi$-calculus with groups extended with constructs for reasoning about private data. The privacy requirements of an information system are captured via a privacy policy language. The correspondence between the privacy model and the \Pcalc semantics is established using a type system for the calculus and a satisfiability definition between types and privacy policies. We deploy a type preservation theorem to show that a system respects a policy and it is safe if the typing of the system satisfies the policy. We illustrate our methodology via analysis of two use cases: a privacy-aware scheme for electronic traffic pricing and a privacy-preserving technique for speed-limit enforcement.

[9]  arXiv:1710.06495 [pdf]
Title: A Line-Point Unified Solution to Relative Camera Pose Estimation
Comments: Submitted to ICRA 2018
Subjects: Robotics (cs.RO); Computer Vision and Pattern Recognition (cs.CV)

In this work we present a unified method of relative camera pose estimation from points and lines correspondences. Given a set of 2D points and lines correspondences in three views, of which two are known, a method has been developed for estimating the camera pose of the third view. Novelty of this algorithm is to combine both points and lines correspondences in the camera pose estimation which enables us to compute relative camera pose with a small number of feature correspondences. Our central idea is to exploit the tri-linear relationship between three views and generate a set of linear equations from the points and lines correspondences in the three views. The desired solution to the system of equations are expressed as a linear combination of the singular vectors and the coefficients are computed by solving a small set of quadratic equations generated by imposing orthonormality constraints for general camera motion. The advantages of the proposed method are demonstrated by experimenting on publicly available data set. Results show the robustness and efficiency of the method in relative camera pose estimation for both small and large camera motion with a small set of points and line features.

[10]  arXiv:1710.06499 [pdf, other]
Title: Fundamental Limits of Low-Density Spreading NOMA with Fading
Subjects: Information Theory (cs.IT)

Spectral efficiency of low-density spreading non-orthogonal multiple access channels in the presence of fading is derived for linear detection with independent decoding as well as optimum decoding. The large system limit, where both the number of users and number of signal dimensions grow with fixed ratio, called load, is considered. In the case of optimum decoding, it is found that low-density spreading underperforms dense spreading for all loads. Conversely, linear detection is characterized by different behaviors in the underloaded vs. overloaded regimes. In particular, it is shown that spectral efficiency changes smoothly as load increases. However, in the overloaded regime, the spectral efficiency of low- density spreading is higher than that of dense spreading.

[11]  arXiv:1710.06500 [pdf, other]
Title: Chain Reduction for Binary and Zero-Suppressed Decision Diagrams
Authors: Randal E. Bryant
Subjects: Data Structures and Algorithms (cs.DS); Logic in Computer Science (cs.LO)

Chain reduction enables reduced ordered binary decision diagrams (BDDs) and zero-suppressed binary decision diagrams (ZDDs) to each take advantage of the others' ability to symbolically represent Boolean functions in compact form. For any Boolean function, its chain-reduced ZDD (CZDD) representation will be no larger than its ZDD representation, and at most twice the size of its BDD representation. The chain-reduced BDD (CBDD) of a function will be no larger than its BDD representation, and at most three times the size of its CZDD representation. Extensions to the standard algorithms for operating on BDDs and ZDDs enable them to operate on the chain-reduced versions. Experimental evaluations on representative benchmarks for encoding word lists, solving combinatorial problems, and operating on digital circuits indicate that chain reduction can provide significant benefits in terms of both memory and execution time.

[12]  arXiv:1710.06501 [pdf, other]
Title: Do Convolutional Neural Networks Learn Class Hierarchy?
Comments: Video demo at this https URL
Journal-ref: IEEE Transactions on Visualization and Computer Graphics, Volume: 23, Issue: 1 (2018)
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Convolutional Neural Networks (CNNs) currently achieve state-of-the-art accuracy in image classification. With a growing number of classes, the accuracy usually drops as the possibilities of confusion increase. Interestingly, the class confusion patterns follow a hierarchical structure over the classes. We present visual-analytics methods to reveal and analyze this hierarchy of similar classes in relation with CNN-internal data. We found that this hierarchy not only dictates the confusion patterns between the classes, it furthermore dictates the learning behavior of CNNs. In particular, the early layers in these networks develop feature detectors that can separate high-level groups of classes quite well, even after a few training epochs. In contrast, the latter layers require substantially more epochs to develop specialized feature detectors that can separate individual classes. We demonstrate how these insights are key to significant improvement in accuracy by designing hierarchy-aware CNNs that accelerate model convergence and alleviate overfitting. We further demonstrate how our methods help in identifying various quality issues in the training data.

[13]  arXiv:1710.06507 [pdf, other]
Title: Scene Parsing with Global Context Embedding
Comments: Accepted in ICCV'17. Code available at this https URL
Subjects: Computer Vision and Pattern Recognition (cs.CV)

We present a scene parsing method that utilizes global context information based on both the parametric and non- parametric models. Compared to previous methods that only exploit the local relationship between objects, we train a context network based on scene similarities to generate feature representations for global contexts. In addition, these learned features are utilized to generate global and spatial priors for explicit classes inference. We then design modules to embed the feature representations and the priors into the segmentation network as additional global context cues. We show that the proposed method can eliminate false positives that are not compatible with the global context representations. Experiments on both the MIT ADE20K and PASCAL Context datasets show that the proposed method performs favorably against existing methods.

[14]  arXiv:1710.06511 [pdf]
Title: Multi-focus image fusion using VOL and EOL in DCT domain
Comments: 2016 1st International Conference on New Research Achievements in Electrical and Computer Engineering (ICNRAECE)
Subjects: Computer Vision and Pattern Recognition (cs.CV)

The purpose of multi-focus image fusion is gathering the essential information and the focused parts from the input multi-focus images into a single image. These multi-focused images are captured with different depths of focus of cameras. Multi-focus image fusion is very time-saving and appropriate in discrete cosine transform (DCT) domain, especially when JPEG images are used in visual sensor networks (VSN). The previous works in DCT domain have some errors in selection of the suitable divided blocks according to their criterion for measurement of the block contrast. In this paper, we used variance of Laplacian (VOL) and energy of Laplacian (EOL) as criterion to measure the contrast of image. Also in this paper, the EOL and VOL calculations directly in DCT domain are prepared using vector processing. We developed four matrices which calculate the Laplacian of block easily in DCT domain. Our works greatly reduce error due to unsuitable block selection. The results of the proposed algorithms are compared with the previous algorithms in order to demonstrate the superiority of the output image quality in the proposed methods. The several JPEG multi-focus images are used in experiments and their fused image by our proposed methods and the other algorithms are compared with different measurement criteria.

[15]  arXiv:1710.06512 [pdf, other]
Title: Pose-based Deep Gait Recognition
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Human gait or the walking manner is a biometric feature that allows to identify a person when other biometric features such as face or iris are not visible. In this paper we present a new pose-based convolutional neural network model for gait recognition. Unlike many methods considering the full-height silhouettes of a moving person, we consider motion of points in the areas around the human joints. To extract the motion information we estimate the optical flow between current and subsequent frames. We propose the deep convolutional model which computes pose-based gait descriptors. We compare different network architectures and aggregation methods. Besides, we experiment with different sets of body parts and learn which of them are the most important for gait recognition. In addition, we investigate the generalization ability of the algorithms transferring them from one dataset to another. The results of the experiments show that our approach outperforms the state-of-the-art methods.

[16]  arXiv:1710.06513 [pdf, other]
Title: Learning Knowledge-guided Pose Grammar Machine for 3D Human Pose Estimation
Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI)

In this paper, we propose a knowledge-guided pose grammar network to tackle the problem of 3D human pose estimation. Our model directly takes 2D poses as inputs and learns the generalized 2D-3D mapping function, which renders high applicability. The proposed network consists of a base network which efficiently captures pose-aligned features and a hierarchy of Bidirectional RNNs on top of it to explicitly incorporate a set of knowledge (e.g., kinematics, symmetry, motor coordination) and thus enforce high-level constraints over human poses. In learning, we develop a pose-guided sample simulator to augment training samples in virtual camera views, which further improves the generalization ability of our model. We validate our method on public 3D human pose benchmarks and propose a new evaluation protocol working on cross-view setting to verify the generalization ability of different methods. We empirically observe that most state-of-the-arts face difficulty under such setting while our method obtains superior performance.

[17]  arXiv:1710.06514 [pdf, ps, other]
Title: On reducing sampling variance in covariate shift using control variates
Comments: Submitted to the journal Pattern Recognition Letters
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

Covariate shift classification problems can in principle be tackled by importance-weighting training samples. However, the sampling variance of the risk estimator is often scaled up dramatically by the weights. This means that during cross-validation - when the importance-weighted risk is repeatedly evaluated - suboptimal hyperparameter estimates are produced. We study the sampling variances of the importance-weighted versus the oracle estimator as a function of the relative scale of the training data. We show that introducing a control variate can reduce the variance of the importance-weighted risk estimator, which leads to superior regularization parameter estimates when the training data is much smaller in scale than the test data.

[18]  arXiv:1710.06515 [pdf, ps, other]
Title: Enhancing Inductive Entailment Proofs in Separation Logic with Lemma Synthesis
Authors: Quang Loc Le
Subjects: Programming Languages (cs.PL); Logic in Computer Science (cs.LO)

This paper presents an approach to lemma synthesis to support advanced inductive entailment procedures based on separation logic. We first propose a mechanism where lemmas are automatically proven and systematically applied. The lemmas may include universal guard and/or unknown predicate. While the former is critical for expressivity, the latter is essential for supporting relationships between multiple predicates. We further introduce lemma synthesis to support (i) automated inductive reasoning together with frame inference and (ii) theorem exploration. For (i) we automatically discover and prove auxiliary lemmas during an inductive proof; and for (ii) we automatically generate a useful set of lemmas to relate user-defined or system-generated predicates. We have implemented our proposed approach into an existing verification system and tested its capability in inductive reasoning and theorem exploration. The experimental results show that the enhanced system can automatically synthesize useful lemmas to facilitate reasoning on a broad range of non-trivial inductive proofs.

[19]  arXiv:1710.06516 [pdf, other]
Title: Hybrid Simulation Safety: Limbos and Zero Crossings
Authors: David Broman
Subjects: Computers and Society (cs.CY)

Physical systems can be naturally modeled by combining continuous and discrete models. Such hybrid models may simplify the modeling task of complex system, as well as increase simulation performance. Moreover, modern simulation engines can often efficiently generate simulation traces, but how do we know that the simulation results are correct? If we detect an error, is the error in the model or in the simulation itself? This paper discusses the problem of simulation safety, with the focus on hybrid modeling and simulation. In particular, two key aspects are studied: safe zero-crossing detection and deterministic hybrid event handling. The problems and solutions are discussed and partially implemented in Modelica and Ptolemy II.

[20]  arXiv:1710.06518 [pdf, other]
Title: Sistema de Navegação Autônomo Baseado em Visão Computacional
Comments: in Portuguese. Thesis presented to the Federal University of Sergipe, at Sergipe, Brazil in partial fulfillment of the requirement for the degree of Bachelor of Science in Computer Engineering. A demonstration of this project can be watched by this link: this https URL Advisors: Dr. Leonardo Nogueira Matos, Dr. Bruno Otavio Piedade Prado
Subjects: Robotics (cs.RO); Computer Vision and Pattern Recognition (cs.CV)

Autonomous robots are used as the tool to solve many kinds of problems, such as environmental mapping and monitoring. Either for adverse conditions related to the human presence or even for the need to reduce costs, it is certain that many efforts have been made to develop robots with an increasingly high level of autonomy. They must be capable of locomotion through dynamic environments, without human operators or assistant systems' help. It is noted, thus, that the form of perception and modeling of the environment becomes significantly relevant to navigation. Among the main sensing methods are those based on vision. Through this, it is possible to create highly-detailed models about the environment, since many characteristics can be measured, such as texture, color, and illumination. However, the most accurate vision-based navigation techniques are computationally expensive to run on low-cost mobile platforms. Therefore, the goal of this work was to develop a low-cost robot, controlled by a Raspberry Pi, whose navigation system is based on vision. For this purpose, the strategy used consisted in identifying obstacles via optical flow pattern recognition. Through this signal, it is possible to infer the relative displacement between the robot and other elements in the environment. Its estimation was done using the Lucas-Kanade algorithm, which can be executed by the Raspberry Pi without harming its performance. Finally, an SVM based classifier was used to identify patterns of this signal associated with obstacles movement. The developed system was evaluated considering its execution over an optical flow pattern dataset extracted from a real navigation environment. In the end, it was verified that the processing frequency of the system was superior to the others. Furthermore, its accuracy and acquisition cost were, respectively, higher and lower than most of the cited works.

[21]  arXiv:1710.06520 [pdf, other]
Title: LASAGNE: Locality And Structure Aware Graph Node Embedding
Subjects: Social and Information Networks (cs.SI); Learning (cs.LG)

In this work we propose Lasagne, a methodology to learn locality and structure aware graph node embeddings in an unsupervised way. In particular, we show that the performance of existing random-walk based approaches depends strongly on the structural properties of the graph, e.g., the size of the graph, whether the graph has a flat or upward-sloping Network Community Profile (NCP), whether the graph is expander-like, whether the classes of interest are more k-core-like or more peripheral, etc. For larger graphs with flat NCPs that are strongly expander-like, existing methods lead to random walks that expand rapidly, touching many dissimilar nodes, thereby leading to lower-quality vector representations that are less useful for downstream tasks. Rather than relying on global random walks or neighbors within fixed hop distances, Lasagne exploits strongly local Approximate Personalized PageRank stationary distributions to more precisely engineer local information into node embeddings. This leads, in particular, to more meaningful and more useful vector representations of nodes in poorly-structured graphs. We show that Lasagne leads to significant improvement in downstream multi-label classification for larger graphs with flat NCPs, that it is comparable for smaller graphs with upward-sloping NCPs, and that is comparable to existing methods for link prediction tasks.

[22]  arXiv:1710.06524 [pdf, ps, other]
Title: Unsupervised Sentence Representations as Word Information Series: Revisiting TF--IDF
Subjects: Computation and Language (cs.CL)

Sentence representation at the semantic level is a challenging task for Natural Language Processing and Artificial Intelligence. Despite the advances in word embeddings (i.e. word vector representations), capturing sentence meaning is an open question due to complexities of semantic interactions among words. In this paper, we present an embedding method, which is aimed at learning unsupervised sentence representations from unlabeled text. We propose an unsupervised method that models a sentence as a weighted series of word embeddings. The weights of the word embeddings are fitted by using Shannon's word entropies provided by the Term Frequency--Inverse Document Frequency (TF--IDF) transform. The hyperparameters of the model can be selected according to the properties of data (e.g. sentence length and textual gender). Hyperparameter selection involves word embedding methods and dimensionalities, as well as weighting schemata. Our method offers advantages over existing methods: identifiable modules, short-term training, online inference of (unseen) sentence representations, as well as independence from domain, external knowledge and language resources. Results showed that our model outperformed the state of the art in well-known Semantic Textual Similarity (STS) benchmarks. Moreover, our model reached state-of-the-art performance when compared to supervised and knowledge-based STS systems.

[23]  arXiv:1710.06525 [pdf, other]
Title: Near-Optimal Adversarial Policy Switching for Decentralized Asynchronous Multi-Agent Systems
Subjects: Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA)

A key challenge in multi-robot and multi-agent systems is generating solutions that are robust to other self-interested or even adversarial parties who actively try to prevent the agents from achieving their goals. The practicality of existing works addressing this challenge is limited to only small-scale synchronous decision-making scenarios or a single agent planning its best response against a single adversary with fixed, procedurally characterized strategies. In contrast this paper considers a more realistic class of problems where a team of asynchronous agents with limited observation and communication capabilities need to compete against multiple strategic adversaries with changing strategies. This problem necessitates agents that can coordinate to detect changes in adversary strategies and plan the best response accordingly. Our approach first optimizes a set of stratagems that represent these best responses. These optimized stratagems are then integrated into a unified policy that can detect and respond when the adversaries change their strategies. The near-optimality of the proposed framework is established theoretically as well as demonstrated empirically in simulation and hardware.

[24]  arXiv:1710.06536 [pdf, other]
Title: Basic tasks of sentiment analysis
Journal-ref: Encyclopedia of Social Network Analysis and Mining, 2017
Subjects: Computation and Language (cs.CL)

Subjectivity detection is the task of identifying objective and subjective sentences. Objective sentences are those which do not exhibit any sentiment. So, it is desired for a sentiment analysis engine to find and separate the objective sentences for further analysis, e.g., polarity detection. In subjective sentences, opinions can often be expressed on one or multiple topics. Aspect extraction is a subtask of sentiment analysis that consists in identifying opinion targets in opinionated text, i.e., in detecting the specific aspects of a product or service the opinion holder is either praising or complaining about.

[25]  arXiv:1710.06537 [pdf, other]
Title: Sim-to-Real Transfer of Robotic Control with Dynamics Randomization
Subjects: Robotics (cs.RO); Systems and Control (cs.SY)

Simulations are attractive environments for training agents as they provide an abundant source of data and alleviate certain safety concerns during the training process. But the behaviours developed by agents in simulation are often specific to the characteristics of the simulator. Due to modeling error, strategies that are successful in simulation may not transfer to their real world counterparts. In this paper, we demonstrate a simple method to bridge this "reality gap." By randomizing the dynamics of the simulator during training, we are able to develop policies that are capable of adapting to very different dynamics, including ones that differ significantly from the dynamics on which the policies were trained. This adaptivity enables the policies to generalize to the dynamics of the real world without any training on the physical system. Our approach is demonstrated on an object pushing task using a robotic arm. Despite being trained exclusively in simulation, our policies are able to maintain a similar level of performance when deployed on a real robot, reliably moving an object to a desired location from random initial configurations. We explore the impact of various design decisions and show that the resulting policies are robust to significant calibration error.

[26]  arXiv:1710.06540 [pdf, ps, other]
Title: A Particle Filtering Approach for Enabling Distributed and Scalable Sharing of DSA Network Resources
Subjects: Networking and Internet Architecture (cs.NI)

Handling the massive number of devices needed in numerous applications such as smart cities is a major challenge given the scarcity of spectrum resources. Dynamic spectrum access (DSA) is seen as a potential candidate to support the connectivity and spectrum access of these devices. We propose an efficient technique that relies on particle filtering to enable distributed resource allocation and sharing for large-scale dynamic spectrum access networks. More specifically, we take advantage of the high tracking capability of particle filtering to efficiently assign the available spectrum and power resources among cognitive users. Our proposed technique maximizes the per-user throughput while ensuring fairness among users, and it does so while accounting for the different users' quality of service requirements and the channel gains' variability. Through intensive simulations, we show that our proposed approach performs well by achieving high overall throughput while improving user's fairness under different objective functions. Furthermore, it achieves higher performance when compared to state-of-the-art techniques.

[27]  arXiv:1710.06541 [pdf]
Title: Design Considerations of a Sub-50 μW Receiver Front-end for Implantable Devices in MedRadio Band
Comments: Accepted to appear on International Conference on VLSI Design 2018 (VLSID)
Subjects: Networking and Internet Architecture (cs.NI); Signal Processing (eess.SP)

Emerging health-monitor applications, such as information transmission through multi-channel neural implants, image and video communication from inside the body etc., calls for ultra-low active power (<50${\mu}$W) high data-rate, energy-scalable, highly energy-efficient (pJ/bit) radios. Previous literature has strongly focused on low average power duty-cycled radios or low power but low-date radios. In this paper, we investigate power performance trade-off of each front-end component in a conventional radio including active matching, down-conversion and RF/IF amplification and prioritize them based on highest performance/energy metric. The analysis reveals 50${\Omega}$ active matching and RF gain is prohibitive for 50${\mu}$W power-budget. A mixer-first architecture with an N-path mixer and a self-biased inverter based baseband LNA, designed in TSMC 65nm technology show that sub 50${\mu}$W performance can be achieved up to 10Mbps (< 5pJ/b) with OOK modulation.

[28]  arXiv:1710.06542 [pdf, other]
Title: Asymmetric Actor Critic for Image-Based Robot Learning
Comments: Videos of experiments can be found at this http URL
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Learning (cs.LG)

Deep reinforcement learning (RL) has proven a powerful technique in many sequential decision making domains. However, Robotics poses many challenges for RL, most notably training on a physical system can be expensive and dangerous, which has sparked significant interest in learning control policies using a physics simulator. While several recent works have shown promising results in transferring policies trained in simulation to the real world, they often do not fully utilize the advantage of working with a simulator. In this work, we exploit the full state observability in the simulator to train better policies which take as input only partial observations (RGBD images). We do this by employing an actor-critic training algorithm in which the critic is trained on full states while the actor (or policy) gets rendered images as input. We show experimentally on a range of simulated tasks that using these asymmetric inputs significantly improves performance. Finally, we combine this method with domain randomization and show real robot experiments for several tasks like picking, pushing, and moving a block. We achieve this simulation to real world transfer without training on any real world data.

[29]  arXiv:1710.06548 [pdf]
Title: Data Driven Computational Model for Bipedal Walking and Push Recovery
Subjects: Robotics (cs.RO)

In this research, we have developed the data driven computational walking model to overcome the problem with traditional kinematics based model. Our model is adaptable and can adjust the parameter morphological similar to human. The human walk is a combination of different discrete sub-phases with their continuous dynamics. Any system which exhibits the discrete switching logic and continuous dynamics can be represented using a hybrid system. In this research, the bipedal locomotion is analyzed which is important for understanding the stability and to negotiate with the external perturbations. We have also studied the other important behavior push recovery. The Push recovery is also a very important behavior acquired by human with continuous interaction with environment. The researchers are trying to develop robots that must have the capability of push recovery to safely maneuver in a dynamic environment. The push is a very commonly experienced phenomenon in cluttered environment. The human beings can recover from external push up to a certain extent using different strategies of hip, knee and ankle. The different human beings have different push recovery capabilities. For example a wrestler has a better push negotiation capability compared to normal human beings. The push negotiation capability acquired by human, therefore, is based on learning but the learning mechanism is still unknown to researchers. The research community across the world is trying to develop various humanoid models to solve this mystery. Seeing all the conventional mechanics and control based models have some inherent limitations, a learning based computational model has been developed to address effectively this issue. In this research we will discuss how we have framed this problem as hybrid system.

[30]  arXiv:1710.06552 [pdf, other]
Title: Relaxation-Based Coarsening for Multilevel Hypergraph Partitioning
Subjects: Discrete Mathematics (cs.DM)

Multilevel partitioning methods that are inspired by principles of multiscaling are the most powerful practical hypergraph partitioning solvers. Hypergraph partitioning has many applications in disciplines ranging from scientific computing to data science. In this paper we introduce the concept of algebraic distance on hypergraphs and demonstrate its use as an algorithmic component in the coarsening stage of multilevel hypergraph partitioning solvers. The algebraic distance is a vertex distance measure that extends hyperedge weights for capturing the local connectivity of vertices which is critical for hypergraph coarsening schemes. The practical effectiveness of the proposed measure and corresponding coarsening scheme is demonstrated through extensive computational experiments on a diverse set of problems. Finally, we propose a benchmark of hypergraph partitioning problems to compare the quality of other solvers.

[31]  arXiv:1710.06554 [pdf, other]
Title: Honk: A PyTorch Reimplementation of Convolutional Neural Networks for Keyword Spotting
Comments: 3 pages, 2 figures
Subjects: Computation and Language (cs.CL)

We describe Honk, an open-source PyTorch reimplementation of convolutional neural networks for keyword spotting that are included as examples in TensorFlow. These models are useful for recognizing "command triggers" in speech-based interfaces (e.g., "Hey Siri"), which serve as explicit cues for audio recordings of utterances that are sent to the cloud for full speech recognition. Evaluation on Google's recently released Speech Commands Dataset shows that our reimplementation is comparable in accuracy and provides a starting point for future work on the keyword spotting task.

[32]  arXiv:1710.06555 [pdf, other]
Title: Learning Deep Context-aware Features over Body and Latent Parts for Person Re-identification
Comments: Accepted by CVPR 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Person Re-identification (ReID) is to identify the same person across different cameras. It is a challenging task due to the large variations in person pose, occlusion, background clutter, etc How to extract powerful features is a fundamental problem in ReID and is still an open problem today. In this paper, we design a Multi-Scale Context-Aware Network (MSCAN) to learn powerful features over full body and body parts, which can well capture the local context knowledge by stacking multi-scale convolutions in each layer. Moreover, instead of using predefined rigid parts, we propose to learn and localize deformable pedestrian parts using Spatial Transformer Networks (STN) with novel spatial constraints. The learned body parts can release some difficulties, eg pose variations and background clutters, in part-based representation. Finally, we integrate the representation learning processes of full body and body parts into a unified framework for person ReID through multi-class person identification tasks. Extensive evaluations on current challenging large-scale person ReID datasets, including the image-based Market1501, CUHK03 and sequence-based MARS datasets, show that the proposed method achieves the state-of-the-art results.

[33]  arXiv:1710.06559 [pdf, ps, other]
Title: A recognition algorithm for simple-triangle graphs
Authors: Asahi Takaoka
Comments: 9 pages, 1 figure
Subjects: Discrete Mathematics (cs.DM); Data Structures and Algorithms (cs.DS); Combinatorics (math.CO)

A simple-triangle graph is the intersection graph of triangles that are defined by a point on a horizontal line and an interval on another horizontal line. The time complexity of the recognition problem for simple-triangle graphs was a longstanding open problem, which was recently settled. This paper provides a new recognition algorithm for simple-triangle graphs to improve the time bound from $O(n^2 \overline{m})$ to $O(nm)$, where $n$, $m$, and $\overline{m}$ are the number of vertices, edges, and non-edges of the graph, respectively. The algorithm uses the vertex ordering characterization in our previous paper that a graph is a simple-triangle graph if and only if there is a linear ordering of the vertices containing both an alternating orientation of the graph and a transitive orientation of the complement of the graph.

[34]  arXiv:1710.06564 [pdf, other]
Title: Replacement AutoEncoder: A Privacy-Preserving Algorithm for Sensory Data Analysis
Comments: Submitted, 12 pages, 11 figures
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

An increasing number of sensors on mobile, Internet of things (IoT), and wearable devices generate time-series measurements of physical activities. Though access to the sensory data is critical to the success of many beneficial applications such as health monitoring or activity recognition, a wide range of potentially sensitive information about the individuals can also be discovered through these datasets and this cannot easily be protected using traditional privacy approaches.
In this paper, we propose an integrated sensing framework for managing access to personal time-series data in order to provide utility while protecting individuals' privacy. We introduce \textit{Replacement AutoEncoder}, a novel feature-learning algorithm which learns how to transform discriminative features of multidimensional time-series that correspond to sensitive inferences, into some features that have been more observed in non-sensitive inferences, to protect users' privacy. The main advantage of Replacement AutoEncoder is its ability to keep important features of desired inferences unchanged to preserve the utility of the data. We evaluate the efficacy of the algorithm with an activity recognition task in a multi-sensing environment using extensive experiments on three benchmark datasets. We show that it can retain the recognition accuracy of state-of-the-art techniques while simultaneously preserving the privacy of sensitive information. We use a Generative Adversarial Network to attempt to detect the replacement of sensitive data with fake non-sensitive data. We show that this approach does not detect the replacement unless the network can train using the users' original unmodified data.

[35]  arXiv:1710.06574 [pdf, other]
Title: The Effects of Memory Replay in Reinforcement Learning
Subjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)

Experience replay is a key technique behind many recent advances in deep reinforcement learning. Allowing the agent to learn from earlier memories can speed up learning and break undesirable temporal correlations. Despite its wide-spread application, very little is understood about the properties of experience replay. How does the amount of memory kept affect learning dynamics? Does it help to prioritize certain experiences? In this paper, we address these questions by formulating a dynamical systems ODE model of Q-learning with experience replay. We derive analytic solutions of the ODE for a simple setting. We show that even in this very simple setting, the amount of memory kept can substantially affect the agent's performance. Too much or too little memory both slow down learning. Moreover, we characterize regimes where prioritized replay harms the agent's learning. We show that our analytic solutions have excellent agreement with experiments. Finally, we propose a simple algorithm for adaptively changing the memory buffer size which achieves consistently good empirical performance.

[36]  arXiv:1710.06578 [pdf, other]
Title: Acceleration of Gradient-based Path Integral Method for Efficient Optimal and Inverse Optimal Control
Subjects: Systems and Control (cs.SY)

This paper deals with a new accelerated path integral method, which iteratively searches optimal controls with a small number of iterations. This study is based on the recent observations that a path integral method for reinforcement learning can be interpreted as gradient descent. This observation also applies to an iterative path integral method for optimal control, which sets a convincing argument for utilizing various optimization methods for gradient descent, such as momentum-based acceleration, step-size adaptation and their combination. We introduce these types of methods to the path integral and demonstrate that momentum-based methods, like Nesterov Accelerated Gradient and Adam, can significantly improve the convergence rate to search for optimal controls in simulated control systems. We also demonstrate that the accelerated path integral could improve the performance on model predictive control for various vehicle navigation tasks. Finally, we represent this accelerated path integral method as a recurrent network, which is the accelerated version of the previously proposed path integral networks (PI-Net). We can train the accelerated PI-Net more efficiently for inverse optimal control with less RAM than the original PI-Net.

[37]  arXiv:1710.06582 [pdf, other]
Title: Learning Social Image Embedding with Deep Multimodal Attention Networks
Journal-ref: Proceedings of Thematic Workshops of the 25th ACM Multimedia 2017
Subjects: Multimedia (cs.MM); Learning (cs.LG); Machine Learning (stat.ML)

Learning social media data embedding by deep models has attracted extensive research interest as well as boomed a lot of applications, such as link prediction, classification, and cross-modal search. However, for social images which contain both link information and multimodal contents (e.g., text description, and visual content), simply employing the embedding learnt from network structure or data content results in sub-optimal social image representation. In this paper, we propose a novel social image embedding approach called Deep Multimodal Attention Networks (DMAN), which employs a deep model to jointly embed multimodal contents and link information. Specifically, to effectively capture the correlations between multimodal contents, we propose a multimodal attention network to encode the fine-granularity relation between image regions and textual words. To leverage the network structure for embedding learning, a novel Siamese-Triplet neural network is proposed to model the links among images. With the joint deep model, the learnt embedding can capture both the multimodal contents and the nonlinear network information. Extensive experiments are conducted to investigate the effectiveness of our approach in the applications of multi-label classification and cross-modal search. Compared to state-of-the-art image embeddings, our proposed DMAN achieves significant improvement in the tasks of multi-label classification and cross-modal search.

[38]  arXiv:1710.06587 [pdf, ps, other]
Title: Association and Load Optimization with User Priorities in Load-Coupled Heterogeneous Networks
Comments: 14pages, 10 figures
Subjects: Information Theory (cs.IT)

In this paper, we consider the network utility maximization problem with various user priorities via jointly optimizing user association, load distribution and power control in a load-coupled heterogeneous network. In order to tackle the nonconvexity of the problem, we first analyze the problem by obtaining the optimal resource allocation strategy in closed form and characterizing the optimal base station load distribution pattern. Both observations are shown essential in simplifying the original problem and making it possible to transform the nonconvex load distribution and power control problem into convex reformulation via exponential variable transformation. An iterative algorithm with low complexity is accordingly presented to obtain a suboptimal solution to the joint optimization problem. Simulation results show that the proposed algorithm achieves better performance than conventional approaches.

[39]  arXiv:1710.06590 [pdf]
Title: MEDOC: a Python wrapper to load MEDLINE into a local MySQL database
Comments: 4 pages, 1 figure
Subjects: Digital Libraries (cs.DL); Databases (cs.DB)

Since the MEDLINE database was released, the number of documents indexed by this entity has risen every year. Several tools have been developed by the National Institutes of Health (NIH) to query this corpus of scientific publications. However, in terms of advances in big data, text-mining and data science, an option to build a local relational database containing all metadata available on MEDLINE would be truly useful to optimally exploit these resources. MEDOC (MEdline DOwnloading Contrivance) is a Python program designed to download data on an FTP and to load all extracted information into a local MySQL database. It took MEDOC 4 days and 17 hours to load the 26 million documents available on this server onto a standard computer. This indexed relational database allows the user to build complex and rapid queries. All fields can thus be searched for desired information, a task that is difficult to accomplish through the PubMed graphical interface. MEDOC is free and publicly available at https://github.com/MrMimic/MEDOC.

[40]  arXiv:1710.06608 [pdf, other]
Title: Cell Segmentation in 3D Confocal Images using Supervoxel Merge-Forests with CNN-based Hypothesis Selection
Comments: 5 pages, 3 figures, 1 table
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Automated segmentation approaches are crucial to quantitatively analyze large-scale 3D microscopy images. Particularly in deep tissue regions, automatic methods still fail to provide error-free segmentations. To improve the segmentation quality throughout imaged samples, we present a new supervoxel-based 3D segmentation approach that outperforms current methods and reduces the manual correction effort. The algorithm consists of gentle preprocessing and a conservative super-voxel generation method followed by supervoxel agglomeration based on local signal properties and a postprocessing step to fix under-segmentation errors using a Convolutional Neural Network. We validate the functionality of the algorithm on manually labeled 3D confocal images of the plant Arabidopis thaliana and compare the results to a state-of-the-art meristem segmentation algorithm.

[41]  arXiv:1710.06609 [pdf, other]
Title: Supervised and Extended Restart in Random Walks for Ranking and Link Prediction in Networks
Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph)

Given a real-world graph, how can we measure relevance scores for ranking and link prediction? Random walk with restart (RWR) provides an excellent measure for this and has been applied to various applications such as friend recommendation, community detection, anomaly detection, etc. However, RWR suffers from two problems: 1) using the same restart probability for all the nodes limits the expressiveness of random walk, and 2) the restart probability needs to be manually chosen for each application without theoretical justification. We have two main contributions in this paper. First, we propose Random Walk with Extended Restart (RWER), a random walk based measure which improves the expressiveness of random walks by using a distinct restart probability for each node. The improved expressiveness leads to superior accuracy for ranking and link prediction. Second, we propose SuRe (Supervised Restart for RWER), an algorithm for learning the restart probabilities of RWER from a given graph. SuRe eliminates the need to heuristically and manually select the restart parameter for RWER. Extensive experiments show that our proposed method provides the best performance for ranking and link prediction tasks, improving the MAP (Mean Average Precision) by up to 15.8% on the best competitor.

[42]  arXiv:1710.06615 [pdf, other]
Title: Amending the Characterization of Guidance in Visual Analytics
Subjects: Human-Computer Interaction (cs.HC); Graphics (cs.GR)

At VAST 2016, a characterization of guidance has been presented. It includes a definition of guidance and a model of guidance based on van Wijk's model of visualization. This note amends the original characterization of guidance in two aspects. First, we provide a clarification of what guidance actually is (and is not). Second, we insert into the model a conceptually relevant link that was missing in the original version.

[43]  arXiv:1710.06617 [pdf, other]
Title: The Robust Reading Competition Annotation and Evaluation Platform
Subjects: Computer Vision and Pattern Recognition (cs.CV)

The ICDAR Robust Reading Competition (RRC), initiated in 2003 and re-established in 2011, has become the de-facto evaluation standard for the international community.
Concurrent with its second incarnation in 2011, a continuous effort started to develop an online framework to facilitate the hosting and management of competitions.
This short paper briefly outlines the Robust Reading Competition Annotation and Evaluation Platform, the backbone of the Robust Reading Competition, comprising a collection of tools and processes that aim to simplify the management and annotation of data, and to provide online and offline performance evaluation and analysis services.

[44]  arXiv:1710.06632 [pdf, other]
Title: Towards a Seamless Integration of Word Senses into Downstream NLP Applications
Comments: ACL 2017
Journal-ref: Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), Vancouver, Canada (2017), pages 1857-1869
Subjects: Computation and Language (cs.CL)

Lexical ambiguity can impede NLP systems from accurate understanding of semantics. Despite its potential benefits, the integration of sense-level information into NLP systems has remained understudied. By incorporating a novel disambiguation algorithm into a state-of-the-art classification model, we create a pipeline to integrate sense-level information into downstream NLP applications. We show that a simple disambiguation of the input text can lead to consistent performance improvement on multiple topic categorization and polarity detection datasets, particularly when the fine granularity of the underlying sense inventory is reduced and the document is sufficiently large. Our results also point to the need for sense representation research to focus more on in vivo evaluations which target the performance in downstream NLP applications rather than artificial benchmarks.

[45]  arXiv:1710.06636 [pdf, ps, other]
Title: Deceased Organ Matching in Australia
Authors: Toby Walsh
Comments: Proceedings of 5th International Conference on Algorithmic Decision Theory (ADT 2017)
Subjects: Computer Science and Game Theory (cs.GT); Artificial Intelligence (cs.AI)

Despite efforts to increase the supply of organs from living donors, most kidney transplants performed in Australia still come from deceased donors. The age of these donated organs has increased substantially in recent decades as the rate of fatal accidents on roads has fallen. The Organ and Tissue Authority in Australia is therefore looking to design a new mechanism that better matches the age of the organ to the age of the patient. I discuss the design, axiomatics and performance of several candidate mechanisms that respect the special online nature of this fair division problem.

[46]  arXiv:1710.06637 [pdf, other]
Title: Maximum Value Matters: Finding Hot Topics in Scholarly Fields
Comments: 10 pages
Subjects: Social and Information Networks (cs.SI); Digital Libraries (cs.DL)

Finding hot topics in scholarly fields can help researchers to keep up with the latest concepts, trends, and inventions in their field of interest. Due to the rarity of complete large-scale scholarly data, earlier studies target this problem based on manual topic extraction from a limited number of domains, with their focus solely on a single feature such as coauthorship, citation relations, and etc. Given the compromised effectiveness of such predictions, in this paper we use a real scholarly dataset from Microsoft Academic Graph, which provides more than 12000 topics in the field of Computer Science (CS), including 1200 venues, 14.4 million authors, 30 million papers and their citation relations over the period of 1950 till now. Aiming to find the topics that will trend in CS area, we innovatively formalize a hot topic prediction problem where, with joint consideration of both inter- and intra-topical influence, 17 different scientific features are extracted for comprehensive description of topic status. By leveraging all those 17 features, we observe good accuracy of topic scale forecasting after 5 and 10 years with R2 values of 0.9893 and 0.9646, respectively. Interestingly, our prediction suggests that the maximum value matters in finding hot topics in scholarly fields, primarily from three aspects: (1) the maximum value of each factor, such as authors' maximum h-index and largest citation number, provides three times the amount of information than the average value in prediction; (2) the mutual influence between the most correlated topics serve as the most telling factor in long-term topic trend prediction, interpreting that those currently exhibiting the maximum growth rates will drive the correlated topics to be hot in the future; (3) we predict in the next 5 years the top 100 fastest growing (maximum growth rate) topics that will potentially get the major attention in CS area.

[47]  arXiv:1710.06647 [pdf, other]
Title: Image Restoration by Iterative Denoising and Backward Projections
Subjects: Computer Vision and Pattern Recognition (cs.CV); Numerical Analysis (cs.NA)

Inverse problems appear in many applications such as image deblurring and inpainting. The common approach to address them is to design a specific algorithm for each problem. The Plug-and-Play (P&P) framework, which has been recently introduced, allows solving general inverse problems by leveraging the impressive capabilities of existing denoising algorithms. While this fresh strategy has found many applications, a burdensome parameter tuning is often required in order to obtain high-quality results. In this work, we propose an alternative method for solving inverse problems using denoising algorithms, that requires less parameter tuning. We demonstrate that it is competitive with task-specific techniques and the P&P approach for image inpainting and deblurring.

[48]  arXiv:1710.06648 [pdf, other]
Title: Representation Learning of Music Using Artist Labels
Comments: 5 pages, will be submitted to ICASSP 2018
Subjects: Sound (cs.SD); Audio and Speech Processing (eess.AS)

Recently, feature representation by learning algorithms has drawn great attention. In the music domain, it is either unsupervised or supervised by semantic labels such as music genre. However, finding discriminative features in an unsupervised way is challenging, and supervised feature learning using semantic labels may involve noisy or expensive annotation. In this paper, we present a feature learning approach that utilizes artist labels attached in every single music track as an objective meta data. To this end, we train a deep convolutional neural network to classify audio tracks into a large number of artists. We regard it as a general feature extractor and apply it to artist recognition, genre classification and music auto-tagging in transfer learning settings. The results show that the proposed approach outperforms or is comparable to previous state-of-the-art methods, indicating that the proposed approach effectively captures general music audio features.

[49]  arXiv:1710.06654 [pdf]
Title: Analysis of Student Behaviour in Habitable Worlds Using Continuous Representation Visualization
Subjects: Human-Computer Interaction (cs.HC)

We introduce a novel approach to visualizing temporal clickstream behaviour in the context of a degree-satisfying online course, Habitable Worlds, offered through Arizona State University. The current practice for visualizing behaviour within a digital learning environment has been to utilize state space graphs and other plots of descriptive statistics on resource transitions. While these forms can be visually engaging, they rely on conditional frequency tabulations which lack contextual depth and require assumptions about the patterns being sought. Skip-grams and other representation learning techniques position elements into a vector space which can capture a wide scope of regularities in the data. These regularities can then be projected onto a two-dimensional perceptual space using dimensionality reduction techniques designed to retain relationships information encoded in the learned representations. While these visualization techniques have been used before in the broader machine learning community to better understand the makeup of a neural network hidden layer or the relationship between word vectors, we apply them to online behavioral learner data and go a step further; exploring the impact of the parameters of the model on producing tangible, non-trivial observations of behaviour that are illuminating and suggestive of pedagogical improvement to the course designers and instructors. The methodology introduced in this paper led to an improved understanding of passing and non-passing student behavior in the course and is widely applicable to other datasets of clickstream activity where investigators and stakeholders wish to organically surface principal behavioral patterns.

[50]  arXiv:1710.06668 [pdf, other]
Title: Simultaneous Recognition and Pose Estimation of Instruments in Minimally Invasive Surgery
Comments: 8 pages, 2 figures, MICCAI 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Detection of surgical instruments plays a key role in ensuring patient safety in minimally invasive surgery. In this paper, we present a novel method for 2D vision-based recognition and pose estimation of surgical instruments that generalizes to different surgical applications. At its core, we propose a novel scene model in order to simultaneously recognize multiple instruments as well as their parts. We use a Convolutional Neural Network architecture to embody our model and show that the cross-entropy loss is well suited to optimize its parameters which can be trained in an end-to-end fashion. An additional advantage of our approach is that instrument detection at test time is achieved while avoiding the need for scale-dependent sliding window evaluation. This allows our approach to be relatively parameter free at test time and shows good performance for both instrument detection and tracking. We show that our approach surpasses state-of-the-art results on in-vivo retinal microsurgery image data, as well as ex-vivo laparoscopic sequences.

[51]  arXiv:1710.06677 [pdf, other]
Title: Dropout Sampling for Robust Object Detection in Open-Set Conditions
Comments: Submitted to IEEE International Conference on Robotics and Automation 2018 (ICRA 2018)
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Dropout Variational Inference, or Dropout Sampling, has been recently proposed as an approximation technique for Bayesian Deep Learning and evaluated for image classification and regression tasks. This paper investigates the utility of Dropout Sampling for object detection for the first time. We demonstrate how label uncertainty can be extracted from a state-of-the-art object detection system via Dropout Sampling. We show that this uncertainty can be utilized to increase object detection performance under the open-set conditions that are typically encountered in robotic vision. We evaluate this approach on a large synthetic dataset with 30,000 images, and a real-world dataset captured by a mobile robot in a versatile campus environment.

[52]  arXiv:1710.06678 [pdf, ps, other]
Title: LTL Semantic Tableaux and Alternating $ω$-automata via Linear Factors
Subjects: Formal Languages and Automata Theory (cs.FL)

Linear Temporal Logic (LTL) is a widely used specification framework for linear time properties of systems. The standard approach for verifying such properties is by transforming LTL formulae to suitable $\omega$-automata and then applying model checking.
We revisit Vardi's transformation of an LTL formula to an alternating $\omega$-automaton and Wolper's LTL tableau method for satisfiability checking. We observe that both constructions effectively rely on a decomposition of formulae into linear factors.
Linear factors have been introduced previously by Antimirov in the context of regular expressions.
We establish the notion of linear factors for LTL and verify essential properties such as expansion and finiteness.
Our results shed new insights on the connection between the construction of alternating $\omega$-automata and semantic tableaux.

[53]  arXiv:1710.06693 [pdf, other]
Title: First-Order Perturbation Analysis of the SECSI Framework for the Approximate CP Decomposition of 3-D Noise-Corrupted Low-Rank Tensors
Subjects: Information Theory (cs.IT)

The Semi-Algebraic framework for the approximate Canonical Polyadic (CP) decomposition via SImultaneaous matrix diagonalization (SECSI) is an efficient tool for the computation of the CP decomposition. The SECSI framework reformulates the CP decomposition into a set of joint eigenvalue decomposition (JEVD) problems. Solving all JEVDs, we obtain multiple estimates of the factor matrices and the best estimate is chosen in a subsequent step by using an exhaustive search or some heuristic strategy that reduces the computational complexity. Moreover, the SECSI framework retains the option of choosing the number of JEVDs to be solved, thus providing an adjustable complexity-accuracy trade-off. In this work, we provide an analytical performance analysis of the SECSI framework for the computation of the approximate CP decomposition of a noise corrupted low-rank tensor, where we derive closed-form expressions of the relative mean square error for each of the estimated factor matrices. These expressions are obtained using a first-order perturbation analysis and are formulated in terms of the second-order moments of the noise, such that apart from a zero mean, no assumptions on the noise statistics are required. Simulation results exhibit an excellent match between the obtained closed-form expressions and the empirical results. Moreover, we propose a new Performance Analysis based Selection (PAS) scheme to choose the final factor matrix estimate. The results show that the proposed PAS scheme outperforms the existing heuristics, especially in the high SNR regime.

[54]  arXiv:1710.06699 [pdf, other]
Title: Detecting Clickbait in Online Social Media: You Won't Believe How We Did It
Subjects: Social and Information Networks (cs.SI)

In this paper, we propose an approach for the detection of clickbait posts in online social media (OSM). Clickbait posts are short catchy phrases that attract a user's attention to click to an article. The approach is based on a machine learning (ML) classifier capable of distinguishing between clickbait and legitimate posts published in OSM. The suggested classifier is based on a variety of features, including image related features, linguistic analysis, and methods for abuser detection. In order to evaluate our method, we used two datasets provided by Clickbait Challenge 2017. The best performance obtained by the ML classifier was an AUC of 0.8, an accuracy of 0.812, precision of 0.819, and recall of 0.966. In addition, as opposed to previous studies, we found that clickbait post titles are statistically significant shorter than legitimate post titles. Finally, we found that counting the number of formal English words in the given content is useful for clickbait detection.

[55]  arXiv:1710.06700 [pdf, other]
Title: Build Fast and Accurate Lemmatization for Arabic
Authors: Hamdy Mubarak
Subjects: Computation and Language (cs.CL)

In this paper we describe the complexity of building a lemmatizer for Arabic which has a rich and complex derivational morphology, and we discuss the need for a fast and accurate lammatization to enhance Arabic Information Retrieval (IR) results. We also introduce a new data set that can be used to test lemmatization accuracy, and an efficient lemmatization algorithm that outperforms state-of-the-art Arabic lemmatization in terms of accuracy and speed. We share the data set and the code for public.

[56]  arXiv:1710.06703 [pdf, other]
Title: Stochastic Weighted Function Norm Regularization
Comments: 19 pages, 8 figures
Subjects: Learning (cs.LG); Machine Learning (stat.ML)

Deep neural networks (DNNs) have become increasingly important due to their excellent empirical performance on a wide range of problems. However, regularization is generally achieved by indirect means, largely due to the complex set of functions defined by a network and the difficulty in measuring function complexity. There exists no method in the literature for additive regularization based on a norm of the function, as is classically considered in statistical learning theory. In this work, we propose sampling-based approximations to weighted function norms as regularizers for deep neural networks. We provide, to the best of our knowledge, the first proof in the literature of the NP-hardness of computing function norms of DNNs, motivating the necessity of a stochastic optimization strategy. Based on our proposed regularization scheme, stability-based bounds yield a $\mathcal{O}(N^{-\frac{1}{2}})$ generalization error for our proposed regularizer when applied to convex function sets. We demonstrate broad conditions for the convergence of stochastic gradient descent on our objective, including for non-convex function sets such as those defined by DNNs. Finally, we empirically validate the improved performance of the proposed regularization strategy for both convex function sets as well as DNNs on real-world classification and segmentation tasks.

[57]  arXiv:1710.06711 [pdf, other]
Title: ComFlux: External Composition and Adaptation of Pervasive Applications
Subjects: Computers and Society (cs.CY); Software Engineering (cs.SE)

Technology is becoming increasingly pervasive. At present, the system components working together to provide functionality, be they purely software or with a physical element, tend to operate within silos, bound to a particular application or usage.
This is counter to the wider vision of pervasive computing, where a potentially limitless number of applications can be realised through the dynamic and seamless interactions of system components. We believe this application composition should be externally controlled, driven by policy and subject to access control. We present ComFlux, our open source middleware, and show through a number of designs and implementations, how it supports this functionality with acceptable overhead.

[58]  arXiv:1710.06738 [pdf, other]
Title: Minimizing Task Space Frechet Error via Efficient Incremental Graph Search
Subjects: Robotics (cs.RO)

We present an algorithm that generates a collision-free configuration-space path that closely follows, according to the discrete Fr\'echet metric, a desired path in task space. By leveraging the Fr\'echet metric and other tools from computational geometry, we approximate the search space using a cross-product graph. This structure allows us to efficiently search for the solution using a simple variant of Dijkstra's graph search algorithm. Additionally, we can incrementally update and improve the solution in an anytime fashion. We compare multiple proposed densification strategies and show that our algorithm outperforms a previously proposed optimization-based approach.

[59]  arXiv:1710.06744 [pdf, ps, other]
Title: An intensionally fully-abstract sheaf model for $π$ (expanded version)
Authors: Clovis Eberhart (1), Tom Hirschowitz (1), Thomas Seiller (2) ((1) LAMA, (2) IHES)
Subjects: Logic in Computer Science (cs.LO); Programming Languages (cs.PL)

Following previous work on CCS, we propose a compositional model for the $\pi$-calculus in which processes are interpreted as sheaves on certain simple sites. Such sheaves are a concurrent form of innocent strategies, in the sense of Hyland-Ong/Nickau game semantics. We define an analogue of fair testing equivalence in the model and show that our interpretation is intensionally fully abstract for it. That is, the interpretation preserves and reflects fair testing equivalence; and furthermore, any innocent strategy is fair testing equivalent to the interpretation of some process. The central part of our work is the construction of our sites, relying on a combinatorial presentation of $\pi$-calculus traces in the spirit of string diagrams.

[60]  arXiv:1710.06745 [pdf, other]
Title: Nonsmooth optimal value and policy functions for mechanical systems subject to unilateral constraints
Subjects: Robotics (cs.RO)

State-of-the-art approaches to optimal control of contact-rich robot dynamics use smooth approximations of value and policy functions and gradient-based algorithms for improving approximator parameters. Unfortunately, the dynamics of mechanical systems subject to unilateral constraints--i.e. robot locomotion and manipulation--are generally nonsmooth. We show that value and policy functions generally inherit regularity properties like (non)smoothness from the underlying system's dynamics, and demonstrate this effect in a simple mechanical system. We conclude with a discussion of implications for the use of gradient-based algorithms for optimal control of contact-rich robot dynamics.

[61]  arXiv:1710.06746 [pdf, ps, other]
Title: Jointly Optimal Spatial Channel Assignment and Power Allocation for MIMO SWIPT Systems
Comments: 5 pages; 4 figures; accepted to IEEE journal 2017
Subjects: Information Theory (cs.IT)

The joint design of spatial channel assignment and power allocation in Multiple Input Multiple Output (MIMO) systems capable of Simultaneous Wireless Information and Power Transfer (SWIPT) is studied. Assuming availability of channel state information at both communications ends, we maximize the harvested energy at the multi-antenna receiver, while satisfying a minimum information rate requirement for the MIMO link. We first derive the globally optimal eigenchannel assignment and power allocation design, and then present a practically motivated tight closed-form approximation for the optimal design parameters. Selected numerical results verify the validity of the optimal solution and provide useful insights on the proposed designs as well as the pareto-optimal rate-energy tradeoff.

[62]  arXiv:1710.06752 [pdf, other]
Title: Caching in Combination Networks: Novel Multicast Message Generation and Delivery by Leveraging the Network Topology
Comments: 6 pages, 3 figures, submitted to ICC 2018
Subjects: Information Theory (cs.IT)

Maddah-Ali and Niesen's original coded caching scheme for shared-link broadcast networks is now known to be optimal to within a factor two, and has been applied to other types of networks. For practical reasons, this paper considers that a server communicates to cache-aided users through $H$ intermediate relays. In particular, it focuses on combination networks where each of the $K = \binom{H}{r}$ users is connected to a distinct $r$-subsets of relays. By leveraging the symmetric topology of the network, this paper proposes a novel method to general multicast messages and to deliver them to the users. By numerical evaluations, the proposed scheme is shown to reduce the download time compared to the schemes available in the literature. The idea is then extended to decentralized combination networks, more general relay networks, and combination networks with cache-aided relays and users. Also in these cases the proposed scheme outperforms known ones.

[63]  arXiv:1710.06753 [pdf, ps, other]
Title: Universally Weakly Secure Coset Coding Schemes for Minimum Storage Regenerating (MSR) Codes
Comments: Presented at the 55th Annual Allerton Conference on Communication, Control, and Computing, Oct 2017
Subjects: Information Theory (cs.IT); Cryptography and Security (cs.CR)

We consider the problem of designing codes for distributed storage that protect user data against eavesdroppers that can gain access to network links as well as individual nodes. Our goal is to achieve weak security (also known as block security) that requires that the eavesdroppers would not be able to decode individual files or combinations of a small number of files. The standard approach for achieving block security is to use a joint design scheme that consists of (inner) storage code and the (outer) coset code. However, jointly designing the codes requires that the user, who pre-processes and stores the files, should know the underlying storage code in order to design the (outer) linear transformation for achieving weak security. In many practical scenarios, such as storing the files on the third party cloud storage system, it may not be possible for the user to know the underlying storage code.
In this work, we present universal schemes that separate the outer code design from the storage code design for minimum storage regenerating codes (MSR). Our schemes allow the independent design of the storage code and the outer code. Our schemes use small field size and can be used in a broad range of practical settings.

[64]  arXiv:1710.06770 [pdf]
Title: SQG-Differential Evolution for difficult optimization problems under a tight function evaluation budget
Subjects: Neural and Evolutionary Computing (cs.NE); Optimization and Control (math.OC)

In the context of industrial engineering it is important to integrate efficient computational optimization methods in the product development process. Some of the most challenging simulation based engineering design optimization problems are characterized by: a large number of design variables, the absence of analytical gradient information, highly non-linear objectives and a limited function evaluation budget. Although a huge variety of different optimization algorithms is available, the development and selection of efficient algorithms for problems with these industrial relevant characteristics, remains a challenge. In this communication a hybrid variant of Differential Evolution (DE) is introduced which combines aspects of Stochastic Quasi-Gradient (SQG) methods within the framework of DE, in order to improve optimization efficiency on problems with the previously mentioned characteristics. The performance of the resulting method is compared with other state-of-the-art DE variants on 25 commonly used test functions, under tight function evaluation budget constraints of 1000 evaluations. The experimental results indicate that the proposed method performs particularly good on the "difficult" (high dimensional, multi-modal, inseparable) test functions. The operations used in the proposed mutation scheme, are computationally inexpensive, and can be easily implemented in existing differential evolution or other optimization algorithms by a few lines of program code as an non-invasive optional setting. Besides the applicability of the presented algorithm by itself, the described concepts can serve as a useful and interesting addition to the algorithmic operators in the frameworks of heuristics and evolutionary optimization and computing.

[65]  arXiv:1710.06774 [pdf, ps, other]
Title: Toward Common Components for Open Workflow Systems
Subjects: Software Engineering (cs.SE)

The role of scalable high-performance workflows and flexible workflow management systems that can support multiple simulations will continue to increase in importance. For example, with the end of Dennard scaling, there is a need to substitute a single long running simulation with multiple repeats of shorter simulations, or concurrent replicas. Further, many scientific problems involve ensembles of simulations in order to solve a higher-level problem or produce statistically meaningful results. However most supercomputing software development and performance enhancements have focused on optimizing single- simulation performance. On the other hand, there is a strong inconsistency in the definition and practice of workflows and workflow management systems. This inconsistency often centers around the difference between several different types of workflows, including modeling and simulation, grid, uncertainty quantification, and purely conceptual workflows. This work explores this phenomenon by examining the different types of workflows and workflow management systems, reviewing the perspective of a large supercomputing facility, examining the common features and problems of workflow management systems, and finally presenting a proposed solution based on the concept of common building blocks. The implications of the continuing proliferation of workflow management systems and the lack of interoperability between these systems are discussed from a practical perspective. In doing so, we have begun an investigation of the design and implementation of open workflow systems for supercomputers based upon common components.

[66]  arXiv:1710.06776 [pdf]
Title: Localization of DES Supervisory Control with Event Reduction
Comments: arXiv admin note: substantial text overlap with arXiv:1611.00339
Subjects: Systems and Control (cs.SY)

Supervisor localization procedure can be employed to construct local controllers corresponding to component agents in discrete-event systems. This proposed method in [11] is based on state reduction of a monolithic supervisor with respect to each set of controllable events corresponding to each component agent. A supervisor is localizable if state cardinality can be reduced from the reduced supervisor to each local controller. Although event reduction is an important property, the original supervisor localization procedure did not guarantee event reduction in each local controller comparing to the reduced supervisor. In this paper, we propose a method to localize a supervisor with event reduction in each local controller comparing to the reduced supervisor. State reduction facilitates the implementation of local controllers on industrial systems, whereas event reduction reduces communication traffic between each pair of local controllers.

[67]  arXiv:1710.06785 [pdf, other]
Title: A New UGV Teleoperation Interface for Improved Awareness of Network Connectivity and Physical Surroundings
Comments: Accepted for publication in the Journal of Human-Robot Interaction
Subjects: Robotics (cs.RO); Human-Computer Interaction (cs.HC); Networking and Internet Architecture (cs.NI)

A reliable wireless connection between the operator and the teleoperated Unmanned Ground Vehicle (UGV) is critical in many Urban Search and Rescue (USAR) missions. Unfortunately, as was seen in e.g. the Fukushima disaster, the networks available in areas where USAR missions take place are often severely limited in range and coverage. Therefore, during mission execution, the operator needs to keep track of not only the physical parts of the mission, such as navigating through an area or searching for victims, but also the variations in network connectivity across the environment.
In this paper, we propose and evaluate a new teleoperation User Interface (UI) that includes a way of estimating the Direction of Arrival (DoA) of the Radio Signal Strength (RSS) and integrating the DoA information in the interface. The evaluation shows that using the interface results in more objects found, and less aborted missions due to connectivity problems, as compared to a standard interface. The proposed interface is an extension to an existing interface centered around the video stream captured by the UGV. But instead of just showing the network signal strength in terms of percent and a set of bars, the additional information of DoA is added in terms of a color bar surrounding the video feed. With this information, the operator knows what movement directions are safe, even when moving in regions close to the connectivity threshold.

[68]  arXiv:1710.06798 [pdf, other]
Title: Feature versus Raw Sequence: Deep Learning Comparative Study on Predicting Pre-miRNA
Comments: 12 pages, 2 figures. arXiv admin note: substantial text overlap with arXiv:1704.03834
Subjects: Learning (cs.LG); Genomics (q-bio.GN)

Should we input known genome sequence features or input sequence itself in deep learning framework? As deep learning more popular in various applications, researchers often come to question whether to generate features or use raw sequences for deep learning. To answer this question, we study the prediction accuracy of precursor miRNA prediction of feature-based deep belief network and sequence-based convolution neural network. Tested on a variant of six-layer convolution neural net and three-layer deep belief network, we find the raw sequence input based convolution neural network model performs similar or slightly better than feature based deep belief networks with best accuracy values of 0.995 and 0.990, respectively. Both the models outperform existing benchmarks models. The results shows us that if provided large enough data, well devised raw sequence based deep learning models can replace feature based deep learning models. However, construction of well behaved deep learning model can be very challenging. In cased features can be easily extracted, feature-based deep learning models may be a better alternative.

[69]  arXiv:1710.06799 [pdf, other]
Title: NeuTM: A Neural Network-based Framework for Traffic Matrix Prediction in SDN
Comments: Submitted to NOMS18. arXiv admin note: substantial text overlap with arXiv:1705.05690
Subjects: Networking and Internet Architecture (cs.NI)

This paper presents NeuTM, a framework for network Traffic Matrix (TM) prediction based on Long Short-Term Memory Recurrent Neural Networks (LSTM RNNs). TM prediction is defined as the problem of estimating future network traffic matrix from the previous and achieved network traffic data. It is widely used in network planning, resource management and network security. Long Short-Term Memory (LSTM) is a specific recurrent neural network (RNN) architecture that is well-suited to learn from data and classify or predict time series with time lags of unknown size. LSTMs have been shown to model long-range dependencies more accurately than conventional RNNs. NeuTM is a LSTM RNN-based framework for predicting TM in large networks. By validating our framework on real-world data from GEEANT network, we show that our model converges quickly and gives state of the art TM prediction performance.

[70]  arXiv:1710.06805 [pdf]
Title: Enhancing the Performance of Convolutional Neural Networks on Quality Degraded Datasets
Comments: The International Conference on Digital Image Computing: Techniques and Applications (DICTA), 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Despite the appeal of deep neural networks that largely replace the traditional handmade filters, they still suffer from isolated cases that cannot be properly handled only by the training of convolutional filters. Abnormal factors, including real-world noise, blur, or other quality degradations, ruin the output of a neural network. These unexpected problems can produce critical complications, and it is surprising that there has only been minimal research into the effects of noise in the deep neural network model. Therefore, we present an exhaustive investigation into the effect of noise in image classification and suggest a generalized architecture of a dual-channel model to treat quality degraded input images. We compare the proposed dual-channel model with a simple single model and show it improves the overall performance of neural networks on various types of quality degraded input datasets.

[71]  arXiv:1710.06811 [pdf, other]
Title: Visual Progression Analysis of Student Records Data
Comments: 8 pages, 7 figures, Published in Visualization in Data Science (VDS 2017)
Subjects: Computers and Society (cs.CY)

University curriculum, both on a campus level and on a per-major level, are affected in a complex way by many decisions of many administrators and faculty over time. As universities across the United States share an urgency to significantly improve student success and success retention, there is a pressing need to better understand how the student population is progressing through the curriculum, and how to provide better supporting infrastructure and refine the curriculum for the purpose of improving student outcomes. This work has developed a visual knowledge discovery system called eCamp that pulls together a variety of populationscale data products, including student grades, major descriptions, and graduation records. These datasets were previously disconnected and only available to and maintained by independent campus offices. The framework models and analyzes the multi-level relationships hidden within these data products, and visualizes the student flow patterns through individual majors as well as through a hierarchy of majors. These results support analytical tasks involving student outcomes, student retention, and curriculum design. It is shown how eCamp has revealed student progression information that was previously unavailable.

[72]  arXiv:1710.06815 [pdf, other]
Title: Photo-Guided Exploration of Volume Data Features
Comments: 9 pages
Subjects: Graphics (cs.GR); Artificial Intelligence (cs.AI)

In this work, we pose the question of whether, by considering qualitative information such as a sample target image as input, one can produce a rendered image of scientific data that is similar to the target. The algorithm resulting from our research allows one to ask the question of whether features like those in the target image exists in a given dataset. In that way, our method is one of imagery query or reverse engineering, as opposed to manual parameter tweaking of the full visualization pipeline. For target images, we can use real-world photographs of physical phenomena. Our method leverages deep neural networks and evolutionary optimization. Using a trained similarity function that measures the difference between renderings of a phenomenon and real-world photographs, our method optimizes rendering parameters. We demonstrate the efficacy of our method using a superstorm simulation dataset and images found online. We also discuss a parallel implementation of our method, which was run on NCSA's Blue Waters.

[73]  arXiv:1710.06824 [pdf, other]
Title: Identifying Mild Traumatic Brain Injury Patients From MR Images Using Bag of Visual Words
Comments: The ASFNR 11th Annual Meeting, 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)

Mild traumatic brain injury (mTBI) is a growing public health problem with an estimated incidence of one million people annually in US. Neurocognitive tests are used to both assess the patient condition and to monitor the patient progress. This work aims to directly use MR images taken shortly after injury to detect whether a patient suffers from mTBI, by incorporating machine learning and computer vision techniques to learn features suitable discriminating between mTBI and normal patients. We focus on 3 regions in brain, and extract multiple patches from them, and use bag-of-visual-word technique to represent each subject as a histogram of representative patterns derived from patches from all training subjects. After extracting the features, we use greedy forward feature selection, to choose a subset of features which achieves highest accuracy. We show through experimental studies that BoW features perform better than the simple mean value features which were used previously.

[74]  arXiv:1710.06825 [pdf, other]
Title: Nonlinear Phase-Quantized Constant-Envelope Precoding for Massive MU-MIMO-OFDM
Subjects: Information Theory (cs.IT)

We propose a novel algorithm for phase-quantized constant-envelope precoding in the massive multi-user (MU) multiple-input multiple-output (MIMO) downlink. Specifically, we extend the nonlinear squared-infinity norm Douglas-Rachford splitting (SQUID) precoder to systems that use oversampling digital-to-analog converters (DACs) at the base station (BS) and orthogonal frequency-division multiplexing (OFDM) to communicate over frequency-selective channels. We demonstrate that SQUID is able to generate constant-envelope signals, which enables the use of power-efficient analog radio-frequency circuitry at the BS. By quantizing the phase of the resulting constant-envelope signal, we obtain a finite-cardinality signal that can be synthesized by low-resolution (e.g., 1-bit) DACs. We use error-rate simulations to demonstrate the superiority of SQUID over linear precoders for massive MU-MIMO-OFDM.

[75]  arXiv:1710.06827 [pdf, other]
Title: A non-ordinary peridynamics implementation for anisotropic materials
Subjects: Computational Engineering, Finance, and Science (cs.CE); Computational Physics (physics.comp-ph)

Peridynamics (PD) represents a new approach for modelling fracture mechanics, where a continuum domain is modelled through particles connected via physical bonds. This formulation allows us to model crack initiation, propagation, branching and coalescence without special assumptions. Up to date, anisotropic materials were modelled in the PD framework as different isotropic materials (for instance, fibre and matrix of a composite laminate), where the stiffness of the bond depends on its orientation. A non-ordinary state-based formulation will enable the modelling of generally anisotropic materials, where the material properties are directly embedded in the formulation. Other material models include rocks, concrete and biomaterials such as bones. In this paper, we implemented this model and validated it for anisotropic composite materials. A composite damage criterion has been employed to model the crack propagation behaviour. Several numerical examples have been used to validate the approach, and compared to other benchmark solution from the finite element method (FEM) and experimental results when available.

[76]  arXiv:1710.06831 [pdf, other]
Title: Setting Up the Beam for Human-Centered Service Tasks
Comments: 10 pages
Subjects: Robotics (cs.RO)

We introduce the Beam, a collaborative autonomous mobile service robot, based on SuitableTech's Beam telepresence system. We present a set of enhancements to the telepresence system, including autonomy, human awareness, increased computation and sensing capabilities, and integration with the popular Robot Operating System (ROS) framework. Together, our improvements transform the Beam into a low-cost platform for research on service robots. We examine the Beam on target search and object delivery tasks and demonstrate that the robot achieves a 100% success rate.

[77]  arXiv:1710.06835 [pdf, ps, other]
Title: Shannon Entropy Estimation in $\infty$-Alphabets from Convergence Results
Authors: Jorge F. Silva
Comments: Submitted for review to JMLR, April 2017
Subjects: Information Theory (cs.IT); Learning (cs.LG)

The problem of Shannon entropy estimation in countable infinite alphabets is revisited from the adoption of convergence results of the entropy functional. Sufficient conditions for the convergence of the entropy are used, including scenarios with both finitely and infinitely supported distributions. From this angle, four plug-in histogram-based estimators are studied showing strong consistency and rate of convergences results for the case of finite and unknown supported distributions and families of distributions with summable tail bounded conditions.

[78]  arXiv:1710.06836 [pdf]
Title: Using Deep Convolutional Networks for Gesture Recognition in American Sign Language
Comments: 12 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)

In the realm of multimodal communication, sign language is, and continues to be, one of the most understudied areas. In line with recent advances in the field of deep learning, there are far reaching implications and applications that neural networks can have for sign language interpretation. In this paper, we present a method for using deep convolutional networks to classify images of both the the letters and digits in American Sign Language.

[79]  arXiv:1710.06838 [pdf, other]
Title: A Distributed, Dynamical System View of Finite, Static Games
Comments: to appear in Proceedings of Allerton conference on communication, control and computing 2017
Subjects: Computer Science and Game Theory (cs.GT); Multiagent Systems (cs.MA)

This paper contains a reformulation of any $n$-player finite, static game into a framework of distributed, dynamical system based on agents' payoff-based deviations. The reformulation generalizes the method employed in the second part of the study of countries' relation formation problem in Li and Morse (2017) to the case of any finite, static game. In the paper two deviation rules are provided and possible applications of this framework are discussed.

[80]  arXiv:1710.06839 [pdf, other]
Title: Driving with Data: Modeling and Forecasting Vehicle Fleet Maintenance in Detroit
Authors: Josh Gardner (1), Danai Koutra (1), Jawad Mroueh (1), Victor Pang (1), Arya Farahi (1), Sam Krassenstein (2), Jared Webb (2) ((1) University of Michigan (2) City of Detroit)
Comments: Presented at the Data For Good Exchange 2017
Subjects: Computers and Society (cs.CY)

The City of Detroit maintains an active fleet of over 2500 vehicles, spending an annual average of over \$5 million on new vehicle purchases and over \$7.7 million on maintaining this fleet. Understanding the existence of patterns and trends in this data could be useful to a variety of stakeholders, particularly as Detroit emerges from Chapter 9 bankruptcy, but the patterns in such data are often complex and multivariate and the city lacks dedicated resources for detailed analysis of this data. This work, a data collaboration between the Michigan Data Science Team (this http URL) and the City of Detroit's Operations and Infrastructure Group, seeks to address this unmet need by analyzing data from the City of Detroit's entire vehicle fleet from 2010-2017. We utilize tensor decomposition techniques to discover and visualize unique temporal patterns in vehicle maintenance; apply differential sequence mining to demonstrate the existence of common and statistically unique maintenance sequences by vehicle make and model; and, after showing these time-dependencies in the dataset, demonstrate an application of a predictive Long Short Term Memory (LSTM) neural network model to predict maintenance sequences. Our analysis shows both the complexities of municipal vehicle fleet data and useful techniques for mining and modeling such data.

[81]  arXiv:1710.06842 [pdf]
Title: Measuring the unmeasurable - a project of domestic violence risk prediction and management
Authors: Ya-Yun Chen (1), Chia-Kai Liu (2), Yu-Hsiu Wang (3), Sue-Chuan Chen (4), Yi-Shan Hsieh (5), Jing-Tai Ke (6), T. C. Hsieh (2) ((1) National Yang-Ming University, Institute of brain science, (2) DSP, Inc, (3) Institute for Information Industry, (4) Taipei City Center for Prevention of Domestic Violence and Sexual Assault, (5) Yuanta Securities Taipei, (6) Megais Co.)
Comments: Presented at the Data For Good Exchange 2017
Subjects: Computers and Society (cs.CY)

The prevention of domestic violence (DV) have aroused serious concerns in Taiwan because of the disparity between the increasing amount of reported DV cases that doubled over the past decade and the scarcity of social workers. Additionally, a large amount of data was collected when social workers use the predominant case management approach to document case reports information. However, these data were not properly stored or organized.
To improve the efficiency of DV prevention and risk management, we worked with Taipei City Government and utilized the 2015 data from its DV database to perform a spatial pattern analysis of the reports of DV cases to build a DV risk map. However, during our map building process, the issue of confounding bias arose because we were not able to verify if reported cases truly reflected real violence occurrence or were simply false reports from potential victim's neighbors. Therefore, we used the random forest method to build a repeat victimization risk prediction model. The accuracy and F1-measure of our model were 96.3% and 62.8%. This model helped social workers differentiate the risk level of new cases, which further reduced their major workload significantly. To our knowledge, this is the first project that utilized machine learning in DV prevention. The research approach and results of this project not only can improve DV prevention process, but also be applied to other social work or criminal prevention areas.

[82]  arXiv:1710.06845 [pdf]
Title: Can Machine Learning Create an Advocate for Foster Youth?
Authors: Meredith Brindley (Think of Us), James Heyes (Think of Us), Darrell Booker (Think of Us Richmond)
Comments: Presented at the Data For Good Exchange 2017
Subjects: Computers and Society (cs.CY)

Statistics are bleak for youth aging out of the United States foster care system. They are often left with few resources, are likely to experience homelessness, and are at increased risk of incarceration and exploitation. The Think of Us platform is a service for foster youth and their advocates to create personalized goals and access curated content specific to aging out of the foster care system. In this paper, we propose the use of a machine learning algorithm within the Think of Us platform to better serve youth transitioning to life outside of foster care. The algorithm collects and collates publicly available figures and data to inform caseworkers and other mentors chosen by the youth on how to best assist foster youth. It can then provide valuable resources for the youth and their advocates targeted directly towards their specific needs. Finally, we examine machine learning as a support system and aid for caseworkers to buttress and protect vulnerable young adults during their transition to adulthood.

[83]  arXiv:1710.06846 [pdf, ps, other]
Title: Kolmogorov Complexity and Information Content
Authors: Fouad B. Chedid
Comments: 12 pages
Subjects: Information Theory (cs.IT); Computational Complexity (cs.CC)

In this paper, we revisit a central concept in Kolmogorov complexity in which one would equate program-size complexity with information content. Despite the fact that Kolmogorov complexity has been widely accepted as an objective measure of the information content of a string, it has been the subject of many criticisms including the fundamental one directed by logicians and philosophers towards the statistical and semantical theories of information, which is about confusing an object and its name. In this paper, we clarify a number of subtle issues that are at the center of this debate.

Cross-lists for Thu, 19 Oct 17

[84]  arXiv:1710.06456 (cross-list from quant-ph) [pdf, other]
Title: Complexity and capacity bounds for quantum channels
Subjects: Quantum Physics (quant-ph); Information Theory (cs.IT); Combinatorics (math.CO); Operator Algebras (math.OA)

We generalise some well-known graph parameters to operator systems by considering their underlying quantum channels. In particular, we introduce the quantum complexity as the dimension of the smallest co-domain Hilbert space a quantum channel requires to realise a given operator system as its non-commutative confusability graph. We describe quantum complexity as a generalised minimum semidefinite rank and, in the case of a graph operator system, as a quantum intersection number. The quantum complexity and a closely related quantum version of orthogonal rank turn out to be upper bounds for the Shannon zero-error capacity of a quantum channel, and we construct examples for which these bounds beat the best previously known general upper bound for the capacity of quantum channels, given by the quantum Lov\'asz theta number.

[85]  arXiv:1710.06462 (cross-list from stat.ML) [pdf, other]
Title: S-Isomap++: Multi Manifold Learning from Streaming Data
Subjects: Machine Learning (stat.ML); Learning (cs.LG)

Manifold learning based methods have been widely used for non-linear dimensionality reduction (NLDR). However, in many practical settings, the need to process streaming data is a challenge for such methods, owing to the high computational complexity involved. Moreover, most methods operate under the assumption that the input data is sampled from a single manifold, embedded in a high dimensional space. We propose a method for streaming NLDR when the observed data is either sampled from multiple manifolds or irregularly sampled from a single manifold. We show that existing NLDR methods, such as Isomap, fail in such situations, primarily because they rely on smoothness and continuity of the underlying manifold, which is violated in the scenarios explored in this paper. However, the proposed algorithm is able to learn effectively in presence of multiple, and potentially intersecting, manifolds, while allowing for the input data to arrive as a massive stream.

[86]  arXiv:1710.06487 (cross-list from cond-mat.dis-nn) [pdf, other]
Title: Classification and Geometry of General Perceptual Manifolds
Comments: 24 pages, 15 figures, Supplementary Materials
Subjects: Disordered Systems and Neural Networks (cond-mat.dis-nn); Statistical Mechanics (cond-mat.stat-mech); Neural and Evolutionary Computing (cs.NE); Neurons and Cognition (q-bio.NC); Machine Learning (stat.ML)

Perceptual manifolds arise when a neural population responds to an ensemble of sensory signals associated with different physical features (e.g., orientation, pose, scale, location, and intensity) of the same perceptual object. Object recognition and discrimination requires classifying the manifolds in a manner that is insensitive to variability within a manifold. How neuronal systems give rise to invariant object classification and recognition is a fundamental problem in brain theory as well as in machine learning. Here we study the ability of a readout network to classify objects from their perceptual manifold representations. We develop a statistical mechanical theory for the linear classification of manifolds with arbitrary geometry revealing a remarkable relation to the mathematics of conic decomposition. Novel geometrical measures of manifold radius and manifold dimension are introduced which can explain the classification capacity for manifolds of various geometries. The general theory is demonstrated on a number of representative manifolds, including L2 ellipsoids prototypical of strictly convex manifolds, L1 balls representing polytopes consisting of finite sample points, and orientation manifolds which arise from neurons tuned to respond to a continuous angle variable, such as object orientation. The effects of label sparsity on the classification capacity of manifolds are elucidated, revealing a scaling relation between label sparsity and manifold radius. Theoretical predictions are corroborated by numerical simulations using recently developed algorithms to compute maximum margin solutions for manifold dichotomies. Our theory and its extensions provide a powerful and rich framework for applying statistical mechanics of linear classification to data arising from neuronal responses to object stimuli, as well as to artificial deep networks trained for object recognition tasks.

[87]  arXiv:1710.06570 (cross-list from stat.ML) [pdf, other]
Title: A Correspondence Between Random Neural Networks and Statistical Field Theory
Subjects: Machine Learning (stat.ML); Disordered Systems and Neural Networks (cond-mat.dis-nn); Learning (cs.LG)

A number of recent papers have provided evidence that practical design questions about neural networks may be tackled theoretically by studying the behavior of random networks. However, until now the tools available for analyzing random neural networks have been relatively ad-hoc. In this work, we show that the distribution of pre-activations in random neural networks can be exactly mapped onto lattice models in statistical physics. We argue that several previous investigations of stochastic networks actually studied a particular factorial approximation to the full lattice model. For random linear networks and random rectified linear networks we show that the corresponding lattice models in the wide network limit may be systematically approximated by a Gaussian distribution with covariance between the layers of the network. In each case, the approximate distribution can be diagonalized by Fourier transformation. We show that this approximation accurately describes the results of numerical simulations of wide random neural networks. Finally, we demonstrate that in each case the large scale behavior of the random networks can be approximated by an effective field theory.

[88]  arXiv:1710.06611 (cross-list from stat.AP) [pdf, other]
Title: An inferential procedure for community structure validation in networks
Subjects: Applications (stat.AP); Social and Information Networks (cs.SI); Physics and Society (physics.soc-ph); Methodology (stat.ME)

`Community structure' is a commonly observed feature of real networks. The term refers to the presence in a network of groups of nodes (communities) that feature high internal connectivity and are poorly connected to each other. Whereas the issue of community detection has been addressed in several works, the problem of validating a partition of nodes as a good community structure for a network has received little attention and remains an open issue. We propose an inferential procedure for community structure validation of network partitions, which relies on concepts from network enrichment analysis. The proposed procedure allows to compare the adequacy of different partitions of nodes as community structures. Moreover, it can be employed to assess whether two networks share the same community structure, and to compare the performance of different network clustering algorithms.

[89]  arXiv:1710.06763 (cross-list from math.OC) [pdf, ps, other]
Title: A complete characterization of optimal dictionaries for least squares representation
Comments: 36 pages
Subjects: Optimization and Control (math.OC); Learning (cs.LG); Machine Learning (stat.ML)

Dictionaries are collections of vectors used for representations of elements in Euclidean spaces. While recent research on optimal dictionaries is focussed on providing sparse (i.e., $\ell_0$-optimal,) representations, here we consider the problem of finding optimal dictionaries such that representations of samples of a random vector are optimal in an $\ell_2$-sense. For us, optimality of representation is equivalent to minimization of the average $\ell_2$-norm of the coefficients used to represent the random vector, with the lengths of the dictionary vectors being specified a priori. With the help of recent results on rank-$1$ decompositions of symmetric positive semidefinite matrices and the theory of majorization, we provide a complete characterization of $\ell_2$-optimal dictionaries. Our results are accompanied by polynomial time algorithms that construct $\ell_2$-optimal dictionaries from given data.

[90]  arXiv:1710.06766 (cross-list from stat.ML) [pdf, other]
Title: Phase Transitions in the Pooled Data Problem
Comments: Accepted to NIPS 2017
Subjects: Machine Learning (stat.ML); Information Theory (cs.IT); Learning (cs.LG)

In this paper, we study the pooled data problem of identifying the labels associated with a large collection of items, based on a sequence of pooled tests revealing the counts of each label within the pool. In the noiseless setting, we identify an exact asymptotic threshold on the required number of tests with optimal decoding, and prove a phase transition between complete success and complete failure. In addition, we present a novel noisy variation of the problem, and provide an information-theoretic framework for characterizing the required number of tests for general random noise models. Our results reveal that noise can make the problem considerably more difficult, with strict increases in the scaling laws even at low noise levels. Finally, we demonstrate similar behavior in an approximate recovery setting, where a given number of errors is allowed in the decoded labels.

[91]  arXiv:1710.06832 (cross-list from cond-mat.stat-mech) [pdf, ps, other]
Title: The Origins of Computational Mechanics: A Brief Intellectual History and Several Clarifications
Comments: 11 pages, 123 citations; this http URL
Subjects: Statistical Mechanics (cond-mat.stat-mech); Information Theory (cs.IT); Learning (cs.LG); Chaotic Dynamics (nlin.CD)

The principle goal of computational mechanics is to define pattern and structure so that the organization of complex systems can be detected and quantified. Computational mechanics developed from efforts in the 1970s and early 1980s to identify strange attractors as the mechanism driving weak fluid turbulence via the method of reconstructing attractor geometry from measurement time series and in the mid-1980s to estimate equations of motion directly from complex time series. In providing a mathematical and operational definition of structure it addressed weaknesses of these early approaches to discovering patterns in natural systems.
Since then, computational mechanics has led to a range of results from theoretical physics and nonlinear mathematics to diverse applications---from closed-form analysis of Markov and non-Markov stochastic processes that are ergodic or nonergodic and their measures of information and intrinsic computation to complex materials and deterministic chaos and intelligence in Maxwellian demons to quantum compression of classical processes and the evolution of computation and language.
This brief review clarifies several misunderstandings and addresses concerns recently raised regarding early works in the field (1980s). We show that misguided evaluations of the contributions of computational mechanics are groundless and stem from a lack of familiarity with its basic goals and from a failure to consider its historical context. For all practical purposes, its modern methods and results largely supersede the early works. This not only renders recent criticism moot and shows the solid ground on which computational mechanics stands but, most importantly, shows the significant progress achieved over three decades and points to the many intriguing and outstanding challenges in understanding the computational nature of complex dynamic systems.

Replacements for Thu, 19 Oct 17

[92]  arXiv:1404.1008 (replaced) [pdf, other]
Title: Spectral concentration and greedy k-clustering
Comments: 19 pages, 6 figures
Subjects: Data Structures and Algorithms (cs.DS)
[93]  arXiv:1510.07244 (replaced) [pdf, other]
Title: Approximation of boundary element matrices using GPGPUs and nested cross approximation
Subjects: Mathematical Software (cs.MS)
[94]  arXiv:1511.06436 (replaced) [pdf, ps, other]
Title: On the robust hardness of Gröbner basis computation
Comments: 13 pages
Subjects: Symbolic Computation (cs.SC)
[95]  arXiv:1605.05776 (replaced) [pdf, other]
Title: The Quality of the Covariance Selection Through Detection Problem and AUC Bounds
Subjects: Information Theory (cs.IT); Machine Learning (stat.ML)
[96]  arXiv:1608.01972 (replaced) [pdf, other]
Title: Bridging the Gap: Incorporating a Semantic Similarity Measure for Effectively Mapping PubMed Queries to Documents
Comments: 10 pages, 1 figure, 3 tables
Subjects: Computation and Language (cs.CL); Information Retrieval (cs.IR)
[97]  arXiv:1608.06608 (replaced) [pdf, other]
Title: Infinite-Label Learning with Semantic Output Codes
Subjects: Learning (cs.LG)
[98]  arXiv:1611.01851 (replaced) [pdf, other]
Title: Bayesian Optimisation with Prior Reuse for Motion Planning in Robot Soccer
Comments: Accepted at ACM India Joint Conference on Data Science and Management of Data 2018
Subjects: Robotics (cs.RO)
[99]  arXiv:1611.04760 (replaced) [pdf]
Title: The Opening Scholarly Communication in Social Sciences project OSCOSS
Comments: 9 pages, 1 figure, Book chapter in the Festschrift for Konrad Umlauf. "Bibliothek. Forschung f\"ur die Praxis"
Subjects: Digital Libraries (cs.DL); Computers and Society (cs.CY)
[100]  arXiv:1611.07008 (replaced) [pdf, ps, other]
Title: Fine-Grained Complexity and Conditional Hardness for Sparse Graphs
Comments: The current version includes an improved result for our sparse reduction from undirected MWC to APSP in Section 3: now the reduced graphs no longer have large edge weights. The other changes are stylistic. In Section 3, we have added a subsection on our new bit-sampling technique (called `bit-fixing' in the previous version). Our notion of time bounds for sparse graphs is moved to Section 6
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC)
[101]  arXiv:1612.08228 (replaced) [pdf, other]
Title: The misleading narrative of the canonical faculty productivity trajectory
Comments: 18 pages, 16 figures
Subjects: Digital Libraries (cs.DL); Physics and Society (physics.soc-ph)
[102]  arXiv:1701.03615 (replaced) [pdf, ps, other]
Title: Towards a Decidable LogicWeb via Length-Bounded Derivations
Comments: 3 pages. A novel module language for logic programming is added
Subjects: Logic in Computer Science (cs.LO)
[103]  arXiv:1702.07146 (replaced) [pdf, other]
Title: Jolie Static Type Checker: a prototype
Comments: Modeling and Analysis of Information Systems, 2017
Subjects: Software Engineering (cs.SE); Programming Languages (cs.PL)
[104]  arXiv:1703.04456 (replaced) [pdf, other]
Title: P?=NP as minimization of degree 4 polynomial, plane or sphere intersection with $\{0,1\}^n$, integration or Grassmann number problem
Authors: Jarek Duda
Comments: 9 pages, 3 figures
Subjects: Computational Complexity (cs.CC)
[105]  arXiv:1703.09327 (replaced) [pdf, other]
Title: DART: Noise Injection for Robust Imitation Learning
Subjects: Learning (cs.LG)
[106]  arXiv:1704.06913 (replaced) [pdf, other]
Title: Learning weakly supervised multimodal phoneme embeddings
Subjects: Computation and Language (cs.CL); Learning (cs.LG)
[107]  arXiv:1705.07069 (replaced) [pdf, other]
Title: CacheShuffle: An Oblivious Shuffle Algorithm Using Caches
Comments: 29 pages, 4 figures
Subjects: Cryptography and Security (cs.CR); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS)
[108]  arXiv:1705.07150 (replaced) [pdf, ps, other]
Title: State Complexity of Reversals of Deterministic Finite Automata with Output
Authors: Sylvie Davies
Comments: 18 pages, 3 tables. Added missing affiliation/funding information
Subjects: Formal Languages and Automata Theory (cs.FL)
[109]  arXiv:1706.01260 (replaced) [pdf, ps, other]
Title: The Classical Complexity of Boson Sampling
Comments: 15 pages. To appear in SODA '18
Subjects: Data Structures and Algorithms (cs.DS); Quantum Physics (quant-ph); Computation (stat.CO)
[110]  arXiv:1706.04902 (replaced) [pdf, other]
Title: A Survey Of Cross-lingual Word Embedding Models
Comments: Very heavily improved and revised version
Subjects: Computation and Language (cs.CL); Learning (cs.LG)
[111]  arXiv:1706.09690 (replaced) [pdf, other]
Title: Power-Based Direction-of-Arrival Estimation Using a Single Multi-Mode Antenna
Subjects: Information Theory (cs.IT)
[112]  arXiv:1707.02473 (replaced) [pdf, other]
Title: Decycling a Graph by the Removal of a Matching: Characterizations for Special Classes
Subjects: Discrete Mathematics (cs.DM)
[113]  arXiv:1707.04084 (replaced) [pdf, other]
Title: An Earthworm-Inspired Soft Crawling Robot Controlled by Friction
Comments: 8 pages, 9 figures, 1 table
Subjects: Robotics (cs.RO)
[114]  arXiv:1707.04202 (replaced) [pdf, other]
Title: Multi-Antenna Assisted Virtual Full-Duplex Relaying with Reliability-Aware Iterative Decoding
Comments: 6 pages, 4 figures, conference paper has been submitted
Subjects: Information Theory (cs.IT)
[115]  arXiv:1707.05016 (replaced) [pdf, other]
Title: Fully polynomial FPT algorithms for some classes of bounded clique-width graphs
Authors: David Coudert (1), Guillaume Ducoffe (1,2), Alexandru Popa ((1) COATI, (2) ICI Bucharest)
Subjects: Data Structures and Algorithms (cs.DS); Computational Complexity (cs.CC); Discrete Mathematics (cs.DM); Combinatorics (math.CO)
[116]  arXiv:1707.09095 (replaced) [pdf, ps, other]
Title: Toward the Starting Line: A Systems Engineering Approach to Strong AI
Comments: 11 pages, 3 figures
Subjects: Artificial Intelligence (cs.AI); Systems and Control (cs.SY)
[117]  arXiv:1707.09904 (replaced) [pdf, other]
Title: Temporal Hierarchical Clustering
Comments: 14 pages, 4 figures
Subjects: Data Structures and Algorithms (cs.DS)
[118]  arXiv:1708.03211 (replaced) [pdf, other]
Title: DNN and CNN with Weighted and Multi-task Loss Functions for Audio Event Detection
Comments: DCASE 2017 technical report
Subjects: Sound (cs.SD); Learning (cs.LG)
[119]  arXiv:1708.03979 (replaced) [pdf, other]
Title: SSH: Single Stage Headless Face Detector
Comments: International Conference on Computer Vision (ICCV) 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[120]  arXiv:1708.08062 (replaced) [pdf, other]
Title: Cross-view Asymmetric Metric Learning for Unsupervised Person Re-identification
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[121]  arXiv:1708.09433 (replaced) [pdf, other]
Title: A Scalable and Statistically Robust Beam Alignment Technique for mm-Wave Systems
Subjects: Information Theory (cs.IT)
[122]  arXiv:1709.00103 (replaced) [pdf, other]
Title: Seq2SQL: Generating Structured Queries from Natural Language using Reinforcement Learning
Comments: 12 pages, 5 figures
Subjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)
[123]  arXiv:1709.00257 (replaced) [pdf, ps, other]
Title: Recovery analysis for weighted mixed $\ell_2/\ell_p$ minimization with $0<p\leq 1$
Authors: Zhiyong Zhou, Jun Yu
Subjects: Information Theory (cs.IT)
[124]  arXiv:1709.01019 (replaced) [pdf, ps, other]
Title: Maximum Secrecy Throughput of MIMOME FSO Communications with Outage Constraints
Subjects: Information Theory (cs.IT)
[125]  arXiv:1709.01782 (replaced) [pdf, other]
Title: Automatic Document Image Binarization using Bayesian Optimization
Comments: To appear in the Proceedings of International Workshop on Historical Document Imaging and Processing, ACM Digital Library, 2017
Subjects: Information Retrieval (cs.IR); Computer Vision and Pattern Recognition (cs.CV)
[126]  arXiv:1709.02082 (replaced) [pdf, other]
Title: A deep generative model for gene expression profiles from single-cell RNA sequencing
Comments: v1 accepted for a talk at BayLearn2017 v2 includes removal of unwanted variation and differential expression
Subjects: Learning (cs.LG); Genomics (q-bio.GN); Machine Learning (stat.ML)
[127]  arXiv:1709.03153 (replaced) [pdf, other]
Title: MBMF: Model-Based Priors for Model-Free Reinforcement Learning
Comments: After we submitted the paper for consideration in CoRL 2017 we found a paper published in the recent past with a similar method (see related work for a discussion). Considering the similarities between the two papers, we have decided to retract our paper from CoRL 2017
Subjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Robotics (cs.RO); Systems and Control (cs.SY)
[128]  arXiv:1709.05036 (replaced) [pdf, other]
Title: Query-based Attention CNN for Text Similarity Map
Subjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
[129]  arXiv:1709.05054 (replaced) [pdf]
Title: Feature-Fused SSD: Fast Detection for Small Objects
Comments: Artificial Intelligence;8 pages,8 figures
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[130]  arXiv:1709.07290 (replaced) [pdf, ps, other]
Title: Comparing the Switch and Curveball Markov Chains for Sampling Binary Matrices with Fixed Marginals
Comments: New revised version. One erroneous claim has been replaced by weaker claim (see footnote 7 on page 12)
Subjects: Discrete Mathematics (cs.DM)
[131]  arXiv:1709.09496 (replaced) [pdf, other]
Title: Drought Stress Classification using 3D Plant Models
Comments: Appears in Workshop on Computer Vision Problems in Plant Phenotyping (CVPPP), International Conference on Computer Vision (ICCV) 2017
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[132]  arXiv:1709.09586 (replaced) [src]
Title: Case Study: Explaining Diabetic Retinopathy Detection Deep CNNs via Integrated Gradients
Comments: This report has been withdrawn as it needs co-authors' permission and further verification of conclusions
Subjects: Artificial Intelligence (cs.AI); Cryptography and Security (cs.CR)
[133]  arXiv:1709.10441 (replaced) [pdf, other]
Title: A representer theorem for deep kernel learning
Subjects: Learning (cs.LG); Numerical Analysis (math.NA)
[134]  arXiv:1710.00366 (replaced) [pdf]
Title: Collaboration Success Factors in an Online Music Community
Comments: GROUP 2018, January 7-10, 2018, Sanibel Island, FL, USA, 10 pages
Subjects: Human-Computer Interaction (cs.HC); Social and Information Networks (cs.SI)
[135]  arXiv:1710.05061 (replaced) [pdf, ps, other]
Title: A New Technique for Reachability of States in Concatenation Automata
Authors: Sylvie Davies
Comments: 23 pages, 1 table. Added missing affiliation/funding information
Subjects: Formal Languages and Automata Theory (cs.FL)
[136]  arXiv:1710.05185 (replaced) [pdf, ps, other]
Title: Approximate Hotspots of Orthogonal Trajectories
Authors: Ali Gholami Rudi
Comments: Added a section on three-dimensional orthogonal trajectories
Subjects: Computational Geometry (cs.CG)
[137]  arXiv:1710.05218 (replaced) [pdf, ps, other]
Title: Two-player incentive compatible mechanisms are affine maximizers
Authors: Bo Lin, Ngoc Mai Tran
Comments: 20 pages, 3 figures
Subjects: Combinatorics (math.CO); Computer Science and Game Theory (cs.GT)
[138]  arXiv:1710.05476 (replaced) [pdf, other]
Title: Calibrated Boosting-Forest
Authors: Haozhen Wu
Subjects: Machine Learning (stat.ML); Learning (cs.LG)
[139]  arXiv:1710.05732 (replaced) [pdf]
Title: Generating Reflectance Curves from sRGB Triplets
Comments: v2 updated to include author's email address, updated references, ACM class, and minor editing
Subjects: Computer Vision and Pattern Recognition (cs.CV); Quantitative Methods (q-bio.QM)
[140]  arXiv:1710.06117 (replaced) [pdf, other]
Title: Map-based Multi-Policy Reinforcement Learning: Enhancing Adaptability of Robots by Deep Reinforcement Learning
Comments: 8 pages, 8 figures
Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Learning (cs.LG)
[141]  arXiv:1710.06270 (replaced) [pdf, other]
Title: Procedural Modeling and Physically Based Rendering for Synthetic Data Generation in Automotive Applications
Authors: Apostolia Tsirikoglou (1), Joel Kronander (1), Magnus Wrenninge (2), Jonas Unger (1) ((1) Linköping University (2) 7DLabs)
Comments: The project web page at this http URL contains a version of the paper with high-resolution images as well as additional material
Subjects: Computer Vision and Pattern Recognition (cs.CV)
[142]  arXiv:1710.06384 (replaced) [pdf, other]
Title: Efficient Neighbor-Finding on Space-Filling Curves
Comments: This is a slightly modified version of my bachelor thesis in mathematics. The corresponding code can be found at this https URL . Changes in v2: Added e-mail address and links to github project, fixed footnote hyperlinks
Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS); Performance (cs.PF)
[ total of 142 entries: 1-142 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)