Computer Science
New submissions
[ showing up to 2000 entries per page: fewer  more ]
New submissions for Tue, 22 Aug 17
 [1] arXiv:1708.05711 [pdf]

Title: Computeraided position planning of miniplates to treat facial bone defectsAuthors: Jan Egger, Jürgen Wallner, Markus Gall, Xiaojun Chen, Katja SchwenzerZimmerer, Knut Reinbacher, Dieter SchmalstiegComments: 19 pages, 13 Figures, 2 TablesJournalref: PLoS ONE 12(8): e0182839 (2017)Subjects: Computer Vision and Pattern Recognition (cs.CV); Computational Engineering, Finance, and Science (cs.CE); Computational Geometry (cs.CG)
In this contribution, a software system for computeraided position planning of miniplates to treat facial bone defects is proposed. The intraoperatively used bone plates have to be passively adapted on the underlying bone contours for adequate bone fragment stabilization. However, this procedure can lead to frequent intraoperatively performed material readjustments especially in complex surgical cases. Our approach is able to fit a selection of common implant models on the surgeon's desired position in a 3D computer model. This happens with respect to the surrounding anatomical structures, always including the possibility of adjusting both the direction and the position of the used osteosynthesis material. By using the proposed software, surgeons are able to preplan the out coming implant in its form and morphology with the aid of a computervisualized model within a few minutes. Further, the resulting model can be stored in STL file format, the commonly used format for 3D printing. Using this technology, surgeons are able to print the virtual generated implant, or create an individually designed bending tool. This method leads to adapted osteosynthesis materials according to the surrounding anatomy and requires further a minimum amount of money and time.
 [2] arXiv:1708.05714 [pdf, other]

Title: A Stronger Foundation for Computer Science and P=NPAuthors: Mark InmanComments: 21 pages, 1 figureSubjects: Computational Complexity (cs.CC); Artificial Intelligence (cs.AI); Logic in Computer Science (cs.LO)
This article constructs a Turing Machine which can solve for $\beta^{'}$ which is REcomplete. Such a machine is only possible if there is something wrong with the foundations of computer science and mathematics. We therefore check our work by looking very closely at Cantor's diagonalization and construct a novel formal language as an Abelian group which allows us, through equivalence relations, to provide a nontrivial counterexample to Cantor's argument. As if that wasn't enough, we then discover that the impredicative nature of G\"odel's diagonalization lemma leads to logical tautology, invalidating any meaning behind the method, leaving no doubt that diagonalization is flawed. Our discovery in regards to these foundational arguments opens the door to solving the P vs NP problem.
 [3] arXiv:1708.05719 [pdf, other]

Title: CrossLingual Dependency Parsing for Closely Related Languages  Helsinki's Submission to VarDial 2017Authors: Jörg TiedemannJournalref: In Proceedings of the Fourth Workshop on NLP for Similar Languages, Varieties and Dialects at EACL 2017, Valencia/Spain, pp. 131136Subjects: Computation and Language (cs.CL)
This paper describes the submission from the University of Helsinki to the shared task on crosslingual dependency parsing at VarDial 2017. We present work on annotation projection and treebank translation that gave good results for all three target languages in the test set. In particular, Slovak seems to work well with information coming from the Czech treebank, which is in line with related work. The attachment scores for crosslingual models even surpass the fully supervised models trained on the target language treebank. Croatian is the most difficult language in the test set and the improvements over the baseline are rather modest. Norwegian works best with information coming from Swedish whereas Danish contributes surprisingly little.
 [4] arXiv:1708.05729 [pdf, ps, other]

Title: Neural machine translation for lowresource languagesComments: rejected from EMNLP 2017Subjects: Computation and Language (cs.CL)
Neural machine translation (NMT) approaches have improved the state of the art in many machine translation settings over the last couple of years, but they require large amounts of training data to produce sensible output. We demonstrate that NMT can be used for lowresource languages as well, by introducing more local dependencies and using word alignments to learn sentence reordering during translation. In addition to our novel model, we also present an empirical evaluation of lowresource phrasebased statistical machine translation (SMT) and NMT to investigate the lower limits of the respective technologies. We find that while SMT remains the best option for lowresource settings, our method can produce acceptable translations with only 70000 tokens of training data, a level where the baseline NMT system fails completely.
 [5] arXiv:1708.05732 [pdf, other]

Title: Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of DronesAuthors: Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Oussama Habachi, Damien Sauveron, Andreas Steyven, Serge ChaumetteComments: 12 Pages, 7 Figures, Conference, The 36th IEEE/AIAA Digital Avionics Systems Conference (DASC'17)Subjects: Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE); Robotics (cs.RO)
Interconnected objects, either via public or private networks are the near future of modern societies. Such interconnected objects are referred to as InternetofThings (IoT) and/or CyberPhysical Systems (CPS). One example of such a system is based on Unmanned Aerial Vehicles (UAVs). The fleet of such vehicles are prophesied to take on multiple roles involving mundane to highsensitive, such as, prompt pizza or shopping deliveries to your homes to battlefield deployment for reconnaissance and combat missions. Drones, as we refer to UAVs in this paper, either can operate individually (solo missions) or part of a fleet (group missions), with and without constant connection with the base station. The base station acts as the command centre to manage the activities of the drones. However, an independent, localised and effective fleet control is required, potentially based on swarm intelligence, for the reasons: 1) increase in the number of drone fleets, 2) number of drones in a fleet might be multiple of tens, 3) timecriticality in making decisions by such fleets in the wild, 4) potential communication congestions/lag, and 5) in some cases working in challenging terrains that hinders or mandateslimited communication with control centre (i.e., operations spanning long period of times or military usage of such fleets in enemy territory). This selfware, missionfocused and independent fleet of drones that potential utilises swarm intelligence for a) airtraffic and/or flight control management, b) obstacle avoidance, c) selfpreservation while maintaining the mission criteria, d) collaboration with other fleets in the wild (autonomously) and e) assuring the security, privacy and safety of physical (drones itself) and virtual (data, software) assets. In this paper, we investigate the challenges faced by fleet of drones and propose a potential course of action on how to overcome them.
 [6] arXiv:1708.05741 [pdf, other]

Title: Dynamic Connectivity Game for Adversarial Internet of Battlefield Things SystemsComments: 10 pages, 6 figuresSubjects: Information Theory (cs.IT); Computer Science and Game Theory (cs.GT)
In this paper, the problem of network connectivity is studied for an adversarial Internet of Battlefield Things (IoBT) system in which an attacker aims at disrupting the connectivity of the network by choosing to compromise one of the IoBT nodes at each time epoch. To counter such attacks, an IoBT defender attempts to reestablish the IoBT connectivity by either deploying new IoBT nodes or by changing the roles of existing nodes. This problem is formulated as a dynamic multistage Stackelberg connectivity game that extends classical connectivity games and that explicitly takes into account the characteristics and requirements of the IoBT network. In particular, the defender's payoff captures the IoBT latency as well as the sum of weights of disconnected nodes at each stage of the game. Due to the dependence of the attacker's and defender's actions at each stage of the game on the network state, the feedback Stackelberg solution (FSE) is used to solve the IoBT connectivity game. Then, sufficient conditions under which the IoBT system will remain connected, when the FSE solution is used, are determined analytically. Numerical results show that the expected number of disconnected sensors, when the FSE solution is used, decreases up to 62% compared to a baseline scenario in which a Stackelberg game with no feedback is used, and up to 57% compared to a baseline equal probability policy.
 [7] arXiv:1708.05746 [pdf, other]

Title: Sparkle: Optimizing Spark for Large Memory Machines and AnalyticsAuthors: Mijung Kim, Jun Li, Haris Volos, Manish Marwah, Alexander Ulanov, Kimberly Keeton, Joseph Tucek, Lucy Cherkasova, Le Xu, Pradeep FernandoComments: 14 pages, 18 figuresSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
Spark is an inmemory analytics platform that targets commodity server environments today. It relies on the Hadoop Distributed File System (HDFS) to persist intermediate checkpoint states and final processing results. In Spark, immutable data are used for storing data updates in each iteration, making it inefficient for long running, iterative workloads. A nondeterministic garbage collector further worsens this problem. Sparkle is a library that optimizes memory usage in Spark. It exploits large shared memory to achieve better data shuffling and intermediate storage. Sparkle replaces the current TCP/IPbased shuffle with a shared memory approach and proposes an offheap memory store for efficient updates. We performed a series of experiments on scaleout clusters and scaleup machines. The optimized shuffle engine leveraging shared memory provides 1.3x to 6x faster performance relative to Vanilla Spark. The offheap memory store along with the sharedmemory shuffle engine provides more than 20x performance increase on a probabilistic graph processing workload that uses a largescale realworld hyperlink graph. While Sparkle benefits at most from running on large memory machines, it also achieves 1.6x to 5x performance improvements over scale out cluster with equivalent hardware setting.
 [8] arXiv:1708.05763 [pdf, other]

Title: The Natural Stories CorpusAuthors: Richard Futrell, Edward Gibson, Hal Tily, Idan Blank, Anastasia Vishnevetsky, Steven T. Piantadosi, Evelina FedorenkoSubjects: Computation and Language (cs.CL)
It is now a common practice to compare models of human language processing by predicting participant reactions (such as reading times) to corpora consisting of rich naturalistic linguistic materials. However, many of the corpora used in these studies are based on naturalistic text and thus do not contain many of the lowfrequency syntactic constructions that are often required to distinguish processing theories. Here we describe a new corpus consisting of English texts edited to contain many lowfrequency syntactic constructions while still sounding fluent to native speakers. The corpus is annotated with handcorrected parse trees and includes selfpaced reading time data. Here we give an overview of the content of the corpus and release the data.
 [9] arXiv:1708.05769 [pdf, ps, other]

Title: Deterministic coding theorems for blind sensing: optimal measurement rate and fractal dimensionComments: 14 pagesSubjects: Information Theory (cs.IT)
Completely blind sensing is the problem of recovering bandlimited signals from measurements, without any spectral information beside an upper bound on the measure of the whole support set in the frequency domain. Determining the number of measurements necessary and sufficient for reconstruction has been an open problem, and usually partially blind sensing is performed, assuming to have some partial spectral information available a priori. In this paper, the minimum number of measurements that guarantees perfect recovery in the absence of measurement error, and robust recovery in the presence of measurement error, is determined in a completely blind setting. Results show that a factor of two in the measurement rate is the price pay for blindness, compared to reconstruction with full spectral knowledge. The minimum number of measurements is also related to the fractal (MinkowskiBouligand) dimension of a discrete approximating set, defined in terms of the Kolmogorov $\epsilon$entropy. These results are analogous to a deterministic coding theorem, where an operational quantity defined in terms of minimum measurement rate is shown to be equal to an informationtheoretic one. A comparison with parallel results in compressed sensing is illustrated, where the relevant dimensionality notion in a stochastic setting is the information (R\'{e}nyi) dimension, defined in terms of the Shannon entropy.
 [10] arXiv:1708.05786 [pdf, other]

Title: Boolean Unateness Testing with $\widetilde{O}(n^{3/4})$ Adaptive QueriesSubjects: Computational Complexity (cs.CC)
We give an adaptive algorithm which tests whether an unknown Boolean function $f\colon \{0, 1\}^n \to\{0, 1\}$ is unate, i.e. every variable of $f$ is either nondecreasing or nonincreasing, or $\epsilon$far from unate with onesided error using $\widetilde{O}(n^{3/4}/\epsilon^2)$ queries. This improves on the best adaptive $O(n/\epsilon)$query algorithm from Baleshzar, Chakrabarty, Pallavoor, Raskhodnikova and Seshadhri when $1/\epsilon \ll n^{1/4}$. Combined with the $\widetilde{\Omega}(n)$query lower bound for nonadaptive algorithms with onesided error of [CWX17, BCPRS17], we conclude that adaptivity helps for the testing of unateness with onesided error. A crucial component of our algorithm is a new subroutine for finding bichromatic edges in the Boolean hypercube called adaptive edge search.
 [11] arXiv:1708.05790 [pdf, other]

Title: University Twitter Engagement: Using Twitter Followers to Rank UniversitiesComments: 14 pages, 4 figuresSubjects: Digital Libraries (cs.DL); Social and Information Networks (cs.SI)
We examine and rank a set of 264 U.S. universities extracted from the National Collegiate Athletic Association (NCAA) Division I membership and global lists published in U.S. News, Times Higher Education, Academic Ranking of World Universities, and Money Magazine. Our University Twitter Engagement (UTE) rank is based on the friend and extended follower network of primary and affiliated secondary Twitter accounts referenced on a university's home page. In ranktorank comparisons we observed a significant, positive rank correlation ({\tau}=0.6018) between UTE and an aggregate reputation ranking which indicates that UTE could be a viable proxy for ranking atypical institutions normally excluded from traditional lists. In addition, we significantly reduce the cost of data collection needed to rank each institution by using only webbased artifacts and a publicly accessible Twitter application programming interface (API).
 [12] arXiv:1708.05797 [pdf, other]

Title: CLaC @ QATS: Quality Assessment for Text SimplificationComments: In Proceedings of the Workshop Shared task on Quality Assessment for Text Simplification (QATS2016), a workshop of the 10th Language Resources and Evaluation Conference (LREC2016), pp. 5356, May 2328, Portoroz, SloveniaSubjects: Computation and Language (cs.CL)
This paper describes our approach to the 2016 QATS quality assessment shared task. We trained three independent Random Forest classifiers in order to assess the quality of the simplified texts in terms of grammaticality, meaning preservation and simplicity. We used the language model of GoogleNgram as feature to predict the grammaticality. Meaning preservation is predicted using two complementary approaches based on word embedding and WordNet synonyms. A wider range of features including TFIDF, sentence length and frequency of cue phrases are used to evaluate the simplicity aspect. Overall, the accuracy of the system ranges from 33.33% for the overall aspect to 58.73% for grammaticality.
 [13] arXiv:1708.05798 [pdf, ps, other]

Title: The CLaC Discourse Parser at CoNLL2016Comments: In Proceedings of the Twentieth Conference on Computational Natural Language Learning: Shared Task. pp 9299. July 712, 2016. Berlin, GermanySubjects: Computation and Language (cs.CL)
This paper describes our submission "CLaC" to the CoNLL2016 shared task on shallow discourse parsing. We used two complementary approaches for the task. A standard machine learning approach for the parsing of explicit relations, and a deep learning approach for nonexplicit relations. Overall, our parser achieves an F1score of 0.2106 on the identification of discourse relations (0.3110 for explicit relations and 0.1219 for nonexplicit relations) on the blind CoNLL2016 test set.
 [14] arXiv:1708.05800 [pdf, ps, other]

Title: On the Contribution of Discourse Structure on Text Complexity AssessmentComments: In Proceedings of the 17th Annual SigDial Meeting on Discourse and Dialogue (SigDial 2016). pp 166174. September 1315. Los Angeles, USASubjects: Computation and Language (cs.CL)
This paper investigates the influence of discourse features on text complexity assessment. To do so, we created two data sets based on the Penn Discourse Treebank and the Simple English Wikipedia corpora and compared the influence of coherence, cohesion, surface, lexical and syntactic features to assess text complexity.
Results show that with both data sets coherence features are more correlated to text complexity than the other types of features. In addition, feature selection revealed that with both data sets the top most discriminating feature is a coherence feature.  [15] arXiv:1708.05801 [pdf, other]

Title: ClaC: Semantic Relatedness of Words and PhrasesComments: In Proceedings of the Second Joint Conference on Lexical and Computational Semantics (*SEM), Volume 2: Proceedings of the Seventh International Workshop on Semantic Evaluation (SemEval 2013),June, Atlanta, Georgia, USA, pp. 108113Subjects: Computation and Language (cs.CL)
The measurement of phrasal semantic relatedness is an important metric for many natural language processing applications. In this paper, we present three approaches for measuring phrasal semantics, one based on a semantic network model, another on a distributional similarity model, and a hybrid between the two. Our hybrid approach achieved an Fmeasure of 77.4% on the task of evaluating the semantic similarity of words and compositional phrases.
 [16] arXiv:1708.05803 [pdf, ps, other]

Title: Measuring the Effect of Discourse Relations on Blog SummarizationComments: In Proceedings of the 6th International Joint Conference on Natural Language Processing (IJCNLP 2013), pages 14011409, October 2013, Nagoya, JapanSubjects: Computation and Language (cs.CL)
The work presented in this paper attempts to evaluate and quantify the use of discourse relations in the context of blog summarization and compare their use to more traditional and factual texts. Specifically, we measured the usefulness of 6 discourse relations  namely comparison, contingency, illustration, attribution, topicopinion, and attributive for the task of text summarization from blogs. We have evaluated the effect of each relation using the TAC 2008 opinion summarization dataset and compared them with the results with the DUC 2007 dataset. The results show that in both textual genres, contingency, comparison, and illustration relations provide a significant improvement on summarization content; while attribution, topicopinion, and attributive relations do not provide a consistent and significant improvement. These results indicate that, at least for summarization, discourse relations are just as useful for informal and affective texts as for more traditional news articles.
 [17] arXiv:1708.05805 [pdf, other]

Title: Design Space of Programming Tools on Mobile Touchscreen DevicesComments: 11 pages, includes onepage tableSubjects: HumanComputer Interaction (cs.HC)
While mobile touchscreen devices are ubiquitous and present opportunities for novel applications, they have seen little adoption as tools for computer programming. In this literature survey, we bring together the diverse research work on programmingrelated tasks supported by mobile touchscreen devices to explore the design space for applying them to programming situations. We used the Grounded theory approach to identify themes and classify previous work. We present these themes and how each paper contributes to the theme, and we outline the remaining challenges in and opportunities for using mobile touchscreen devices in programming applications.
 [18] arXiv:1708.05811 [pdf, other]

Title: Secure Search on the Cloud via Coresets and SketchesComments: 25 pages, 2 figuresSubjects: Cryptography and Security (cs.CR)
\emph{Secure Search} is the problem of retrieving from a database table (or any unsorted array) the records matching specified attributes, as in SQL SELECT queries, but where the database and the query are encrypted. Secure search has been the leading example for practical applications of Fully Homomorphic Encryption (FHE) starting in Gentry's seminal work; however, to the best of our knowledge all stateoftheart secure search algorithms to date are realized by a polynomial of degree $\Omega(m)$ for $m$ the number of records, which is typically too slow in practice even for moderate size $m$.
In this work we present the first algorithm for secure search that is realized by a polynomial of degree polynomial in $\log m$. We implemented our algorithm in an open source library based on HELib implementation for the BrakerskiGentryVaikuntanthan's FHE scheme, and ran experiments on Amazon's EC2 cloud. Our experiments show that we can retrieve the first match in a database of millions of entries in less than an hour using a single machine; the time reduced almost linearly with the number of machines.
Our result utilizes a new paradigm of employing coresets and sketches, which are modern data summarization techniques common in computational geometry and machine learning, for efficiency enhancement for homomorphic encryption. As a central tool we design a novel sketch that returns the first positive entry in a (not necessarily sparse) array; this sketch may be of independent interest.  [19] arXiv:1708.05812 [pdf, other]

Title: Discovery of Visual Semantics by Unsupervised and SelfSupervised Representation LearningAuthors: Gustav LarssonComments: Ph.D. thesisSubjects: Computer Vision and Pattern Recognition (cs.CV)
The success of deep learning in computer vision is rooted in the ability of deep networks to scale up model complexity as demanded by challenging visual tasks. As complexity is increased, so is the need for large amounts of labeled data to train the model. This is associated with a costly human annotation effort. To address this concern, with the longterm goal of leveraging the abundance of cheap unlabeled data, we explore methods of unsupervised "pretraining." In particular, we propose to use selfsupervised automatic image colorization.
We show that traditional methods for unsupervised learning, such as layerwise clustering or autoencoders, remain inferior to supervised pretraining. In search for an alternative, we develop a fully automatic image colorization method. Our method sets a new stateoftheart in revitalizing old blackandwhite photography, without requiring human effort or expertise. Additionally, it gives us a method for selfsupervised representation learning. In order for the model to appropriately recolor a grayscale object, it must first be able to identify it. This ability, learned entirely selfsupervised, can be used to improve other visual tasks, such as classification and semantic segmentation. As a future direction for selfsupervision, we investigate if multiple proxy tasks can be combined to improve generalization. This turns out to be a challenging open problem. We hope that our contributions to this endeavor will provide a foundation for future efforts in making selfsupervision compete with supervised pretraining.  [20] arXiv:1708.05815 [pdf, other]

Title: Minimum Hidden Guarding of Histogram PolygonsSubjects: Computational Geometry (cs.CG)
A hidden guard set $ G $ is a set of point guards in polygon $ P $ that all points of the polygon are visible from some guards in $ G $ under the constraint that no two guards may see each other. In this paper, we consider the problem for finding minimum hidden guard sets in histogram polygons under orthogonal visibility. Two points $ p $ and $ q $ are orthogonally visible if the orthogonal bounding rectangle for $ p $ and $ q $ lies within $ P $. It is known that the problem is NPhard for simple polygon with general visibility and it is true for simple orthogonal polygon. We proposed a linear time exact algorithm for finding minimum hidden guard set in histogram polygons under orthogonal visibility. In our algorithm, it is allowed that guards place everywhere in the polygon.
 [21] arXiv:1708.05821 [pdf, other]

Title: Analysing Soccer Games with Clustering and ConceptorsComments: To appear in RoboCup 2017: Robot World Cup XXI; Springer, 2018Subjects: Learning (cs.LG)
We present a new approach for identifying situations and behaviours, which we call "moves", from soccer games in the 2D simulation league. Being able to identify key situations and behaviours are useful capabilities for analysing soccer matches, anticipating opponent behaviours to aid selection of appropriate tactics, and also as a prerequisite for automatic learning of behaviours and policies. To support a wide set of strategies, our goal is to identify situations from data, in an unsupervised way without making use of predefined soccer specific concepts such as "pass" or "dribble". The recurrent neural networks we use in our approach act as a highdimensional projection of the recent history of a situation on the field. Similar situations, i.e., with similar histories, are found by clustering of network states. The same networks are also used to learn socalled conceptors, that are lowerdimensional manifolds that describe trajectories through a highdimensional state space that enable situationspecific predictions from the same neural network. With the proposed approach, we can segment games into sequences of situations that are learnt in an unsupervised way, and learn conceptors that are useful for the prediction of the near future of the respective situation.
 [22] arXiv:1708.05824 [pdf]

Title: Applying Deep Bidirectional LSTM and Mixture Density Network for Basketball Trajectory PredictionSubjects: Artificial Intelligence (cs.AI)
Data analytics helps basketball teams to create tactics. However, manual data collection and analytics are costly and ineffective. Therefore, we applied a deep bidirectional long shortterm memory (BLSTM) and mixture density network (MDN) approach. This model is not only capable of predicting a basketball trajectory based on real data, but it also can generate new trajectory samples. It is an excellent application to help coaches and players decide when and where to shoot. Its structure is particularly suitable for dealing with time series problems. BLSTM receives forward and backward information at the same time, while stacking multiple BLSTMs further increases the learning ability of the model. Combined with BLSTMs, MDN is used to generate a multimodal distribution of outputs. Thus, the proposed model can, in principle, represent arbitrary conditional probability distributions of output variables. We tested our model with two experiments on threepointer datasets from NBA SportVu data. In the hitormiss classification experiment, the proposed model outperformed other models in terms of the convergence speed and accuracy. In the trajectory generation experiment, eight modelgenerated trajectories at a given time closely matched real trajectories.
 [23] arXiv:1708.05826 [pdf, other]

Title: Ensemble Of Deep Neural Networks For Acoustic Scene ClassificationComments: Detection and Classification of Acoustic Scenes and Events 2017Subjects: Sound (cs.SD)
Deep neural networks (DNNs) have recently achieved great success in a multitude of classification tasks. Ensembles of DNNs have been shown to improve the performance. In this paper, we explore the recent stateoftheart DNNs used for image classification. We modified these DNNs and applied them to the task of acoustic scene classification. We conducted a number of experiments on the TUT Acoustic Scenes 2017 dataset to empirically compare these methods. Finally, we show that the ensemble of these DNNs improves the baseline score for DCASE2017 Task 1 by 10%.
 [24] arXiv:1708.05827 [pdf, other]

Title: Visual Forecasting by Imitating Dynamics in Natural SequencesComments: 10 pages, 9 figures, accepted to ICCV 2017Subjects: Computer Vision and Pattern Recognition (cs.CV)
We introduce a general framework for visual forecasting, which directly imitates visual sequences without additional supervision. As a result, our model can be applied at several semantic levels and does not require any domain knowledge or handcrafted features. We achieve this by formulating visual forecasting as an inverse reinforcement learning (IRL) problem, and directly imitate the dynamics in natural sequences from their raw pixel values. The key challenge is the highdimensional and continuous stateaction space that prohibits the application of previous IRL algorithms. We address this computational bottleneck by extending recent progress in modelfree imitation with trainable deep feature representations, which (1) bypasses the exhaustive stateaction pair visits in dynamic programming by using a dual formulation and (2) avoids explicit state sampling at gradient computation using a deep feature reparametrization. This allows us to apply IRL at scale and directly imitate the dynamics in highdimensional continuous visual sequences from the raw pixel values. We evaluate our approach at three different levelofabstraction, from low level pixels to higher level semantics: future frame generation, action anticipation, visual story forecasting. At all levels, our approach outperforms existing methods.
 [25] arXiv:1708.05828 [pdf]

Title: High Voltage Insulator Surface Evaluation Using Image ProcessingComments: 2017 International Symposium on Electrical Insulating Materials, September 1215, 2017Subjects: Computer Vision and Pattern Recognition (cs.CV)
High voltage insulators are widely deployed in power systems to isolate the live and deadpart of overhead lines as well as to support the power line conductors mechanically. Permanent, secure and safe operation of power transmission lines require that the high voltage insulators are inspected and monitor, regularly. Severe environment conditions will influence insulator surface and change creepage distance. Consequently, power utilities and transmission companies face significant problem in operation due to insulator damage or contamination. In this study, a new technique is developed for realtime inspection of insulator and estimating the snow, ice and water over the insulator surface which can be a potential risk of operation breakdown. To examine the proposed system, practical experiment is conducted using ceramic insulator for capturing the images with snow, ice and wet surface conditions. Gabor and Standard deviation filters are utilized for image feature extraction. The best achieved recognition accuracy rate was 87% using statistical approach the Standard deviation.
 [26] arXiv:1708.05831 [pdf, other]

Title: Real Time Prediction of Drive by Download Attacks on TwitterComments: 17 pagesSubjects: Social and Information Networks (cs.SI)
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs to save space, given the 140 character limit, provides cyber criminals with an opportunity to obfuscate the URL of a malicious Web page within a tweet. Once the URL is obfuscated the cyber criminal can lure a user to click on it with enticing text and images before carrying out a cyber attack using a malicious Web server. This is known as a driveby download. In a drivebydownload a user's computer system is infected while interacting with the malicious endpoint, often without them being made aware, the attack has taken place. An attacker can gain control of the system by exploiting unpatched system vulnerabilities and this form of attack currently represents one of the most common methods employed. In this paper, we build a machine learning model using machine activity data and tweet meta data to move beyond postexecution classification of such URLs as malicious, to predict a URL will be malicious with 99.2% Fmeasure (using 10fold cross validation) and 83.98% (using an unseen test set) at 1 second into the interaction with the URL. Thus providing a basis from which to kill the connection to the server before an attack has completed and proactively blocking and preventing an attack, rather than reacting and repairing at a later date.
 [27] arXiv:1708.05844 [pdf, other]

Title: NIZKCTF: A NonInteractive ZeroKnowledge Capture the Flag PlatformComments: Preprint submitted to Middleware 2017 Industry TrackSubjects: Cryptography and Security (cs.CR)
Capture the Flag (CTF) competitions are educational and professional tools for the cybersecurity community. Unfortunately, CTF platforms suffer from the same security issues as other software components, what may give advantage to competitors who target the actual platform instead of the challenges. While it is arguable that successful attacks against the platform demonstrate relevant skills, the organizers may be interested into enforcing rules and rewarding solutions of the contest problems, due to sponsorship duties or focused recruiting efforts. To mitigate this, we present NIZKCTF, the first openaudit CTF platform based on noninteractive zeroknowledge proofs. NIZKCTF is publicly available for anyone who wants to run a CTF competition and provides strong transparency guarantees through the protocol, allowing any entity to verify the contest progression and outcome by employing a Gitbased transaction log, a continuous integration service and zeroknowledge proofs. Using NIZKCTF, we conducted a competition for 10 invited teams. This competition had a bug bounty program, with cash prizes for teams able to exploit and compromise the CTF result. In this experiment, we observed that attacks carried by the teams against the platform were unsuccessful.
 [28] arXiv:1708.05847 [pdf, other]

Title: Unbounded productform Petri netsComments: 31 pagesSubjects: Performance (cs.PF); Discrete Mathematics (cs.DM); Logic in Computer Science (cs.LO)
Computing steadystate distributions in infinitestate stochastic systems is in general a very dificult task. Productform Petri nets are those Petri nets for which the steadystate distribution can be described as a natural product corresponding, up to a normalising constant, to an exponentiation of the markings. However, even though some classes of nets are known to have a productform distribution, computing the normalising constant can be hard. The class of (closed) {\Pi}3nets has been proposed in an earlier work, for which it is shown that one can compute the steadystate distribution efficiently. However these nets are bounded. In this paper, we generalise queuing Markovian networks and closed {\Pi}3nets to obtain the class of open {\Pi}3nets, that generate infinitestate systems. We show interesting properties of these nets: (1) we prove that liveness can be decided in polynomial time, and that reachability in live {\Pi}3nets can be decided in polynomial time; (2) we show that we can decide ergodicity of such nets in polynomial time as well; (3) we provide a pseudopolynomial time algorithm to compute the normalising constant.
 [29] arXiv:1708.05849 [pdf, other]

Title: Dependences in Strategy LogicSubjects: Logic in Computer Science (cs.LO)
Strategy Logic (SL) is a very expressive logic for specifying and verifying properties of multiagent systems: in SL, one can quantify over strategies, assign them to agents, and express properties of the resulting plays. Such a powerful framework has two drawbacks: first, model checking SL has nonelementary complexity; second, the exact semantics of SL is rather intricate, and may not correspond to what is expected. In this paper, we focus on strategy dependences in SL, by tracking how existentiallyquantified strategies in a formula may (or may not) depend on other strategies selected in the formula. We study different kinds of dependences, refining the approach of [Mogavero et al., Reasoning about strategies: On the modelchecking problem, 2014], and prove that they give rise to different satisfaction relations. In the setting where strategies may only depend on what they have observed, we identify a large fragment of SL for which we prove model checking can be performed in 2EXPTIME.
 [30] arXiv:1708.05851 [pdf, ps, other]

Title: Image2song: Song Retrieval via Bridging Image Content and Lyric WordsComments: 13 pages, 13 figures, accepted by ICCV 2017Subjects: Computer Vision and Pattern Recognition (cs.CV); Information Retrieval (cs.IR); Multimedia (cs.MM)
Image is usually taken for expressing some kinds of emotions or purposes, such as love, celebrating Christmas. There is another better way that combines the image and relevant song to amplify the expression, which has drawn much attention in the social network recently. Hence, the automatic selection of songs should be expected. In this paper, we propose to retrieve semantic relevant songs just by an image query, which is named as the image2song problem. Motivated by the requirements of establishing correlation in semantic/content, we build a semanticbased song retrieval framework, which learns the correlation between image content and lyric words. This model uses a convolutional neural network to generate rich tags from image regions, a recurrent neural network to model lyric, and then establishes correlation via a multilayer perceptron. To reduce the content gap between image and lyric, we propose to make the lyric modeling focus on the main image content via a tag attention. We collect a dataset from the socialsharing multimodal data to study the proposed problem, which consists of (image, music clip, lyric) triplets. We demonstrate that our proposed model shows noticeable results in the image2song retrieval task and provides suitable songs. Besides, the song2image task is also performed.
 [31] arXiv:1708.05855 [pdf, other]

Title: Practical Distance Functions for PathPlanning in Planar DomainsSubjects: Robotics (cs.RO)
Path planning is an important problem in robotics. One way to plan a path between two points $x,y$ within a (not necessarily simplyconnected) planar domain $\Omega$, is to define a nonnegative distance function $d(x,y)$ on $\Omega\times\Omega$ such that following the (descending) gradient of this distance function traces such a path. This presents two equally important challenges: A mathematical challenge  to define $d$ such that $d(x,y)$ has a single minimum for any fixed $y$ (and this is when $x=y$), since a local minimum is in effect a "dead end", A computational challenge  to define $d$ such that it may be computed efficiently. In this paper, given a description of $\Omega$, we show how to assign coordinates to each point of $\Omega$ and define a family of distance functions between points using these coordinates, such that both the mathematical and the computational challenges are met. This is done using the concepts of \emph{harmonic measure} and \emph{$f$divergences}.
In practice, path planning is done on a discrete network defined on a finite set of \emph{sites} sampled from $\Omega$, so any method that works well on the continuous domain must be adapted so that it still works well on the discrete domain. Given a set of sites sampled from $\Omega$, we show how to define a network connecting these sites such that a \emph{greedy routing} algorithm (which is the discrete equivalent of continuous gradient descent) based on the distance function mentioned above is guaranteed to generate a path in the network between any two such sites. In many cases, this network is close to a (desirable) planar graph, especially if the set of sites is dense.  [32] arXiv:1708.05857 [pdf, other]

Title: The CLaC Discourse Parser at CoNLL2015Comments: Proceedings of the Nineteenth Conference on Computational Natural Language Learning Shared Task (CoNLL 2015). Beijing, ChinaSubjects: Computation and Language (cs.CL)
This paper describes our submission (kosseim15) to the CoNLL2015 shared task on shallow discourse parsing. We used the UIMA framework to develop our parser and used ClearTK to add machine learning functionality to the UIMA framework. Overall, our parser achieves a result of 17.3 F1 on the identification of discourse relations on the blind CoNLL2015 test set, ranking in sixth place.
 [33] arXiv:1708.05866 [pdf, other]

Title: A Brief Survey of Deep Reinforcement LearningComments: To appear in IEEE Signal Processing Magazine, Special Issue on Deep Learning for Image UnderstandingSubjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
Deep reinforcement learning is poised to revolutionise the field of AI and represents a step towards building autonomous systems with a higher level understanding of the visual world. Currently, deep learning is enabling reinforcement learning to scale to problems that were previously intractable, such as learning to play video games directly from pixels. Deep reinforcement learning algorithms are also applied to robotics, allowing control policies for robots to be learned directly from camera inputs in the real world. In this survey, we begin with an introduction to the general field of reinforcement learning, then progress to the main streams of valuebased and policybased methods. Our survey will cover central algorithms in deep reinforcement learning, including the deep $Q$network, trust region policy optimisation, and asynchronous advantage actorcritic. In parallel, we highlight the unique advantages of deep neural networks, focusing on visual understanding via reinforcement learning. To conclude, we describe several current areas of research within the field.
 [34] arXiv:1708.05867 [pdf, other]

Title: Power Allocation for Adaptive OFDM Index Modulation in Cooperative NetworksSubjects: Information Theory (cs.IT)
In this paper, we propose a power allocation strategy for the adaptive orthogonal frequencydivision multiplexing (OFDM) index modulation (IM) in cooperative networks. The allocation strategy is based on the KarushKuhnTucker (KKT) conditions, and aims at maximizing the average network capacity according to the instantaneous channel state information (CSI). As the transmit power at source and relay is constrained separately, we can thus formulate an optimization problem by allocating power to active subcarriers. Compared to the conventional uniform power allocation strategy, the proposed dynamic strategy can lead to a higher average network capacity, especially in the low signaltonoise ratio (SNR) region. The analysis is also verified by numerical results produced by Monte Carlo simulations. By applying the proposed power allocation strategy, the efficiency of adaptive OFDM IM can be enhanced in practice, which paves the way for its implementation in the future, especially for celledge communications.
 [35] arXiv:1708.05868 [pdf, other]

Title: Outage Performance Analysis of Multicarrier Relay Selection for Cooperative NetworksSubjects: Information Theory (cs.IT)
In this paper, we analyze the outage performance of two multicarrier relay selection schemes, i.e. bulk and persubcarrier selections, for twohop orthogonal frequencydivision multiplexing (OFDM) systems. To provide a comprehensive analysis, three forwarding protocols: decodeandforward (DF), fixedgain (FG) amplifyandforward (AF) and variablegain (VG) AF relay systems are considered. We obtain closedform approximations for the outage probability and closedform expressions for the asymptotic outage probability in the high signaltonoise ratio (SNR) region for all cases. Our analysis is verified by Monte Carlo simulations, and provides an analytical framework for multicarrier systems with relay selection.
 [36] arXiv:1708.05869 [pdf, other]

Title: UE4Sim: A PhotoRealistic Simulator for Computer Vision ApplicationsSubjects: Computer Vision and Pattern Recognition (cs.CV)
We present a photorealistic training and evaluation simulator (UE4Sim) with extensive applications across various fields of computer vision. Built on top of the Unreal Engine, the simulator integrates full featured physics based cars, unmanned aerial vehicles (UAVs), and animated human actors in diverse urban and suburban 3D environments. We demonstrate the versatility of the simulator with two case studies: autonomous UAVbased tracking of moving objects and autonomous driving using supervised learning. The simulator fully integrates both several stateoftheart tracking algorithms with a benchmark evaluation tool and a deep neural network (DNN) architecture for training vehicles to drive autonomously. It generates synthetic photorealistic datasets with automatic ground truth annotations to easily extend existing realworld datasets and provides extensive synthetic data variety through its ability to reconfigure synthetic worlds on the fly using an automatic world generation tool.
 [37] arXiv:1708.05870 [pdf, ps, other]

Title: The Spatial Outage Capacity of Wireless NetworksComments: 32 pages, 9 figuresSubjects: Information Theory (cs.IT)
We address a fundamental question in wireless networks that, surprisingly, has not been studied before: what is the maximum density of concurrently active links that satisfy a certain outage constraint? We call this quantity the spatial outage capacity (SOC), give a rigorous definition, and analyze it for Poisson bipolar networks with ALOHA. Specifically, we provide exact analytical and approximate expressions for the density of links satisfying an outage constraint and give simple upper and lower bounds on the SOC. In the highreliability regime where the target outage probability is close to zero, we obtain an exact closedform expression of the SOC, which reveals the interesting and perhaps counterintuitive result that all transmitters need to be always active to achieve the SOC, i.e., the transmit probability needs to be set to 1 to achieve the SOC.
 [38] arXiv:1708.05872 [pdf]

Title: Agentbased computing from multiagent systems to agentbased Models: a visual surveyComments: 30 pages, 11 figures, 9 tablesJournalref: Scientometrics 89.2 (2011): 479Subjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI); Digital Libraries (cs.DL); Multiagent Systems (cs.MA); Adaptation and SelfOrganizing Systems (nlin.AO)
AgentBased Computing is a diverse research domain concerned with the building of intelligent software based on the concept of "agents". In this paper, we use Scientometric analysis to analyze all subdomains of agentbased computing. Our data consists of 1,064 journal articles indexed in the ISI web of knowledge published during a twenty year period: 19902010. These were retrieved using a topic search with various keywords commonly used in subdomains of agentbased computing. In our proposed approach, we have employed a combination of two applications for analysis, namely Network Workbench and CiteSpace  wherein Network Workbench allowed for the analysis of complex network aspects of the domain, detailed visualizationbased analysis of the bibliographic data was performed using CiteSpace. Our results include the identification of the largest cluster based on keywords, the timeline of publication of index terms, the core journals and key subject categories. We also identify the core authors, top countries of origin of the manuscripts along with core research institutes. Finally, our results have interestingly revealed the strong presence of agentbased computing in a number of noncomputing related scientific domains including Life Sciences, Ecological Sciences and Social Sciences.
 [39] arXiv:1708.05873 [pdf, other]

Title: What Drives the International Development Agenda? An NLP Analysis of the United Nations General Debate 19702016Subjects: Computation and Language (cs.CL); Social and Information Networks (cs.SI)
There is surprisingly little known about agenda setting for international development in the United Nations (UN) despite it having a significant influence on the process and outcomes of development efforts. This paper addresses this shortcoming using a novel approach that applies natural language processing techniques to countries' annual statements in the UN General Debate. Every year UN member states deliver statements during the General Debate on their governments' perspective on major issues in world politics. These speeches provide invaluable information on state preferences on a wide range of issues, including international development, but have largely been overlooked in the study of global politics. This paper identifies the main international development topics that states raise in these speeches between 1970 and 2016, and examine the countryspecific drivers of international development rhetoric.
 [40] arXiv:1708.05875 [pdf]

Title: A novel agentbased simulation framework for sensing in complex adaptive environmentsComments: 8 pagesJournalref: IEEE Sensors Journal 11.2 (2011): 404412Subjects: Networking and Internet Architecture (cs.NI); Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA); Software Engineering (cs.SE); Adaptation and SelfOrganizing Systems (nlin.AO)
In this paper we present a novel Formal AgentBased Simulation framework (FABS). FABS uses formal specification as a means of clear description of wireless sensor networks (WSN) sensing a Complex Adaptive Environment. This specification model is then used to develop an agentbased model of both the wireless sensor network as well as the environment. As proof of concept, we demonstrate the application of FABS to a boids model of selforganized flocking of animals monitored by a random deployment of proximity sensors.
 [41] arXiv:1708.05878 [pdf]

Title: EventRadar: Realtime Local Event Detection System for GeoTagged Tweet StreamsComments: 12 pagesSubjects: Information Retrieval (cs.IR)
The local event detection is to use posting messages with geotags on social networks to reveal the related ongoing events and their locations. Recent studies have demonstrated that the geotagged tweet stream serves as an unprecedentedly valuable source for local event detection. Nevertheless, how to effectively extract local events from large geotagged tweet streams in real time remains challenging. A robust and efficient cloudbased realtime local event detection software system would benefit various aspects in the reallife society, from shopping recommendation for customer service providers to disaster alarming for emergency departments. We use the preliminary research GeoBurst as a starting point, which proposed a novel method to detect local events. GeoBurst+ leverages a novel crossmodal authority measure to identify several pivots in the query window. Such pivots reveal different geotopical activities and naturally attract related tweets to form candidate events. It further summarises the continuous stream and compares the candidates against the historical summaries to pinpoint truly interesting local events. We mainly implement a website demonstration system EventRadar with an improved algorithm to show the realtime local events online for public interests. Better still, as the query window shifts, our method can update the event list with little time cost, thus achieving continuous monitoring of the stream.
 [42] arXiv:1708.05884 [pdf, other]

Title: Teaching UAVs to Race Using UE4SimSubjects: Computer Vision and Pattern Recognition (cs.CV)
Automating the navigation of unmanned aerial vehicles (UAVs) in diverse scenarios has gained much attention in the recent years. However, teaching UAVs to fly in challenging environments remains an unsolved problem, mainly due to the lack of data for training. In this paper, we develop a photorealistic simulator that can afford the generation of large amounts of training data (both images rendered from the UAV camera and its controls) to teach a UAV to autonomously race through challenging tracks. We train a deep neural network to predict UAV controls from raw image data for the task of autonomous UAV racing. Training is done through imitation learning enabled by data augmentation to allow for the correction of navigation mistakes. Extensive experiments demonstrate that our trained network (when sufficient data augmentation is used) outperforms stateoftheart methods and flies more consistently than many human pilots.
 [43] arXiv:1708.05887 [pdf, other]

Title: LTE PHY Layer Vulnerability Analysis and Testing Using OpenSource SDR ToolsComments: 7 pages, 7 figures. Publication accepted at IEEE MILCOM, 2017Subjects: Networking and Internet Architecture (cs.NI)
This paper provides a methodology to study the PHY layer vulnerability of wireless protocols in hostile radio environments. Our approach is based on testing the vulnerabilities of a system by analyzing the individual subsystems. By targeting an individual subsystem or a combination of subsystems at a time, we can infer the weakest part and revise it to improve the overall system performance. We apply our methodology to 4G LTE downlink by considering each control channel as a subsystem. We also develop opensource software enabling research and education using softwaredefined radios. We present experimental results with opensource LTE systems and shows how the different subsystems behave under targeted interference. The analysis for the LTE downlink shows that the synchronization signals (PSS/SSS) are very resilient to interference, whereas the downlink pilots or CellSpecific Reference signals (CRS) are the most susceptible to a synchronized protocolaware interferer. We also analyze the severity of control channel attacks for different LTE configurations. Our methodology and tools allow rapid evaluation of the PHY layer reliability in harsh signaling environments, which is an asset to improve current standards and develop new robust wireless protocols.
 [44] arXiv:1708.05889 [pdf, other]

Title: Analysis of Solar Energy Aggregation under Various Billing MechanismsComments: 8 pagesSubjects: Systems and Control (cs.SY)
Ongoing reductions in the cost of solar photovoltaic (PV) systems are driving increased residential households installations. Various incentive programs such as feedin tariff, net metering, net purchase and sale that allow the consumers to sell their generated electricity to the grid are also powering this trend. In this paper, we investigate sharing of PV systems among a set of households who can also benefit further by pooling their production. We first find conditions under which such sharing decreases their net total cost. Next, we develop allocation rules such that the joint net electricity consumption cost is allocated to the participants based on cost causation principle. The joint cost also satisfies standalone cost principle thus promoting PV solar aggregation.
 [45] arXiv:1708.05891 [pdf, other]

Title: Arabic MultiDialect Segmentation: biLSTMCRF vs. SVMAuthors: Mohamed Eldesouki, Younes Samih, Ahmed Abdelali, Mohammed Attia, Hamdy Mubarak, Kareem Darwish, Kallmeyer LauraSubjects: Computation and Language (cs.CL)
Arabic word segmentation is essential for a variety of NLP applications such as machine translation and information retrieval. Segmentation entails breaking words into their constituent stems, affixes and clitics. In this paper, we compare two approaches for segmenting four major Arabic dialects using only several thousand training examples for each dialect. The two approaches involve posing the problem as a ranking problem, where an SVM ranker picks the best segmentation, and as a sequence labeling problem, where a biLSTM RNN coupled with CRF determines where best to segment words. We are able to achieve solid segmentation results for all dialects using rather limited training data. We also show that employing Modern Standard Arabic data for domain adaptation and assuming context independence improve overall results.
 [46] arXiv:1708.05896 [pdf, other]

Title: A Cointuitionistic Adjoint LogicComments: 54 pagesSubjects: Logic in Computer Science (cs.LO)
One leading question with respect to Biintuitionistic logic (BINT) is, what does BINT look like across the three arcs  logic, typed $\lambda$calculi, and category theory  of the CurryHowardLambek correspondence? Categorically, BINT can be seen as a mixing of two worlds: the first being intuitionistic logic (IL), which is modeled by a cartesian closed category, and the second being the dual to intuitionistic logic called cointuitionistic logic (coIL), which is modeled by a cocartesian coclosed category. Crolard showed that combining these two categories into the same category results in it degenerating to a poset. However, this degeneration does not occur when both logics are linear. We propose that IL and coIL need to be separated, and then mixed in a controlled way using the modalities from linear logic. This separation can be ultimately achieved by an adjoint formalization of biintuitionistic logic. This formalization consists of three worlds instead of two: the first is intuitionistic logic, the second is linear biintuitionistic (BiILL), and the third is cointuitionistic logic. They are then related via two adjunctions. The adjunction between IL and ILL is known as a Linear/Nonlinear model (LNL model) of ILL, and is due to Benton. However, the dual to LNL models which would amount to the adjunction between coILL and coIL has yet to appear in the literature. In this paper we fill this gap by studying the dual to LNL models which we call dual LNL models. We show that dual LNL models correspond to dual linear categories, the dual to Bierman's linear categories proposed by Bellin. Then we give the definition of biLNL models by combining our model with LNL models to obtain a new model of biintuitionistic logic. Finally, we give a corresponding sequent calculus, natural deduction, and term assignment for dual LNL models.
 [47] arXiv:1708.05897 [pdf]

Title: Computeraided diagnosis of lung nodule using gradient tree boosting and Bayesian optimizationAuthors: Mizuho Nishio, Mitsuo Nishizawa, Osamu Sugiyama, Ryosuke Kojima, Masahiro Yakami, Tomohiro Kuroda, Kaori TogashiComments: 29 pages, 4 figuresSubjects: Computer Vision and Pattern Recognition (cs.CV)
We aimed to evaluate computeraided diagnosis (CADx) system for lung nodule classification focusing on (i) usefulness of gradient tree boosting (XGBoost) and (ii) effectiveness of parameter optimization using Bayesian optimization (Tree Parzen Estimator, TPE) and random search. 99 lung nodules (62 lung cancers and 37 benign lung nodules) were included from public databases of CT images. A variant of local binary pattern was used for calculating feature vectors. Support vector machine (SVM) or XGBoost was trained using the feature vectors and their labels. TPE or random search was used for parameter optimization of SVM and XGBoost. Leaveoneout crossvalidation was used for optimizing and evaluating the performance of our CADx system. Performance was evaluated using area under the curve (AUC) of receiver operating characteristic analysis. AUC was calculated 10 times and, its average was obtained. The best averaged AUC of SVM and XGBoost were 0.850 and 0.896, respectively; both were obtained using TPE. XGBoost was generally superior to SVM. Optimal parameters for achieving high AUC were obtained with fewer numbers of trials when using TPE, compared with random search. In conclusion, XGBoost was better than SVM for classifying lung nodules. TPE was more efficient than random search for parameter optimization.
 [48] arXiv:1708.05903 [pdf, other]

Title: An FPT algorithm for planar multicuts with sources and sinks on the outer faceAuthors: Cédric BentzComments: 15 pages, 1 figureSubjects: Data Structures and Algorithms (cs.DS)
Given a list of k sourcesink pairs in an edgeweighted graph G, the minimum multicut problem consists in selecting a set of edges of minimum total weight in G, such that removing these edges leaves no path from each source to its corresponding sink. To the best of our knowledge, no nontrivial FPT result for special cases of this problem, which is APXhard in general graphs for any fixed k>2, is known with respect to k only. When the graph G is planar, this problem is known to be polynomialtime solvable if k=O(1), but cannot be FPT with respect to k under the Exponential Time Hypothesis.
In this paper, we show that, if G is planar and in addition all sources and sinks lie on the outer face, then this problem does admit an FPT algorithm when parameterized by k (although it remains APXhard when k is part of the input, even in stars). To do this, we provide a new characterization of optimal solutions in this case, and then use it to design a "divideandconquer" approach: namely, some edges that are part of any such solution actually define an optimal solution for a polynomialtime solvable multiterminal variant of the problem on some of the sources and sinks (which can be identified thanks to a reduced enumeration phase). Removing these edges from the graph cuts it into several smaller instances, which can then be solved recursively.  [49] arXiv:1708.05904 [pdf, other]

Title: Modular Safety Verification for Stateful NetworksAuthors: Kalev Alpernas (Tel Aviv University), Roman Manevich (BenGurion University of the Negev), Aurojit Panda (UC Berkeley), Mooly Sagiv (Tel Aviv University), Scott Shenker (UC Berkeley), Sharon Shoham (Tel Aviv University), Yaron Velner (Hebrew University of Jerusalem)Subjects: Programming Languages (cs.PL)
Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification.
We describe a new algorithm for conservatively checking the safety of stateful networks. Our algorithm is modular in the sense that it repeatedly analyzes each middlebox separately w.r.t. an intermediate global state view. Its asymptotic complexity is polynomial in the size of the network, albeit being exponential in the maximal number of queries of the local state that a middlebox can do, which is often small.
Our algorithm is sound, i.e., it can never miss a violation of safety but may fail to verify some properties. The algorithm performs onthe fly abstract interpretation by (1) abstracting away the order of packet processing, (2) abstracting away correlations between states of different middleboxes and channel contents, and (3) representing middlebox states by their effect on each packet separately, rather than taking into account the entire state space. We show that the abstractions do not lose precision when the middlebox may reset in any state. This is encouraging since many real middleboxes reset, e.g., after some session timeout is reached or due to hardware failure.  [50] arXiv:1708.05905 [pdf, other]

Title: Designing for Pragmatists and Fundamentalists: Privacy Concerns and Attitudes on the Internet of ThingsComments: Brazilian Symposium on Human Factors in Computing Systems (HC'17), October 2327, 2017, Joinville, SC, Brazil. 10 pages, 5 figuresSubjects: HumanComputer Interaction (cs.HC)
Internet of Things (IoT) systems have aroused enthusiasm and concerns. Enthusiasm comes from their utilities in people daily life, and concerns may be associated with privacy issues. By using two IoT systems as casestudies, we examine users' privacy beliefs, concerns and attitudes. We focus on four major dimensions: the collection of personal data, the inference of new information, the exchange of information to third parties, and the riskutility tradeoff posed by the features of the system. Altogether, 113 Brazilian individuals answered a survey about such dimensions. Although their perceptions seem to be dependent on the context, there are recurrent patterns. Our results suggest that IoT users can be classified into unconcerned, fundamentalists and pragmatists. Most of them exhibit a pragmatist profile and believe in privacy as a right guaranteed by law. One of the most privacy concerning aspect is the exchange of personal information to third parties. Individuals' perceived risk is negatively correlated with their perceived utility in the features of the system. We discuss practical implications of these results and suggest heuristics to cope with privacy concerns when designing IoT systems.
 [51] arXiv:1708.05907 [pdf, other]

Title: Electricity Theft Detection using Machine LearningAuthors: Niklas DahringerSubjects: Cryptography and Security (cs.CR); Computers and Society (cs.CY); Learning (cs.LG)
Nontechnical losses (NTL) in electric power grids arise through electricity theft, broken electric meters or billing errors. They can harm the power supplier as well as the whole economy of a country through losses of up to 40% of the total power distribution. For NTL detection, researchers use artificial intelligence to analyse data. This work is about improving the extraction of more meaningful features from a data set. With these features, the prediction quality will increase.
 [52] arXiv:1708.05908 [pdf, other]

Title: Designing virusresistant, highperformance networks: a gameformation approachComments: accepted for publication in IEEE Transactions on Control of Network SystemsSubjects: Computer Science and Game Theory (cs.GT); Networking and Internet Architecture (cs.NI); Systems and Control (cs.SY)
Designing an optimal network topology while balancing multiple, possibly conflicting objectives like cost, performance, and resiliency to viruses is a challenging endeavor, let alone in the case of decentralized network formation. We therefore propose a gameformation technique where each player aims to minimize its cost in installing links, the probability of being infected by a virus and the sum of hopcounts on its shortest paths to all other nodes.
In this article, we (1) determine the Nash Equilibria and the Price of Anarchy for our novel network formation game, (2) demonstrate that the Price of Anarchy (PoA) is usually low, which suggests that (near)optimal topologies can be formed in a decentralized way, and (3) give suggestions for practitioners for those cases where the PoA is high and some centralized control/incentives are advisable.  [53] arXiv:1708.05918 [pdf, other]

Title: Adaptive Sampling for Rapidly Matching HistogramsSubjects: Databases (cs.DB)
In exploratory data analysis, analysts often have a need to identify histograms that possess a specific distribution, among a large class of candidate histograms, e.g., find histograms of countries whose income distribution is most similar to that of Greece. This distribution could be a new one that the user is curious about, or a known distribution from an existing histogram visualization. At present, this process of identification is bruteforce, requiring the manual generation and evaluation of a large number of histograms. We present FastMatch: an endtoend architecture for interactively retrieving the histogram visualizations that are most similar to a userspecified target, from a large collection of histograms. The primary technical contribution underlying FastMatch is a sublinear algorithm, HistSim, a theoretically sound samplingbased approach to identify the top$k$ closest histograms under $\ell_1$ distance. While HistSim can be used independently, within FastMatch we couple HistSim with a novel system architecture that is aware of practical considerations, employing blockbased sampling policies and asynchronous statistics and computation, building on lightweight sampling engines developed in recent work. In our experiments on several realworld datasets, FastMatch obtains nearperfect accuracy with up to $100\times$ speedups over less sophisticated approaches.
 [54] arXiv:1708.05922 [pdf, other]

Title: 360degree Video Stitching for Dualfisheye Lens Cameras Based On Rigid Moving Least SquaresComments: Preprint versionSubjects: Multimedia (cs.MM)
Dualfisheye lens cameras are becoming popular for 360degree video capture, especially for Usergenerated content (UGC), since they are affordable and portable. Images generated by the dualfisheye cameras have limited overlap and hence require nonconventional stitching techniques to produce highquality 360x180degree panoramas. This paper introduces a novel method to align these images using interpolation grids based on rigid moving least squares. Furthermore, jitter is the critical issue arising when one applies the imagebased stitching algorithms to video. It stems from the unconstrained movement of stitching boundary from one frame to another. Therefore, we also propose a new algorithm to maintain the temporal coherence of stitching boundary to provide jitterfree 360degree videos. Results show that the method proposed in this paper can produce higher quality stitched images and videos than prior work.
 [55] arXiv:1708.05924 [pdf, other]

Title: A Deep QNetwork for the Beer Game with Partial InformationSubjects: Learning (cs.LG); Multiagent Systems (cs.MA)
The beer game is a decentralized, multiagent, cooperative problem that can be modeled as a serial supply chain network in which agents cooperatively attempt to minimize the total cost of the network even though each agent can only observe its own local information. We develop a variant of the Deep QNetwork algorithm to solve this problem. Extensive numerical experiment show the effectiveness of our algorithm. Unlike most algorithms in literature, our algorithm does not have any limits on the parameter values, and it provides good solutions even if the agents do not follow a rational policy. The algorithm can be extended to other decentralized multiagent cooperative games with partially observed information, which is a common type of situation in supply chain problems.
 [56] arXiv:1708.05926 [pdf, other]

Title: TamperEvident Complex Genomic NetworksComments: 14 pages, 8 figuresSubjects: Social and Information Networks (cs.SI); Cryptography and Security (cs.CR); Databases (cs.DB); Networking and Internet Architecture (cs.NI)
Networks are important storage data structures now used to store personal information of individuals around the globe. With the advent of personal genome sequencing, networks are going to be used to store personal genomic sequencing of people. In contrast to social media networks, the importance of relationships in this genomic network is extremely significant. Losing connections between individuals thus implies losing relationship information (E.g. father or son etc.). There currently exists a considerably serious problem in the current approach to storing network data. Simply stated, network data is not tamperevident. In other words, if some links or nodes were changed/removed/added by a malicious attacker, it would be impossible for the administrator to detect such changes. While, in the current age of social media networks, change in node characteristics and links can be bad in terms of relationships, in the case of networks for storing personal genomes, the results could be truly devastating. Here we present a scheme for building tamperevident networks using a combination of Cryptographic and Egobased Network analytic methods. Using actual published datasets, we also demonstrate the utility and validity of the scheme besides demonstrating its working in various possible scenarios of usage. Results from the extensive experiments demonstrate the validity of the proposed approach.
 [57] arXiv:1708.05929 [pdf, other]

Title: XPACS: eXPlaining Anomalies by Characterizing SubspacesComments: 10 pages, 5 figures, 5 tablesSubjects: Learning (cs.LG); Machine Learning (stat.ML)
Anomaly detection has numerous critical applications in finance, security, etc. and has been vastly studied. In this paper, we tap into a gap in the literature and consider a complementary problem: anomaly description. Interpretation of anomalies has important implications for decision makers, from being able to troubleshoot and prioritize their actions to making policy changes for prevention. We present a new method called XPACS which "reverseengineers" the known anomalies in a dataset by identifying a few anomalous patterns that they form along with the characterizing subspace of features that separates them from normal instances. From a descriptive data mining perspective, our solution has five key desired properties. It can unearth anomalous patterns (i) of multiple different types, (ii) hidden in arbitrary subspaces of a high dimensional space, (iii) interpretable by the endusers, (iv) succinct, providing the shortest data description, and finally (v) different from normal patterns of the data. There is no existing work on anomaly description that satisfy all of these desiderata simultaneously. While not our primary goal, anomalous patterns XPACS finds can further be seen as multiple, interpretable "signatures" and can be used for detection. We show the effectiveness of XPACS in explanation as well as detection tasks on 9 realworld datasets.
 [58] arXiv:1708.05930 [pdf, ps, other]

Title: Solving a New 3D Bin Packing Problem with Deep Reinforcement Learning MethodComments: 7 pages, 1 figuresSubjects: Artificial Intelligence (cs.AI)
In this paper, a new type of 3D bin packing problem (BPP) is proposed, in which a number of cuboidshaped items must be put into a bin one by one orthogonally. The objective is to find a way to place these items that can minimize the surface area of the bin. This problem is based on the fact that there is no fixedsized bin in many real business scenarios and the cost of a bin is proportional to its surface area. Our research shows that this problem is NPhard. Based on previous research on 3D BPP, the surface area is determined by the sequence, spatial locations and orientations of items. Among these factors, the sequence of items plays a key role in minimizing the surface area. Inspired by recent achievements of deep reinforcement learning (DRL) techniques, especially Pointer Network, on combinatorial optimization problems such as TSP, a DRLbased method is applied to optimize the sequence of items to be packed into the bin. Numerical results show that the method proposed in this paper achieve about 5% improvement than heuristic method.
 [59] arXiv:1708.05935 [pdf]

Title: SoftwareDefined Robotics  Idea & ApproachAuthors: Ali AlBayatyComments: 4 pages, 4 figures, robotics and automation, SoftwareDefined RoboticsSubjects: Robotics (cs.RO); Artificial Intelligence (cs.AI)
The methodology of SoftwareDefined Robotics hierarchicalbased and standalone framework can be designed and implemented to program and control different sets of robots, regardless of their manufacturers' parameters and specifications, with unified commands and communications. This framework approach will increase the capability of (re)programming a specific group of robots during the runtime without affecting the others as desired in the critical missions and industrial operations, expand the shared bandwidth, enhance the reusability of code, leverage the computational processing power, decrease the unnecessary analyses of vast supplemental electrical components for each robot, as well as get advantages of the most stateoftheart industrial trends in the cloudbased computing, Virtual Machines (VM), and RobotasaService (RaaS) technologies.
 [60] arXiv:1708.05939 [pdf, other]

Title: Message Passing in CRAN: Joint User Activity and Signal DetectionComments: Conference, 6 pages, 7 figures, accepted by IEEE Globecom 2017Subjects: Information Theory (cs.IT)
In cloud radio access network (CRAN), remote radio heads (RRHs) and users are uniformly distributed in a large area such that the channel matrix can be considered as sparse. Based on this phenomenon, RRHs only need to detect the relatively strong signals from nearby users and ignore the weak signals from far users, which is helpful to develop lowcomplexity detection algorithms without causing much performance loss. However, before detection, RRHs require to obtain the realtime user activity information by the dynamic grant procedure, which causes the enormous latency. To address this issue, in this paper, we consider a grantfree CRAN system and propose a lowcomplexity BernoulliGaussian message passing (BGMP) algorithm based on the sparsified channel, which jointly detects the user activity and signal. Since active users are assumed to transmit Gaussian signals at any time, the user activity can be regarded as a Bernoulli variable and the signals from all users obey a BernoulliGaussian distribution. In the BGMP, the detection functions for signals are designed with respect to the BernoulliGaussian variable. Numerical results demonstrate the robustness and effectivity of the BGMP. That is, for different sparsified channels, the BGMP can approach the meansquare error (MSE) of the genieaided sparse minimum meansquare error (GASMMSE) which exactly knows the user activity information. Meanwhile, the fast convergence and strong recovery capability for user activity of the BGMP are also verified.
 [61] arXiv:1708.05942 [pdf, other]

Title: The Helsinki Neural Machine Translation SystemComments: Proceedings of the Second Conference on Machine Translation (WMT 2017) at EMNLP 2017, Copenhagen/DanmarkSubjects: Computation and Language (cs.CL)
We introduce the Helsinki Neural Machine Translation system (HNMT) and how it is applied in the news translation task at WMT 2017, where it ranked first in both the human and automatic evaluations for EnglishFinnish. We discuss the success of EnglishFinnish translations and the overall advantage of NMT over a strong SMT baseline. We also discuss our submissions for EnglishLatvian, EnglishChinese and ChineseEnglish.
 [62] arXiv:1708.05943 [pdf, other]

Title: Neural Machine Translation with Extended ContextComments: Proceedings of the Third Workshop on Discourse in Machine Translation (DiscoMT 2017) at EMNLP 2017, Copenhagen/DanmarkSubjects: Computation and Language (cs.CL)
We investigate the use of extended context in attentionbased neural machine translation. We base our experiments on translated movie subtitles and discuss the effect of increasing the segments beyond single translation units. We study the use of extended source language context as well as bilingual context extensions. The models learn to distinguish between information from different segments and are surprisingly robust with respect to translation quality. In this pilot study, we observe interesting crosssentential attention patterns that improve textual coherence in translation at least in some selected cases.
 [63] arXiv:1708.05947 [pdf, ps, other]

Title: Golden Angle ModulationAuthors: Peter LarssonComments: 4 pages, 4 figures. Submitted for possible publication in wireless communication letters. Extract from draft PhD thesis chapterSubjects: Information Theory (cs.IT)
Quadrature amplitude modulation (QAM) exhibits a shapingloss of $\pi \mathrm{e}/6$, ($\approx1.53$ dB) compared to the AWGN Shannon capacity. With inspiration gained from special (leaf, flower petal, and seed) packing arrangements (spiral phyllotaxis) found among plants, a novel, shapeversatile, circular symmetric, modulation scheme, the Golden Angle Modulation (GAM) is introduced. Discshaped, and complex Gaussian approximating bellshaped, GAMsignal constellations are considered. For bellGAM, a highrate approximation, and a mutual information optimization formulation, are developed. BellGAM overcomes the asymptotic shapingloss seen in QAM, and offers Shannon capacity approaching performance. Transmitter resource limited links, such as space probetoearth, and mobiletobasestation, are cases where GAM could be particularly valuable.
 [64] arXiv:1708.05956 [pdf, other]

Title: An EndtoEnd Trainable Neural Network Model with Belief Tracking for TaskOriented DialogComments: Published at Interspeech 2017Subjects: Computation and Language (cs.CL)
We present a novel endtoend trainable neural network model for taskoriented dialog systems. The model is able to track dialog state, issue API calls to knowledge base (KB), and incorporate structured KB query results into system responses to successfully complete taskoriented dialogs. The proposed model produces wellstructured system responses by jointly learning belief tracking and KB result processing conditioning on the dialog history. We evaluate the model in a restaurant search domain using a dataset that is converted from the second Dialog State Tracking Challenge (DSTC2) corpus. Experiment results show that the proposed model can robustly track dialog state given the dialog history. Moreover, our model demonstrates promising results in producing appropriate system responses, outperforming prior endtoend trainable neural network models using perresponse accuracy evaluation metrics.
 [65] arXiv:1708.05959 [pdf, other]

Title: Kirchhoff Index As a Measure of Edge Centrality in Weighted Networks: Nearly Linear Time AlgorithmsSubjects: Data Structures and Algorithms (cs.DS); Social and Information Networks (cs.SI)
Most previous work of centralities focuses on metrics of vertex importance and methods for identifying powerful vertices, while related work for edges is much lesser, especially for weighted networks, due to the computational challenge. In this paper, we propose to use the wellknown Kirchhoff index as the measure of edge centrality in weighted networks, called $\theta$Kirchhoff edge centrality. The Kirchhoff index of a network is defined as the sum of effective resistances over all vertex pairs. The centrality of an edge $e$ is reflected in the increase of Kirchhoff index of the network when the edge $e$ is partially deactivated, characterized by a parameter $\theta$. We define two equivalent measures for $\theta$Kirchhoff edge centrality. Both are global metrics and have a better discriminating power than commonly used measures, based on local or partial structural information of networks, e.g. edge betweenness and spanning edge centrality.
Despite the strong advantages of Kirchhoff index as a centrality measure and its wide applications, computing the exact value of Kirchhoff edge centrality for each edge in a graph is computationally demanding. To solve this problem, for each of the $\theta$Kirchhoff edge centrality metrics, we present an efficient algorithm to compute its $\epsilon$approximation for all the $m$ edges in nearly linear time in $m$. The proposed $\theta$Kirchhoff edge centrality is the first global metric of edge importance that can be provably approximated in nearlylinear time. Moreover, according to the $\theta$Kirchhoff edge centrality, we present a $\theta$Kirchhoff vertex centrality measure, as well as a fast algorithm that can compute $\epsilon$approximate Kirchhoff vertex centrality for all the $n$ vertices in nearly linear time in $m$.  [66] arXiv:1708.05965 [pdf, other]

Title: On the topology effects in wireless sensor networks based prognostics and health managementComments: 19th IEEE International Conference on Computational Science and EngineeringSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computers and Society (cs.CY)
In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from the network. This will lead to broken links and data loss. It is therefore important to keep the network running for as long as possible by preserving the energy held by the nodes. Indeed, saving the quality of service (QoS) of a wireless sensor network for a long period is very important in order to ensure accurate data. Then, the area diagnosing will be more accurate. From another side, packet transmission is the phase that consumes the highest amount of energy comparing to other activities in the network. Therefore, we can see that the network topology has an important impact on energy efficiency, and thus on data and diagnosis accuracies. In this paper, we study and compare four network topologies: distributed, hierarchical, centralized, and decentralized topology and show their impact on the resulting estimation of diagnostics. We have used six diagnostic algorithms, to evaluate both prognostic and health management with the variation of type of topology in WSN.
 [67] arXiv:1708.05966 [pdf, other]

Title: Incremental Import Vector Machines for Classifying Hyperspectral DataJournalref: IEEE Transactions on Geoscience and Remote Sensing, Vol.50, No.09, September 2012, 34633473Subjects: Computer Vision and Pattern Recognition (cs.CV)
In this paper we propose an incremental learning strategy for import vector machines (IVM), which is a sparse kernel logistic regression approach. We use the procedure for the concept of selftraining for sequential classification of hyperspectral data. The strategy comprises the inclusion of new training samples to increase the classification accuracy and the deletion of noninformative samples to be memory and runtimeefficient. Moreover, we update the parameters in the incremental IVM model without retraining from scratch. Therefore, the incremental classifier is able to deal with large data sets. The performance of the IVM in comparison to support vector machines (SVM) is evaluated in terms of accuracy and experiments are conducted to assess the potential of the probabilistic outputs of the IVM. Experimental results demonstrate that the IVM and SVM perform similar in terms of classification accuracy. However, the number of import vectors is significantly lower when compared to the number of support vectors and thus, the computation time during classification can be decreased. Moreover, the probabilities provided by IVM are more reliable, when compared to the probabilistic information, derived from an SVM's output. In addition, the proposed selftraining strategy can increase the classification accuracy. Overall, the IVM and the its incremental version is worthwhile for the classification of hyperspectral data.
 [68] arXiv:1708.05969 [pdf, other]

Title: Applying Data Augmentation to Handwritten Arabic Numeral Recognition Using Deep Learning Neural NetworksComments: 5 pages, 6 figures, 3 tables, Accepted on 4th International Conference on Advances in Electrical Engineering (ICAEE)Subjects: Computer Vision and Pattern Recognition (cs.CV)
Handwritten character recognition has been the center of research and a benchmark problem in the sector of pattern recognition and artificial intelligence, and it continues to be a challenging research topic. Due to its enormous application many works have been done in this field focusing on different languages. Arabic, being a diversified language has a huge scope of research with potential challenges. A convolutional neural network model for recognizing handwritten numerals in Arabic language is proposed in this paper, where the dataset is subject to various augmentation in order to add robustness needed for deep learning approach. The proposed method is empowered by the presence of dropout regularization to do away with the problem of data overfitting. Moreover, suitable change is introduced in activation function to overcome the problem of vanishing gradient. With these modifications, the proposed system achieves an accuracy of 99.4\% which performs better than every previous work on the dataset.
 [69] arXiv:1708.05970 [pdf, other]

Title: An improved watermarking scheme for Internet applicationsComments: Proceedings of INTERNET'2010, 2nd Int. Conf. on Evolving Internet. Valencia (Spain), September 2025, 2010. pp. 119124Subjects: Multimedia (cs.MM); Cryptography and Security (cs.CR); Information Theory (cs.IT)
In this paper, a data hiding scheme ready for Internet applications is proposed. An existing scheme based on chaotic iterations is improved, to respond to some major Internet security concerns, such as digital rights management, communication over hidden channels, and social search engines. By using Reed Solomon error correcting codes and wavelets domain, we show that this data hiding scheme can be improved to solve issues and requirements raised by these Internet fields.
 [70] arXiv:1708.05974 [pdf, other]

Title: Shapeletbased Sparse Representation for Landcover Classification of Hyperspectral ImagesJournalref: IEEE Transactions on Geoscience and Remote Sensing, Volume: 54, Issue: 3, March 2016, 1623  1634Subjects: Computer Vision and Pattern Recognition (cs.CV)
This paper presents a sparse representationbased classification approach with a novel dictionary construction procedure. By using the constructed dictionary sophisticated prior knowledge about the spatial nature of the image can be integrated. The approach is based on the assumption that each image patch can be factorized into characteristic spatial patterns, also called shapelets, and patchspecific spectral information. A set of shapelets is learned in an unsupervised way and spectral information are embodied by training samples. A combination of shapelets and spectral information are represented in an undercomplete spatialspectral dictionary for each individual patch, where the elements of the dictionary are linearly combined to a sparse representation of the patch. The patchbased classification is obtained by means of the representation error. Experiments are conducted on three wellknown hyperspectral image datasets. They illustrate that our proposed approach shows superior results in comparison to sparse representationbased classifiers that use only limited spatial information and behaves competitively with or better than stateoftheart classifiers utilizing spatial information and kernelized sparse representationbased classifiers.
 [71] arXiv:1708.05978 [pdf, other]

Title: Stochastic PrimalDual Proximal ExtraGradient Descent for Compositely Regularized OptimizationSubjects: Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
We consider a wide range of regularized stochastic minimization problems with two regularization terms, one of which is composed with a linear function. This optimization model abstracts a number of important applications in artificial intelligence and machine learning, such as fused Lasso, fused logistic regression, and a class of graphguided regularized minimization. The computational challenges of this model are in two folds. On one hand, the closedform solution of the proximal mapping associated with the composed regularization term or the expected objective function is not available. On the other hand, the calculation of the full gradient of the expectation in the objective is very expensive when the number of input data samples is considerably large. To address these issues, we propose a stochastic variant of extragradient type methods, namely \textsf{Stochastic PrimalDual Proximal ExtraGradient descent (SPDPEG)}, and analyze its convergence property for both convex and strongly convex objectives. For general convex objectives, the uniformly average iterates generated by \textsf{SPDPEG} converge in expectation with $O(1/\sqrt{t})$ rate. While for strongly convex objectives, the uniformly and nonuniformly average iterates generated by \textsf{SPDPEG} converge with $O(\log(t)/t)$ and $O(1/t)$ rates, respectively. The order of the rate of the proposed algorithm is known to match the best convergence rate for firstorder stochastic algorithms. Experiments on fused logistic regression and graphguided regularized logistic regression problems show that the proposed algorithm performs very efficiently and consistently outperforms other competing algorithms.
 [72] arXiv:1708.05979 [pdf, other]

Title: An Efficient Single Chordbased Accumulation Technique (SCA) to Detect More Reliable CornersComments: 5 pages, 7 figures, 2 tables, Accepted on 4th International Conference on Advances in Electrical Engineering (ICAEE)Subjects: Computer Vision and Pattern Recognition (cs.CV)
Corner detection is a vital operation in numerous computer vision applications. The ChordtoPoint Distance Accumulation (CPDA) detector is recognized as the contourbased corner detector producing the lowest localization error while localizing corners in an image. However, in our experiment part, we demonstrate that CPDA detector often misses some potential corners. Moreover, the detection algorithm of CPDA is computationally costly. In this paper, We focus on reducing localization error as well as increasing average repeatability. The preprocessing and refinements steps of proposed process are similar to CPDA. Our experimental results will show the effectiveness and robustness of proposed process over CPDA.
 [73] arXiv:1708.05980 [pdf, other]

Title: Attentive Semantic Video Generation using CaptionsSubjects: Computer Vision and Pattern Recognition (cs.CV)
This paper proposes a network architecture to perform variable length semantic video generation using captions. We adopt a new perspective towards video generation where we allow the captions to be combined with the longterm and shortterm dependencies between video frames and thus generate a video in an incremental manner. Our experiments demonstrate our network architecture's ability to distinguish between objects, actions and interactions in a video and combine them to generate videos for unseen captions. The network also exhibits the capability to perform spatiotemporal style transfer when asked to generate videos for a sequence of captions. We also show that the network's ability to learn a latent representation allows it generate videos in an unsupervised manner and perform other tasks such as action recognition.
 [74] arXiv:1708.05987 [pdf, ps, other]

Title: Perceptual audio loss function for deep learningSubjects: Sound (cs.SD); Learning (cs.LG)
PESQ and POLQA , are standards are standards for automated assessment of voice quality of speech as experienced by human beings. The predictions of those objective measures should come as close as possible to subjective quality scores as obtained in subjective listening tests. Wavenet is a deep neural network originally developed as a deep generative model of raw audio waveforms. Wavenet architecture is based on dilated causal convolutions, which exhibit very large receptive fields. In this short paper we suggest using the Wavenet architecture, in particular its large receptive filed in order to learn PESQ algorithm. By doing so we can use it as a differentiable loss function for speech enhancement.
 [75] arXiv:1708.05992 [pdf, other]

Title: LSTM Network for Inflected Abbreviation ExpansionAuthors: Piotr ŻelaskoSubjects: Computation and Language (cs.CL)
In this paper, the problem of recovery of morphological information lost in abbreviated forms is addressed with a focus on highly inflected languages. Evidence is presented that the correct inflected form of an expanded abbreviation can in many cases be deduced solely from morphosyntactic tags of the context. The prediction model is a deep bidirectional LSTM network with tag embedding. The network is trained on over 10 million words from the Polish Sejm Corpus and achieves 74.2\% prediction accuracy on a smaller, but more general National Corpus of Polish. Analysis of errors suggests that performance in this task may improve if some prior knowledge about the abbreviated word is incorporated into the model.
 [76] arXiv:1708.05997 [pdf, ps, other]

Title: A Batch Noise Contrastive Estimation Approach for Training Large Vocabulary Language ModelsComments: Accepted for publication at INTERSPEECH'17. The paper is 5 pages long in a twocolumn formatSubjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI)
Training large vocabulary Neural Network Language Models (NNLMs) is a difficult task due to the explicit requirement of the output layer normalization, which typically involves the evaluation of the full softmax function over the complete vocabulary. This paper proposes a Batch Noise Contrastive Estimation (BNCE) approach to alleviate this problem. This is achieved by reducing the vocabulary, at each time step, to the target words in the batch and then replacing the softmax by the noise contrastive estimation approach, where these words play the role of targets and noise samples at the same time. In doing so, the proposed approach can be fully formulated and implemented using optimal dense matrix operations. Applying BNCE to train different NNLMs on the Large Text Compression Benchmark (LTCB) and the One Billion Word Benchmark (OBWB) shows a significant reduction of the training time with no noticeable degradation of the models performance. This paper also presents a new baseline comparative study of different standard NNLMs on the large OBWB on a single TitanX GPU.
 [77] arXiv:1708.05999 [pdf, other]

Title: Jointly Optimal Routing and Caching for Arbitrary Network TopologiesComments: This is the extended version of the paper "Jointly Optimal Routing and Caching for Arbitrary Network Topologies", appearing in the 4th ACM Conference on InformationCentric Networking (ICN 2017), Berlin, Sep. 2628, 2017Subjects: Networking and Internet Architecture (cs.NI)
We study a problem of fundamental importance to ICNs, namely, minimizing routing costs by jointly optimizing caching and routing decisions over an arbitrary network topology. We consider both source routing and hopbyhop routing settings. The respective offline problems are NPhard. Nevertheless, we show that there exist polynomial time approximation algorithms producing solutions within a constant approximation from the optimal. We also produce distributed, adaptive algorithms with the same approximation guarantees. We simulate our adaptive algorithms over a broad array of different topologies. Our algorithms reduce routing costs by several orders of magnitude compared to prior art, including algorithms optimizing caching under fixed routing.
 [78] arXiv:1708.06000 [pdf, other]

Title: Efficient Online Inference for Infinite Evolutionary Cluster models with Applications to Latent Social Event DiscoverySubjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Social and Information Networks (cs.SI)
The Recurrent Chinese Restaurant Process (RCRP) is a powerful statistical method for modeling evolving clusters in large scale social media data. With the RCRP, one can allow both the number of clusters and the cluster parameters in a model to change over time. However, application of the RCRP has largely been limited due to the nonconjugacy between the cluster evolutionary priors and the Multinomial likelihood. This nonconjugacy makes inference di cult and restricts the scalability of models which use the RCRP, leading to the RCRP being applied only in simple problems, such as those that can be approximated by a single Gaussian emission. In this paper, we provide a novel solution for the nonconjugacy issues for the RCRP and an example of how to leverage our solution for one speci c problem  the social event discovery problem. By utilizing Sequential Monte Carlo methods in inference, our approach can be massively paralleled and is highly scalable, to the extent it can work on tens of millions of documents. We are able to generate high quality topical and location distributions of the clusters that can be directly interpreted as real social events, and our experimental results suggest that the approaches proposed achieve much better predictive performance than techniques reported in prior work. We also demonstrate how the techniques we develop can be used in a much more general ways toward similar problems.
 [79] arXiv:1708.06004 [pdf, other]

Title: Boltzmann machines for timeseriesAuthors: Takayuki OsogamiComments: 32 pages. The topics covered in this paper are presented in Part III of IJCAI17 tutorial on energybased machine learning. this https URLSubjects: Neural and Evolutionary Computing (cs.NE)
We review Boltzmann machines extended for timeseries. These models often have recurrent structure, and back propagration through time (BPTT) is used to learn their parameters. The perstep computational complexity of BPTT in online learning, however, grows linearly with respect to the length of preceding timeseries (i.e., learning rule is not local in time), which limits the applicability of BPTT in online learning. We then review dynamic Boltzmann machines (DyBMs), whose learning rule is local in time. DyBM's learning rule relates to spiketiming dependent plasticity (STDP), which has been postulated and experimentally confirmed for biological neural networks.
 [80] arXiv:1708.06008 [pdf, other]

Title: Boltzmann machines and energybased modelsAuthors: Takayuki OsogamiComments: 36 pages. The topics covered in this paper are presented in Part I of IJCAI17 tutorial on energybased machine learning. this https URLSubjects: Neural and Evolutionary Computing (cs.NE)
We review Boltzmann machines and energybased models. A Boltzmann machine defines a probability distribution over binaryvalued patterns. One can learn parameters of a Boltzmann machine via gradient based approaches in a way that log likelihood of data is increased. The gradient and Laplacian of a Boltzmann machine admit beautiful mathematical representations, although computing them is in general intractable. This intractability motivates approximate methods, including Gibbs sampler and contrastive divergence, and tractable alternatives, namely energybased models.
 [81] arXiv:1708.06010 [pdf, ps, other]

Title: The Universal ProcessAuthors: Yuxi FuSubjects: Logic in Computer Science (cs.LO)
A universal process of a process calculus is one that, given the G\"{o}del index of a process of a certain type, produces a process equivalent to the encoded process. This paper demonstrates how universal processes can be formally defined and how a universal process of the valuepassing calculus can be constructed. The existence of such a universal process in a process model can be explored to implement higher order communications, security protocols, and programming languages in the process model. A process version of the Smn theorem is stated to showcase how to embed the recursion theory in a process calculus.
 [82] arXiv:1708.06011 [pdf, ps, other]

Title: Modelling Word Burstiness in Natural Language: A Generalised Polya Process for Document Language Models in Information RetrievalAuthors: Ronan CumminsComments: 12 pagesSubjects: Information Retrieval (cs.IR)
We introduce a generalised multivariate Polya process for document language modelling. The framework outlined here generalises a number of statistical language models used in information retrieval for modelling document generation. In particular, we show that the choice of replacement matrix M ultimately defines the type of random process and therefore defines a particular type of document language model. We show that a particular variant of the general model is useful for modelling termspecific burstiness. Furthermore, via experimentation we show that this variant significantly improves retrieval effectiveness over a strong baseline on a number of small test collections.
 [83] arXiv:1708.06012 [pdf, ps, other]

Title: Product Matrix Minimum Storage Regenerating Codes with Flexible Number of HelpersComments: IEEE Information Theory Workshop (ITW) 2017Subjects: Information Theory (cs.IT)
In coding for distributed storage systems, efficient data reconstruction and repair through accessing a predefined number of arbitrarily chosen storage nodes is guaranteed by regenerating codes. Traditionally, code parameters, specially the number of helper nodes participating in a repair process, are predetermined. However, depending on the state of the system and network traffic, it is desirable to adapt such parameters accordingly in order to minimize the cost of repair. In this work a class of regenerating codes with minimum storage is introduced that can simultaneously operate at the optimal repair bandwidth, for a wide range of exact repair mechanisms, based on different number of helper nodes.
 [84] arXiv:1708.06013 [pdf, other]

Title: Robust and Scalable Power System State Estimation via Composite OptimizationComments: 9 pages, 3 figuresSubjects: Systems and Control (cs.SY)
In today's cyberenabled smart grids, high penetration of uncertain renewables, purposeful manipulation of meter readings, and the need for widearea situational awareness, call for fast, accurate, and robust power system state estimation. The leastabsolutevalue (LAV) estimator is known for its robustness relative to the weighted leastsquares (WLS) one. However, due to nonconvexity and nonsmoothness, existing LAV solvers based on linear programming are typically slow, hence inadequate for realtime system monitoring. This paper develops two novel algorithms for efficient LAV estimation, which draw from recent advances in composite optimization. The first is a deterministic linear proximal scheme that handles a sequence of convex quadratic problems, each efficiently solvable either via offtheshelf algorithms or through the alternating direction method of multipliers. Leveraging the sparse connectivity inherent to power networks, the second scheme is stochastic, and updates only \emph{a few} entries of the complex voltage state vector per iteration. In particular, when voltage magnitude and (re)active power flow measurements are used only, this number reduces to one or two, \emph{regardless of} the number of buses in the network. This computational complexity evidently scales well to largesize power systems. Furthermore, by carefully \emph{minibatching} the voltage and power flow measurements, accelerated implementation of the stochastic iterations becomes possible. The developed algorithms are numerically evaluated using a variety of benchmark power networks. Simulated tests corroborate that improved robustness can be attained at comparable or markedly reduced computation times for medium or largesize networks relative to the "workhorse" WLSbased GaussNewton iterations.
 [85] arXiv:1708.06019 [pdf, other]

Title: A Capacity Scaling Law for Artificial Neural NetworksComments: 13 pages, 4 figures, 2 listings of source codeSubjects: Neural and Evolutionary Computing (cs.NE); Learning (cs.LG)
In this article, we derive the calculation of two critical numbers that quantify the capabilities of artificial neural networks with gating functions, such as sign, sigmoid, or rectified linear units. First, we derive the calculation of the VapnikChervonenkis dimension of a network with binary output layer, which is the theoretical limit for perfect fitting of the training data. Second, we derive what we call the MacKay dimension of the network. This is a theoretical limit indicating necessary catastrophic forgetting i.e., the upper limit for most uses of the network. Our derivation of the capacity is embedded into a Shannon communication model, which allows measuring the capacities of neural networks in bits. We then compare our theoretical derivations with experiments using different network configurations, diverse neural network implementations, varying activation functions, and several learning algorithms to confirm our upper bound. The result is that the capacity of a fully connected perceptron network scales strictly linear with the number of weights.
 [86] arXiv:1708.06020 [pdf, ps, other]

Title: Improving Deep Learning using Generic Data AugmentationSubjects: Learning (cs.LG); Machine Learning (stat.ML)
Deep artificial neural networks require a large corpus of training data in order to effectively learn, where collection of such training data is often expensive and laborious. Data augmentation overcomes this issue by artificially inflating the training set with label preserving transformations. Recently there has been extensive use of generic data augmentation to improve Convolutional Neural Network (CNN) task performance. This study benchmarks various popular data augmentation schemes to allow researchers to make informed decisions as to which training methods are most appropriate for their data sets. Various geometric and photometric schemes are evaluated on a coarsegrained data set using a relatively simple CNN. Experimental results, run using 4fold crossvalidation and reported in terms of Top1 and Top5 accuracy, indicate that cropping in geometric augmentation significantly increases CNN task performance.
 [87] arXiv:1708.06022 [pdf, other]

Title: Learning to Paraphrase for Question AnsweringComments: EMNLP 2017Subjects: Computation and Language (cs.CL)
Question answering (QA) systems are sensitive to the many different ways natural language expresses the same information need. In this paper we turn to paraphrases as a means of capturing this knowledge and present a general framework which learns felicitous paraphrases for various QA tasks. Our method is trained endtoend using questionanswer pairs as a supervision signal. A question and its paraphrases serve as input to a neural scoring model which assigns higher weights to linguistic expressions most likely to yield correct answers. We evaluate our approach on QA over Freebase and answer sentence selection. Experimental results on three datasets show that our framework consistently improves performance, achieving competitive results despite the use of simple QA models.
 [88] arXiv:1708.06023 [pdf, other]

Title: Joint Multiview Face Alignment in the WildComments: submit to IEEE Transactions on Image ProcessingSubjects: Computer Vision and Pattern Recognition (cs.CV)
The de facto algorithm for facial landmark estimation involves running a face detector with a subsequent deformable model fitting on the bounding box. This encompasses two basic problems: i) the detection and deformable fitting steps are performed independently, while the detector might not provide bestsuited initialisation for the fitting step, ii) the face appearance varies hugely across different poses, which makes the deformable face fitting very challenging and thus distinct models have to be used (\eg, one for profile and one for frontal faces). In this work, we propose the first, to the best of our knowledge, joint multiview convolutional network to handle large pose variations across faces inthewild, and elegantly bridge face detection and facial landmark localisation tasks. Existing joint face detection and landmark localisation methods focus only on a very small set of landmarks. By contrast, our method can detect and align a large number of landmarks for semifrontal (68 landmarks) and profile (39 landmarks) faces. We evaluate our model on a plethora of datasets including standard static image datasets such as IBUG, 300W, COFW, and the latest Menpo Benchmark for both semifrontal and profile faces. Significant improvement over stateoftheart methods on deformable face tracking is witnessed on 300VW benchmark. We also demonstrate stateoftheart results for face detection on FDDB and MALF datasets.
 [89] arXiv:1708.06025 [pdf, ps, other]

Title: Portuguese Word Embeddings: Evaluating on Word Analogies and Natural Language TasksAuthors: Nathan Hartmann, Erick Fonseca, Christopher Shulby, Marcos Treviso, Jessica Rodrigues, Sandra AluisioComments: 7 pages, STIL 2017 Full paperSubjects: Computation and Language (cs.CL)
Word embeddings have been found to provide meaningful representations for words in an efficient way; therefore, they have become common in Natural Language Processing sys tems. In this paper, we evaluated different word embedding models trained on a large Portuguese corpus, including both Brazilian and European variants. We trained 31 word embedding models using FastText, GloVe, Wang2Vec and Word2Vec. We evaluated them intrinsically on syntactic and semantic analogies and extrinsically on POS tagging and sentence semantic similarity tasks. The obtained results suggest that word analogies are not appropriate for word embedding evaluation; taskspecific evaluations appear to be a better option.
 [90] arXiv:1708.06026 [pdf]

Title: DeepBreath: Deep Learning of Breathing Patterns for Automatic Stress Recognition using LowCost Thermal Imaging in Unconstrained SettingsComments: Submitted to "2017 7th International Conference on Affective Computing and Intelligent Interaction (ACII)"  ACII 2017Subjects: HumanComputer Interaction (cs.HC); Computer Vision and Pattern Recognition (cs.CV); Medical Physics (physics.medph)
We propose DeepBreath, a deep learning model which automatically recognises people's psychological stress level (mental overload) from their breathing patterns. Using a low cost thermal camera, we track a person's breathing patterns as temperature changes around his/her nostril. The paper's technical contribution is threefold. First of all, instead of creating handcrafted features to capture aspects of the breathing patterns, we transform the unidimensional breathing signals into two dimensional respiration variability spectrogram (RVS) sequences. The spectrograms easily capture the complexity of the breathing dynamics. Second, a spatial pattern analysis based on a deep Convolutional Neural Network (CNN) is directly applied to the spectrogram sequences without the need of handcrafting features. Finally, a data augmentation technique, inspired from solutions for overfitting problems in deep learning, is applied to allow the CNN to learn with a smallscale dataset from shortterm measurements (e.g., up to a few hours). The model is trained and tested with data collected from people exposed to two types of cognitive tasks (Stroop Colour Word Test, Mental Computation test) with sessions of different difficulty levels. Using normalised selfreport as ground truth, the CNN reaches 84.59% accuracy in discriminating between two levels of stress and 56.52% in discriminating between three levels. In addition, the CNN outperformed powerful shallow learning methods based on a single layer neural network. Finally, the dataset of labelled thermal images will be open to the community.
 [91] arXiv:1708.06027 [pdf, other]

Title: An evaluation of intrusive instrumental intelligibility metricsComments: Currently under peerreviewSubjects: Sound (cs.SD)
Instrumental intelligibility metrics are commonly used as an alternative to intelligibility listening tests. This paper evaluates 12 existing monaural intrusive instrumental intelligibility metrics: SII, HEGP, CSII, HASPI, NCM, QSTI, STOI, ESTOI, MIKNN, SIMI, SIIB, and $\mathrm{sEPSM^{corr}}$. The intelligibility data used in the evaluation were obtained from ten listening tests described in the literature. The stimuli included speech that was distorted by additive noise, reverberation, competing talkers, preprocessing enhancement, and postprocessing enhancement. STOI, which is arguably the most popular intelligibility metric, achieved a correlation with listening test scores on average of $\rho=0.80$, and its successor, ESTOI, achieved $\rho=0.86$. The metrics with the highest overall performance were SIIB ($\rho=0.92$) and HASPI ($\rho=0.89$). The results show that many intelligibility metrics perform poorly on data sets that were not used during their development, thus caution should be taken when using intelligibility metrics to replace listening tests, especially in situations where the accuracy of the metric has not been verified.
 [92] arXiv:1708.06034 [pdf, other]

Title: Perceptual Studies for Foveated Light Field DisplaysSubjects: Graphics (cs.GR)
The human visual system can resolve higher spatial frequencies in the fovea than in the periphery. This property has been harnessed by recent 2D foveated rendering methods to reduce computation cost while maintaining perceptual quality. Inspired by this, we have conducted psychophysical experiments to study foveation of human visual systems for 4D light fields and evaluate our prototype system described in [Sun et al. 2017].
We measure, for the first time, the blur detection/discrimination and light field depth perception thresholds in up to 15 degree of visual eccentricity, and reject the idea of replacing the peripheral rendering with 2D billboards  4D light fields are still required. The psychophysical data can also guide other foveated rendering approaches.  [93] arXiv:1708.06039 [pdf, other]

Title: More cat than cute? Interpretable Prediction of AdjectiveNoun PairsAuthors: Delia Fernandez, Alejandro Woodward, Victor Campos, Xavier GiroiNieto, Brendan Jou, ShihFu ChangComments: Oral paper at ACM Multimedia 2017 Workshop on Multimodal Understanding of Social, Affective and Subjective Attributes (MUSA2)Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Multimedia (cs.MM)
The increasing availability of affectrich multimedia resources has bolstered interest in understanding sentiment and emotions in and from visual content. Adjectivenoun pairs (ANP) are a popular midlevel semantic construct for capturing affect via visually detectable concepts such as "cute dog" or "beautiful landscape". Current stateoftheart methods approach ANP prediction by considering each of these compound concepts as individual tokens, ignoring the underlying relationships in ANPs. This work aims at disentangling the contributions of the `adjectives' and `nouns' in the visual prediction of ANPs. Two specialised classifiers, one trained for detecting adjectives and another for nouns, are fused to predict 553 different ANPs. The resulting ANP prediction model is more interpretable as it allows us to study contributions of the adjective and noun components. Source code and models are available at https://imatgeupc.github.io/affective2017musa2/ .
 [94] arXiv:1708.06040 [pdf, other]

Title: Neural Block SamplingComments: 10 pagesSubjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)
Efficient Monte Carlo inference often requires manual construction of modelspecific proposals. We propose an approach to automated proposal construction by training neural networks to provide fast approximations to block Gibbs conditionals. The learned proposals generalize to occurrences of common structural motifs both within a given model and across models, allowing for the construction of a library of learned inference primitives that can accelerate inference on unseen models with no modelspecific training required. We explore several applications including openuniverse Gaussian mixture models, in which our learned proposals outperform a handtuned sampler, and a realworld named entity recognition task, in which our sampler's ability to escape local modes yields higher final F1 scores than singlesite Gibbs.
 [95] arXiv:1708.06042 [pdf, other]

Title: Multiversion Coding for Consistent Distributed Storage of Correlated Data UpdatesSubjects: Information Theory (cs.IT)
Motivated by applications of distributed storage systems to cloudbased keyvalue stores, the multiversion coding problem has been recently formulated to store frequently updated data in asynchronous distributed storage systems. Inspired by consistency requirements in distributed computing, the main goal in multiversion coding is to ensure that the latest possible version of the data is decodable, even if all the data updates have not reached all the servers in the system. In this paper, we study the storage cost of ensuring consistency for the case where the various versions of the data are correlated, in contrast to previous work where versions were treated as being independent. We provide multiversion code constructions that show that the storage cost can be significantly smaller than the previous constructions depending on the degree of correlation between the different versions of the data. Our constructions are based on updateefficient codes, ReedSolomon code, random binning coding and BCH codes.
Specifically, we consider the multiversion coding setting with $n$ servers and $\nu$ versions, with a failure tolerance of $nc$, where the $\nu$ message versions form a Markov chain. The message version is distributed uniformly over all binary vectors of length $K$, and given a version, the subsequent version is uniformly distributed in a Hamming ball of radius $\delta_K K$ centered around that given version. Previously derived achievable schemes have a perserver storage cost of at least $ \frac{1}{2}\frac{\nu K}{c}o(K)$ when $\nu \leq c$, whereas we propose a scheme that has a storage cost of $\frac{K}{c} + \frac{\nu1}{c}\log Vol(\delta_KK, K)$, where $Vol(r, K)$ is the volume of a ball of radius $r$ in the $K$ dimensional Hamming cube. Through a converse result, we show that our multiversion code constructions are nearlyoptimal in certain correlation regimes.  [96] arXiv:1708.06046 [pdf, other]

Title: nutsflow/ml: data preprocessing for deep learningSubjects: Learning (cs.LG); Software Engineering (cs.SE)
Data preprocessing is a fundamental part of any machine learning application and frequently the most timeconsuming aspect when developing a machine learning solution. Preprocessing for deep learning is characterized by pipelines that lazily load data and perform data transformation, augmentation, batching and logging. Many of these functions are common across applications but require different arrangements for training, testing or inference. Here we introduce a novel software framework named nutsflow/ml that encapsulates common preprocessing operations as components, which can be flexibly arranged to rapidly construct efficient preprocessing pipelines for deep learning.
 [97] arXiv:1708.06048 [pdf]

Title: Efficient algorithms for scheduling equallength jobs with processing set restrictions on uniform parallel batch machinesAuthors: Shuguang LiSubjects: Data Structures and Algorithms (cs.DS)
We consider the problem of scheduling jobs with equal lengths on uniform parallel batch machines with nonidentical capacities where each job can only be processed on a specified subset of machines called its processing set. For the case of equal release times, we give efficient exact algorithms for various objective functions. For the case of unequal release times, we give efficient exact algorithms for minimizing makespan.
 [98] arXiv:1708.06056 [pdf, other]

Title: Integrating asymptoticallyoptimal path planning with local optimizationSubjects: Robotics (cs.RO)
Many robots operating in unpredictable environments require an online path planning algorithm that can quickly compute high quality paths. Asymptotically optimal planners are capable of finding the optimal path, but can be slow to converge. Local optimisation algorithms are capable of quickly improving a solution, but are not guaranteed to converge to the optimal solution. In this paper we develop a new way to integrate an asymptotically optimal planners with a local optimiser. We test our approach using RRTConnect* with a shortcutting local optimiser. Our approach results in a significant performance improvement when compared with the stateoftheart RRTConnect* asymptotically optimal planner and computes paths that are 31\% faster to execute when both are given 3 seconds of planning time.
 [99] arXiv:1708.06062 [pdf, other]

Title: Balanced partitions of 3colored geometric sets in the planeAuthors: Sergey Bereg, Matias Korman, Rodrigo I. Silveira, Ferran Hurtado, Dolores Lara, Jorge Urrutia, Mikio Kano, Carlos Seara, Kevin VerbeekComments: This paper was published in Discrete Applied Mathematics, 181:2132, 2015Subjects: Computational Geometry (cs.CG)
Let $S$ be a finite set of geometric objects partitioned into classes or \emph{colors}. A subset $S'\subseteq S$ is said to be \emph{balanced} if $S'$ contains the same amount of elements of $S$ from each of the colors. We study several problems on partitioning $3$colored sets of points and lines in the plane into two balanced subsets: (a) We prove that for every 3colored arrangement of lines there exists a segment that intersects exactly one line of each color, and that when there are $2m$ lines of each color, there is a segment intercepting $m$ lines of each color. (b) Given $n$ red points, $n$ blue points and $n$ green points on any closed Jordan curve $\gamma$, we show that for every integer $k$ with $0 \leq k \leq n$ there is a pair of disjoint intervals on $\gamma$ whose union contains exactly $k$ points of each color. (c) Given a set $S$ of $n$ red points, $n$ blue points and $n$ green points in the integer lattice satisfying certain constraints, there exist two rays with common apex, one vertical and one horizontal, whose union splits the plane into two regions, each one containing a balanced subset of $S$.
 [100] arXiv:1708.06063 [pdf, other]

Title: Helly Numbers of PolyominoesComments: This paper was published in Graphs and Combinatorics, September 2013, Volume 29, Issue 5, pp 12211234Subjects: Computational Geometry (cs.CG)
We define the Helly number of a polyomino $P$ as the smallest number $h$ such that the $h$Helly property holds for the family of symmetric and translated copies of $P$ on the integer grid. We prove the following: (i) the only polyominoes with Helly number 2 are the rectangles, (ii) there does not exist any polyomino with Helly number 3, (iii) there exist polyominoes of Helly number $k$ for any $k\neq 1,3$.
 [101] arXiv:1708.06064 [pdf, other]

Title: Geodesic Order TypesComments: This paper was published in Algorithmica, September 2014, Volume 70, Issue 1, pp 112128Subjects: Computational Geometry (cs.CG)
The geodesic between two points $a$ and $b$ in the interior of a simple polygon~$P$ is the shortest polygonal path inside $P$ that connects $a$ to $b$. It is thus the natural generalization of straight line segments on unconstrained point sets to polygonal environments. In this paper we use this extension to generalize the concept of the order type of a set of points in the Euclidean plane to geodesic order types. In particular, we show that, for any set $S$ of points and an ordered subset $\mathcal{B} \subseteq S$ of at least four points, one can always construct a polygon $P$ such that the points of $\mathcal{B}$ define the geodesic hull of~$S$ w.r.t.~$P$, in the specified order. Moreover, we show that an abstract order type derived from the dual of the Pappus arrangement can be realized as a geodesic order type.
 [102] arXiv:1708.06067 [pdf, other]

Title: Finding shorter paths for robot arms using their redundancySubjects: Robotics (cs.RO)
Many robot arms can accomplish one task using many different joint configurations. Often only one of these configurations is used as a goal by the path planner. Ideally the robot's path planner would be able to use the extra configurations to find higher quality paths. In this paper we use the extra goal configurations to find significantly shorter paths that are faster to execute compared to a planner that chooses one goal configuration arbitrarily. In a grape vine pruning robot arm experiment our proposed approach reduced execution times by 58%.
 [103] arXiv:1708.06068 [pdf, other]

Title: Vector Space Model as Cognitive Space for Text ClassificationComments: 6 pages, 6 figures, 3 tablesSubjects: Computation and Language (cs.CL)
In this era of digitization, knowing the user's sociolect aspects have become essential features to build the user specific recommendation systems. These sociolect aspects could be found by mining the user's language sharing in the form of text in social media and reviews. This paper describes about the experiment that was performed in PAN Author Profiling 2017 shared task. The objective of the task is to find the sociolect aspects of the users from their tweets. The sociolect aspects considered in this experiment are user's gender and native language information. Here user's tweets written in a different language from their native language are represented as Document  Term Matrix with document frequency as the constraint. Further classification is done using the Support Vector Machine by taking gender and native language as target classes. This experiment attains the average accuracy of 73.42% in gender prediction and 76.26% in the native language identification task.
 [104] arXiv:1708.06073 [pdf, other]

Title: The Microsoft 2017 Conversational Speech Recognition SystemSubjects: Computation and Language (cs.CL)
We describe the 2017 version of Microsoft's conversational speech recognition system, in which we update our 2016 system with recent developments in neuralnetworkbased acoustic and language modeling to further advance the state of the art on the Switchboard speech recognition task. The system adds a CNNBLSTM acoustic model to the set of model architectures we combined previously, and includes characterbased and dialog session aware LSTM language models in rescoring. For system combination we adopt a twostage approach, whereby subsets of acoustic models are first combined at the senone/frame level, followed by a wordlevel voting via confusion networks. We also added a confusion network rescoring step after system combination. The resulting system yields a 5.1\% word error rate on the 2000 Switchboard evaluation set.
 [105] arXiv:1708.06075 [pdf, other]

Title: Scientific Information Extraction with Semisupervised Neural TaggingComments: accepted by EMNLP 2017Subjects: Computation and Language (cs.CL)
This paper addresses the problem of extracting keyphrases from scientific articles and categorizing them as corresponding to a task, process, or material. We cast the problem as sequence tagging and introduce semisupervised methods to a neural tagging model, which builds on recent advances in named entity recognition. Since annotated training data is scarce in this domain, we introduce a graphbased semisupervised algorithm together with a data selection scheme to leverage unannotated articles. Both inductive and transductive semisupervised learning strategies outperform stateoftheart information extraction performance on the 2017 SemEval Task 10 ScienceIE task.
 [106] arXiv:1708.06081 [pdf, ps, other]

Title: Block Markov Superposition Transmission of BCH Codes with Iterative ErasuresandErrors DecodersComments: submitted to IEEE Transactions on CommunicationsSubjects: Information Theory (cs.IT)
In this paper, we present the block Markov superposition transmission of BCH (BMSTBCH) codes, which can be constructed to obtain a very low error floor. To reduce the implementation complexity, we design a low complexity iterative slidingwindow decoding algorithm, in which only binary and/or erasure messages are processed and exchanged between processing units. The error floor can be predicted by a genieaided lower bound, while the waterfall performance can be analyzed by the density evolution method. To evaluate the error floor of the constructed BMSTBCH codes at a very low bit error rate (BER) region, we propose a fast simulation approach. Numerical results show that, at a target BER of $10^{15}$, the harddecision decoding of the BMSTBCH codes with overhead $25\%$ can achieve a net coding gain (NCG) of $10.55$ dB. Furthermore, the softdecision decoding can yield an NCG of $10.74$ dB. The construction of BMSTBCH codes is flexible to trade off latency against performance at all overheads of interest and may find applications in optical transport networks as an attractive~candidate.
 [107] arXiv:1708.06118 [pdf, other]

Title: Distantly Supervised Road SegmentationComments: Accepted for ICCV workshop CVRSUAD2017Subjects: Computer Vision and Pattern Recognition (cs.CV)
We present an approach for road segmentation that only requires imagelevel annotations at training time. We leverage distant supervision, which allows us to train our model using images that are different from the target domain. Using large publicly available image databases as distant supervisors, we develop a simple method to automatically generate weak pixelwise road masks. These are used to iteratively train a fully convolutional neural network, which produces our final segmentation model. We evaluate our method on the Cityscapes dataset, where we compare it with a fully supervised approach. Further, we discuss the tradeoff between annotation cost and performance. Overall, our distantly supervised approach achieves 93.8% of the performance of the fully supervised approach, while using orders of magnitude less annotation work.
 [108] arXiv:1708.06121 [pdf, ps, other]

Title: The satisfiability problem for Boolean set theory with a choice correspondence(Extended version)Subjects: Logic in Computer Science (cs.LO)
Given a set $U$ of alternatives, a choice (correspondence) on $U$ is a contractive map $c$ defined on a family $\Omega$ of nonempty subsets of $U$. Semantically, a choice $c$ associates to each menu $A \in \Omega$ a nonempty subset $c(A) \subseteq A$ comprising all elements of $A$ that are deemed selectable by an agent. A choice on $U$ is total if its domain is the powerset of $U$ minus the empty set, and partial otherwise. According to the theory of revealed preferences, a choice is rationalizable if it can be retrieved from a binary relation on $U$ by taking all maximal elements of each menu. It is wellknown that rationalizable choices are characterized by the satisfaction of suitable axioms of consistency, which codify logical rules of selection within menus. For instance, WARP (Weak Axiom of Revealed Preference) characterizes choices rationalizable by a transitive relation. Here we study the satisfiability problem for unquantified formulae of an elementary fragment of set theory involving a choice function symbol $\mathtt{c}$, the Boolean set operators and the singleton, the equality and inclusion predicates, and the propositional connectives. In particular, we consider the cases in which the interpretation of $\mathtt{c}$ satisfies any combination of two specific axioms of consistency, whose conjunction is equivalent to WARP. In two cases we prove that the related satisfiability problem is NPcomplete, whereas in the remaining cases we obtain NPcompleteness under the additional assumption that the number of choice terms is constant.
 [109] arXiv:1708.06126 [pdf, other]

Title: eCounterfeit: a mobileserver platform for document counterfeit detectionComments: 6 pages, 5 figuresSubjects: Computer Vision and Pattern Recognition (cs.CV)
This paper presents a novel application to detect counterfeit identity documents forged by a scanprinting operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as IDs or banknotes. The main contribution of this work is the endtoend mobileserver architecture, which provides a service for nonexpert users and therefore can be used in several scenarios. The system also provides a crowdsourcing mode so labeled images can be gathered, generating databases for incremental training of the algorithms.
 [110] arXiv:1708.06127 [pdf, other]

Title: Practical Minimum Cut AlgorithmsSubjects: Data Structures and Algorithms (cs.DS); Distributed, Parallel, and Cluster Computing (cs.DC)
The minimum cut problem for an undirected edgeweighted graph asks us to divide its set of nodes into two blocks while minimizing the weight sum of the cut edges. Here, we introduce a lineartime algorithm to compute nearminimum cuts. Our algorithm is based on cluster contraction using label propagation and Padberg and Rinaldi's contraction heuristics [SIAM Review, 1991]. We give both sequential and sharedmemory parallel implementations of our algorithm. Extensive experiments on both realworld and generated instances show that our algorithm finds the optimal cut on nearly all instances significantly faster than other stateoftheart algorithms while our error rate is lower than that of other heuristic algorithms. In addition, our parallel algorithm shows good scalability.
 [111] arXiv:1708.06128 [pdf, other]

Title: Revisiting knowledge transfer for training object class detectorsSubjects: Computer Vision and Pattern Recognition (cs.CV)
We propose to revisit knowledge transfer for training object detectors on target classes with only weakly supervised training images. We present a unified knowledge transfer framework based on training a single neural network multiclass object detector over all source classes, organized in a semantic hierarchy. This provides proposal scoring functions at multiple levels in the hierarchy, which we use to guide object localization in the target training set. Compared to works using a manually engineered classgeneric objectness measure as a vehicle for transfer, our learned toplevel scoring function for 'entity' is much stronger. Compared to works that perform classspecific transfer from a few most related source classes to the target class, our framework enables to explore a broad rage of generality of transfer. Experiments on 200 object classes in the ILSVRC 2013 dataset show that our technique (1) leads to much greater performance improvements than manually engineered objectness; (2) outperforms the best reported transfer learning results on this dataset by a wide margin (+40% correct localization on the target training set, and +14% mAP on the target test set).
 [112] arXiv:1708.06131 [pdf, other]

Title: Evasion Attacks against Machine Learning at Test TimeAuthors: Battista Biggio, Igino Corona, Davide Maiorca, Blaine Nelson, Nedim Srndic, Pavel Laskov, Giorgio Giacinto, Fabio RoliComments: In this paper, in 2013, we were the first to introduce the notion of evasion attacks (adversarial examples) created with high confidence (instead of minimumdistance misclassifications), and the notion of surrogate learners (substitute models). These two concepts are now widely reused in developing attacks against deep networks (even if not always referring to the ideas reported in this work). arXiv admin note: text overlap with arXiv:1401.7727Journalref: ECML PKDD, Part III, vol. 8190, LNCS, pp. 387402. Springer, 2013Subjects: Cryptography and Security (cs.CR); Learning (cs.LG)
In securitysensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, wellmotivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present a simple but effective gradientbased approach that can be exploited to systematically assess the security of several, widelyused classification algorithms against evasion attacks. Following a recently proposed framework for security evaluation, we simulate attack scenarios that exhibit different risk levels for the classifier by increasing the attacker's knowledge of the system and her ability to manipulate attack samples. This gives the classifier designer a better picture of the classifier performance under evasion attacks, and allows him to perform a more informed model selection (or parameter setting). We evaluate our approach on the relevant security task of malware detection in PDF files, and show that such systems can be easily evaded. We also sketch some countermeasures suggested by our analysis.
 [113] arXiv:1708.06145 [pdf, other]

Title: Knock Knock, Who's There? Membership Inference on Aggregate Location DataSubjects: Cryptography and Security (cs.CR)
Aggregate location data is often used to support smart services and applications, such as generating live traffic maps or predicting visits to businesses. In this paper, we present the first study on the feasibility of membership inference attacks on aggregate location timeseries. We introduce a gamebased definition of the adversarial task, and cast it as a classification problem where machine learning can be used to distinguish whether or not a target user is part of the aggregates. We empirically evaluate the power of these attacks on both raw and differentially private aggregates using two realworld mobility datasets. We find that membership inference is a serious privacy threat, and show how its effectiveness depends on the adversary's prior knowledge, the characteristics of the underlying location data, as well as the number of users and the timeframe on which aggregation is performed. Although differentially private defenses can indeed reduce the extent of the attacks, they also yield a significant loss in utility. Moreover, a strategic adversary mimicking the behavior of the defense mechanism can greatly limit the protection they provide. Overall, our work presents a novel methodology geared to evaluate membership inference on aggregate location data in realworld settings and can be used by providers to assess the quality of privacy protection before data release or by regulators to detect violations.
 [114] arXiv:1708.06151 [pdf, other]

Title: Scalable Kernelization for Maximum Independent SetsSubjects: Data Structures and Algorithms (cs.DS); Distributed, Parallel, and Cluster Computing (cs.DC)
The most efficient algorithms for finding maximum independent sets in both theory and practice use reduction rules to obtain a much smaller problem instance called a kernel. The kernel can then be solved quickly using exact or heuristic algorithms  or by repeatedly kernelizing recursively in the branchandreduce paradigm. It is of critical importance for these algorithms that kernelization is fast and returns a small kernel. Current algorithms are either slow but produce a small kernel, or fast and give a large kernel. We attempt to accomplish both of these goals simultaneously, by giving an efficient parallel kernelization algorithm based on graph partitioning and parallel bipartite maximum matching. We combine our parallelization techniques with two techniques to accelerate kernelization further: dependency checking that prunes reductions that cannot be applied, and reduction tracking that allows us to stop kernelization when reductions become less fruitful. Our algorithm produces kernels that are orders of magnitude smaller than the fastest kernelization methods, while having a similar execution time. Furthermore, our algorithm is able to compute kernels with size comparable to the smallest known kernels, but up to two orders of magnitude faster than previously possible. Finally, we show that our kernelization algorithm can be used to accelerate existing stateoftheart heuristic algorithms, allowing us to find larger independent sets faster on large realworld networks and synthetic instances.
 [115] arXiv:1708.06173 [pdf, ps, other]

Title: To Infinity and BeyondAuthors: Ines Klimann (IRIF)Subjects: Formal Languages and Automata Theory (cs.FL); Group Theory (math.GR)
We prove that if a group generated by a bireversible Mealy automaton contains an element of infinite order, its growth blows up and is necessarily exponential. As a direct consequence, Z cannot be generated by a bireversible Mealy automaton.
 [116] arXiv:1708.06183 [pdf, other]

Title: Optimally Gathering Two RobotsSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computational Complexity (cs.CC); Data Structures and Algorithms (cs.DS); Performance (cs.PF); Robotics (cs.RO)
We present an algorithm that ensures in finite time the gathering of two robots in the nonrigid ASYNC model. To circumvent established impossibility results, we assume robots are equipped with 2colors lights and are able to measure distances between one another. Aside from its light, a robot has no memory of its past actions, and its protocol is deterministic. Since, in the same model, gathering is impossible when lights have a single color, our solution is optimal with respect to the number of used colors.
 [117] arXiv:1708.06185 [pdf, other]

Title: Seernet at EmoInt2017: Tweet Emotion Intensity EstimatorComments: In Proceedings of the EMNLP 2017 Workshop on Computational Approaches to Subjectivity, Sentiment, and Social Media (WASSA), September 2017, Copenhagen, DenmarkSubjects: Computation and Language (cs.CL)
The paper describes experiments on estimating emotion intensity in tweets using a generalized regressor system. The system combines lexical, syntactic and pretrained word embedding features, trains them on general regressors and finally combines the best performing models to create an ensemble. The proposed system stood 3rd out of 22 systems in the leaderboard of WASSA2017 Shared Task on Emotion Intensity.
 [118] arXiv:1708.06196 [pdf, other]

Title: 3D Visibility Representations of 1planar GraphsComments: Appears in the Proceedings of the 25th International Symposium on Graph Drawing and Network Visualization (GD 2017)Subjects: Computational Geometry (cs.CG)
We prove that every 1planar graph G has a zparallel visibility representation, i.e., a 3D visibility representation in which the vertices are isothetic disjoint rectangles parallel to the xyplane, and the edges are unobstructed zparallel visibilities between pairs of rectangles. In addition, the constructed representation is such that there is a plane that intersects all the rectangles, and this intersection defines a bar 1visibility representation of G.
 [119] arXiv:1708.06197 [pdf, other]

Title: Segmentation of retinal cysts from Optical Coherence Tomography volumes via selective enhancementSubjects: Computer Vision and Pattern Recognition (cs.CV)
Automated and accurate segmentation of cystoid structures in Optical Coherence Tomography (OCT) is of interest in the early detection of retinal diseases. It is, however, a challenging task. We propose a novel method for localizing cysts in 3D OCT volumes. The proposed work is biologically inspired and based on selective enhancement of the cysts, by inducing motion to a given OCT slice. A Convolutional Neural Network (CNN) is designed to learn a mapping function that combines the result of multiple such motions to produce a probability map for cyst locations in a given slice. The final segmentation of cysts is obtained via simple clustering of the detected cyst locations. The proposed method is evaluated on two public datasets and one private dataset. The public datasets include the one released for the OPTIMA Cyst segmentation challenge (OCSC) in MICCAI 2015 and the DME dataset. After training on the OCSC train set, the method achieves a mean Dice Coefficient (DC) of 0.71 on the OCSC test set. The robustness of the algorithm was examined by crossvalidation on the DME and AEI (private) datasets and a mean DC values obtained were 0.69 and 0.79, respectively. Overall, the proposed system outperforms all benchmarks. These results underscore the strengths of the proposed method in handling variations in both data acquisition protocols and scanners.
 [120] arXiv:1708.06199 [pdf, ps, other]

Title: Algorithm Substitution Attacks from a Steganographic PerspectiveComments: CCS 2017, 12 pages, doublecolumnSubjects: Cryptography and Security (cs.CR)
The goal of an algorithm substitution attack (ASA), also called a subversion attack (SA), is to replace an honest implementation of a cryptographic tool by a subverted one which allows to leak private information while generating output indistinguishable from the honest output. Bellare, Paterson, and Rogaway provided at CRYPTO'14 a formal security model to capture this kind of attacks and constructed practically implementable ASAs against a large class of symmetric encryption schemes. At CCS'15, Ateniese, Magri, and Venturi extended this model to allow the attackers to work in a fullyadaptive and continuous fashion and proposed subversion attacks against digital signature schemes. Both papers also showed the impossibility of ASAs in cases where the cryptographic tools are deterministic. Also at CCS'15, Bellare, Jaeger, and Kane strengthened the original model and proposed a universal ASA against sufficiently random encryption schemes. In this paper we analyze ASAs from the perspective of steganography  the well known concept of hiding the presence of secret messages in legal communications. While a close connection between ASAs and steganography is known, this lacks a rigorous treatment. We consider the common computational model for secretkey steganography and prove that successful ASAs correspond to secure stegosystems on certain channels and vice versa. This formal proof allows us to conclude that ASAs are stegosystems and to "rediscover" several results concerning ASAs known in the steganographic literature.
 [121] arXiv:1708.06207 [pdf]

Title: Givers & Receivers perceive handover tasks differently: Implications for HumanRobot collaborative system designComments: 16 pages, 8 figures, Keywords  Joint action, HumanRobot Collaboration, HumanRobot Handover, Designing Cobots, HumanFactors in Repetitive Task, Warehouse robots, SupermarketSubjects: HumanComputer Interaction (cs.HC); Computers and Society (cs.CY); Robotics (cs.RO); Systems and Control (cs.SY)
Humanhuman jointaction in shortcycle repetitive handover tasks was investigated for a bottle handover task using a threefold approach: workmethods field studies in multiple supermarkets, simulation analysis using an ergonomics software package and by conducting an inhouse lab experiment on humanhuman collaboration by recreating the environment and conditions of a supermarket. Evaluation included both objective and subjective measures. Subjective evaluation was done taking a psychological perspective and showcases among other things, the differences in the way a common jointaction is being perceived by individual team partners depending upon their role (giver or receiver). The proposed approach can provide a systematic method to analyze similar tasks. Combining the results of all the three analyses, this research gives insight into the science of jointaction for shortcycle repetitive tasks and its implications for humanrobot collaborative system design.
 [122] arXiv:1708.06209 [pdf]

Title: On the Nanocommunications at THz Band in GrapheneEnabled Wireless NetworkonChipComments: 13 pages, 8 figuresJournalref: Mathematical Problems in Engineering (Hindawi), Vol. 2017, Article ID 9768604, 13 pagesSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
One of the main challenges towards the growing computationintensive applications with scalable bandwidth requirement is the deployment of a dense number of onchip cores within a chip package. To this end, this paper investigates the Wireless Network onChip (WiNoC), which is enabled by graphenebased nanoantennas (GNAs) in Terahertz frequency band. We first develop a channel model between the GNAs taking into account the practical issues of the propagation medium, such as transmission frequency, operating temperature, ambient pressure, and distance between the GNAs. In the Terahertz band, not only dielectric propagation loss but also molecular absorption attenuation (MAA) caused by various molecules and their isotopologues within the chip package constitutes the signal transmission loss. We further propose an optimal power allocation to achieve the channel capacity. The proposed channel model shows that the MAA significantly degrades the performance at certain frequency ranges compared to the conventional channel model, even when the GNAs are very closely located. More specifically, at transmission frequency of 1 THz, the channel capacity of the proposed model is shown to be much lower than that of the conventional model over the whole range of temperature and ambient pressure of up to 26.8% and 25%, respectively.
 [123] arXiv:1708.06215 [pdf, other]

Title: Analysis of Statistical QoS in Half Duplex and Full Duplex Dense Heterogeneous Cellular NetworksComments: arXiv admin note: substantial text overlap with arXiv:1604.00588Subjects: Information Theory (cs.IT)
Statistical QoS provisioning as an important performance metric in analyzing next generation mobile cellular network, aka 5G, is investigated. In this context, by quantifying the performance in terms of the effective capacity, we introduce a lower bound for the system performance that facilitates an efficient analysis. Based on the proposed lower bound, which is mainly built on a per resource block analysis, we build a basic mathematical framework to analyze effective capacity in an ultra dense heterogeneous cellular network. We use our proposed scalable approach to give insights about the possible enhancements of the statistical QoS experienced by the end users if heterogeneous cellular networks migrate from a conventional half duplex to an imperfect full duplex mode of operation. Numerical results and analysis are provided, where the network is modeled as a Matern point process. The results demonstrate the accuracy and computational efficiency of the proposed scheme, especially in large scale wireless systems. Moreover, the minimum level of self interference cancellation for the full duplex system to start outperforming its half duplex counterpart is investigated.
 [124] arXiv:1708.06219 [pdf, other]

Title: On the approximation by single hidden layer feedforward neural networks with fixed weightsComments: 17 pages, 5 figures, submitted; for associated SageMath worksheet, see this https URLSubjects: Neural and Evolutionary Computing (cs.NE); Information Theory (cs.IT); Numerical Analysis (math.NA)
Feedforward neural networks have wide applicability in various disciplines of science due to their universal approximation property. Some authors have shown that single hidden layer feedforward neural networks (SLFNs) with fixed weights still possess the universal approximation property provided that approximated functions are univariate. But this phenomenon does not lay any restrictions on the number of neurons in the hidden layer. The more this number, the more the probability of the considered network to give precise results. In this note, we constructively prove that SLFNs with the fixed weight $1$ and two neurons in the hidden layer can approximate any continuous function on a compact subset of the real line. The applicability of this result is demonstrated in various numerical examples. Finally, we show that SLFNs with fixed weights cannot approximate all continuous multivariate functions.
 [125] arXiv:1708.06226 [html]

Title: Proceedings 15th International Conference on Automata and Formal LanguagesJournalref: EPTCS 252, 2017Subjects: Formal Languages and Automata Theory (cs.FL)
The 15th International Conference on Automata and Formal Languages (AFL 2017) was held in Debrecen, Hungary, from September 4 to 6, 2017. The conference was organized by the Faculty of Informatics of the University of Debrecen and the Faculty of Informatics of the E\"otv\"os Lor\'and University of Budapest. Topics of interest covered all aspects of automata and formal languages, including theory and applications.
 [126] arXiv:1708.06227 [pdf, other]

Title: Recognizing Involuntary Actions from 3D Skeleton Data Using Body StatesSubjects: Computer Vision and Pattern Recognition (cs.CV)
Human action recognition has been one of the most active fields of research in computer vision for last years. Two dimensional action recognition methods are facing serious challenges such as occlusion and missing the third dimension of data. Development of depth sensors has made it feasible to track positions of human body joints over time. This paper proposes a novel method of action recognition which uses temporal 3D skeletal Kinect data. This method introduces the definition of body states and then every action is modeled as a sequence of these states. The learning stage uses Fisher Linear Discriminant Analysis (LDA) to construct discriminant feature space for discriminating the body states. Moreover, this paper suggests the use of the Mahalonobis distance as an appropriate distance metric for the classification of the states of involuntary actions. Hidden Markov Model (HMM) is then used to model the temporal transition between the body states in each action. According to the results, this method significantly outperforms other popular methods, with recognition rate of 88.64% for eight different actions and up to 96.18% for classifying fall actions.
 [127] arXiv:1708.06228 [pdf, other]

Title: An efficient algorithm to decide periodicity of brecognisable sets using LSDF conventionAuthors: Victor MarsaultComments: 40 pagesSubjects: Formal Languages and Automata Theory (cs.FL)
Given an integer base b>1, a set of integers is represented in base b by a language over {0,1,...,b1}. The set is said to be brecognisable if its representation is a regular language. It is known that ultimately periodic sets are brecognisable in every base b, and Cobham's theorem implies the converse: no other set is brecognisable in every base b.
We are interested in deciding whether a brecognisable set of integers (given as a finite automaton) is eventually periodic. Honkala showed in 1986 that this problem is decidable. Leroux used in 2005 the convention to write integers with the least significant digit first (LSDF), and designed a quadratic algorithm to solve a more general problem.
We use here LSDF convention as well and give a structural description of the minimal automata that accept periodic sets of integers. We then show that it can be verified in linear time if a given minimal automaton meets this description. This yields a O(bn log(n)) procedure to decide whether a general deterministic automaton accepts an ultimately periodic set of numbers.  [128] arXiv:1708.06233 [pdf, other]

Title: Fake News in Social NetworksSubjects: Artificial Intelligence (cs.AI); Multiagent Systems (cs.MA); Social and Information Networks (cs.SI); Physics and Society (physics.socph); Economics (qfin.EC)
We model the spread of news as a social learning game on a network. Agents can either endorse or oppose a claim made in a piece of news, which itself may be either true or false. Agents base their decision on a private signal and their neighbors' past actions. Given these inputs, agents follow strategies derived via multiagent deep reinforcement learning and receive utility from acting in accordance with the veracity of claims. Our framework yields strategies with agent utility close to a theoretical, Bayes optimal benchmark, while remaining flexible to model respecification. Optimized strategies allow agents to correctly identify most false claims, when all agents receive unbiased private signals. However, an adversary's attempt to spread fake news by targeting a subset of agents with a biased private signal can be successful. Even more so when the adversary has information about agents' network position or private signal. When agents are aware of the presence of an adversary they reoptimize their strategies in the training stage and the adversary's attack is less effective. Hence, exposing agents to the possibility of fake news can be an effective way to curtail the spread of fake news in social networks. Our results also highlight that information about the users' private beliefs and their social network structure can be extremely valuable to adversaries and should be well protected.
 [129] arXiv:1708.06238 [pdf, ps, other]

Title: Stochastic IMT (insulatormetaltransition) neurons: An interplay of thermal and threshold noise at bifurcationSubjects: Emerging Technologies (cs.ET); Neural and Evolutionary Computing (cs.NE)
A stochastic neuron, a key hardware kernel for implementing stochastic neural networks, is constructed using an insulatormetaltransition (IMT) device based on electrically induced phasetransition in series with a tunable resistance. We show that such an IMT neuron has dynamics similar to a piecewise linear FitzHughNagumo (FHN) neuron. Spiking statistics of such neurons are demonstrated experimentally using Vanadium Dioxide (VO$_{2}$) based IMT neurons, and modeled as an OrnsteinUhlenbeck (OU) process with a fluctuating boundary. The stochastic spiking is explained by thermal noise and threshold fluctuations acting as precursors of bifurcation which result in a sigmoidlike transfer function. Moments of interspike intervals are calculated analytically by extending the firstpassagetime (FPT) models for OrnsteinUhlenbeck (OU) process to include a fluctuating boundary. We find that the coefficient of variation of interspike intervals depend on the relative proportion of thermal and threshold noise. In the current experimental demonstrations where both kinds of noise are present, the coefficient of variation is about an order of magnitude higher compared to the case where only thermal noise were present.
 [130] arXiv:1708.06242 [pdf]

Title: Prevalence and citation advantage of gold open access in the subject areas of the Scopus databaseComments: 31 pages, 2 figures, 7 tables, 3 annexSubjects: Digital Libraries (cs.DL)
The potential benefit of open access (OA) in relation to citation impact has been discussed in the literature in depth. The methodology used to test the OA citation advantage includes comparing OA vs. nonOA journal impact factors and citations of OA versus nonOA articles published in the same nonOA journals. However, one problem with many studies is that they are small restricted to a discipline or set of journals. Moreover, conclusions are not entirely consistent among research areas and 'early view' and 'selection bias' have been suggested as possible explications. In the present paper, an analysis of gold OA from across all areas of research the 27 subject areas of the Scopus database is realized. As a novel contribution, this paper takes a journallevel approach to assessing the OA citation advantage, whereas many others take a paperlevel approach. Data were obtained from Scimago Lab, sorted using Scopus database, and tagged as OA/nonOA using the DOAJ list. Jointly with the OA citation advantage, the OA prevalence as well as the differences between access types (OA vs. nonOA) in production and referencing are tested. A total of 3,737 OA journals (16.8%) and 18,485 nonOA journals (83.2%) published in 2015 are considered. As the main conclusion, there is no generalizable gold OA citation advantage at journal level.
 [131] arXiv:1708.06243 [pdf]

Title: General Backpropagation Algorithm for Training Secondorder Neural NetworksComments: 5 pages, 7 figures, 19 referencesSubjects: Learning (cs.LG); Machine Learning (stat.ML)
The artificial neural network is a popular framework in machine learning. To empower individual neurons, we recently suggested that the current type of neurons could be upgraded to 2nd order counterparts, in which the linear operation between inputs to a neuron and the associated weights is replaced with a nonlinear quadratic operation. A single 2nd order neurons already has a strong nonlinear modeling ability, such as implementing basic fuzzy logic operations. In this paper, we develop a general backpropagation (BP) algorithm to train the network consisting of 2ndorder neurons. The numerical studies are performed to verify of the generalized BP algorithm.
 [132] arXiv:1708.06246 [pdf, other]

Title: Comparative Benchmarking of Causal Discovery TechniquesSubjects: Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
In this paper we present a comprehensive view of prominent causal discovery algorithms, categorized into two main categories (1) assuming acyclic and no latent variables, and (2) allowing both cycles and latent variables, along with experimental results comparing them from three perspectives: (a) structural accuracy, (b) standard predictive accuracy, and (c) accuracy of counterfactual inference. For (b) and (c) we train causal Bayesian networks with structures as predicted by each causal discovery technique to carry out counterfactual or standard predictive inference. We compare causal algorithms on two pub licly available and one simulated datasets having different sample sizes: small, medium and large. Experiments show that structural accuracy of a technique does not necessarily correlate with higher accuracy of inferencing tasks. Fur ther, surveyed structure learning algorithms do not perform well in terms of structural accuracy in case of datasets having large number of variables.
 [133] arXiv:1708.06248 [pdf, other]

Title: GraphR: Accelerating Graph Processing Using ReRAMSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Hardware Architecture (cs.AR)
This paper presents GRAPHR, the first ReRAMbased graph processing accelerator. GRAPHR follows the principle of neardata processing but explores the opportunity of performing massive parallel operations with low hardware and energy cost. Compared to recent works in applying ReRAM to more regular neural computations, we are faced with several challenges: 1) The graph data are stored in the compressed format, instead of matrix forms, making it impossible to perform direct insitu computations in memory; 2) It is less intuitive to map various graph algorithms to ReRAM with hardware constrains; 3) Coordinating data movements among ReRAM crossbars and memory to achieve high throughput. GRAPHR is a novel accelerator architecture consisting of two major components: memory ReRAM and graph engine (GE). The core graph computations are performed in sparse matrix format in GEs (ReRAM crossbars), which perform efficient matrixvector multiplications. The vector/matrixbased graph computation is not new, but ReRAM offers the unique opportunity to realize the massive parallelism with unprecedented energy efficiency and low hardware cost. Due to the same cost/performance tradeoff, with ReRAM, the gain of performing parallel operations overshadows the wastes due to sparsity in matrix view within a small subgraph. Moreover, it naturally enables near data processing with reduced data movements. The experiment results show that GRAPHR achieves a16.01x (up to132.67x) speedup and an33.82x energy saving on geometric mean compared to a CPU baseline system.
 [134] arXiv:1708.06250 [pdf, other]

Title: Pillar Networks++: Distributed nonparametric deep and wide networksComments: arXiv admin note: substantial text overlap with arXiv:1707.06923Subjects: Computer Vision and Pattern Recognition (cs.CV); Neural and Evolutionary Computing (cs.NE); Computation (stat.CO); Machine Learning (stat.ML)
In recent work, it was shown that combining multikernel based support vector machines (SVMs) can lead to near stateoftheart performance on an action recognition dataset (HMDB51 dataset). This was 0.4\% lower than frameworks that used handcrafted features in addition to the deep convolutional feature extractors. In the present work, we show that combining distributed Gaussian Processes with multistream deep convolutional neural networks (CNN) alleviate the need to augment a neural network with handcrafted features. In contrast to prior work, we treat each deep neural convolutional network as an expert wherein the individual predictions (and their respective uncertainties) are combined into a Product of Experts (PoE) framework.
 [135] arXiv:1708.06252 [pdf, other]

Title: Mixture Reduction on Matrix Lie GroupsComments: IEEE Signal Processing LettersSubjects: Systems and Control (cs.SY); Robotics (cs.RO)
Many physical systems evolve on matrix Lie groups and mixture filtering designed for such manifolds represent an inevitable tool for challenging estimation problems. However, mixture filtering faces the issue of a constantly growing number of components, hence require appropriate mixture reduction techniques. In this letter we propose a mixture reduction approach for distributions on matrix Lie groups, called the concentrated Gaussian distributions (CGDs). This entails appropriate reparametrization of CGD parameters to compute the KL divergence, pick and merge the mixture components. Furthermore, we also introduce a multitarget tracking filter on Lie groups as a mixture filtering study example for the proposed reduction method. In particular, we implemented the probability hypothesis density filter on matrix Lie groups. We validate the filter performance using the optimal subpattern assignment metric on a synthetic dataset consisting of 100 randomly generated multitarget scenarios.
 [136] arXiv:1708.06257 [pdf, other]

Title: Notes: A Continuous Model of Neural Networks. Part I: Residual NetworksSubjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
In this series of notes, we try to model neural networks as as discretizations of continuous flows on the space of data, which can be called flow model. The idea comes from an observation of their similarity in mathematical structures. This conceptual analogy has not been proven useful yet, but it seems interesting to explore.
In this part, we start with a linear transport equation (with nonlinear transport velocity field) and obtain a class of residual type neural networks. If the transport velocity field has a special form, the obtained network is found similar to the original ResNet. This neural network can be regarded as a discretization of the continuous flow defined by the transport flow.
In the end, a summary of the correspondence between neural networks and transport equations is presented, followed by some general discussions.  [137] arXiv:1708.06266 [pdf, other]

Title: Probabilistic Relation Induction in Vector Space EmbeddingsSubjects: Artificial Intelligence (cs.AI); Computation and Language (cs.CL)
Word embeddings have been found to capture a surprisingly rich amount of syntactic and semantic knowledge. However, it is not yet sufficiently wellunderstood how the relational knowledge that is implicitly encoded in word embeddings can be extracted in a reliable way. In this paper, we propose two probabilistic models to address this issue. The first model is based on the common relationsastranslations view, but is cast in a probabilistic setting. Our second model is based on the much weaker assumption that there is a linear relationship between the vector representations of related words. Compared to existing approaches, our models lead to more accurate predictions, and they are more explicit about what can and cannot be extracted from the word embedding.
 [138] arXiv:1708.06268 [pdf, other]

Title: PartialDuplex AmplifyandForward Relaying: Spectral Efficiency Analysis under SelfInterferenceComments: Submitted to IEEE Transactions on Wireless CommunicationsSubjects: Information Theory (cs.IT)
We propose a novel mode of operation for AmplifyandForward relays in which the spectra of the relay input and output signals partially overlap. This partialduplex relaying mode encompasses halfduplex and fullduplex as particular cases. By viewing the partialduplex relay as a bandwidthpreserving Linear Periodic TimeVarying system, an analysis of the spectral efficiency in the presence of selfinterference is developed. In contrast with previous works, selfinterference is regarded as a useful informationbearing component rather than simply assimilated to noise. This approach reveals that previous results regarding the impact of selfinterference on (fullduplex) relay performance are overly pessimistic. Based on a frequencydomain interpretation of the effect of selfinterference, a number of suboptimal decoding architectures at the destination node are also discussed. It is found that the partialduplex relaying mode may provide an attractive tradeoff between spectral efficiency and receiver complexity.
 [139] arXiv:1708.06274 [pdf, other]

Title: This Far, No Further: Introducing Virtual Borders to Mobile Robots Using a Laser PointerComments: 8 pages, 8 figures, supplementary video: this https URLSubjects: Robotics (cs.RO)
In this paper, we address the problem of controlling the workspace of a 3DoF mobile robot. This problem arises due to the emerging coexistence between humans and robots resulting in a shared space. In such an environment, robots should navigate in a humanacceptable way according to the users' demands. For this purpose, we propose a method that gives a nonexpert user the possibility to intuitively define virtual borders by means of a laser pointer. In detail, we contribute a method and implementation based on a previously developed framework using a laser pointer as humanrobot interface to change the robot's navigational behavior. Furthermore, we extend the framework to increase the flexibility by considering different types of virtual borders, i.e. polygons and curves separating an area. We qualitatively and quantitatively evaluated our method concerning correctness, accuracy and teaching effort. The experimental results revealed a high accuracy and low teaching effort while correctly incorporating the virtual borders into the robot's navigational map.
 [140] arXiv:1708.06275 [pdf, other]

Title: Simple and NearOptimal Distributed Coloring for Sparse GraphsSubjects: Data Structures and Algorithms (cs.DS)
Graph coloring is one of the central problems in distributed graph algorithms. Much of the research on this topic has focused on coloring with $\Delta+1$ colors, where $\Delta$ denotes the maximum degree. Using $\Delta+1$ colors may be unsatisfactory in sparse graphs, where not all nodes have such a high degree; it would be more desirable to use a number of colors that improves with sparsity. A standard measure that captures sparsity is arboricity, which is the smallest number of forests into which the edges of the graph can be partitioned.
We present simple randomized distributed algorithms that, with high probability, color any $n$node $\alpha$arboricity graph:
 using $(2+\varepsilon)\cdot \alpha$ colors, for constant $\varepsilon>0$, in $O(\log n)$ rounds, if $\alpha=\tilde{\Omega}(\log n)$, or
 using $O(\alpha \log \alpha )$ colors, in $O(\log n)$ rounds, or
 using $O(\alpha)$ colors, in $O(\log n \cdot \min\{\log\log n,\; \log \alpha\})$ rounds.
These algorithms are nearlyoptimal, as it is known by results of Linial [FOCS'87] and Barenboim and Elkin [PODC'08] that coloring with $\Theta(\alpha)$ colors, or even poly$(\alpha)$ colors, requires $\Omega(\log_{\alpha} n)$ rounds. The previously bestknown $O(\log n)$time result was a deterministic algorithm due to Barenboim and Elkin [PODC'08], which uses $\Theta(\alpha ^2)$ colors. Barenboim and Elkin stated improving this number of colors as an open problem in their Distributed Graph Coloring Book.  [141] arXiv:1708.06276 [pdf, other]

Title: The CARESSES EUJapan project: making assistive robots culturally competentAuthors: Barbara Bruno, Nak Young Chong, Hiroko Kamide, Sanjeev Kanoria, Jaeryoung Lee, Yuto Lim, Amit Kumar Pandey, Chris Papadopoulos, Irena Papadopoulos, Federico Pecora, Alessandro Saffiotti, Antonio SgorbissaComments: Paper presented at: Ambient Assisted Living, Italian Forum. Genova, Italy, June 1215, 2017Subjects: Robotics (cs.RO); Artificial Intelligence (cs.AI); Computers and Society (cs.CY); HumanComputer Interaction (cs.HC)
The nursing literature shows that cultural competence is an important requirement for effective healthcare. We claim that personal assistive robots should likewise be culturally competent, that is, they should be aware of general cultural characteristics and of the different forms they take in different individuals, and take these into account while perceiving, reasoning, and acting. The CARESSES project is an EuropeJapan collaborative effort that aims at designing, developing and evaluating culturally competent assistive robots. These robots will be able to adapt the way they behave, speak and interact to the cultural identity of the person they assist. This paper describes the approach taken in the CARESSES project, its initial steps, and its future plans.
 [142] arXiv:1708.06290 [pdf, other]

Title: Parallel solver for shifted systems in a hybrid CPUGPU frameworkSubjects: Mathematical Software (cs.MS)
This paper proposes a combination of a hybrid CPUGPU and a pure GPU software implementation of a direct algorithm for solving shifted linear systems $(A  \sigma I)X = B$ with large number of complex shifts $\sigma$ and multiple righthand sides. Such problems often appear e.g. in control theory when evaluating the transfer function, or as a part of an algorithm performing interpolatory model reduction, as well as when computing pseudospectra and structured pseudospectra, or solving large linear systems of ordinary differential equations. The proposed algorithm first jointly reduces the general full $n\times n$ matrix $A$ and the $n\times m$ full righthand side matrix $B$ to the controller Hessenberg canonical form that facilitates efficient solution: $A$ is transformed to a socalled $m$Hessenberg form and $B$ is made uppertriangular. This is implemented as blocked highly parallel CPUGPU hybrid algorithm; individual blocks are reduced by the CPU, and the necessary updates of the rest of the matrix are split among the cores of the CPU and the GPU. To enhance parallelization, the reduction and the updates are overlapped. In the next phase, the reduced $m$Hessenbergtriangular systems are solved entirely on the GPU, with shifts divided into batches. The benefits of such load distribution are demonstrated by numerical experiments. In particular, we show that our proposed implementation provides an excellent basis for efficient implementations of computational methods in systems and control theory, from evaluation of transfer function to the interpolatory model reduction.
 [143] arXiv:1708.06293 [pdf, ps, other]

Title: Neville's algorithm revisitedAuthors: M. de JongComments: 3 pagesSubjects: Other Computer Science (cs.OH)
Neville's algorithm is known to provide an efficient and numerically stable solution for polynomial interpolations. In this paper, an extension of this algorithm is presented which includes the derivatives of the interpolating polynomial.
 [144] arXiv:1708.06297 [pdf, other]

Title: Employing Weak Annotations for Medical Image Analysis ProblemsAuthors: Martin Rajchl, Lisa M. Koch, Christian Ledig, Jonathan PasseratPalmbach, Kazunari Misawa, Kensaku Mori, Daniel RueckertSubjects: Computer Vision and Pattern Recognition (cs.CV)
To efficiently establish training databases for machine learning methods, collaborative and crowdsourcing platforms have been investigated to collectively tackle the annotation effort. However, when this concept is ported to the medical imaging domain, reading expertise will have a direct impact on the annotation accuracy. In this study, we examine the impact of expertise and the amount of available annotations on the accuracy outcome of a liver segmentation problem in an abdominal computed tomography (CT) image database. In controlled experiments, we study this impact for different types of weak annotations. To address the decrease in accuracy associated with lower expertise, we propose a method for outlier correction making use of a weakly labelled atlas. Using this approach, we demonstrate that weak annotations subject to high error rates can achieve a similarly high accuracy as stateoftheart multiatlas segmentation approaches relying on a large amount of expert manual segmentations. Annotations of this nature can realistically be obtained from a nonexpert crowd and can potentially enable crowdsourcing of weak annotation tasks for medical image analysis.
 [145] arXiv:1708.06301 [pdf, other]

Title: Dense Disparity Estimation in Egomotion Reduced Search SpaceSubjects: Robotics (cs.RO)
Depth estimation from stereo images remains a challenge even though studied for decades. The KITTI benchmark shows that the stateoftheart solutions offer accurate depth estimation, but are still computationally complex and often require a GPU or FPGA implementation. In this paper we aim at increasing the accuracy of depth map estimation and reducing the computational complexity by using information from previous frames. We propose to transform the disparity map of the previous frame into the current frame, relying on the estimated egomotion, and use this map as the prediction for the Kalman filter in the disparity space. Then, we update the predicted disparity map using the newly matched one. This way we reduce disparity search space and flickering between consecutive frames, thus increasing the computational efficiency of the algorithm. In the end, we validate the proposed approach on realworld data from the KITTI benchmark suite and show that the proposed algorithm yields more accurate results, while at the same time reducing the disparity search space.
 [146] arXiv:1708.06303 [pdf, other]

Title: Network Model Selection for TaskFocused Attributed Network InferenceSubjects: Social and Information Networks (cs.SI); Artificial Intelligence (cs.AI)
Networks are models representing relationships between entities. Often these relationships are explicitly given, or we must learn a representation which generalizes and predicts observed behavior in underlying individual data (e.g. attributes or labels). Whether given or inferred, choosing the best representation affects subsequent tasks and questions on the network. This work focuses on model selection to evaluate network representations from data, focusing on fundamental predictive tasks on networks. We present a modular methodology using general, interpretable network models, task neighborhood functions found across domains, and several criteria for robust model selection. We demonstrate our methodology on three online user activity datasets and show that network model selection for the appropriate network task vs. an alternate task increases performance by an order of magnitude in our experiments.
 [147] arXiv:1708.06308 [pdf, other]

Title: Detecting Location Fraud in Indoor Mobile CrowdsensingComments: 6 pagesSubjects: Cryptography and Security (cs.CR)
Mobile crowdsensing allows a large number of mobile devices to measure phenomena of common interests and form a body of knowledge about natural and social environments. In order to get location annotations for indoor mobile crowdsensing, reference tags are usually deployed which are susceptible to tampering and compromises by attackers. In this work, we consider three types of locationrelated attacks including tag forgery, tag misplacement, and tag removal. Different detection algorithms are proposed to deal with these attacks. First, we introduce locationdependent fingerprints as supplementary information for better location identification. A truth discovery algorithm is then proposed to detect falsified data. Moreover, visiting patterns are utilized for the detection of tag misplacement and removal. Experiments on both crowdsensed and emulated dataset show that the proposed algorithms can detect all three types of attacks with high accuracy.
 [148] arXiv:1708.06309 [pdf, other]

Title: ConStance: Modeling Annotation Contexts to Improve Stance ClassificationComments: To appear at EMNLP 2017Subjects: Social and Information Networks (cs.SI)
Manual annotations are a prerequisite for many applications of machine learning. However, weaknesses in the annotation process itself are easy to overlook. In particular, scholars often choose what information to give to annotators without examining these decisions empirically. For subjective tasks such as sentiment analysis, sarcasm, and stance detection, such choices can impact results. Here, for the task of political stance detection on Twitter, we show that providing too little context can result in noisy and uncertain annotations, whereas providing too strong a context may cause it to outweigh other signals. To characterize and reduce these biases, we develop ConStance, a general model for reasoning about annotations across information conditions. Given conflicting labels produced by multiple annotators seeing the same instances with different contexts, ConStance simultaneously estimates gold standard labels and also learns a classifier for new instances. We show that the classifier learned by ConStance outperforms a variety of baselines at predicting political stance, while the model's interpretable parameters shed light on the effects of each context.
 [149] arXiv:1708.06312 [pdf, other]

Title: Verifying Quantum Programs: From Quipper to QPMCComments: Long versionSubjects: Logic in Computer Science (cs.LO)
In this paper we present a translation from the quantum programming language Quipper to the QPMC model checker, with the main aim of verifying Quipper programs. Quipper is an embedded functional programming language for quantum computation. It is above all a circuit description language, for this reason it uses the vector state formalism and its main purpose is to make circuit implementation easy providing high level operations for circuit manipulation. Quipper provides both an highlevel circuit building interface and a simulator. QPMC is a model checker for quantum protocols based on the density matrix formalism. QPMC extends the probabilistic model checker IscasMC allowing to formally verify properties specified in the temporal logic QCTL on Quantum Markov Chains. We implemented and tested our translation on several quantum algorithms, including Grover's quantum search.
 [150] arXiv:1708.06313 [pdf, other]

Title: A survey on fiber nonlinearity compensation for 400 Gbps and beyond optical communication systemsAuthors: Abdelkerim Amari, Octavia A. Dobre, Ramachandran Venkatesan, O. S. Sunish Kumar, Philippe Ciblat, Yves JaouënComments: Accepted in the IEEE Communications Surveys and TutorialsSubjects: Networking and Internet Architecture (cs.NI)
Optical communication systems represent the backbone of modern communication networks. Since their deployment, different fiber technologies have been used to deal with optical fiber impairments such as dispersionshifted fibers and dispersioncompensation fibers. In recent years, thanks to the introduction of coherent detection based systems, fiber impairments can be mitigated using digital signal processing (DSP) algorithms. Coherent systems are used in the current 100 Gbps wavelengthdivision multiplexing (WDM) standard technology. They allow the increase of spectral efficiency by using multilevel modulation formats, and are combined with DSP techniques to combat the linear fiber distortions. In addition to linear impairments, the next generation 400 Gbps/1 Tbps WDM systems are also more affected by the fiber nonlinearity due to the Kerr effect. At high input power, the fiber nonlinear effects become more important and their compensation is required to improve the transmission performance. Several approaches have been proposed to deal with the fiber nonlinearity. In this paper, after a brief description of the Kerrinduced nonlinear effects, a survey on the fiber nonlinearity compensation (NLC) techniques is provided. We focus on the wellknown NLC techniques and discuss their performance, as well as their implementation and complexity. An extension of the intersubcarrier nonlinear interference canceler approach is also proposed. A performance evaluation of the wellknown NLC techniques and the proposed approach is provided in the context of Nyquist and superNyquist superchannel systems.
 [151] arXiv:1708.06320 [pdf, other]

Title: Learning Spreadout Local Feature DescriptorsComments: ICCV 2017. 9 pages, 7 figuresSubjects: Computer Vision and Pattern Recognition (cs.CV)
We propose a simple, yet powerful regularization technique that can be used to significantly improve both the pairwise and triplet losses in learning local feature descriptors. The idea is that in order to fully utilize the expressive power of the descriptor space, good local feature descriptors should be sufficiently "spreadout" over the space. In this work, we propose a regularization term to maximize the spread in feature descriptor inspired by the property of uniform distribution. We show that the proposed regularization with triplet loss outperforms existing Euclidean distance based descriptor learning techniques by a large margin. As an extension, the proposed regularization technique can also be used to improve imagelevel deep feature embedding.
 [152] arXiv:1708.06333 [pdf]

Title: SigViewer: Visualizing Multimodal Signals Stored in XDF (Extensible Data Format) FilesComments: 39th Annual International Conference of the IEEE Engineering in Medicine and Biology SocietySubjects: Other Computer Science (cs.OH)
Multimodal biosignal acquisition is facilitated by recently introduced software solutions such as LabStreaming Layer (LSL) and its associated data format XDF (Extensible Data Format). However, there are no standalone applications that can visualize multimodal time series stored in XDF files. We extended SigViewer, an open source crossplatform Qt C++ application with the capability of loading, resampling, annotating, and visualizing signals stored in XDF files and successfully applied the tool for posthoc visual verification of the accuracy of a system that aims to predict the phase of alpha oscillations within the electroencephalogram in realtime.
 [153] arXiv:1708.06334 [pdf, other]

Title: An Intelligent Cloud Storage Gateway for Medical ImagingComments: Preprint to be published in Journal of Medical Systems. 8 pages, 5 figuresSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
Historically, medical imaging repositories have been supported by indoor infrastructures. However, the amount of diagnostic imaging procedures has continuously increased over the last decades, imposing several challenges associated with the storage volume, data redundancy and availability. Cloud platforms are focused on delivering hardware and software services over the Internet, becoming an appealing solution for repository outsourcing. Although this option may bring financial and technological benefits, it also presents new challenges. In medical imaging scenarios, communication latency is a critical issue that still hinders the adoption of this paradigm. This paper proposes an intelligent Cloud storage gateway that optimizes data access times. This is achieved through a new cache architecture that combines static rules and pattern recognition for eviction and prefetching. The evaluation results, obtained through simulations over a realworld dataset, show that cache hit ratios can reach around 80%, leading reductions of image retrieval times by over 60%. The combined use of eviction and prefetching policies pro posed can significantly reduce communication latency, even when using a small cache in comparison to the total size of the repository. Apart from the performance gains, the proposed system is capable of adjusting to specific workflows of different institutions.
 [154] arXiv:1708.06336 [pdf, ps, other]

Title: SER for Optimal Combining in Rician Fading with Cochannel InterferenceSubjects: Information Theory (cs.IT)
Approximate Symbol error rate (SER) expressions are derived for receive diversity system employing optimum combining, when both the desired and the interfering signals are subjected to Rician fading, for the case of a) equal power uncorrelated interferers b) unequal power interferers c) interferer correlation. The derived expressions are applicable for an arbitrary number of receive antennas and interferers and for any QAM constellation. Furthermore, we derive a simple closed form expression for SER in the interferencelimited regime, for the special case of Rayleigh faded interferers. A close match is observed between the SER result obtained through the derived analytical expression and the one obtained from MonteCarlo simulations, for a variety of QAM constellations.
 [155] arXiv:1708.06343 [pdf]

Title: Aerial Rock Fragmentation Analysis in LowLight Condition Using UAV TechnologyComments: 8 pages, 6 figures, 2 tables, Application of Computers and Operations Research in the Mining Industry (APCOM)Subjects: Robotics (cs.RO)
In recent years, Unmanned Aerial Vehicle (UAV) technology has been introduced into the mining industry to conduct terrain surveying. This work investigates the application of UAVs with artificial lighting for measurement of rock fragmentation under poor lighting conditions, representing night shifts in surface mines or working conditions in underground mines. The study relies on indoor and outdoor experiments for rock fragmentation analysis using a quadrotor UAV. Comparison of the rock size distributions in both cases show that adequate artificial lighting enables similar accuracy to ideal lighting conditions.
Crosslists for Tue, 22 Aug 17
 [156] arXiv:1708.05768 (crosslist from stat.ML) [pdf, other]

Title: DataDriven Tree Transforms and MetricsComments: 16 pages, 5 figures. Accepted to IEEE Transactions on Signal and Information Processing over NetworksSubjects: Machine Learning (stat.ML); Learning (cs.LG); Quantitative Methods (qbio.QM)
We consider the analysis of high dimensional data given in the form of a matrix with columns consisting of observations and rows consisting of features. Often the data is such that the observations do not reside on a regular grid, and the given order of the features is arbitrary and does not convey a notion of locality. Therefore, traditional transforms and metrics cannot be used for data organization and analysis. In this paper, our goal is to organize the data by defining an appropriate representation and metric such that they respect the smoothness and structure underlying the data. We also aim to generalize the joint clustering of observations and features in the case the data does not fall into clear disjoint groups. For this purpose, we propose multiscale datadriven transforms and metrics based on trees. Their construction is implemented in an iterative refinement procedure that exploits the codependencies between features and observations. Beyond the organization of a single dataset, our approach enables us to transfer the organization learned from one dataset to another and to integrate several datasets together. We present an application to breast cancer gene expression analysis: learning metrics on the genes to cluster the tumor samples into cancer subtypes and validating the joint organization of both the genes and the samples. We demonstrate that using our approach to combine information from multiple gene expression cohorts, acquired by different profiling technologies, improves the clustering of tumor samples.
 [157] arXiv:1708.05788 (crosslist from physics.fludyn) [pdf, other]

Title: Computer Algebra for MicrohydrodynamicsAuthors: Jonas EinarssonSubjects: Fluid Dynamics (physics.fludyn); Mathematical Software (cs.MS)
I describe a method for computer algebra that helps with laborious calculations typically encountered in theoretical microhydrodynamics. The program mimics how humans calculate by matching patterns and making replacements according to the rules of algebra and calculus. This note gives an overview and walks through an example, while the accompanying code repository contains the implementation details, a tutorial, and more examples. The code repository is attached as supplementary material to this note, and maintained at https://github.com/jeinarsson/matte
 [158] arXiv:1708.05789 (crosslist from stat.ML) [pdf, other]

Title: Semisupervised Conditional GANsSubjects: Machine Learning (stat.ML); Learning (cs.LG)
We introduce a new model for building conditional generative models in a semisupervised setting to conditionally generate data given attributes by adapting the GAN framework. The proposed semisupervised GAN (SSGAN) model uses a pair of stacked discriminators to learn the marginal distribution of the data, and the conditional distribution of the attributes given the data respectively. In the semisupervised setting, the marginal distribution (which is often harder to learn) is learned from the labeled + unlabeled data, and the conditional distribution is learned purely from the labeled data. Our experimental results demonstrate that this model performs significantly better compared to existing semisupervised conditional GAN models.
 [159] arXiv:1708.05840 (crosslist from stat.ML) [pdf, other]

Title: A Data and ModelParallel, Distributed and Scalable Framework for Training of Deep Networks in Apache SparkComments: 12 pagesSubjects: Machine Learning (stat.ML); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV); Distributed, Parallel, and Cluster Computing (cs.DC); Learning (cs.LG)
Training deep networks is expensive and timeconsuming with the training period increasing with data size and growth in model parameters. In this paper, we provide a framework for distributed training of deep networks over a cluster of CPUs in Apache Spark. The framework implements both Data Parallelism and Model Parallelism making it suitable to use for deep networks which require huge training data and model parameters which are too big to fit into the memory of a single machine. It can be scaled easily over a cluster of cheap commodity hardware to attain significant speedup and obtain better results making it quite economical as compared to farm of GPUs and supercomputers. We have proposed a new algorithm for training of deep networks for the case when the network is partitioned across the machines (Model Parallelism) along with detailed cost analysis and proof of convergence of the same. We have developed implementations for FullyConnected Feedforward Networks, Convolutional Neural Networks, Recurrent Neural Networks and Long ShortTerm Memory architectures. We present the results of extensive simulations demonstrating the speedup and accuracy obtained by our framework for different sizes of the data and model parameters with variation in the number of worker cores/partitions; thereby showing that our proposed framework can achieve significant speedup (upto 11X for CNN) and is also quite scalable.
 [160] arXiv:1708.05864 (crosslist from math.CO) [pdf, ps, other]

Title: A plurality problem with three colors and query size threeComments: 29 pagesSubjects: Combinatorics (math.CO); Discrete Mathematics (cs.DM)
The Plurality problem  introduced by Aigner \cite{A2004}  has many variants. In this article we deal with the following version: suppose we are given $n$ balls, each of them colored by one of three colors. A \textit{plurality ball} is one such that its color class is strictly larger than any other color class. Questioner wants to find a plurality ball as soon as possible or state there is no, by asking triplets (or $k$sets, in general), while Adversary partition the triplets into color classes as an answer for the queries and wants to postpone the possibility of determining a plurality ball (or stating there is no).
We denote by $A_p(n,3)$ the largest number of queries needed to ask if both play optimally (and Questioner asks triplets). We provide an almost precise result in case of even $n$ by proving that for $n \ge 4$ even we have $$\frac{3}{4}n2 \le A_p(n,3) \le \frac{3}{4}n\frac{1}{2},$$ and for $n \ge 3$ odd we have $$\frac{3}{4}nO(\log n) \le A_p(n,3) \le \frac{3}{4}n\frac{1}{2}.$$
We also prove some bounds on the number of queries needed to ask for larger $k$.  [161] arXiv:1708.05917 (crosslist from stat.ML) [pdf, ps, other]

Title: Accelerating Kernel Classifiers Through Borders MappingAuthors: Peter MillsComments: Stuck even deeper in peerreview limboSubjects: Machine Learning (stat.ML); Learning (cs.LG)
Support vector machines (SVM) and other kernel techniques represent a family of powerful statistical classification methods with high accuracy and broad applicability. Because they use all or a significant portion of the training data, however, they can be slow, especially for large problems. Piecewise linear classifiers are similarly versatile, yet have the additional advantages of simplicity, ease of interpretation and, if the number of component linear classifiers is not too large, speed. Here we show how a simple, piecewise linear classifier can be trained from a kernelbased classifier in order to improve the classification speed. The method works by finding the root of the difference in conditional probabilities between pairs of opposite classes to build up a representation of the decision boundary. When tested on 17 different datasets, it succeeded in improving the classification speed of a SVM for 9 of them by factors as high as 88 times or more. The method is best suited to problems with continuum features data and smooth probability functions. Because the component linear classifiers are built up individually from an existing classifier, rather than through a simultaneous optimization procedure, the classifier is also fast to train.
 [162] arXiv:1708.05932 (crosslist from stat.ML) [pdf, other]

Title: Fundamental Limits of Weak Recovery with Applications to Phase RetrievalComments: 46 pages, 3 figuresSubjects: Machine Learning (stat.ML); Information Theory (cs.IT)
In phase retrieval we want to recover an unknown signal $\boldsymbol x\in\mathbb C^d$ from $n$ quadratic measurements of the form $y_i = \langle\boldsymbol a_i,\boldsymbol x\rangle^2+w_i$ where $\boldsymbol a_i\in \mathbb C^d$ are known sensing vectors and $w_i$ is measurement noise. We ask the following weak recovery question: what is the minimum number of measurements $n$ needed to produce an estimator $\hat{\boldsymbol x}(\boldsymbol y)$ that is positively correlated with the signal $\boldsymbol x$? We consider the case of Gaussian vectors $\boldsymbol a_i$. We prove that  in the highdimensional limit  a sharp phase transition takes place, and we locate the threshold in the regime of vanishingly small noise. For $n\le do(d)$ no estimator can do significantly better than random and achieve a strictly positive correlation. For $n\ge d+o(d)$ a simple spectral estimator achieves a positive correlation. Surprisingly, numerical simulations with the same spectral estimator demonstrate promising performances with realistic sensing matrices as well. Spectral methods are used to initialize nonconvex optimization algorithms in phase retrieval, and our approach can boost performances in this setting as well.
Our impossibility result is based on classical informationtheory arguments. The spectral algorithm computes the leading eigenvector of a weighted empirical covariance matrix. We obtain a sharp characterization of the spectral properties of this random matrix using tools from free probability and generalizing a recent result by Lu and Li. Both the upper and lower bound generalize beyond phase retrieval to measurements $y_i$ produced according to a generalized linear model.  [163] arXiv:1708.05950 (crosslist from math.CO) [pdf, ps, other]

Title: New extremal singly even selfdual codes of lengths $64$ and $66$Comments: 13 pages. arXiv admin note: text overlap with arXiv:1706.01694Subjects: Combinatorics (math.CO); Information Theory (cs.IT)
For lengths $64$ and $66$, we construct extremal singly even selfdual codes with weight enumerators for which no extremal singly even selfdual codes were previously known to exist. We also construct new $40$ inequivalent extremal doubly even selfdual $[64,32,12]$ codes with covering radius $12$ meeting the Delsarte bound.
 [164] arXiv:1708.05963 (crosslist from stat.ML) [pdf, ps, other]

Title: Neural Networks Compression for Language ModelingComments: Keywords: LSTM, RNN, language modeling, lowrank factorization, pruning, quantization. Published by Springer in the LNCS series, 7th International Conference on Pattern Recognition and Machine Intelligence, 2017Subjects: Machine Learning (stat.ML); Computation and Language (cs.CL); Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
In this paper, we consider several compression techniques for the language modeling problem based on recurrent neural networks (RNNs). It is known that conventional RNNs, e.g, LSTMbased networks in language modeling, are characterized with either high space complexity or substantial inference time. This problem is especially crucial for mobile applications, in which the constant interaction with the remote server is inappropriate. By using the Penn Treebank (PTB) dataset we compare pruning, quantization, lowrank factorization, tensor train decomposition for LSTM networks in terms of model size and suitability for fast inference.
 [165] arXiv:1708.05976 (crosslist from math.NT) [pdf, ps, other]

Title: On the construction of small subsets containing special elements in a finite fieldAuthors: Jiyou LiComments: 10 pagesSubjects: Number Theory (math.NT); Computational Complexity (cs.CC); Combinatorics (math.CO)
In this note we construct a series of small subsets containing a nondth power element in a finite field by applying certain bounds on incomplete character sums.
Precisely, let $h=\lfloor q^{\delta}\rfloor>1$ and $d\mid q^h1$. If $q^h1$ has a prime divisor $r$ with $r=O((h\log q)^c)$, then there is a constant $0<\epsilon<1$ such that for a ratio at least $\frac 1 {q^{\epsilon h}}$ of $\alpha\in \mathbb{F}_{q^{h}} \backslash\mathbb{F}_{q}$, the set $S=\{ \alphax^t, x\in\mathbb{F}_{q}\}$ of cardinality $O(q^{\frac 12 +\delta_c})$ contains a nondth power in $\mathbb{F}_{q^{\lfloor q^\delta\rfloor}}$, where $t$ is the largest power of $r$ such that $t<\sqrt{q}/h$. For odd $q$, the choice of $\delta=\frac 12d, d=o(1)>0$ shows that there exists an explicit subset of cardinality $q^{1d}=O(\log^{2+\epsilon'}(q^h))$ containing a nonquadratic element in $\mathbb{F}_{q^h}$. On the other hand, the choice of $h=2$ shows that for any odd prime power $q$, there is an explicit subset of cardinality $O(\sqrt{q})$ containing a nonquadratic element in $\mathbb{F}_{q^2}$, essentially improving a $O(q)$ construction by Coulter and Kosick \cite{CK}.
In addition, we obtain a similar construction for small sets containing a primitive element. The construction works well provided $\phi(q^h1)$ is very small, where $\phi$ is the Euler's totient function.  [166] arXiv:1708.06002 (crosslist from quantph) [pdf, ps, other]

Title: Quantum state certificationSubjects: Quantum Physics (quantph); Data Structures and Algorithms (cs.DS)
We consider the problem of quantum state certification, where one is given $n$ copies of an unknown $d$dimensional quantum mixed state $\rho$, and one wants to test whether $\rho$ is equal to some known mixed state $\sigma$ or else is $\epsilon$far from $\sigma$. The goal is to use notably fewer copies than the $\Omega(d^2)$ needed for full tomography on $\rho$ (i.e., density estimation). We give two robust state certification algorithms: one with respect to fidelity using $n = O(d/\epsilon)$ copies, and one with respect to trace distance using $n = O(d/\epsilon^2)$ copies. The latter algorithm also applies when $\sigma$ is unknown as well. These copy complexities are optimal up to constant factors.
 [167] arXiv:1708.06018 (crosslist from math.NA) [pdf, ps, other]

Title: Conversion of Mersenne Twister to doubleprecision floatingpoint numbersAuthors: Shin HaraseComments: 14 pagesSubjects: Numerical Analysis (math.NA); Numerical Analysis (cs.NA); Computation (stat.CO)
The 32bit Mersenne Twister generator MT19937 is a widely used random number generator. To generate numbers with more than 32 bits in bit length, and particularly when converting into 53bit doubleprecision floatingpoint numbers in $[0,1)$ in the IEEE 754 format, the typical implementation concatenates two successive 32bit integers and divides them by a power of $2$. In this case, the 32bit MT19937 is optimized in terms of its equidistribution properties (the socalled dimension of equidistribution with $v$bit accuracy) under the assumption that one will mainly be using 32bit output values, and hence the concatenation sometimes degrades the dimension of equidistribution compared with the simple use of 32bit outputs. In this paper, we analyze such phenomena by investigating hidden $\mathbb{F}_2$linear relations among the bits of highdimensional outputs. Accordingly, we report that MT19937 with a specific lag set fails several statistical tests, such as the overlapping collision test, matrix rank test, and Hamming independence test.
 [168] arXiv:1708.06070 (crosslist from math.GN) [pdf, ps, other]

Title: On AtiyahSinger and AtiyahBott for finite abstract simplicial complexesAuthors: Oliver KnillComments: 12 pagesSubjects: General Topology (math.GN); Discrete Mathematics (cs.DM)
A linear or multilinear valuation on a finite abstract simplicial complex can be expressed as an analytic index dim(ker(D)) dim(ker(D^*)) of a differential complex D:E > F. In the discrete, a complex D can be called elliptic if a McKeanSinger spectral symmetry applies as this implies str(exp(t D^2)) is tindependent. In that case, the analytic index of D is the sum of (1)^k b_k(D), where b_k(D) is the k'th Betti number, which by Hodge is the nullity of the (k+1)'th block of the Hodge operator L=D^2. It can also be written as a topological index summing K(v) over the set of zerodimensional simplices in G and where K is an Euler type curvature defined by G and D. This can be interpreted as a AtiyahSinger type correspondence between analytic and topological index. Examples are the de Rham differential complex for the Euler characteristic X(G) or the connection differential complex for Wu characteristic w_k(G). Given an endomorphism T of an elliptic complex, the Lefschetz number X(T,G,D) is defined as the super trace of T acting on cohomology defined by E. It is equal to the sum i(v) over V which are contained in fixed simplices of T, and i is a Brouwer type index. This AtiyahBott result generalizes the BrouwerLefschetz fixed point theorem for an endomorphism of the simplicial complex G. In both the static and dynamic setting, the proof is done by heat deforming the Koopman operator U(T) to get the cohomological picture str(exp(t D^2) U(T)) in the limit t to infinity and then use Hodge, and then by applying a discrete gradient flow to the simplex data defining the valuation to push str(U(T)) to V, getting curvature K(v) or the Brouwer type index i(v).
 [169] arXiv:1708.06077 (crosslist from math.ST) [pdf, ps, other]

Title: ExSIS: Extended Sure Independence Screening for Ultrahighdimensional Linear ModelsComments: 22 pages (singlecolumn version); 10 figures; submitted for journal publicationSubjects: Statistics Theory (math.ST); Information Theory (cs.IT); Machine Learning (stat.ML)
Statistical inference can be computationally prohibitive in ultrahighdimensional linear models. Correlationbased variable screening, in which one leverages marginal correlations for removal of irrelevant variables from the model prior to statistical inference, can be used to overcome this challenge. Prior works on correlationbased variable screening either impose strong statistical priors on the linear model or assume specific postscreening inference methods. This paper first extends the analysis of correlationbased variable screening to arbitrary linear models and postscreening inference techniques. In particular, ($i$) it shows that a conditiontermed the screening conditionis sufficient for successful correlationbased screening of linear models, and ($ii$) it provides insights into the dependence of marginal correlationbased screening on different problem parameters. Numerical experiments confirm that these insights are not mere artifacts of analysis; rather, they are reflective of the challenges associated with marginal correlationbased variable screening. Second, the paper explicitly derives the screening condition for two families of linear models, namely, subGaussian linear models and arbitrary (random or deterministic) linear models. In the process, it establishes thatunder appropriate conditionsit is possible to reduce the dimension of an ultrahighdimensional, arbitrary linear model to almost the sample size even when the number of active variables scales almost linearly with the sample size.
 [170] arXiv:1708.06160 (crosslist from stat.AP) [pdf]

Title: Economic Design of MemoryType Control Charts: The Fallacy of the Formula Proposed by Lorenzen and Vance (1986)Subjects: Applications (stat.AP); Computational Engineering, Finance, and Science (cs.CE); Mathematical Software (cs.MS); Optimization and Control (math.OC); Economics (qfin.EC)
The memorytype control charts, such as EWMA and CUSUM, are powerful tools for detecting small quality changes in univariate and multivariate processes. Many papers on economic design of these control charts use the formula proposed by Lorenzen and Vance (1986) [Lorenzen, T. J., & Vance, L. C. (1986). The economic design of control charts: A unified approach. Technometrics, 28(1), 310, DOI: 10.2307/1269598]. This paper shows that this formula is not correct for memorytype control charts and its values can significantly deviate from the original values even if the ARL values used in this formula are accurately computed. Consequently, the use of this formula can result in charts that are not economically optimal. The formula is corrected for memorytype control charts, but unfortunately the modified formula is not a helpful tool from a computational perspective. We show that simulationbased optimization is a possible alternative method.
 [171] arXiv:1708.06216 (crosslist from physics.fludyn) [pdf, other]

Title: Molecular dynamic simulation of water vapor interaction with blind pore of deadend and saccate typeComments: 4 pages, 6 figuresSubjects: Fluid Dynamics (physics.fludyn); Soft Condensed Matter (condmat.soft); Computational Engineering, Finance, and Science (cs.CE)
One of the varieties of pores, often found in natural or artificial building materials, are the socalled blind pores of deadend or saccate type. Threedimensional model of such kind of pore has been developed in this work. This model has been used for simulation of water vapor interaction with individual pore by molecular dynamics in combination with the diffusion equation method. Special investigations have been done to find dependencies between thermostats implementations and conservation of thermodynamic and statistical values of water vapor  pore system. The two types of evolution of waterpore system have been investigated: drying and wetting of the pore. Full research of diffusion coefficient, diffusion velocity and other diffusion parameters has been made.
 [172] arXiv:1708.06235 (crosslist from stat.ML) [pdf, other]

Title: Deep Convolutional Neural Networks for Massive MIMO FingerprintBased PositioningComments: Accepted in the IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC) 2017Subjects: Machine Learning (stat.ML); Information Theory (cs.IT)
This paper provides an initial investigation on the application of convolutional neural networks (CNNs) for fingerprintbased positioning using measured massive MIMO channels. When represented in appropriate domains, massive MIMO channels have a sparse structure which can be efficiently learned by CNNs for positioning purposes. We evaluate the positioning accuracy of stateoftheart CNNs with channel fingerprints generated from a channel model with a rich clustered structure: the COST 2100 channel model. We find that moderately deep CNNs can achieve fractionalwavelength positioning accuracies, provided that an enough representative data set is available for training.
 [173] arXiv:1708.06298 (crosslist from quantph) [pdf, other]

Title: Bounds on absolutely maximally entangled states from shadow inequalities, and the quantum MacWilliams identityComments: 10 pages, 3 figuresSubjects: Quantum Physics (quantph); Information Theory (cs.IT)
A pure multipartite quantum state is called absolutely maximally entangled (AME), if all reductions obtained by tracing out at least half of its parties are maximally mixed. However, the existence of such states is in many cases unclear. With the help of the weight enumerator machinery known from quantum error correcting codes and the generalized shadow inequalities, we obtain new bounds on the existence of AME states in higher dimensions. To complete the treatment on the weight enumerator machinery, the quantum MacWilliams identity is derived in the Bloch representation.
Replacements for Tue, 22 Aug 17
 [174] arXiv:1503.06911 (replaced) [pdf, other]
 [175] arXiv:1512.02456 (replaced) [pdf, other]

Title: A study of Timevarying Cost Parameter Estimation Methods in Traffic Networks for Mobile RobotsComments: A shorter version of this article is published in ETFA'2016Subjects: Robotics (cs.RO)
 [176] arXiv:1603.09051 (replaced) [pdf, other]

Title: Phoenix: A SelfOptimizing Chess EngineComments: Accepted in CICN 2015. PreprintSubjects: Artificial Intelligence (cs.AI); Neural and Evolutionary Computing (cs.NE)
 [177] arXiv:1603.09095 (replaced) [pdf, other]

Title: Learning Local Descriptors by Optimizing the KeypointCorrespondence CriterionComments: v3: presented at ICPR2016 v4: additional experiments on the HPatches benchmarkSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [178] arXiv:1605.06814 (replaced) [pdf, other]

Title: SpaceTime Tradeoffs for Distributed VerificationComments: Preproceedings version of paper presented at the 24th International Colloquium on Structural Information and Communication Complexity (SIROCCO 2017)Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Computational Complexity (cs.CC)
 [179] arXiv:1605.08151 (replaced) [pdf, other]

Title: Predicting Visual Exemplars of Unseen Classes for ZeroShot LearningComments: ICCV2017 camerareadySubjects: Computer Vision and Pattern Recognition (cs.CV)
 [180] arXiv:1605.08285 (replaced) [pdf, other]

Title: Solving Systems of Random Quadratic Equations via Truncated Amplitude FlowComments: 37 Pages, 16 figuresSubjects: Machine Learning (stat.ML); Information Theory (cs.IT); Optimization and Control (math.OC)
 [181] arXiv:1607.03766 (replaced) [pdf, other]

Title: AudioPairBank: Towards A LargeScale TagPairBased Audio Content AnalysisComments: This paper is a revised version of "AudioSentibank: Largescale Semantic Ontology of Acoustic Concepts for Audio Content Analysis"Subjects: Sound (cs.SD); Computation and Language (cs.CL)
 [182] arXiv:1608.02191 (replaced) [pdf, other]

Title: BoundBased Power Optimization for MultiHop Heterogeneous Wireless Industrial Networks Under Statistical Delay ConstraintsSubjects: Performance (cs.PF); Networking and Internet Architecture (cs.NI)
 [183] arXiv:1609.00110 (replaced) [pdf, other]

Title: A Decomposition Method for Global Evaluation of Shannon Entropy and Local Estimations of Algorithmic ComplexityAuthors: Hector Zenil, Fernando SolerToscano, Narsis A. Kiani, Santiago HernándezOrozco, Antonio RuedaToicenComments: 43 pages, 11 figures, 4 tablesSubjects: Information Theory (cs.IT); Computational Complexity (cs.CC)
 [184] arXiv:1611.03968 (replaced) [pdf, other]

Title: Online GenerativeDiscriminative Model for Object Detection in Video: An Unsupervised Learning FrameworkSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [185] arXiv:1611.07890 (replaced) [pdf, other]

Title: Imagebased localization using LSTMs for structured feature correlationAuthors: Florian Walch, Caner Hazirbas, Laura LealTaixé, Torsten Sattler, Sebastian Hilsenbeck, Daniel CremersSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [186] arXiv:1611.10314 (replaced) [pdf, other]

Title: SyncDRAW: Automatic Video Generation using Deep Recurrent Attentive ArchitecturesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [187] arXiv:1612.00738 (replaced) [pdf, other]

Title: Action Recognition with Dynamic Image NetworksComments: 14 pages, 9 figures, 9 tablesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [188] arXiv:1612.01401 (replaced) [pdf, other]

Title: Learning AdversaryResistant Deep Neural NetworksAuthors: Qinglong Wang, Wenbo Guo, Kaixuan Zhang, Alexander G. Ororbia II, Xinyu Xing, Xue Liu, C. Lee GilesSubjects: Learning (cs.LG)
 [189] arXiv:1612.04350 (replaced) [pdf, ps, other]

Title: LoPub: HighDimensional Crowdsourced Data Publication with Local Differential PrivacySubjects: Cryptography and Security (cs.CR)
 [190] arXiv:1612.05002 (replaced) [pdf, other]

Title: A coalgebraic treatment of conditional transition systems with upgradesComments: Prerequisite for LMCS submissionSubjects: Logic in Computer Science (cs.LO)
 [191] arXiv:1612.09223 (replaced) [pdf, other]

Title: A revised completeness result for the simply typed $λμ$calculus using realizability semanticsComments: arXiv admin note: text overlap with arXiv:0905.0357Subjects: Logic (math.LO); Logic in Computer Science (cs.LO)
 [192] arXiv:1612.09508 (replaced) [pdf, other]

Title: Feedback NetworksSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [193] arXiv:1701.02292 (replaced) [src]
 [194] arXiv:1701.05654 (replaced) [pdf, other]

Title: Bayesian Network Learning via Topological OrderSubjects: Machine Learning (stat.ML); Data Structures and Algorithms (cs.DS)
 [195] arXiv:1701.06368 (replaced) [pdf, other]

Title: An Upper Bound to ZeroDelay Rate Distortion via Kalman Filtering for Vector Gaussian SourcesComments: 7 pages, 6 figures, accepted for publication in IEEE Information Theory Workshop (ITW)Subjects: Information Theory (cs.IT)
 [196] arXiv:1702.02258 (replaced) [pdf, other]

Title: Generating Multiple Diverse Hypotheses for Human 3D Pose Consistent with 2D Joint DetectionsComments: accepted to ICCV 2017 (PeopleCap)Subjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Multimedia (cs.MM); Machine Learning (stat.ML)
 [197] arXiv:1702.03196 (replaced) [pdf, other]

Title: Universal Semantic ParsingComments: 16 pages with supplementary, EMNLP 2017Subjects: Computation and Language (cs.CL)
 [198] arXiv:1702.06997 (replaced) [pdf, other]

Title: Beyond Talagrand Functions: New Lower Bounds for Testing Monotonicity and UnatenessSubjects: Computational Complexity (cs.CC)
 [199] arXiv:1702.08435 (replaced) [pdf, other]

Title: Statistical Anomaly Detection via Composite Hypothesis Testing for Markov ModelsComments: Preprint submitted to the IEEE Transactions on Signal ProcessingSubjects: Systems and Control (cs.SY); Optimization and Control (math.OC); Machine Learning (stat.ML)
 [200] arXiv:1703.01986 (replaced) [pdf, other]

Title: Learning from Experience: A Dynamic ClosedLoop QoE Optimization for Video Adaptation and DeliveryComments: 8 pagesSubjects: Multimedia (cs.MM)
 [201] arXiv:1703.03315 (replaced) [pdf, other]

Title: SelfStabilizing Disconnected Components Detection and Rooted ShortestPath Tree Maintenance in Polynomial Steps *Comments: Discrete Mathematics and Theoretical Computer Science DMTCS, 2015, ISSSubjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)
 [202] arXiv:1703.04115 (replaced) [pdf, other]

Title: BetaRun Soccer Simulation League Team: Variety, Complexity, and LearningComments: A sketch for a new team for RoboCup 2D simulation league, currently planned for 2018Subjects: Artificial Intelligence (cs.AI)
 [203] arXiv:1703.06986 (replaced) [pdf, other]

Title: CacheZoom: How SGX Amplifies The Power of Cache AttacksComments: Accepted at Conference on Cryptographic Hardware and Embedded Systems (CHES '17)Subjects: Cryptography and Security (cs.CR)
 [204] arXiv:1703.07418 (replaced) [pdf, other]

Title: Cognitive Hierarchy Theory for Distributed Resource Allocation in the Internet of ThingsComments: To appear in IEEE Transactions on Wireless Communications, 2017Subjects: Information Theory (cs.IT)
 [205] arXiv:1703.08390 (replaced) [pdf, ps, other]

Title: Smart Meter Privacy with Renewable Energy and an Energy Storage DeviceComments: to appear, IEEE Transactions on Information Forensics and SecuritySubjects: Information Theory (cs.IT)
 [206] arXiv:1703.08836 (replaced) [pdf, other]

Title: Learned MultiPatch SimilarityComments: 10 pages, 7 figures, Accepted at ICCV 2017Subjects: Computer Vision and Pattern Recognition (cs.CV); Learning (cs.LG)
 [207] arXiv:1703.10089 (replaced) [pdf, other]

Title: Positionbased Content Attention for Time Series Forecasting with Sequencetosequence RNNsAuthors: Yagmur G. Cinar, Hamid Mirisaee, Parantapa Goswami, Eric Gaussier, Ali AitBachir, Vadim StrijovSubjects: Learning (cs.LG); Neural and Evolutionary Computing (cs.NE)
 [208] arXiv:1703.10594 (replaced) [pdf, other]

Title: The Dynamics of RankMaximal and Popular MatchingsSubjects: Data Structures and Algorithms (cs.DS)
 [209] arXiv:1704.02310 (replaced) [pdf, other]

Title: Matrix Scaling and Balancing via Box Constrained Newton's Method and Interior Point MethodsComments: To appear in FOCS 2017Subjects: Data Structures and Algorithms (cs.DS)
 [210] arXiv:1704.02665 (replaced) [pdf, ps, other]

Title: Supervised Infinite Feature SelectionSubjects: Learning (cs.LG)
 [211] arXiv:1704.03549 (replaced) [pdf, other]

Title: Attentionbased Extraction of Structured Information from Street View ImageryAuthors: Zbigniew Wojna, Alex Gorban, DarShyang Lee, Kevin Murphy, Qian Yu, Yeqing Li, Julian IbarzComments: Updated references, added link to the source codeSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [212] arXiv:1704.04565 (replaced) [pdf, other]

Title: Neural Paraphrase Identification of Questions with Noisy PretrainingSubjects: Computation and Language (cs.CL)
 [213] arXiv:1704.04795 (replaced) [pdf, other]

Title: Root Mean Square Error of Neural Spike Train Sequence Matching with OptogeneticsComments: 6 pages, 5 figures. Will be presented at IEEE Global Communications Conference (IEEE GLOBECOM 2017) in December 2017Subjects: Neurons and Cognition (qbio.NC); Information Theory (cs.IT); Biological Physics (physics.bioph)
 [214] arXiv:1704.04848 (replaced) [pdf, other]
 [215] arXiv:1704.06870 (replaced) [pdf, ps, other]

Title: Algorithms for Covering Multiple BarriersComments: A preliminary version appeared in WADS 2017Subjects: Computational Geometry (cs.CG); Data Structures and Algorithms (cs.DS)
 [216] arXiv:1704.07050 (replaced) [pdf, other]

Title: Using Global Constraints and Reranking to Improve Cognates DetectionComments: 10 pages, 6 figures, 6 tables; published in the Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pages 19831992, Vancouver, Canada, July 2017Journalref: In Proceedings of the 55th Annual Meeting of the Association for Computational Linguistics, pages 19831992, Vancouver, Canada, July 2017. Association for Computational LinguisticsSubjects: Computation and Language (cs.CL); Learning (cs.LG); Machine Learning (stat.ML)
 [217] arXiv:1705.00097 (replaced) [pdf, ps, other]

Title: A lambda calculus for density matrices with classical and probabilistic controlsAuthors: Alejandro DíazCaroComments: Accepted in APLAS 2017 (to appear in LNCS). This version includes a 12pages appendix with proofsSubjects: Logic in Computer Science (cs.LO)
 [218] arXiv:1705.01861 (replaced) [pdf, other]

Title: Action Tubelet Detector for SpatioTemporal Action LocalizationComments: 9 pagesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [219] arXiv:1705.06070 (replaced) [pdf, ps, other]

Title: Rank 3 Inhabitation of Intersection Types Revisited (Extended Version)Subjects: Logic in Computer Science (cs.LO); Computational Complexity (cs.CC)
 [220] arXiv:1705.07120 (replaced) [pdf, other]

Title: VAE with a VampPriorComments: 16 pages, new results (two additional datasets) comparing to the previous version + the text was reorganized and rewrittenSubjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
 [221] arXiv:1705.07450 (replaced) [pdf, other]

Title: Image Segmentation by Iterative Inference from Conditional Score EstimationSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [222] arXiv:1705.08417 (replaced) [pdf, other]

Title: Reinforcement Learning with a Corrupted Reward ChannelComments: A shorter version of this report was accepted to IJCAI 2017 AI and Autonomy trackSubjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)
 [223] arXiv:1705.09218 (replaced) [pdf, other]

Title: Finding Robust Solutions to Stable MarriageComments: IJCAI 2017 proceedingsSubjects: Artificial Intelligence (cs.AI)
 [224] arXiv:1706.01382 (replaced) [pdf, other]

Title: NeuroRAM Unit with Applications to Similarity Testing and Compression in Spiking Neural NetworksSubjects: Neural and Evolutionary Computing (cs.NE); Distributed, Parallel, and Cluster Computing (cs.DC); Data Structures and Algorithms (cs.DS); Neurons and Cognition (qbio.NC)
 [225] arXiv:1706.01570 (replaced) [pdf, other]

Title: Acquisition of Translation Lexicons for Historically Unwritten Languages via Bridging LoanwordsComments: 5 pages, 1 figure, 1 table; published in the Proceedings of the 10th Workshop on Building and Using Comparable Corpora, pages 2125, Vancouver, Canada, August 2017Journalref: In Proceedings of the 10th Workshop on Building and Using Comparable Corpora, pages 2125, Vancouver, Canada, August 2017. Association for Computational LinguisticsSubjects: Computation and Language (cs.CL)
 [226] arXiv:1706.03675 (replaced) [pdf, other]

Title: Postprocessing partitions to identify domains of modularity optimizationComments: this http URLJournalref: Algorithms 10, no. 3: 93 (2017)Subjects: Social and Information Networks (cs.SI); Physics and Society (physics.socph)
 [227] arXiv:1706.04034 (replaced) [pdf, other]

Title: Probabilistic RGBD Odometry based on Points, Lines and Planes Under Depth UncertaintyComments: 30 pages, corrected equation 24 and typosSubjects: Computer Vision and Pattern Recognition (cs.CV); Robotics (cs.RO)
 [228] arXiv:1706.05101 (replaced) [pdf, other]

Title: On Mary Distributed Detection for Power Constraint Wireless Sensor NetworksComments: arXiv admin note: text overlap with arXiv:cs/0703046 by other authorsSubjects: Information Theory (cs.IT)
 [229] arXiv:1706.07418 (replaced) [pdf, ps, other]

Title: Optimal General MatchingsSubjects: Data Structures and Algorithms (cs.DS)
 [230] arXiv:1706.08502 (replaced) [pdf, other]

Title: Natural Language Does Not Emerge 'Naturally' in MultiAgent DialogComments: 9 pages, 7 figures, 2 tables, accepted at EMNLP 2017 as short paperSubjects: Computation and Language (cs.CL); Artificial Intelligence (cs.AI); Computer Vision and Pattern Recognition (cs.CV)
 [231] arXiv:1706.09152 (replaced) [pdf, other]

Title: Generative Bridging Network in Neural Sequence PredictionComments: A submission for AAAI 2018Subjects: Artificial Intelligence (cs.AI); Learning (cs.LG); Machine Learning (stat.ML)
 [232] arXiv:1707.01227 (replaced) [pdf, other]

Title: Exponential random graphs behave like mixtures of stochastic block modelsSubjects: Probability (math.PR); Social and Information Networks (cs.SI); Mathematical Physics (mathph); Combinatorics (math.CO); Statistics Theory (math.ST)
 [233] arXiv:1707.03017 (replaced) [pdf, other]

Title: Learning Visual Reasoning Without Strong PriorsComments: This work was presented at ICML 2017's Machine Learning in Speech and Language Processing WorkshopSubjects: Computer Vision and Pattern Recognition (cs.CV); Artificial Intelligence (cs.AI); Computation and Language (cs.CL); Machine Learning (stat.ML)
 [234] arXiv:1707.05501 (replaced) [pdf, other]

Title: Story Generation from Sequence of Independent Short DescriptionsAuthors: Parag Jain, Priyanka Agrawal, Abhijit Mishra, Mohak Sukhwani, Anirban Laha, Karthik SankaranarayananComments: Accepted in SIGKDD Workshop on Machine Learning for Creativity (ML4Creativity), 2017Subjects: Computation and Language (cs.CL)
 [235] arXiv:1707.05740 (replaced) [pdf, other]

Title: Skeleton Based Human Action Recognition with Global ContextAware Attention LSTM NetworksSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [236] arXiv:1707.06168 (replaced) [pdf, other]

Title: Channel Pruning for Accelerating Very Deep Neural NetworksComments: To be appear at ICCV 2017Subjects: Computer Vision and Pattern Recognition (cs.CV)
 [237] arXiv:1707.06381 (replaced) [pdf]

Title: Adaptive Learning Rule for Hardwarebased Deep Neural Networks Using Electronic Synapse DevicesAuthors: Suhwan Lim, JongHo Bae, JaiHo Eum, Sungtae Lee, ChulHeung Kim, Dongseok Kwon, ByungGook Park, JongHo LeeSubjects: Neural and Evolutionary Computing (cs.NE); Emerging Technologies (cs.ET)
 [238] arXiv:1707.06766 (replaced) [pdf, other]

Title: OutcomeOriented Predictive Process Monitoring: Review and BenchmarkSubjects: Artificial Intelligence (cs.AI)
 [239] arXiv:1707.07716 (replaced) [pdf, other]

Title: Stochastic Gradient Descent for Relational Logistic Regression via Partial Network CrawlsComments: 7 pages, 3 figures, Proceedings of the Seventh International Workshop on Statistical Relational AI (StarAI 2017)Subjects: Machine Learning (stat.ML); Learning (cs.LG)
 [240] arXiv:1707.09979 (replaced) [pdf, other]

Title: Rational invariants of ternary forms under the orthogonal groupComments: Typos and references corrected. 34 pages, 5 figuresSubjects: Symbolic Computation (cs.SC)
 [241] arXiv:1708.01383 (replaced) [pdf, other]

Title: Convergence of VarianceReduced Stochastic Learning under Random ReshufflingSubjects: Learning (cs.LG); Optimization and Control (math.OC); Machine Learning (stat.ML)
 [242] arXiv:1708.01666 (replaced) [pdf]

Title: An Effective Training Method For Deep Convolutional Neural NetworkSubjects: Learning (cs.LG); Artificial Intelligence (cs.AI); Machine Learning (stat.ML)
 [243] arXiv:1708.03310 (replaced) [pdf, other]

Title: Thinking, Fast and Slow: Combining Vector Spaces and Knowledge GraphsSubjects: Artificial Intelligence (cs.AI)
 [244] arXiv:1708.03604 (replaced) [pdf, other]

Title: Porting of the DBCSR library for Sparse MatrixMatrix Multiplications to Intel Xeon Phi systemsComments: Submitted to the ParCo2017 conference, Bologna, Italy 1215 September 2017Subjects: Distributed, Parallel, and Cluster Computing (cs.DC)
 [245] arXiv:1708.04418 (replaced) [pdf]

Title: An Exploratory Study of Health Habit Formation Through GamificationAuthors: Anna IurchenkoComments: 5 pages, 2 tables, 2 figuresSubjects: HumanComputer Interaction (cs.HC)
 [246] arXiv:1708.04754 (replaced) [pdf, other]

Title: Specification and Implementation of Replicated List: The Jupiter Protocol RevisitedComments: 17 pages, 10 figuresSubjects: Distributed, Parallel, and Cluster Computing (cs.DC)
 [247] arXiv:1708.04866 (replaced) [pdf, other]

Title: Economic Factors of Vulnerability Trade and Exploitation: Empirical Evidence from a Prominent Russian Cybercrime MarketAuthors: Luca AllodiComments: To appear in the Proceedings of ACM CCS 2017. 17 pages, 11 figures, 14 tablesSubjects: Cryptography and Security (cs.CR)
 [248] arXiv:1708.05234 (replaced) [pdf, other]

Title: FaceBoxes: A CPU Realtime Face Detector with High AccuracyComments: Accepted by IJCB 2017; Added referencesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [249] arXiv:1708.05473 (replaced) [pdf, other]

Title: Dilated Residual Network for Image DenoisingComments: 8 pagesSubjects: Computer Vision and Pattern Recognition (cs.CV)
 [250] arXiv:1708.05517 (replaced) [pdf, other]

Title: EveTAR: Building a LargeScale MultiTask Test Collection over Arabic TweetsSubjects: Information Retrieval (cs.IR)
 [251] arXiv:1708.05636 (replaced) [pdf, other]

Title: What does a convolutional neural network recognize in the moon?Authors: Daigo ShojiComments: 13 pages, 6 figuresSubjects: Computer Vision and Pattern Recognition (cs.CV); Earth and Planetary Astrophysics (astroph.EP); Geophysics (physics.geoph)
[ showing up to 2000 entries per page: fewer  more ]
Disable MathJax (What is MathJax?)