_id
sequence
label
stringlengths
5
77
text
stringlengths
78
3.43k
[ 26, 38 ]
math.RT math.NT
From the Monster to Thompson to O'Nan. The commencement of monstrous moonshine is a connection between the largest sporadic simple group the monster and complex elliptic curves. Here we explain how a closer look at this connection leads, via the Thompson group, to recently observed relationships between the non monstrous sporadic simple group of O'Nan and certain families of elliptic curves defined over the rationals. We also describe umbral moonshine from this perspective.
[ 48, 77 ]
math.LO cs.CC
New relations and separations of conjectures about incompleteness in the finite domain. Our main results are in the following three sections 1. We prove new relations between proof complexity conjectures that are discussed in cite pu18 . 2. We investigate the existence of p optimal proof systems for mathsf TAUT , assuming the collapse of cal C and sf N cal C (the nondeterministic version of cal C ) for some new classes cal C and also prove new conditional independence results for strong theories, assuming nonexistence of p optimal proof systems. 3. We construct two new oracles cal V and cal W . These two oracles imply several new separations of proof complexity conjectures in relativized worlds. Among them, we prove that existence of a p optimal proof system for mathsf TAUT and existence of a complete problem for mathsf TFNP are independent of each other in relativized worlds which was not known before.
[ 0 ]
cs.CV
Extended Local Binary Patterns for Efficient and Robust Spontaneous Facial Micro Expression Recognition. Facial Micro Expressions (MEs) are spontaneous, involuntary facial movements when a person experiences an emotion but deliberately or unconsciously attempts to conceal his or her genuine emotions. Recently, ME recognition has attracted increasing attention due to its potential applications such as clinical diagnosis, business negotiation, interrogations, and security. However, it is expensive to build large scale ME datasets, mainly due to the difficulty of inducing spontaneous MEs. This limits the application of deep learning techniques which require lots of training data. In this paper, we propose a simple, efficient yet robust descriptor called Extended Local Binary Patterns on Three Orthogonal Planes (ELBPTOP) for ME recognition. ELBPTOP consists of three complementary binary descriptors LBPTOP and two novel ones Radial Difference LBPTOP (RDLBPTOP) and Angular Difference LBPTOP (ADLBPTOP), which explore the local second order information along the radial and angular directions contained in ME video sequences. ELBPTOP is a novel ME descriptor inspired by unique and subtle facial movements. It is computationally efficient and only marginally increases the cost of computing LBPTOP, yet is extremely effective for ME recognition. In addition, by firstly introducing Whitened Principal Component Analysis (WPCA) to ME recognition, we can further obtain more compact and discriminative feature representations, then achieve significantly computational savings. Extensive experimental evaluation on three popular spontaneous ME datasets SMIC, CASME II and SAMM show that our proposed ELBPTOP approach significantly outperforms the previous state of the art on all three single evaluated datasets and achieves promising results on cross database recognition.Our code will be made available.
[ 46 ]
math.AG
Universal degeneracy classes for vector bundles on mathbb P 1 bundles. Given a vector bundle on a mathbb P 1 bundle, the base is stratified by degeneracy loci measuring the spitting type of the vector bundle restricted to each fiber. The classes of these degeneracy loci in the Chow ring or cohomology ring of the base are natural invariants characterizing the degenerations of the vector bundle. When these degeneracy loci occur in the expected codimension, we find their classes. This yields universal formulas for degeneracy classes in terms of naturally arising vector bundles on the base. Our results hold over arbitrary fields of any characteristic.
[ 32, 17, 68, 65 ]
cs.DC cs.DM cs.DS cs.NI
Terminating cases of flooding. Basic synchronous flooding proceeds in rounds. Given a finite undirected (network) graph G , a set of sources I subseteq G initiate flooding in the first round by every node in I sending the same message to all of its neighbours. In each subsequent round, nodes send the message to all of their neighbours from which they did not receive the message in the previous round. Flooding terminates when no node in G sends a message in a round. The question of termination has not been settled rather, non termination is implicitly assumed to be possible. We show that flooding terminates on every finite graph. In the case of a single source g 0 , flooding terminates in e rounds if G is bipartite and j rounds with e j leq e d 1 otherwise, where e and d are the eccentricity of g 0 and diameter of G respectively. For communication broadcast to all nodes, this is asymptotically time optimal and obviates the need for construction and maintenance of spanning structures. We extend to dynamic flooding initiated in multiple rounds with possibly multiple messages. The cases where a node only sends a message to neighbours from which it did not receive it any message in the previous round, and where a node sends some highest ranked message to all neighbours from which it did not receive it that message in the previous round, both terminate. All these cases also hold if the network graph loses edges over time. Non terminating cases include asynchronous flooding, flooding where messages have fixed delays at edges, cases of multiple message flooding and cases where the network graph acquires edges over time.
[ 66 ]
cs.CE
Direct dissipation based arc length approach for the cracking elements method. Dissipated energy, representing a monotonically increasing state variable in nonlinear fracture mechanics, can be used as a restraint for tracing the dissipation instead of the elastic unloading path of the structure response. In this work, in contrast to other energy based approaches that use internal energy and the work done by the external loads, a novel arc length approach is proposed. It directly extracts the dissipated energy based on crack openings and tractions (displacement jumps and cohesive forces between two surfaces of one crack), taking advantage of the global extended method of cracking elements. Its linearized form is developed, and the stiffness factor of the arc length restraint is naturally obtained by means of the Sherman Morrison formula. Once cohesive cracks appear, the proposed approach can be applied until most of the fracture energy is dissipated. Results from several numerical tests, in which arc length control and self propagating cracks are jointly used, are presented. They demonstrate the robustness of the proposed method, which captures both global and local peak loads and all snap back parts of the force displacement responses of loaded structures with multiple cracks.
[ 3 ]
cs.CL
Demoting Racial Bias in Hate Speech Detection. In current hate speech datasets, there exists a high correlation between annotators' perceptions of toxicity and signals of African American English (AAE). This bias in annotated training data and the tendency of machine learning models to amplify it cause AAE text to often be mislabeled as abusive offensive hate speech with a high false positive rate by current hate speech classifiers. In this paper, we use adversarial training to mitigate this bias, introducing a hate speech classifier that learns to detect toxic sentences while demoting confounds corresponding to AAE texts. Experimental results on a hate speech dataset and an AAE dataset suggest that our method is able to substantially reduce the false positive rate for AAE text while only minimally affecting the performance of hate speech classification.
[ 9 ]
math.AP
Controllability of two point boundary value problem for wave equations in L 1 and L 2 spaces One dimensional case. In this paper we discuss the controllability of two point boundary value problem (TBVP) for one dimensional wave equation. Some new concepts are introduced TBVP input control problem, minimum input solution (MS) and pre minimum input solution (PMS). We set the metric in L 1 and L 2 spaces on a closed set, and control the input to reach its minimum. And we mainly discuss the property of input, the existence and uniqueness of MS and PMS for L 1 and L 2 metric respectively. The minimum inputs lie on a strip in L 1 and PMS for L 1 and L 2 always exists. Furthermore, to construct PMS, we also introduce an approximation method which meets certain conditions.
[ 18, 29 ]
math.GT math.GR
Prescribed virtual homological torsion of 3 manifolds. We prove that given any finite abelian group A and any irreducible 3 manifold M with empty or toroidal boundary which is not a graph manifold there exists a finite cover M' to M so that A is a direct factor in H 1(M', mathbb Z ) . This generalizes results of Sun and of Friedl Herrmann.
[ 41 ]
cs.RO
A Reconfigurable Hybrid Actuator with Rigid and Soft Components. Classical rigid bodied robotic systems are presented with proven success in theoretical development and industrial applications, are recently challenged by the emergence of soft robotics due to a growing need in physical human robot interactions (pHRI), such as wearable devices, medical robots, personal robots, etc. In this paper, we present the design and fabrication of a robust, hybrid bending actuator build from both rigid and soft components inspired by crustaceans, where its bending radius and axis can be mechanically programmed through the selective activation of the rigid exterior joints, actuated by the soft actuators inside. The hybrid actuator was experimentally measured in terms of bending and force tests to demonstrate the utility of this design. Finally, a case study was presented to demonstrate its capacity to adapt to specific objects geometry, anticipating its potential application in situations where compliance is the priority.
[ 0, 66, 30 ]
q-fin.ST cs.CE cs.CV
GA MSSR Genetic Algorithm Maximizing Sharpe and Sterling Ratio Method for RoboTrading. Foreign exchange is the largest financial market in the world, and it is also one of the most volatile markets. Technical analysis plays an important role in the forex market and trading algorithms are designed utilizing machine learning techniques. Most literature used historical price information and technical indicators for training. However, the noisy nature of the market affects the consistency and profitability of the algorithms. To address this problem, we designed trading rule features that are derived from technical indicators and trading rules. The parameters of technical indicators are optimized to maximize trading performance. We also proposed a novel cost function that computes the risk adjusted return, Sharpe and Sterling Ratio (SSR), in an effort to reduce the variance and the magnitude of drawdowns. An automatic robotic trading (RoboTrading) strategy is designed with the proposed Genetic Algorithm Maximizing Sharpe and Sterling Ratio model (GA MSSR) model. The experiment was conducted on intraday data of 6 major currency pairs from 2018 to 2019. The results consistently showed significant positive returns and the performance of the trading system is superior using the optimized rule based features. The highest return obtained was 320 annually using 5 minute AUDUSD currency pair. Besides, the proposed model achieves the best performance on risk factors, including maximum drawdowns and variance in return, comparing to benchmark models. The code can be accessed at https github.com zzzac rule based forextrading system
[ 38, 23 ]
math.FA math.NT
Fourier uniqueness in mathbb R 4 . We show an interrelation between the uniqueness aspect of the recent Fourier interpolation formula of Radchenko and Viazovska and the Heisenberg uniqueness study for the Klein Gordon equation and the lattice cross of critical density, studied by Hedenmalm and Montes Rodriguez. This has been known since 2017.
[ 56, 2 ]
cs.AI cs.LO
Abstract Argumentation and the Rational Man. Abstract argumentation has emerged as a method for non monotonic reasoning that has gained popularity in the symbolic artificial intelligence community. In the literature, the different approaches to abstract argumentation that were refined over the years are typically evaluated from a formal logics perspective an analysis that is based on models of economically rational decision making does not exist. In this paper, we work towards addressing this issue by analyzing abstract argumentation from the perspective of the rational man paradigm in microeconomic theory. To assess under which conditions abstract argumentation based decision making can be considered economically rational, we derive reference independence as a non monotonic inference property from a formal model of economic rationality and create a new argumentation principle that ensures compliance with this property. We then compare the reference independence principle with other reasoning principles, in particular with cautious monotony and rational monotony. We show that the argumentation semantics as proposed in Dung's seminal paper, as well as other semantics we evaluate with the exception of naive semantics and the SCC recursive CF2 semantics violate the reference independence principle. Consequently, we investigate how structural properties of argumentation frameworks impact the reference independence principle, and identify cyclic expansions (both even and odd cycles) as the root of the problem. Finally, we put reference independence into the context of preference based argumentation and show that for this argumentation variant, which explicitly models preferences, reference independence cannot be ensured in a straight forward manner.
[ 3 ]
cs.CL
Don't Say That! Making Inconsistent Dialogue Unlikely with Unlikelihood Training. Generative dialogue models currently suffer from a number of problems which standard maximum likelihood training does not address. They tend to produce generations that (i) rely too much on copying from the context, (ii) contain repetitions within utterances, (iii) overuse frequent words, and (iv) at a deeper level, contain logical flaws. In this work we show how all of these problems can be addressed by extending the recently introduced unlikelihood loss (Welleck et al., 2019) to these cases. We show that appropriate loss functions which regularize generated outputs to match human distributions are effective for the first three issues. For the last important general issue, we show applying unlikelihood to collected data of what a model should not do is effective for improving logical consistency, potentially paving the way to generative models with greater reasoning ability. We demonstrate the efficacy of our approach across several dialogue tasks.
[ 0, 1 ]
cs.CV cs.LG
Adversarial Learning of Disentangled and Generalizable Representations for Visual Attributes. Recently, a multitude of methods for image to image translation have demonstrated impressive results on problems such as multi domain or multi attribute transfer. The vast majority of such works leverages the strengths of adversarial learning and deep convolutional autoencoders to achieve realistic results by well capturing the target data distribution. Nevertheless, the most prominent representatives of this class of methods do not facilitate semantic structure in the latent space, and usually rely on binary domain labels for test time transfer. This leads to rigid models, unable to capture the variance of each domain label. In this light, we propose a novel adversarial learning method that (i) facilitates the emergence of latent structure by semantically disentangling sources of variation, and (ii) encourages learning generalizable, continuous, and transferable latent codes that enable flexible attribute mixing. This is achieved by introducing a novel loss function that encourages representations to result in uniformly distributed class posteriors for disentangled attributes. In tandem with an algorithm for inducing generalizable properties, the resulting representations can be utilized for a variety of tasks such as intensity preserving multi attribute image translation and synthesis, without requiring labelled test data. We demonstrate the merits of the proposed method by a set of qualitative and quantitative experiments on popular databases such as MultiPIE, RaFD, and BU 3DFE, where our method outperforms other, state of the art methods in tasks such as intensity preserving multi attribute transfer and synthesis.
[ 0 ]
cs.CV
Superpixel Segmentation Based on Spatially Constrained Subspace Clustering. Superpixel segmentation aims at dividing the input image into some representative regions containing pixels with similar and consistent intrinsic properties, without any prior knowledge about the shape and size of each superpixel. In this paper, to alleviate the limitation of superpixel segmentation applied in practical industrial tasks that detailed boundaries are difficult to be kept, we regard each representative region with independent semantic information as a subspace, and correspondingly formulate superpixel segmentation as a subspace clustering problem to preserve more detailed content boundaries. We show that a simple integration of superpixel segmentation with the conventional subspace clustering does not effectively work due to the spatial correlation of the pixels within a superpixel, which may lead to boundary confusion and segmentation error when the correlation is ignored. Consequently, we devise a spatial regularization and propose a novel convex locality constrained subspace clustering model that is able to constrain the spatial adjacent pixels with similar attributes to be clustered into a superpixel and generate the content aware superpixels with more detailed boundaries. Finally, the proposed model is solved by an efficient alternating direction method of multipliers (ADMM) solver. Experiments on different standard datasets demonstrate that the proposed method achieves superior performance both quantitatively and qualitatively compared with some state of the art methods.
[ 1, 2, 43 ]
cs.AI cs.DB cs.LG
Beta Embeddings for Multi Hop Logical Reasoning in Knowledge Graphs. One of the fundamental problems in Artificial Intelligence is to perform complex multi hop logical reasoning over the facts captured by a knowledge graph (KG). This problem is challenging, because KGs can be massive and incomplete. Recent approaches embed KG entities in a low dimensional space and then use these embeddings to find the answer entities. However, it has been an outstanding challenge of how to handle arbitrary first order logic (FOL) queries as present methods are limited to only a subset of FOL operators. In particular, the negation operator is not supported. An additional limitation of present methods is also that they cannot naturally model uncertainty. Here, we present BetaE, a probabilistic embedding framework for answering arbitrary FOL queries over KGs. BetaE is the first method that can handle a complete set of first order logical operations conjunction ( wedge ), disjunction ( vee ), and negation ( neg ). A key insight of BetaE is to use probabilistic distributions with bounded support, specifically the Beta distribution, and embed queries entities as distributions, which as a consequence allows us to also faithfully model uncertainty. Logical operations are performed in the embedding space by neural operators over the probabilistic embeddings. We demonstrate the performance of BetaE on answering arbitrary FOL queries on three large, incomplete KGs. While being more general, BetaE also increases relative performance by up to 25.4 over the current state of the art KG reasoning methods that can only handle conjunctive queries without negation.
[ 18, 42 ]
math.GT math.DG
Short closed geodesics on cusped hyperbolic surfaces. This article deals with the set of closed geodesics on complete finite type hyperbolic surfaces. For any non negative integer k , we consider the set of closed geodesics that self intersect at least k times, and investigate those of minimal length. The main result is that, if the surface has at least one cusp, their self intersection numbers are exactly k for large enough k .
[ 27, 75 ]
math.KT math.CT
The theory of half derivators. We review the theory of derivators from the ground up, defining new classes of derivators which were originally motivated by derivator K theory. We prove that many old arguments that relied on homotopical bicompleteness hold also for one sided half derivators on arbitrary diagram categories. We end by defining the maximal domain for a K theory of derivators generalising Waldhausen K theory.
[ 20 ]
math.NA cs.NA
AIR algebraic multigrid for a space time hybridizable discontinuous Galerkin discretization of advection( diffusion). This paper investigates the efficiency, robustness, and scalability of approximate ideal restriction (AIR) algebraic multigrid as a preconditioner in the all at once solution of a space time hybridizable discontinuous Galerkin (HDG) discretization of advection dominated flows. The motivation for this study is that the time dependent advection diffusion equation can be seen as a "steady" advection diffusion problem in (d 1) dimensions and AIR has been shown to be a robust solver for steady advection dominated problems. Numerical examples demonstrate the effectiveness of AIR as a preconditioner for advection diffusion problems on fixed and time dependent domains, using both slab by slab and all at once space time discretizations, and in the context of uniform and space time adaptive mesh refinement. A closer look at the geometric coarsening structure that arises in AIR also explains why AIR can provide robust, scalable space time convergence on advective and hyperbolic problems, while most multilevel parallel in time schemes struggle with such problems.
[ 46 ]
math.AG
A characterization of the U(Omega,m) sets of a hyperelliptic curve as Omega and m vary. In this article we consider a certain distinguished set U( Omega,m) subseteq 1,2, ldots,2g 1, infty that can be attached to a marked hyperelliptic curve of genus g equipped with a small period matrix Omega for its polarized Jacobian. We show that as Omega and the marking m vary, this set ranges over all possibilities prescribed by an argument of Poor.
[ 20, 15 ]
cs.IT cs.NA math.IT math.NA
A Novel RIS Assisted Modulation Scheme. In this work, in order to achieve higher spectrum efficiency, we propose a reconfigurable intelligent surface (RIS) assisted multi user communication uplink system. Different from previous work in which the RIS only optimizes the phase of the incident users's signal, we propose the use of the RIS to create a virtual constellation diagram to transmit the data of an additional user signal. We focus on the two user case and develop a tight approximation for the cumulative distribution function (CDF) of the received signal to noise ratio of both users. Then, based on the proposed statistical distribution, we derive the analytical expressions of the average bit error rate of the considered two users. The paper shows the trade off between the performance of the two users against each other as a function of the proposed phase shift at the RIS.
[ 9, 6 ]
math.AP physics.flu-dyn
An error bound for the slender body approximation of a thin, rigid fiber sedimenting in Stokes flow. We investigate the motion of a thin rigid body in Stokes flow and the corresponding slender body approximation used to model sedimenting fibers. In particular, we derive a rigorous error bound comparing the rigid slender body approximation to the classical PDE for rigid motion in the case of a closed loop with constant radius. Our main tool is the slender body PDE framework established by the authors and D. Spirn in 18,19 , which we adapt to the rigid setting.
[ 21 ]
math.CO
Constructing saturating sets in projective spaces using subgeometries. A varrho saturating set of text PG (N,q) is a point set mathcal S such that any point of text PG (N,q) lies in a subspace of dimension at most varrho spanned by points of mathcal S . It is generally known that a varrho saturating set of text PG (N,q) has size at least c cdot varrho ,q frac N varrho varrho 1 , with c frac 1 3 a constant. Our main result is the discovery of a varrho saturating set of size roughly frac ( varrho 1)( varrho 2) 2 q frac N varrho varrho 1 if q (q') varrho 1 , with q' an arbitrary prime power. The existence of such a set improves most known upper bounds on the smallest possible size of varrho saturating sets if varrho frac 2N 1 3 . As saturating sets have a one to one correspondence to linear covering codes, this result improves existing upper bounds on the length and covering density of such codes. To prove that this construction is a varrho saturating set, we observe that the affine parts of q' subgeometries of text PG (N,q) having a hyperplane in common, behave as certain lines of text AG big( varrho 1,(q') N big) . More precisely, these affine lines are the lines of the linear representation of a q' subgeometry text PG ( varrho,q') embedded in text PG big( varrho 1,(q') N big) .
[ 32 ]
cs.DS
Entropy conservation for comparison based algorithms. Comparison based algorithms are algorithms for which the execution of each operation is solely based on the outcome of a series of comparisons between elements. Comparison based computations can be naturally represented via the following computational model (a) model data structures as partially ordered finite sets (b) model data on these by topological sorts (c) considering computation states as finite multisets of such data (d) represent computations by their induced transformations on states. In this view, an abstract specification of a sorting algorithm has input state given by any possible permutation of a finite set of elements (represented, according to (a) and (b), by a discrete partially ordered set together with its topological sorts given by all permutations) and output state a sorted list of elements (represented, again according to (a) and (b), by a linearly ordered finite set with its unique topological sort). Entropy is a measure of "randomness" or "disorder." Based on the computational model, we introduce an entropy conservation result for comparison based algorithms "quantitative order gained is proportional to positional order lost." Intuitively, the result bears some relation to the messy office argument advocating a chaotic office where nothing is in the right place yet each item's place is known to the owner, over the case where each item is stored in the right order and yet the owner can no longer locate the items. Formally, we generalize the result to the class of data structures representable via series parallel partial orders a well known computationally tractable class. The resulting "denotational" version of entropy conservation will be extended in follow up work to an "operational" version for a core part of our computational model.
[ 13, 46 ]
math.DS math.AG
Automorphisms of compact K "ahler manifolds with slow dynamics. We study the automorphisms of compact K "ahler manifolds having slow dynamics. By adapting Gromov's classical argument, we give an upper bound on the polynomial entropy and study its possible values in dimensions 2 and 3 . We prove that every automorphism with sublinear derivative growth is an isometry a counter example is given in the C infty context, answering negatively a question of Artigue, Carrasco Olivera and Monteverde on polynomial entropy. Finally, we classify minimal automorphisms in dimension 2 and prove they exist only on tori. We conjecture that this is true for any dimension.
[ 0 ]
cs.CV
Coherent Semantic Attention for Image Inpainting. The latest deep learning based approaches have shown promising results for the challenging task of inpainting missing regions of an image. However, the existing methods often generate contents with blurry textures and distorted structures due to the discontinuity of the local pixels. From a semantic level perspective, the local pixel discontinuity is mainly because these methods ignore the semantic relevance and feature continuity of hole regions. To handle this problem, we investigate the human behavior in repairing pictures and propose a fined deep generative model based approach with a novel coherent semantic attention (CSA) layer, which can not only preserve contextual structure but also make more effective predictions of missing parts by modeling the semantic relevance between the holes features. The task is divided into rough, refinement as two steps and model each step with a neural network under the U Net architecture, where the CSA layer is embedded into the encoder of refinement step. To stabilize the network training process and promote the CSA layer to learn more effective parameters, we propose a consistency loss to enforce the both the CSA layer and the corresponding layer of the CSA in decoder to be close to the VGG feature layer of a ground truth image simultaneously. The experiments on CelebA, Places2, and Paris StreetView datasets have validated the effectiveness of our proposed methods in image inpainting tasks and can obtain images with a higher quality as compared with the existing state of the art approaches.
[ 36, 7 ]
physics.chem-ph physics.comp-ph
Diffusion Monte Carlo evaluation of disiloxane linearization barrier. The disiloxane molecule is a prime example of silicate compounds containing the Si O Si bridge. The molecule is of significant interest within the field of quantum chemistry, owing to the difficulty in theoretically predicting its properties. Herein, the linearisation barrier of disiloxane is investigated using a fixed node diffusion Monte Carlo (FNDMC) approach, which is currently the most reliable it ab initio method in accounting for an electronic correlation. Calculations utilizing the density functional theory (DFT) and the coupled cluster method with single and double substitutions, including noniterative triples (CCSD(T))are carried out alongside FNDMC for comparison. Two families of basis sets are used to investigate the disiloxane linearisation barrier Dunning's correlation consistent basis sets cc pV x Z ( x D, T, and Q) and their core valence correlated counterparts, cc pCV x Z. It is concluded that FNDMC successfully predicts the disiloxane linearisation barrier and does not depend on the completeness of the basis sets as much as DFT or CCSD(T), thus establishing its suitability.
[ 0, 83 ]
cs.MM cs.CV
OpenKinoAI An Open Source Framework for Intelligent Cinematography and Editing of Live Performances. OpenKinoAI is an open source framework for post production of ultra high definition video which makes it possible to emulate professional multiclip editing techniques for the case of single camera recordings. OpenKinoAI includes tools for uploading raw video footage of live performances on a remote web server, detecting, tracking and recognizing the performers in the original material, reframing the raw video into a large choice of cinematographic rushes, editing the rushes into movies, and annotating rushes and movies for documentation purposes. OpenKinoAI is made available to promote research in multiclip video editing of ultra high definition video, and to allow performing artists and companies to use this research for archiving, documenting and sharing their work online in an innovative fashion.
[ 76, 12, 20, 23 ]
math.CA cs.NA math.FA math.NA math.SP
Estimates for the SVD of the truncated Fourier transform on L2(exp(b times )) and stable analytic continuation. The Fourier transform truncated on c,c is usually analyzed when acting on L 2( 1 b,1 b) and its right singular vectors are the prolate spheroidal wave functions. This paper considers the operator acting on the larger space L 2(exp(b . )) on which it remains injective. We give nonasymptotic upper and lower bounds on the singular values with similar qualitative behavior in m (the index), b, and c. The lower bounds are used to obtain rates of convergence for stable analytic continuation of possibly nonbandlimited functions whose Fourier transform belongs to L 2(exp(b . )). We also derive bounds on the sup norm of the singular functions. Finally, we propose a numerical method to compute the SVD and apply it to stable analytic continuation when the function is observed with error on an interval.
[ 67, 5 ]
physics.atom-ph physics.plasm-ph
Expansion Dynamics of Cold Non Neutral Plasma. We study the expansion of a strongly coupled, non neutral, and cylindrically arranged ion plasma into the vacuum. The plasma is made from cold rubidium atoms in a magneto optical trap (MOT) and is formed via ultraviolet photoionization. Higher density and lower density plasmas are studied to exhibit different aspects indicative of strong coupling. In a higher density regime, we report on the formation and persistence of plasma shock fronts, as well as external field induced plasma focusing effects. In the lower density regime, conditions are ideal to observe the development and evolution of nearest neighbor ion correlations, as well as geometry induced asymmetries in the pair correlation function. Simulated results from a trajectory model and a fluid model are in good agreement with the measurements.
[ 21, 31 ]
math.CO q-bio.PE
A path deformation framework for determining weighted genome rearrangement distance. Measuring the distance between two bacterial genomes under the inversion process is usually done by assuming all inversions to occur with equal probability. Recently, an approach to calculating inversion distance using group theory was introduced, and is effective for the model in which only very short inversions occur. In this paper, we show how to use the group theoretic framework to establish minimal distance for any weighting on the set of inversions, generalizing previous approaches. To do this we use the theory of rewriting systems for groups, and exploit the Knuth Bendix algorithm, the first time this theory has been introduced into genome rearrangement problems. The central idea of the approach is to use existing group theoretic methods to find an initial path between two genomes in genome space (for instance using only short inversions), and then to deform this path to optimality using a confluent system of rewriting rules generated by the Knuth Bendix algorithm.
[ 49 ]
math.OC
Dynamic Output Feedback Stabilization of Non uniformly Observable Dissipative Systems. Output feedback stabilization of control systems is a crucial issue in engineering. Most of these systems are not uniformly observable, which proves to be a difficulty to move from state feedback stabilization to dynamic output feedback stabilization. In this paper, we present a methodology to overcome this challenge in the case of dissipative systems by requiring only target detectability. These systems appear in many physical systems and we provide various examples and applications of the result.
[ 8, 51 ]
physics.optics physics.bio-ph
Multiline Orthogonal Scanning Temporal Focusing (mosTF) Microscopy for Scattering Reduction in High speed in vivo Brain Imaging. Temporal focusing two photon microscopy enables high resolution imaging of fine structures in vivo over a large volume. A limitation of temporal focusing is that signal to background ratio and resolution degrade rapidly with increasing imaging depth. This degradation originates from the scattered emission photons are widely distributed resulting in a strong background. We have developed Multiline Orthogonal Scanning Temporal Focusing (mosTF) microscopy that overcomes this problem. mosTF captures a sequence of images at each scan location of the excitation line, followed by a reconstruction algorithm reassigns scattered photons back to the correct scan position. We demonstrate mosTF by acquiring mice neuronal images in vivo. Our results show remarkably improvements with mosTF for in vivo brain imaging while maintaining its speed advantage.
[ 34, 13 ]
math.CV math.DS
Speeds of convergence of orbits of non elliptic semigroups of holomorphic self maps of the unit disc. We introduce three quantities related to orbits of non elliptic continuous semigroups of holomorphic self maps of the unit disc, the total speed, the orthogonal speed and the tangential speed and show how they are related and what can be inferred from those.
[ 0, 41, 1 ]
cs.RO cs.CV cs.LG
Learning Object Manipulation Skills via Approximate State Estimation from Real Videos. Humans are adept at learning new tasks by watching a few instructional videos. On the other hand, robots that learn new actions either require a lot of effort through trial and error, or use expert demonstrations that are challenging to obtain. In this paper, we explore a method that facilitates learning object manipulation skills directly from videos. Leveraging recent advances in 2D visual recognition and differentiable rendering, we develop an optimization based method to estimate a coarse 3D state representation for the hand and the manipulated object(s) without requiring any supervision. We use these trajectories as dense rewards for an agent that learns to mimic them through reinforcement learning. We evaluate our method on simple single and two object actions from the Something Something dataset. Our approach allows an agent to learn actions from single videos, while watching multiple demonstrations makes the policy more robust. We show that policies learned in a simulated environment can be easily transferred to a real robot.
[ 42 ]
math.DG
Singular minimal translation surfaces in Euclidean spaces endowed with semi symmetric connections. In this paper, we study and classify singular minimal translation surfaces in a Euclidean space of dimension 3 endowed with a certain semi symmetric (non )metric connection.
[ 21 ]
math.CO
Fibonacci run graphs II Degree sequences. Fibonacci cubes are induced subgraphs of hypercube graphs obtained by restricting the vertex set to those binary strings which do not contain consecutive 1s. This class of graphs has been studied extensively and generalized in many different directions. Induced subgraphs of the hypercube on binary strings with restricted runlengths as vertices define Fibonacci run graphs. These graphs have the same number of vertices as Fibonacci cubes, but fewer edges and different graph theoretical properties. Basic properties of Fibonacci run graphs are presented in a companion paper, while in this paper we consider the nature of the degree sequences of Fibonacci run graphs. The generating function we obtain is a refinement of the generating function of the degree sequences, and has a number of corollaries, obtained as specializations. We also obtain several properties of Fibonacci run graphs viewed as a partially ordered set, and discuss its embedding properties.
[ 25, 21, 70 ]
math.HO math.CO math.PR
A Quantitative Study on Average Number of Spins of Two Player Dreidel. We give an excellent approximation of the average number of spins of a simplified version of a two player version of the game Dreidel. We also make a conjecture on the average number of spins of the full version of the game.
[ 20, 76 ]
math.NA cs.NA math.SP
A new regularization method for linear exponentially ill posed problems. This paper provides a new regularization method which is particularly suitable for linear exponentially ill posed problems. Under logarithmic source conditions (which have a natural interpretation in terms of Sobolev spaces in the aforementioned context), concepts of qualifications as well as order optimal rates of convergence are presented. Optimality results under general source conditions expressed in terms of index functions are also studied. Finally, numerical experiments on three test problems attest the better performance of the new method compared to the well known Tikhonov method in instances of exponentially ill posed problems.
[ 50, 60 ]
physics.med-ph cs.AR
A concept of a measuring system for probe kinesthetic parameters identification during echocardiography examination. Echocardiography is the most commonly used imaging technique in clinical cardiology. Due to the high demand for this type of examination and the small number of specialists, there is a need to support the examination process through telemedicine. Moreover, specialist training can be supported by appropriate simulation systems. For (i) creating tailor made tele echo robots, (ii) creating echo system simulators, and (iii) conducting echo examination with local or remote expert assistance, knowledge about echo probe kinesthetic parameters during echocardiography examination is advisable. The article describes the concept of a measuring system for obtaining such data.
[ 23 ]
math.FA
Isometric composition operators on Lipschitz spaces. Given pointed metric spaces X and Y , we characterize the basepoint preserving Lipschitz maps phi from Y to X inducing an isometric composition operator C phi between the Lipschitz spaces Lip 0(X) and Lip 0(Y) , whenever X enjoys the peak property. This gives an answer to a question posed by N. Weaver in his book Lipschitz algebras. Second edition. World Scientific Publishing Co. Pte. Ltd., Hackensack, NJ, 2018 .
[ 5 ]
physics.plasm-ph
Radiation induced acceleration of ions. Radiation friction can have a substantial impact on electron dynamics in a transparent target exposed to a strong laser pulse. In particular, by modifying quiver electron motion, it can strongly enhance the longitudinal charge separation field, thus stimulating ion acceleration. We present a model and simulation results for such a radiation induced ion acceleration and study the scalings of the maximal attainable and average ion energies with respect to the laser and target parameters. We also compare the performance of this mechanism to the conventional ones.
[ 46 ]
math.AG
On the arithmetic Cohen Macaulayness of varieties parameterized by Togliatti systems. Given any diagonal cyclic subgroup Lambda subset GL(n 1,k) of order d , let I d subset k x 0, ldots, x n be the ideal generated by all monomials m 1 , ldots, m r of degree d which are invariants of Lambda . I d is a monomial Togliatti system, provided r leq binom d n 1 n 1 , and in this case the projective toric variety X d parameterized by (m 1 , ldots, m r ) is called a GT variety with group Lambda . We prove that all these GT varieties are arithmetically Cohen Macaulay and we give a combinatorial expression of their Hilbert functions. In the case n 2 , we compute explicitly the Hilbert function, polynomial and series of X d . We determine a minimal free resolution of its homogeneous ideal and we show that it is a binomial prime ideal generated by quadrics and cubics. We also provide the exact number of both types of generators. Finally, we pose the problem of determining whether a surface parameterized by a Togliatti system is aCM. We construct examples that are aCM and examples that are not.
[ 1, 2 ]
cs.LG cs.AI
Adaptive Submodular Meta Learning. Meta Learning has gained increasing attention in the machine learning and artificial intelligence communities. In this paper, we introduce and study an adaptive submodular meta learning problem. The input of our problem is a set of items, where each item has a random state which is initially unknown. The only way to observe an item's state is to select that item. Our objective is to adaptively select a group of items that achieve the best performance over a set of tasks, where each task is represented as an adaptive submodular function that maps sets of items and their states to a real number. To reduce the computational cost while maintaining a personalized solution for each future task, we first select an initial solution set based on previously observed tasks, then adaptively add the remaining items to the initial solution set when a new task arrives. As compared to the solution where a brand new solution is computed for each new task, our meta learning based approach leads to lower computational overhead at test time since the initial solution set is pre computed in the training stage. To solve this problem, we propose a two phase greedy policy and show that it achieves a 1 2 approximation ratio for the monotone case. For the non monotone case, we develop a two phase randomized greedy policy that achieves a 1 32 approximation ratio.
[ 0, 1 ]
cs.CV cs.LG
FAN Feature Adaptation Network for Surveillance Face Recognition and Normalization. This paper studies face recognition (FR) and normalization in surveillance imagery. Surveillance FR is a challenging problem that has great values in law enforcement. Despite recent progress in conventional FR, less effort has been devoted to surveillance FR. To bridge this gap, we propose a Feature Adaptation Network (FAN) to jointly perform surveillance FR and normalization. Our face normalization mainly acts on the aspect of image resolution, closely related to face super resolution. However, previous face super resolution methods require paired training data with pixel to pixel correspondence, which is typically unavailable between real world low resolution and high resolution faces. FAN can leverage both paired and unpaired data as we disentangle the features into identity and non identity components and adapt the distribution of the identity features, which breaks the limit of current face super resolution methods. We further propose a random scale augmentation scheme to learn resolution robust identity features, with advantages over previous fixed scale augmentation. Extensive experiments on LFW, WIDER FACE, QUML SurvFace and SCface datasets have shown the effectiveness of our method on surveillance FR and normalization.
[ 41, 14 ]
cs.RO cs.HC
HATSUKI An anime character like robot figure platform with anime style expressions and imitation learning based action generation. Japanese character figurines are popular and have pivot position in Otaku culture. Although numerous robots have been developed, less have focused on otaku culture or on embodying the anime character figurine. Therefore, we take the first steps to bridge this gap by developing Hatsuki, which is a humanoid robot platform with anime based design. Hatsuki's novelty lies in aesthetic design, 2D facial expressions, and anime style behaviors that allows it to deliver rich interaction experiences resembling anime characters. We explain our design implementation process of Hatsuki, followed by our evaluations. In order to explore user impressions and opinions towards Hatsuki, we conducted a questionnaire in the world's largest anime figurine event. The results indicate that participants were generally very satisfied with Hatsuki's design, and proposed various use case scenarios and deployment contexts for Hatsuki. The second evaluation focused on imitation learning, as such method can provide better interaction ability in the real world and generate rich, context adaptive behavior in different situations. We made Hatsuki learn 11 actions, combining voice, facial expressions and motions, through neuron network based policy model with our proposed interface. Results show our approach was successfully able to generate the actions through self organized contexts, which shows the potential for generalizing our approach in further actions under different contexts. Lastly, we present our future research direction for Hatsuki, and provide our conclusion.
[ 0 ]
cs.CV
Video Captioning with Text based Dynamic Attention and Step by Step Learning. Automatically describing video content with natural language has been attracting much attention in CV and NLP communities. Most existing methods predict one word at a time, and by feeding the last generated word back as input at the next time, while the other generated words are not fully exploited. Furthermore, traditional methods optimize the model using all the training samples in each epoch without considering their learning situations, which leads to a lot of unnecessary training and can not target the difficult samples. To address these issues, we propose a text based dynamic attention model named TDAM, which imposes a dynamic attention mechanism on all the generated words with the motivation to improve the context semantic information and enhance the overall control of the whole sentence. Moreover, the text based dynamic attention mechanism and the visual attention mechanism are linked together to focus on the important words. They can benefit from each other during training. Accordingly, the model is trained through two steps "starting from scratch" and "checking for gaps". The former uses all the samples to optimize the model, while the latter only trains for samples with poor control. Experimental results on the popular datasets MSVD and MSR VTT demonstrate that our non ensemble model outperforms the state of the art video captioning benchmarks.
[ 0 ]
cs.CV
ViNet Pushing the limits of Visual Modality for Audio Visual Saliency Prediction. We propose the ViNet architecture for audio visual saliency prediction. ViNet is a fully convolutional encoder decoder architecture. The encoder uses visual features from a network trained for action recognition, and the decoder infers a saliency map via trilinear interpolation and 3D convolutions, combining features from multiple hierarchies. The overall architecture of ViNet is conceptually simple it is causal and runs in real time (60 fps). ViNet does not use audio as input and still outperforms the state of the art audio visual saliency prediction models on nine different datasets (three visual only and six audio visual datasets). ViNet also surpasses human performance on the CC, SIM and AUC metrics for the AVE dataset, and to our knowledge, it is the first network to do so. We also explore a variation of ViNet architecture by augmenting audio features into the decoder. To our surprise, upon sufficient training, the network becomes agnostic to the input audio and provides the same output irrespective of the input. Interestingly, we also observe similar behaviour in the previous state of the art models cite tsiami2020stavis for audio visual saliency prediction. Our findings contrast with previous works on deep learning based audio visual saliency prediction, suggesting a clear avenue for future explorations incorporating audio in a more effective manner. The code and pre trained models are available at https github.com samyak0210 ViNet.
[ 21 ]
math.CO
On the Erd H o s Hajnal problem in the case of 3 graphs. Let m(n,r) denote the minimal number of edges in an n uniform hypergraph which is not r colorable. For the broad history of the problem see RaiSh . It is known that for a fixed n the sequence frac m(n,r) r n has a limit. The only trivial case is n 2 in which m(2,r) binom r 1 2 . In this note we focus on the case n 3 . First, we compare the existing methods in this case and then improve the lower bound.
[ 3 ]
cs.CL
Adversarial Language Games for Advanced Natural Language Intelligence. We study the problem of adversarial language games, in which multiple agents with conflicting goals compete with each other via natural language interactions. While adversarial language games are ubiquitous in human activities, little attention has been devoted to this field in natural language processing. In this work, we propose a challenging adversarial language game called Adversarial Taboo as an example, in which an attacker and a defender compete around a target word. The attacker is tasked with inducing the defender to utter the target word invisible to the defender, while the defender is tasked with detecting the target word before being induced by the attacker. In Adversarial Taboo, a successful attacker must hide its intention and subtly induce the defender, while a competitive defender must be cautious with its utterances and infer the intention of the attacker. Such language abilities can facilitate many important downstream NLP tasks. To instantiate the game, we create a game environment and a competition platform. Comprehensive experiments and empirical studies on several baseline attack and defense strategies show promising and interesting results. Based on the analysis on the game and experiments, we discuss multiple promising directions for future research.
[ 25, 54, 23 ]
math.FA math.PR q-fin.MF
Compact embeddings for spaces of forward rate curves. The goal of this note is to prove a compact embedding result for spaces of forward rate curves. As a consequence of this result, we show that any forward rate evolution can be approximated by a sequence of finite dimensional processes in the larger state space.
[ 21 ]
math.CO
The admissibility theorem for the spatial X ray transform over the two element field. We consider the Radon transform along lines in an n dimensional vector space over the two element field. It is well known that this transform is injective and highly overdetermined. We classify the minimal collections of lines for which the restricted Radon transform is also injective. This is an instance of I.M. Gelfand's it admissibility problem . The solution is in stark contrast to the more uniform cases of the affine hyperplane transform and the projective line transform, which are addressed in other papers, cite Feld G,Gr1 . The presentation here is intended to be widely accessible, requiring minimum background.
[ 65, 1, 15 ]
cs.NI cs.IT cs.LG math.IT
Deep Learning for CSI Feedback Based on Superimposed Coding. Massive multiple input multiple output (MIMO) with frequency division duplex (FDD) mode is a promising approach to increasing system capacity and link robustness for the fifth generation (5G) wireless cellular systems. The premise of these advantages is the accurate downlink channel state information (CSI) fed back from user equipment. However, conventional feedback methods have difficulties in reducing feedback overhead due to significant amount of base station (BS) antennas in massive MIMO systems. Recently, deep learning (DL) based CSI feedback conquers many difficulties, yet still shows insufficiency to decrease the occupation of uplink bandwidth resources. In this paper, to solve this issue, we combine DL and superimposed coding (SC) for CSI feedback, in which the downlink CSI is spread and then superimposed on uplink user data sequences (UL US) toward the BS. Then, a multi task neural network (NN) architecture is proposed at BS to recover the downlink CSI and UL US by unfolding two iterations of the minimum mean squared error (MMSE) criterion based interference reduction. In addition, for a network training, a subnet by subnet approach is exploited to facilitate the parameter tuning and expedite the convergence rate. Compared with standalone SC based CSI scheme, our multi task NN, trained in a specific signal to noise ratio (SNR) and power proportional coefficient (PPC), consistently improves the estimation of downlink CSI with similar or better UL US detection under SNR and PPC varying.
[ 41 ]
cs.RO
AR based interaction for safe human robot collaborative manufacturing. Industrial standards define safety requirements for Human Robot Collaboration (HRC) in industrial manufacturing. The standards particularly require real time monitoring and securing of the minimum protective distance between a robot and an operator. In this work, we propose a depth sensor based model for workspace monitoring and an interactive Augmented Reality (AR) User Interface (UI) for safe HRC. The AR UI is implemented on two different hardware a projector mirror setup anda wearable AR gear (HoloLens). We experiment the workspace model and UIs for a realistic diesel motor assembly task. The AR based interactive UIs provide 21 24 and 57 64 reduction in the task completion and robot idle time, respectively, as compared to a baseline without interaction and workspace sharing. However, subjective evaluations reveal that HoloLens based AR is not yet suitable for industrial manufacturing while the projector mirror setup shows clear improvements in safety and work ergonomics.
[ 49, 23 ]
math.OC math.FA
Functional Penalised Basis Pursuit on Spheres. In this paper, we propose a unified theoretical and practical spherical approximation framework for functional inverse problems on the hypersphere. More specifically, we consider recovering spherical fields directly in the continuous domain using functional penalised basis pursuit problems with gTV regularisation terms. Our framework is compatible with various measurement types as well as non differentiable convex cost functionals. Via a novel representer theorem, we characterise their solution sets in terms of spherical splines with sparse innovations. We use this result to derive an approximate canonical spline based discretisation scheme, with vanishing approximation error. To solve the resulting finite dimensional optimisation problem, we propose an efficient and provably convergent primal dual splitting algorithm. We illustrate the versatility of our framework on real life examples from the field of environmental sciences.
[ 0, 41 ]
cs.RO cs.CV
Simplified edition Multi robot SLAM Multi view Target Tracking based on Panoramic Vision in Irregular Environment. In order to improve the precision of multi robot SLAM multi view target tracking process, a improved multi robot SLAM multi view target tracking algorithm based on panoramic vision in irregular environment was put forward, adding an correction factor to renew the existing Extended Kalman Filter (EKF) model, obtaining new coordinates X and Y after twice iterations. The paper has been accepted by Computing and Visualization in Science and this is a simplified version.
[ 2, 3 ]
cs.AI cs.CL
RDF2Vec Light A Lightweight Approach for Knowledge Graph Embeddings. Knowledge graph embedding approaches represent nodes and edges of graphs as mathematical vectors. Current approaches focus on embedding complete knowledge graphs, i.e. all nodes and edges. This leads to very high computational requirements on large graphs such as DBpedia or Wikidata. However, for most downstream application scenarios, only a small subset of concepts is of actual interest. In this paper, we present RDF2Vec Light, a lightweight embedding approach based on RDF2Vec which generates vectors for only a subset of entities. To that end, RDF2Vec Light only traverses and processes a subgraph of the knowledge graph. Our method allows the application of embeddings of very large knowledge graphs in scenarios where such embeddings were not possible before due to a significantly lower runtime and significantly reduced hardware requirements.
[ 15 ]
cs.IT math.IT
An Index Coding Approach to Caching with Uncoded Cache Placement. Caching is an efficient way to reduce network traffic congestion during peak hours, by storing some content at the user's local cache memory, even without knowledge of user's later demands. Maddah Ali and Niesen proposed a two phase (placement phase and delivery phase) coded caching strategy for broadcast channels with cache aided users. This paper investigates the same model under the constraint that content is placed uncoded within the caches, that is, when bits of the files are simply copied within the caches. When the cache contents are uncoded and the users' demands are revealed, the caching problem can be connected to an index coding problem. This paper focuses on deriving fundamental performance limits for the caching problem by using tools for the index coding problem that were either known or are newly developed in this work. First, a converse bound for the caching problem under the constraint of uncoded cache placement is proposed based on the "acyclic index coding converse bound". This converse bound is proved to be achievable by the Maddah Ali and Niesen's scheme when the number of files is not less than the number of users, and by a newly derived index coding achievable scheme otherwise. The proposed index coding achievable scheme is based on distributed source coding and strictly improves on the widely used "composite (index) coding" achievable bound and its improvements, and is of independent interest. An important consequence of the findings of this paper is that advancements on the coded caching problem posed by Maddah Ali and Niesen are thus only possible by considering strategies with coded placement phase. A recent work by Yu et al. has however shown that coded cache placement can at most half the network load compared to the results presented in this paper.
[ 76 ]
math.SP
On the spectra of g circulant matrices and applications. A g circulant matrix of order n is defined as a matrix of order n where each row is a right cyclic shift in g places to the preceding row. Using number theory, certain nonnegative g circulant real matrices are constructed. In particular, it is shown that spectra with sufficient conditions so that it can be the spectrum of a real g circulant matrix is not a spectrum with sufficient conditions so that it can be the spectrum of a real circulant matrix of the same order. The obtained results are applied to Nonnegative Inverse Eigenvalue Problem to construct nonnegative, g circulant matrices with given appropriated spectrum. Moreover, nonnegative g circulant matrices by blocks are also studied and in this case, their orders can be a multiple of a prime number.
[ 2 ]
cs.AI
Morphological Computation and Learning to Learn In Natural Intelligent Systems And AI. At present, artificial intelligence in the form of machine learning is making impressive progress, especially the field of deep learning (DL) 1 . Deep learning algorithms have been inspired from the beginning by nature, specifically by the human brain, in spite of our incomplete knowledge about its brain function. Learning from nature is a two way process as discussed in 2 3 4 , computing is learning from neuroscience, while neuroscience is quickly adopting information processing models. The question is, what can the inspiration from computational nature at this stage of the development contribute to deep learning and how much models and experiments in machine learning can motivate, justify and lead research in neuroscience and cognitive science and to practical applications of artificial intelligence.
[ 40, 1, 32 ]
cs.IR cs.DS cs.LG
Applying Multi armed Bandit Algorithms to Computational Advertising. Over the last two decades, we have seen extensive industrial research in the area of computational advertising. In this paper, our goal is to study the performance of various online learning algorithms to identify and display the best ads offers with the highest conversion rates to web users. We formulate our ad selection problem as a Multi Armed Bandit problem which is a classical paradigm in Machine Learning. We have been applying machine learning, data mining, probability, and statistics to analyze big data in the ad tech space and devise efficient ad selection strategies. This article highlights some of our findings in the area of computational advertising from 2011 to 2015.
[ 78, 15 ]
cs.IT math.AC math.IT
On depth spectra of constacyclic codes. In this paper, we determine depth spectra of all repeated root ( alpha gamma beta) constacyclic codes of arbitrary lengths over a finite commutative chain ring mathcal R , where alpha is a non zero element of the Teichm " u ller set of mathcal R , gamma is a generator of unique maximal ideal of mathcal R and beta is a unit in mathcal R . We also illustrate our results with some examples.
[ 0, 1 ]
cs.CV cs.LG
AdvGAN Harnessing latent layers for adversary generation. Adversarial examples are fabricated examples, indistinguishable from the original image that mislead neural networks and drastically lower their performance. Recently proposed AdvGAN, a GAN based approach, takes input image as a prior for generating adversaries to target a model. In this work, we show how latent features can serve as better priors than input images for adversary generation by proposing AdvGAN , a version of AdvGAN that achieves higher attack rates than AdvGAN and at the same time generates perceptually realistic images on MNIST and CIFAR 10 datasets.
[ 3 ]
cs.CL
Classification of Cuisines from Sequentially Structured Recipes. Cultures across the world are distinguished by the idiosyncratic patterns in their cuisines. These cuisines are characterized in terms of their substructures such as ingredients, cooking processes and utensils. A complex fusion of these substructures intrinsic to a region defines the identity of a cuisine. Accurate classification of cuisines based on their culinary features is an outstanding problem and has hitherto been attempted to solve by accounting for ingredients of a recipe as features. Previous studies have attempted cuisine classification by using unstructured recipes without accounting for details of cooking techniques. In reality, the cooking processes techniques and their order are highly significant for the recipe's structure and hence for its classification. In this article, we have implemented a range of classification techniques by accounting for this information on the RecipeDB dataset containing sequential data on recipes. The state of the art RoBERTa model presented the highest accuracy of 73.30 among a range of classification models from Logistic Regression and Naive Bayes to LSTMs and Transformers.
[ 72 ]
cs.PF
EasyCrash Exploring Non Volatility of Non Volatile Memory for High Performance Computing Under Failures. Emerging non volatile memory (NVM) is promising for building future HPC. Leveraging the non volatility of NVM as main memory, we can restart the application using data objects remaining on NVM when the application crashes. This paper explores this solution to handle HPC under failures, based on the observation that many HPC applications have good enough intrinsic fault tolerance. To improve the possibility of successful recomputation with correct outcomes and ignorable performance loss, we introduce EasyCrash, a framework to decide how to selectively persist application data objects during application execution. Our evaluation shows that EasyCrash transforms 54 of crashes that cannot correctly recompute into the correct computation while incurring a negligible performance overhead (1.5 on average). Using EasyCrash and application intrinsic fault tolerance, 82 of crashes can successfully recompute. When EasyCrash is used with a traditional checkpoint scheme, it enables up to 24 improvement (15 on average) in system efficiency.
[ 19 ]
cs.CR
Why Johnny can't rely on anti phishing educational interventions to protect himself against contemporary phishing attacks?. Phishing is a way of stealing people's sensitive information such as username, password and banking details by disguising as a legitimate entity (i.e. email, website). Anti phishing education considered to be vital in strengthening "human", the weakest link in information security. Previous research in anti phishing education focuses on improving educational interventions to better interact the end user. However, one can argue that existing anti phishing educational interventions are limited in success due to their outdated teaching content incorporated. Furthermore, teaching outdated anti phishing techniques might not help combat contemporary phishing attacks. Therefore, this research focuses on investigating the obfuscation techniques of phishing URLs used in anti phishing education against the contemporary phishing attacks reported in PhishTank.com. Our results showed that URL obfuscation with IP address has become insignificant and it revealed two emerging URL obfuscation techniques, that attackers use lately, haven't been incorporated into existing anti phishing educational interventions.
[ 56, 77, 21 ]
cs.LO math.CO math.LO
Fusible numbers and Peano Arithmetic. Inspired by a mathematical riddle involving fuses, we define the "fusible numbers" as follows 0 is fusible, and whenever x,y are fusible with y x 1 , the number (x y 1) 2 is also fusible. We prove that the set of fusible numbers, ordered by the usual order on mathbb R , is well ordered, with order type varepsilon 0 . Furthermore, we prove that the density of the fusible numbers along the real line grows at an incredibly fast rate Letting g(n) be the largest gap between consecutive fusible numbers in the interval n, infty) , we have g(n) 1 ge F varepsilon 0 (n c) for some constant c , where F alpha denotes the fast growing hierarchy. Finally, we derive some true statements that can be formulated but not proven in Peano Arithmetic, of a different flavor than previously known such statements PA cannot prove the true statement "For every natural number n there exists a smallest fusible number larger than n ." Also, consider the algorithm " M(x) if x 0 return x , else return M(x M(x 1)) 2 ." Then M terminates on real inputs, although PA cannot prove the statement " M terminates on all natural inputs."
[ 56, 57, 22 ]
cs.LO cs.PL cs.SE
Proceedings of the 4th Workshop on Models for Formal Analysis of Real Systems. This volume contains the proceedings of MARS 2020, the fourth workshop on Models for Formal Analysis of Real Systems held as part of ETAPS 2020, the European Joint Conferences on Theory and Practice of Software. The MARS workshop brings together researchers from different communities who are developing formal models of real systems in areas where complex models occur, such as networks, cyber physical systems, hardware software codesign, biology, etc. The MARS workshops stem from two observations (1) Large case studies are essential to show that specification formalisms and modelling techniques are applicable to real systems, whereas many research papers only consider toy examples or tiny case studies. (2) Developing an accurate model of a real system takes a large amount of time, often months or years. In most scientific papers, however, salient details of the model need to be skipped due to lack of space, and to leave room for formal verification methodologies and results. The MARS workshop remedies these issues, emphasising modelling over verification, so as to retain lessons learnt from formal modelling, which are not usually discussed elsewhere.
[ 3 ]
cs.CL
Generating Sense Embeddings for Syntactic and Semantic Analogy for Portuguese. Word embeddings are numerical vectors which can represent words or concepts in a low dimensional continuous space. These vectors are able to capture useful syntactic and semantic information. The traditional approaches like Word2Vec, GloVe and FastText have a strict drawback they produce a single vector representation per word ignoring the fact that ambiguous words can assume different meanings. In this paper we use techniques to generate sense embeddings and present the first experiments carried out for Portuguese. Our experiments show that sense vectors outperform traditional word vectors in syntactic and semantic analogy tasks, proving that the language resource generated here can improve the performance of NLP tasks in Portuguese.
[ 0, 3 ]
cs.CV cs.CL
Convolutional Auto encoding of Sentence Topics for Image Paragraph Generation. Image paragraph generation is the task of producing a coherent story (usually a paragraph) that describes the visual content of an image. The problem nevertheless is not trivial especially when there are multiple descriptive and diverse gists to be considered for paragraph generation, which often happens in real images. A valid question is how to encapsulate such gists topics that are worthy of mention from an image, and then describe the image from one topic to another but holistically with a coherent structure. In this paper, we present a new design Convolutional Auto Encoding (CAE) that purely employs convolutional and deconvolutional auto encoding framework for topic modeling on the region level features of an image. Furthermore, we propose an architecture, namely CAE plus Long Short Term Memory (dubbed as CAE LSTM), that novelly integrates the learnt topics in support of paragraph generation. Technically, CAE LSTM capitalizes on a two level LSTM based paragraph generation framework with attention mechanism. The paragraph level LSTM captures the inter sentence dependency in a paragraph, while sentence level LSTM is to generate one sentence which is conditioned on each learnt topic. Extensive experiments are conducted on Stanford image paragraph dataset, and superior results are reported when comparing to state of the art approaches. More remarkably, CAE LSTM increases CIDEr performance from 20.93 to 25.15 .
[ 23 ]
math.FA
Time regularity for generalized Mehler semigroups. We study continuity and H "older continuity of t mapsto P tf , where P t is a generalized Mehler semigroup in C b(X) , the space of the continuous and bounded functions from a Banach space X to R , and f in C b(X) . The generators L of such semigroups are realizations of a class of differential and pseudo differential operators, both in finite and in infinite dimension. Examples of operators L to which this theory is applicable include Ornstein Uhlenbeck operators with fractional diffusion in finite dimension, and Ornstein Uhlenbeck operators with associated strong Feller semigroups, in infinite dimension.
[ 8, 11 ]
physics.optics physics.app-ph
Generalized Brewster Effect using Bianisotropic Metasurfaces. We show that a properly designed bianisotropic metasurface placed at the interface between two arbitrary different media, or coating a dielectric medium exposed to the air, provides Brewster (reflectionless) transmission at arbitrary angles and for both the TM and TE polarizations. We present a rigorous derivation of the corresponding surface susceptibility tensors based on the Generalized Sheet Transition Conditions (GSTCs), and demonstrate the system with planar microwave metasurfaces designed for polarization independent and azimuth independent operations. Moreover, we reveal that such a system leads to the concept of effective refractive media with engineerable impedance. The proposed bianisotropic metasurfaces provide deeply subwavelength matching solutions for initially mismatched media, and alternatively lead to the possibility of on demand manipulation of the conventional Fresnel coefficients. The reported generalized Brewster effect represents a fundamental advance in optical technology, where it may both improve the performance of conventional components and enable the development of novel devices.
[ 34 ]
math.CV
Around a Conjecture of K. Tran. We study the root distribution of a sequence of polynomials P n(z) n 0 infty with the rational generating function sum n 0 infty P n(z)t n frac 1 1 B(z)t ell A(z)t k for (k, ell) (3,2) and (4,3) where A(z) and B(z) are arbitrary polynomials in z with complex coefficients. We show that the zeros of P n(z) which satisfy A(z)B(z) neq 0 lie on a real algebraic curve which we describe explicitly.
[ 46 ]
math.AG
Torelli group action on the configuration space of a surface. We show that the Torelli group of a closed surface of genus ge 3 acts nontrivially on the rational cohomology of its space of 3 element subsets.
[ 12 ]
math.CA
Zero Spacings of Paraorthogonal Polynomials on the Unit Circle. We prove some new results about the spacing between neighboring zeros of paraorthogonal polynomials on the unit circle. Our methods also provide new proofs of some existing results. The main tool we will use is a formula for the phase of the appropriate Blaschke product at points on the unit circle.
[ 14 ]
cs.HC
How Players Play Games Observing the Influences of Game Mechanics. The popularity of computer games is remarkably high and is still growing every year. Despite this popularity and the economical importance of gaming, research in game design, or to be more precise, of game mechanics that can be used to improve the enjoyment of a game, is still scarce. In this paper, we analyze Fortnite, one of the currently most successful games, and observe how players play the game. We investigate what makes playing the game enjoyable by analyzing video streams of experienced players from game streaming platforms and by conducting a user study with players who are new to the game. We formulate four hypotheses about how game mechanics influence the way players interact with the game and how it influences player enjoyment. We present differences in player behavior between experienced players and beginners and discuss how game mechanics could be used to improve the enjoyment for beginners. In addition, we describe our approach to analyze games without access to game internal data by using a toolchain which automatically extracts game information from video streams.
[ 19, 15 ]
cs.CR cs.IT math.IT
Covert Communication in Continuous Time Systems. Recent works have considered the ability of transmitter Alice to communicate reliably to receiver Bob without being detected by warden Willie. These works generally assume a standard discrete time model. But the assumption of a discrete time model in standard communication scenarios is often predicated on its equivalence to a continuous time model, which has not been established for the covert communications problem. Here, we consider the continuous time channel directly and study if efficient covert communication can still be achieved. We assume that an uninformed jammer is present to assist Alice, and we consider additive white Gaussian noise (AWGN) channels between all parties. For a channel with approximate bandwidth W, we establish constructions such that O(WT) information bits can be transmitted covertly and reliably from Alice to Bob in T seconds for two separate scenarios 1) when the path loss between Alice and Willie is known and 2) when the path loss between Alice and Willie is unknown.
[ 1, 3 ]
cs.CL cs.LG
Contextualized Embeddings in Named Entity Recognition An Empirical Study on Generalization. Contextualized embeddings use unsupervised language model pretraining to compute word representations depending on their context. This is intuitively useful for generalization, especially in Named Entity Recognition where it is crucial to detect mentions never seen during training. However, standard English benchmarks overestimate the importance of lexical over contextual features because of an unrealistic lexical overlap between train and test mentions. In this paper, we perform an empirical analysis of the generalization capabilities of state of the art contextualized embeddings by separating mentions by novelty and with out of domain evaluation. We show that they are particularly beneficial for unseen mentions detection, especially out of domain. For models trained on CoNLL03, language model contextualization leads to a 1.2 maximal relative micro F1 score increase in domain against 13 out of domain on the WNUT dataset
[ 0 ]
cs.CV
Transfer Learning of Photometric Phenotypes in Agriculture Using Metadata. Estimation of photometric plant phenotypes (e.g., hue, shine, chroma) in field conditions is important for decisions on the expected yield quality, fruit ripeness, and need for further breeding. Estimating these from images is difficult due to large variances in lighting conditions, shadows, and sensor properties. We combine the image and metadata regarding capturing conditions embedded into a network, enabling more accurate estimation and transfer between different conditions. Compared to a state of the art deep CNN and a human expert, metadata embedding improves the estimation of the tomato's hue and chroma.
[ 0 ]
cs.CV
Align Deep Features for Oriented Object Detection. The past decade has witnessed significant progress on detecting objects in aerial images that are often distributed with large scale variations and arbitrary orientations. However most of existing methods rely on heuristically defined anchors with different scales, angles and aspect ratios and usually suffer from severe misalignment between anchor boxes and axis aligned convolutional features, which leads to the common inconsistency between the classification score and localization accuracy. To address this issue, we propose a Single shot Alignment Network (S 2 A Net) consisting of two modules a Feature Alignment Module (FAM) and an Oriented Detection Module (ODM). The FAM can generate high quality anchors with an Anchor Refinement Network and adaptively align the convolutional features according to the anchor boxes with a novel Alignment Convolution. The ODM first adopts active rotating filters to encode the orientation information and then produces orientation sensitive and orientation invariant features to alleviate the inconsistency between classification score and localization accuracy. Besides, we further explore the approach to detect objects in large size images, which leads to a better trade off between speed and accuracy. Extensive experiments demonstrate that our method can achieve state of the art performance on two commonly used aerial objects datasets (i.e., DOTA and HRSC2016) while keeping high efficiency. The code is available at https github.com csuhan s2anet.
[ 9 ]
math.AP
Rank one convexity vs. ellipticity for isotropic functions. It is well known that a twice differentiable real valued function W operatorname GL (n) rightarrow mathbb R on the group operatorname GL (n) of invertible n times n matrices with positive determinant is rank one convex if and only if it is Legendre Hadamard elliptic. Many energy functions arising from interesting applications in isotropic nonlinear elasticity, however, are not necessarily twice differentiable everywhere on operatorname GL (n) , especially at points with non simple singular values. Here, we show that if an isotropic function W on operatorname GL (n) is twice differentiable at each F in operatorname GL (n) with simple singular values and Legendre Hadamard elliptic at each such F , then W is already rank one convex under strongly reduced regularity assumptions. In particular, this generalization makes (local) ellipticity criteria accessible as criteria for (global) rank one convexity to a wider class of elastic energy potentials expressed in terms of ordered singular values. Our results are also directly applicable to so called conformally invariant energy functions. We also discuss a classical ellipticity criterion for the planar case by Knowles and Sternberg which has often been used in the literature as a criterion for global rank one convexity and show that for this purpose, it is still applicable under weakened regularity assumptions.
[ 0 ]
cs.CV
Symmetric block low rank layers for fully reversible multilevel neural networks. Factors that limit the size of the input and output of a neural network include memory requirements for the network states activations to compute gradients, as well as memory for the convolutional kernels or other weights. The memory restriction is especially limiting for applications where we want to learn how to map volumetric data to the desired output, such as video to video. Recently developed fully reversible neural networks enable gradient computations using storage of the network states for a couple of layers only. While this saves a tremendous amount of memory, it is the convolutional kernels that take up most memory if fully reversible networks contain multiple invertible pooling coarsening layers. Invertible coarsening operators such as the orthogonal wavelet transform cause the number of channels to grow explosively. We address this issue by combining fully reversible networks with layers that contain the convolutional kernels in a compressed form directly. Specifically, we introduce a layer that has a symmetric block low rank structure. In spirit, this layer is similar to bottleneck and squeeze and expand structures. We contribute symmetry by construction, and a combination of notation and flattening of tensors allows us to interpret these network structures in linear algebraic fashion as a block low rank matrix in factorized form and observe various properties. A video segmentation example shows that we can train a network to segment the entire video in one go, which would not be possible, in terms of memory requirements, using non reversible networks and previously proposed reversible networks.
[ 24 ]
math.MG
Combinatorial properties of ultrametrics and generalized ultrametrics. Let X , Y be sets and let Phi , Psi be mappings with domains X 2 and Y 2 respectively. We say that Phi and Psi are combinatorially similar if there are bijections f colon Phi(X 2) to Psi(Y 2 ) and g colon Y to X such that Psi(x, y) f( Phi(g(x), g(y))) for all x , y in Y . Conditions under which a given mapping is combinatorially similar to an ultrametric or a pseudoultrametric are found. Combinatorial characterizations are also obtained for poset valued ultrametric distances recently defined by Priess Crampe and Ribenboim.
[ 2, 3 ]
cs.AI cs.CL
Coronavirus Knowledge Graph A Case Study. The emergence of the novel COVID 19 pandemic has had a significant impact on global healthcare and the economy over the past few months. The virus's rapid widespread has led to a proliferation in biomedical research addressing the pandemic and its related topics. One of the essential Knowledge Discovery tools that could help the biomedical research community understand and eventually find a cure for COVID 19 are Knowledge Graphs. The CORD 19 dataset is a collection of publicly available full text research articles that have been recently published on COVID 19 and coronavirus topics. Here, we use several Machine Learning, Deep Learning, and Knowledge Graph construction and mining techniques to formalize and extract insights from the PubMed dataset and the CORD 19 dataset to identify COVID 19 related experts and bio entities. Besides, we suggest possible techniques to predict related diseases, drug candidates, gene, gene mutations, and related compounds as part of a systematic effort to apply Knowledge Discovery methods to help biomedical researchers tackle the pandemic.
[ 40, 43 ]
cs.DB cs.IR
Uncovering Hidden Semantics of Set Information in Knowledge Bases. Knowledge Bases (KBs) contain a wealth of structured information about entities and predicates. This paper focuses on set valued predicates, i.e., the relationship between an entity and a set of entities. In KBs, this information is often represented in two formats (i) via counting predicates such as numberOfChildren and staffSize, that store aggregated integers, and (ii) via enumerating predicates such as parentOf and worksFor, that store individual set memberships. Both formats are typically complementary unlike enumerating predicates, counting predicates do not give away individuals, but are more likely informative towards the true set size, thus this coexistence could enable interesting applications in question answering and KB curation. In this paper we aim at uncovering this hidden knowledge. We proceed in two steps. (i) We identify set valued predicates from a given KB predicates via statistical and embedding based features. (ii) We link counting predicates and enumerating predicates by a combination of co occurrence, correlation and textual relatedness metrics. We analyze the prevalence of count information in four prominent knowledge bases, and show that our linking method achieves up to 0.55 F1 score in set predicate identification versus 0.40 F1 score of a random selection, and normalized discounted gains of up to 0.84 at position 1 and 0.75 at position 3 in relevant predicate alignments. Our predicate alignments are showcased in a demonstration system available at https counqer.mpi inf.mpg.de spo.
[ 56, 68, 21 ]
cs.LO cs.DM math.CO
Walk refinement, walk logic, and the iteration number of the Weisfeiler Leman algorithm. We show that the 2 dimensional Weisfeiler Leman algorithm stabilizes n vertex graphs after at most O(n log n) iterations. This implies that if such graphs are distinguishable in 3 variable first order logic with counting, then they can also be distinguished in this logic by a formula of quantifier depth at most O(n log n). For this we exploit a new refinement based on counting walks and argue that its iteration number differs from the classic Weisfeiler Leman refinement by at most a logarithmic factor. We then prove matching linear upper and lower bounds on the number of iterations of the walk refinement. This is achieved with an algebraic approach by exploiting properties of semisimple matrix algebras. We also define a walk logic and a bijective walk pebble game that precisely correspond to the new walk refinement.
[ 1, 2, 3 ]
cs.CL cs.AI cs.LG
Fine tuning Multi hop Question Answering with Hierarchical Graph Network. In this paper, we present a two stage model for multi hop question answering. The first stage is a hierarchical graph network, which is used to reason over multi hop question and is capable to capture different levels of granularity using the nature structure(i.e., paragraphs, questions, sentences and entities) of documents. The reasoning process is convert to node classify task(i.e., paragraph nodes and sentences nodes). The second stage is a language model fine tuning task. In a word, stage one use graph neural