AI Buzzword Explained: Multi-Agent Path Finding (MAPF)

Explanation of the hot topic ‘multi-agent path finding’.

Deep Reinforcement Learning: Framework, Applications, and Embedded Implementations

The recent breakthroughs of deep reinforcement learning (DRL) technique in Alpha Go and playing Atari have set a good example in handling large state and actions spaces of complicated control problems. The DRL technique is comprised of (i) an offline deep neural network (DNN) construction phase, which derives the correlation between each state-action pair of the system and its value function, and (ii) an online deep Q-learning phase, which adaptively derives the optimal action and updates value estimates. In this paper, we first present the general DRL framework, which can be widely utilized in many applications with different optimization objectives. This is followed by the introduction of three specific applications: the cloud computing resource allocation problem, the residential smart grid task scheduling problem, and building HVAC system optimal control problem. The effectiveness of the DRL technique in these three cyber-physical applications have been validated. Finally, this paper investigates the stochastic computing-based hardware implementations of the DRL framework, which consumes a significant improvement in area efficiency and power consumption compared with binary-based implementation counterparts.

Attack Analysis for Distributed Control Systems: An Internal Model Principle Approach

Although adverse effects of attacks have been acknowledged in many cyber-physical systems, there is no system-theoretic comprehension of how a compromised agent can leverage communication capabilities to maximize the damage in distributed multi-agent systems. A rigorous analysis of cyber-physical attacks enables us to increase the system awareness against attacks and design more resilient control protocols. To this end, we will take the role of the attacker to identify the worst effects of attacks on root nodes and non-root nodes in a distributed control system. More specifically, we show that a stealthy attack on root nodes can mislead the entire network to a wrong understanding of the situation and even destabilize the synchronization process. This will be called the internal model principle for the attacker and will intensify the urgency of designing novel control protocols to mitigate these types of attacks.

Deep Hyperalignment

This paper proposes Deep Hyperalignment (DHA) as a regularized, deep extension, scalable Hyperalignment (HA) method, which is well-suited for applying functional alignment to fMRI datasets with nonlinearity, high-dimensionality (broad ROI), and a large number of subjects. Unlink previous methods, DHA is not limited by a restricted fixed kernel function. Further, it uses a parametric approach, rank-m Singular Value Decomposition (SVD), and stochastic gradient descent for optimization. Therefore, DHA has a suitable time complexity for large datasets, and DHA does not require the training data when it computes the functional alignment for a new subject. Experimental studies on multi-subject fMRI analysis confirm that the DHA method achieves superior performance to other state-of-the-art HA algorithms.

A Note on Community Trees in Networks

We introduce the concept of community trees that summarizes topological structures within a network. A community tree is a tree structure representing clique communities from the clique percolation method (CPM). The community tree also generates a persistent diagram. Community trees and persistent diagrams reveal topological structures of the underlying networks and can be used as visualization tools. We study the stability of community trees and derive a quantity called the total star number (TSN) that presents an upper bound on the change of community trees. Our findings provide a topological interpretation for the stability of communities generated by the CPM.

When is Network Lasso Accurate: The Vector Case

A recently proposed learning algorithm for massive network-structured data sets (big data over networks) is the network Lasso (nLasso), which extends the well- known Lasso estimator from sparse models to network-structured datasets. Efficient implementations of the nLasso have been presented using modern convex optimization methods. In this paper, we provide sufficient conditions on the network structure and available label information such that nLasso accurately learns a vector-valued graph signal (representing label information) from the information provided by the labels of a few data points.

Decision support from financial disclosures with deep neural networks and transfer learning

Company disclosures greatly aid in the process of financial decision-making; therefore, they are consulted by financial investors and automated traders before exercising ownership in stocks. While humans are usually able to correctly interpret the content, the same is rarely true of computerized decision support systems, which struggle with the complexity and ambiguity of natural language. A possible remedy is represented by deep learning, which overcomes several shortcomings of traditional methods of text mining. For instance, recurrent neural networks, such as long short-term memories, employ hierarchical structures, together with a large number of hidden layers, to automatically extract features from ordered sequences of words and capture highly non-linear relationships such as context-dependent meanings. However, deep learning has only recently started to receive traction, possibly because its performance is largely untested. Hence, this paper studies the use of deep neural networks for financial decision support. We additionally experiment with transfer learning, in which we pre-train the network on a different corpus with a length of 139.1 million words. Our results reveal a higher directional accuracy as compared to traditional machine learning when predicting stock price movements in response to financial disclosures. Our work thereby helps to highlight the business value of deep learning and provides recommendations to practitioners and executives.

Deep learning in remote sensing: a review

Standing at the paradigm shift towards data-intensive science, machine learning techniques are becoming increasingly important. In particular, as a major breakthrough in the field, deep learning has proven as an extremely powerful tool in many fields. Shall we embrace deep learning as the key to all? Or, should we resist a ‘black-box’ solution? There are controversial opinions in the remote sensing community. In this article, we analyze the challenges of using deep learning for remote sensing data analysis, review the recent advances, and provide resources to make deep learning in remote sensing ridiculously simple to start with. More importantly, we advocate remote sensing scientists to bring their expertise into deep learning, and use it as an implicit general model to tackle unprecedented large-scale influential challenges, such as climate change and urbanization.

An introduction to Topological Data Analysis: fundamental and practical aspects for data scientists

Topological Data Analysis (tda) is a recent and fast growing eld providing a set of new topological and geometric tools to infer relevant features for possibly complex data. This paper is a brief introduction, through a few selected topics, to basic fundamental and practical aspects of tda for non experts. 1 Introduction and motivation Topological Data Analysis (tda) is a recent eld that emerged from various works in applied (algebraic) topology and computational geometry during the rst decade of the century. Although one can trace back geometric approaches for data analysis quite far in the past, tda really started as a eld with the pioneering works of Edelsbrunner et al. (2002) and Zomorodian and Carlsson (2005) in persistent homology and was popularized in a landmark paper in 2009 Carlsson (2009). tda is mainly motivated by the idea that topology and geometry provide a powerful approach to infer robust qualitative, and sometimes quantitative, information about the structure of data-see, e.g. Chazal (2017). tda aims at providing well-founded mathematical, statistical and algorithmic methods to infer, analyze and exploit the complex topological and geometric structures underlying data that are often represented as point clouds in Euclidean or more general metric spaces. During the last few years, a considerable eort has been made to provide robust and ecient data structures and algorithms for tda that are now implemented and available and easy to use through standard libraries such as the Gudhi library (C++ and Python) Maria et al. (2014) and its R software interface Fasy et al. (2014a). Although it is still rapidly evolving, tda now provides a set of mature and ecient tools that can be used in combination or complementary to other data sciences tools. The tdapipeline. tda has recently known developments in various directions and application elds. There now exist a large variety of methods inspired by topological and geometric approaches. Providing a complete overview of all these existing approaches is beyond the scope of this introductory survey. However, most of them rely on the following basic and standard pipeline that will serve as the backbone of this paper: 1. The input is assumed to be a nite set of points coming with a notion of distance-or similarity between them. This distance can be induced by the metric in the ambient space (e.g. the Euclidean metric when the data are embedded in R d) or come as an intrinsic metric dened by a pairwise distance matrix. The denition of the metric on the data is usually given as an input or guided by the application. It is however important to notice that the choice of the metric may be critical to reveal interesting topological and geometric features of the data.

Decentralized Online Learning with Kernels

We consider multi-agent stochastic optimization problems over reproducing kernel Hilbert spaces (RKHS). In this setting, a network of interconnected agents aims to learn decision functions, i.e., nonlinear statistical models, that are optimal in terms of a global convex functional that aggregates data across the network, with only access to locally and sequentially observed samples. We propose solving this problem by allowing each agent to learn a local regression function while enforcing consensus constraints. We use a penalized variant of functional stochastic gradient descent operating simultaneously with low-dimensional subspace projections. These subspaces are constructed greedily by applying orthogonal matching pursuit to the sequence of kernel dictionaries and weights. By tuning the projection-induced bias, we propose an algorithm that allows for each individual agent to learn, based upon its locally observed data stream and message passing with its neighbors only, a regression function that is close to the globally optimal regression function. That is, we establish that with constant step-size selections agents’ functions converge to a neighborhood of the globally optimal one while satisfying the consensus constraints as the penalty parameter is increased. Moreover, the complexity of the learned regression functions is guaranteed to remain finite. On both multi-class kernel logistic regression and multi-class kernel support vector classification with data generated from class-dependent Gaussian mixture models, we observe stable function estimation and state of the art performance for distributed online multi-class classification. Experiments on the Brodatz textures further substantiate the empirical validity of this approach.

Variable Selection in Restricted Linear Regression Models

The use of prior information in the linear regression is well known to provide more efficient estimators of regression coefficients. The methods of non-stochastic restricted regression estimation proposed by Theil and Goldberger (1961) are preferred when prior information is available. In this study, we will consider parameter estimation and the variable selection in non-stochastic restricted linear regression model, using least absolute shrinkage and selection operator (LASSO) method introduced by Tibshirani (1996). A small simulation study and real data example are provided to illustrate the performance of the proposed method for dealing with the variable selection and the parameter estimation in restricted linear regression models.

Quantum jumps on Anderson attractors
Joint Weakly and Semi-Supervised Deep Learning for Localization and Classification of Masses in Breast Ultrasound Images
momentuHMM: R package for generalized hidden Markov models of animal movement
Indoor Massive MIMO Deployments for Uniformly High Wireless Capacity
Hybrid Vector Perturbation Precoding: The Blessing of Approximate Message Passing
On First Come, First Served Queues with Two Classes of Impatient Customers
Day-Ahead Solar Forecasting Based on Multi-level Solar Measurements
End-to-End Deep Learning for Steering Autonomous Vehicles Considering Temporal Dependencies
DeepSolarEye: Power Loss Prediction and Weakly Supervised Soiling Localization via Fully Convolutional Networks for Solar Panels
Stability and exact Turan numbers for matroids
Application of Deep Learning in Neuroradiology: Automated Detection of Basal Ganglia Hemorrhage using 2D-Convolutional Neural Networks
Inference on Auctions with Weak Assumptions on Information
Multiply Balanced Edge Colorings of Multigraphs
The Galactic Dependencies Treebanks: Getting More Data by Synthesizing New Languages
Disentangled Representations via Synergy Minimization
What are graph amalgamations?
On Mixing Behavior of a Family of Random Walks Determined by a Linear Recurrence
Detachments of Amalgamated 3-uniform Hypergraphs : Factorization Consequences
Using Task Descriptions in Lifelong Machine Learning for Improved Performance and Zero-Shot Transfer
Constructing Top-k Routes with Personalized Submodular Maximization of POI Features
On Estimation of $L_{r}$-Norms in Gaussian White Noise Models
An Empirical Bayes Approach to Regularization Using Previously Published Models
The Domination Equivalence Classes of Paths
Specification Inference from Demonstrations
Fine-Grained Prediction of Syntactic Typology: Discovering Latent Structure with Supervised Learning
Variable screening with multiple studies
Distribution of descents in matchings
On similarity of the sample depth contours
General notions of regression depth function
Is repulsion good for the health of Chimeras?
Star coloring splitting graphs of cycles
Backward Approximate Dynamic Programming with Hidden Semi-Markov Stochastic Models in Energy Storage Optimization
Global spectrum fluctuations for Gaussian beta ensembles: a martingale approach
Theta maps for combinatorial Hopf algebras
A Semantics Comparison Workbench for a Concurrent, Asynchronous, Distributed Programming Language
Vertex-flames of countable digraphs preserving an Aharoni-Berger cut for each vertex
PRM-RL: Long-range Robotic Navigation Tasks by Combining Reinforcement Learning and Sampling-based Planning
Subdomain Deflation and Algebraic Multigrid: Combining Multiscale with Multilevel
One-step Estimation of Networked Population Size: Respondent-Driven Capture-Recapture with Anonymity
DailyDialog: A Manually Labelled Multi-turn Dialogue Dataset
Detect to Track and Track to Detect
Adaptive multi-penalty regularization based on a generalized Lasso path
Exploring Cross-Domain Data Dependencies for Smart Homes to Improve Energy Efficiency
A batching and scheduling optimisation for a cutting work-center: Acta-Mobilier case study
Second-order Karush-Kuhn-Tucker necessary conditions in locally Lipschitz vector optimization with inequality constraints
A Simple Yet Efficient Rank One Update for Covariance Matrix Adaptation
A Dynamic Edge Exchangeable Model for Sparse Temporal Networks
A note on the asymptotics of random density matrices
Marine Wireless Big Data: Efficient Transmission, Related Applications, and Challenges
Sample-path large deviations for Lévy processes and random walks with Weibull increments
Renormalization-group theory of the abnormal singularities at the critical-order transition in bond percolation on pointed hierarchical graphs
$ρ$-white noise solution to 2D stochastic Euler equations
Cytometry inference through adaptive atomic deconvolution
FFDNet: Toward a Fast and Flexible Solution for CNN based Image Denoising
Sparsity estimation in compressive sensing with application to MR images
The number of linked references of publications in Microsoft Academic in comparison with the Web of Science
Image retargeting via Beltrami representation
Porcellio scaber algorithm (PSA) for solving constrained optimization problems
Using modular decomposition technique to solve the maximum clique problem
Real State Transfer
Interactive Medical Image Segmentation using Deep Learning with Image-specific Fine-tuning
Neural Networks Quantum States, String-Bond States and chiral topological states
A Functional Central Limit Theorem for the Becker-Döring model
Stream Graphs and Link Streams for the Modeling of Interactions over Time
Word Translation Without Parallel Data
Quantized Minimum Error Entropy Criterion
Finding Euler Tours in One Pass in the W-Streaming Model with O(n log(n)) RAM
Efficient MCMC for Gibbs Random Fields using pre-computation
Validation of hardware events for successful performance pattern identification in High Performance Computing
Local Radon Descriptors for Image Search
Wembedder: Wikidata entity embedding web service
The Provable Virtue of Laziness in Motion Planning
Combining learned and analytical models for predicting action effects
Wilf-collapse in permutation classes having two basis elements of size three
Oriented Matroid Structures From Realized Root Systems
Discrete Event, Continuous Time RNNs
Recognizing Daily Activities from Egocentric Photo-Streams
A Simple Nonlinearity-Tailored Probabilistic Shaping Distribution for Square QAM
Bollywood Movie Corpus for Text, Images and Videos
GUIDES – Geospatial Urban Infrastructure Data Engineering Solutions
Classifying Fano Complexity-One $T$-Varieties via Divisorial Polytopes
Neural Program Meta-Induction
Counterfactual Conditionals in Quantified Modal Logic
Synkhronos: a Multi-GPU Theano Extension for Data Parallelism
An Information Theoretic Framework for Active De-anonymization in Social Networks Based on Group Memberships
Concentration of Multilinear Functions of the Ising Model with Applications to Network Data
VC-dimension of short Presburger formulas
On Data-Driven Saak Transform
The Social Bow Tie
An impossibility theorem for gerrymandering
Extreme value statistics of mutation accumulation in renewing cell populations
Joint Image Filtering with Deep Convolutional Networks