Temporal Stability in Predictive Process Monitoring

Predictive business process monitoring is concerned with the analysis of events produced during the execution of a business process in order to predict as early as possible the final outcome of an ongoing case. Traditionally, predictive process monitoring methods are optimized with respect to accuracy. However, in environments where users make decisions and take actions in response to the predictions they receive, it is equally important to optimize the stability of the successive predictions made for each case. To this end, this paper defines a notion of temporal stability for predictive process monitoring and evaluates existing methods with respect to both temporal stability and accuracy. We find that methods based on XGBoost and LSTM neural networks exhibit the highest temporal stability. We then show that temporal stability can be enhanced by hyperparameter-optimizing random forests and XGBoost classifiers with respect to inter-run stability. Finally, we show that time series smoothing techniques can further enhance temporal stability at the expense of slightly lower accuracy.


Causal Patterns: Extraction of multiple causal relationships by Mixture of Probabilistic Partial Canonical Correlation Analysis

In this paper, we propose a mixture of probabilistic partial canonical correlation analysis (MPPCCA) that extracts the Causal Patterns from two multivariate time series. Causal patterns refer to the signal patterns within interactions of two elements having multiple types of mutually causal relationships, rather than a mixture of simultaneous correlations or the absence of presence of a causal relationship between the elements. In multivariate statistics, partial canonical correlation analysis (PCCA) evaluates the correlation between two multivariates after subtracting the effect of the third multivariate. PCCA can calculate the Granger Causal- ity Index (which tests whether a time-series can be predicted from an- other time-series), but is not applicable to data containing multiple partial canonical correlations. After introducing the MPPCCA, we propose an expectation-maxmization (EM) algorithm that estimates the parameters and latent variables of the MPPCCA. The MPPCCA is expected to ex- tract multiple partial canonical correlations from data series without any supervised signals to split the data as clusters. The method was then eval- uated in synthetic data experiments. In the synthetic dataset, our method estimated the multiple partial canonical correlations more accurately than the existing method. To determine the types of patterns detectable by the method, experiments were also conducted on real datasets. The method estimated the communication patterns In motion-capture data. The MP- PCCA is applicable to various type of signals such as brain signals, human communication and nonlinear complex multibody systems.


Guidelines for Producing Useful Synthetic Data

We report on our experiences of helping staff of the Scottish Longitudinal Study to create synthetic extracts that can be released to users. In particular, we focus on how the synthesis process can be tailored to produce synthetic extracts that will provide users with similar results to those that would be obtained from the original data. We make recommendations for synthesis methods and illustrate how the staff creating synthetic extracts can evaluate their utility at the time they are being produced. We discuss measures of utility for synthetic data and show that one tabular utility measure is exactly equivalent to a measure calculated from a propensity score. The methods are illustrated by using the R package synthpop to create synthetic versions of data from the 1901 Census of Scotland.


Learning from the machine: interpreting machine learning algorithms for point- and extended- source classification

We investigate star-galaxy classification for astronomical surveys in the context of four methods enabling the interpretation of black-box machine learning systems. The first is outputting and exploring the decision boundaries as given by decision tree based methods, which enables the visualization of the classification categories. Secondly, we investigate how the Mutual Information based Transductive Feature Selection (MINT) algorithm can be used to perform feature pre-selection. If one would like to provide only a small number of input features to a machine learning classification algorithm, feature pre-selection provides a method to determine which of the many possible input properties should be selected. Third is the use of the tree-interpreter package to enable popular decision tree based ensemble methods to be opened, visualized, and understood. This is done by additional analysis of the tree based model, determining not only which features are important to the model, but how important a feature is for a particular classification given its value. Lastly, we use decision boundaries from the model to revise an already existing method of classification, essentially asking the tree based method where decision boundaries are best placed and defining a new classification method. We showcase these techniques by applying them to the problem of star-galaxy separation using data from the Sloan Digital Sky Survey (hereafter SDSS). We use the output of MINT and the ensemble methods to demonstrate how more complex decision boundaries improve star-galaxy classification accuracy over the standard SDSS frames approach (reducing misclassifications by up to \approx33\%). We then show how tree-interpreter can be used to explore how relevant each photometric feature is when making a classification on an object by object basis.


Cavs: A Vertex-centric Programming Interface for Dynamic Neural Networks

Recent deep learning (DL) models have moved beyond static network architectures to dynamic ones, handling data where the network structure changes every example, such as sequences of variable lengths, trees, and graphs. Existing dataflow-based programming models for DL—both static and dynamic declaration—either cannot readily express these dynamic models, or are inefficient due to repeated dataflow graph construction and processing, and difficulties in batched execution. We present Cavs, a vertex-centric programming interface and optimized system implementation for dynamic DL models. Cavs represents dynamic network structure as a static vertex function \mathcal{F} and a dynamic instance-specific graph \mathcal{G}, and performs backpropagation by scheduling the execution of \mathcal{F} following the dependencies in \mathcal{G}. Cavs bypasses expensive graph construction and preprocessing overhead, allows for the use of static graph optimization techniques on pre-defined operations in \mathcal{F}, and naturally exposes batched execution opportunities over different graphs. Experiments comparing Cavs to two state-of-the-art frameworks for dynamic NNs (TensorFlow Fold and DyNet) demonstrate the efficacy of this approach: Cavs achieves a near one order of magnitude speedup on training of various dynamic NN architectures, and ablations demonstrate the contribution of our proposed batching and memory management strategies.


In a Nutshell: Sequential Parameter Optimization

The performance of optimization algorithms relies crucially on their parameterizations. Finding good parameter settings is called algorithm tuning. Using a simple simulated annealing algorithm, we will demonstrate how optimization algorithms can be tuned using the sequential parameter optimization toolbox (SPOT). SPOT provides several tools for automated and interactive tuning. The underling concepts of the SPOT approach are explained. This includes key techniques such as exploratory fitness landscape analysis and response surface methodology. Many examples illustrate how SPOT can be used for understanding the performance of algorithms and gaining insight into algorithm’s behavior. Furthermore, we demonstrate how SPOT can be used as an optimizer and how a sophisticated ensemble approach is able to combine several meta models via stacking.


PacGAN: The power of two samples in generative adversarial networks

Generative adversarial networks (GANs) are innovative techniques for learning generative models of complex data distributions from samples. Despite remarkable recent improvements in generating realistic images, one of their major shortcomings is the fact that in practice, they tend to produce samples with little diversity, even when trained on diverse datasets. This phenomenon, known as mode collapse, has been the main focus of several recent advances in GANs. Yet there is little understanding of why mode collapse happens and why existing approaches are able to mitigate mode collapse. We propose a principled approach to handling mode collapse, which we call packing. The main idea is to modify the discriminator to make decisions based on multiple samples from the same class, either real or artificially generated. We borrow analysis tools from binary hypothesis testing—in particular the seminal result of Blackwell [Bla53]—to prove a fundamental connection between packing and mode collapse. We show that packing naturally penalizes generators with mode collapse, thereby favoring generator distributions with less mode collapse during the training process. Numerical experiments on benchmark datasets suggests that packing provides significant improvements in practice as well.


Deep Reinforcement Learning Boosted by External Knowledge

Recent improvements in deep reinforcement learning have allowed to solve problems in many 2D domains such as Atari games. However, in complex 3D environments, numerous learning episodes are required which may be too time consuming or even impossible especially in real-world scenarios. We present a new architecture to combine external knowledge and deep reinforcement learning using only visual input. A key concept of our system is augmenting image input by adding environment feature information and combining two sources of decision. We evaluate the performances of our method in a 3D partially-observable environment from the Microsoft Malmo platform. Experimental evaluation exhibits higher performance and faster learning compared to a single reinforcement learning model.


Neural Component Analysis for Fault Detection

Principal component analysis (PCA) is largely adopted for chemical process monitoring and numerous PCA-based systems have been developed to solve various fault detection and diagnosis problems. Since PCA-based methods assume that the monitored process is linear, nonlinear PCA models, such as autoencoder models and kernel principal component analysis (KPCA), has been proposed and applied to nonlinear process monitoring. However, KPCA-based methods need to perform eigen-decomposition (ED) on the kernel Gram matrix whose dimensions depend on the number of training data. Moreover, prefixed kernel parameters cannot be most effective for different faults which may need different parameters to maximize their respective detection performances. Autoencoder models lack the consideration of orthogonal constraints which is crucial for PCA-based algorithms. To address these problems, this paper proposes a novel nonlinear method, called neural component analysis (NCA), which intends to train a feedforward neural work with orthogonal constraints such as those used in PCA. NCA can adaptively learn its parameters through backpropagation and the dimensionality of the nonlinear features has no relationship with the number of training samples. Extensive experimental results on the Tennessee Eastman (TE) benchmark process show the superiority of NCA in terms of missed detection rate (MDR) and false alarm rate (FAR). The source code of NCA can be found in https://…/Neural-Component-Analysis.git.


GibbsNet: Iterative Adversarial Inference for Deep Graphical Models

Directed latent variable models that formulate the joint distribution as p(x,z) = p(z) p(x \mid z) have the advantage of fast and exact sampling. However, these models have the weakness of needing to specify p(z), often with a simple fixed prior that limits the expressiveness of the model. Undirected latent variable models discard the requirement that p(z) be specified with a prior, yet sampling from them generally requires an iterative procedure such as blocked Gibbs-sampling that may require many steps to draw samples from the joint distribution p(x, z). We propose a novel approach to learning the joint distribution between the data and a latent code which uses an adversarially learned iterative procedure to gradually refine the joint distribution, p(x, z), to better match with the data distribution on each step. GibbsNet is the best of both worlds both in theory and in practice. Achieving the speed and simplicity of a directed latent variable model, it is guaranteed (assuming the adversarial game reaches the virtual training criteria global minimum) to produce samples from p(x, z) with only a few sampling iterations. Achieving the expressiveness and flexibility of an undirected latent variable model, GibbsNet does away with the need for an explicit p(z) and has the ability to do attribute prediction, class-conditional generation, and joint image-attribute modeling in a single model which is not trained for any of these specific tasks. We show empirically that GibbsNet is able to learn a more complex p(z) and show that this leads to improved inpainting and iterative refinement of p(x, z) for dozens of steps and stable generation without collapse for thousands of steps, despite being trained on only a few steps.


Outlier Detection by Consistent Data Selection Method

Often the challenge associated with tasks like fraud and spam detection[1] is the lack of all likely patterns needed to train suitable supervised learning models. In order to overcome this limitation, such tasks are attempted as outlier or anomaly detection tasks. We also hypothesize that out- liers have behavioral patterns that change over time. Limited data and continuously changing patterns makes learning significantly difficult. In this work we are proposing an approach that detects outliers in large data sets by relying on data points that are consistent. The primary contribution of this work is that it will quickly help retrieve samples for both consistent and non-outlier data sets and is also mindful of new outlier patterns. No prior knowledge of each set is required to extract the samples. The method consists of two phases, in the first phase, consistent data points (non- outliers) are retrieved by an ensemble method of unsupervised clustering techniques and in the second phase a one class classifier trained on the consistent data point set is ap- plied on the remaining sample set to identify the outliers. The approach is tested on three publicly available data sets and the performance scores are competitive.


Interpretable Policies for Reinforcement Learning by Genetic Programming

The search for interpretable reinforcement learning policies is of high academic and industrial interest. Especially for industrial systems, domain experts are more likely to deploy autonomously learned controllers if they are understandable and convenient to evaluate. Basic algebraic equations are supposed to meet these requirements, as long as they are restricted to an adequate complexity. Here we introduce the genetic programming for reinforcement learning (GPRL) approach based on model-based batch reinforcement learning and genetic programming, which autonomously learns policy equations from pre-existing default state-action trajectory samples. GPRL is compared to a straight-forward method which utilizes genetic programming for symbolic regression, yielding policies imitating an existing well-performing, but non-interpretable policy. Experiments on three reinforcement learning benchmarks, i.e., mountain car, cart-pole balancing, and industrial benchmark, demonstrate the superiority of our GPRL approach compared to the symbolic regression method. GPRL is capable of producing well-performing interpretable reinforcement learning policies from pre-existing default trajectory data.


Contradiction-Centricity: A Uniform Model for Formation of Swarm Intelligence and its Simulations

It is a grand challenge to model the emergence of swarm intelligence and many principles or models had been proposed. However, existing models do not catch the nature of swarm intelligence and they are not generic enough to describe various types of emergence phenomena. In this work, we propose a contradiction-centric model for emergence of swarm intelligence, in which individuals’ contradictions dominate their appearances whilst they are associated and interacting to update their contradictions. This model hypothesizes that 1) the emergence of swarm intelligence is rooted in the development of contradictions of individuals and the interactions among associated individuals and 2) swarm intelligence is essentially a combinative reflection of the configurations of contradictions inside individuals and the distributions of contradictions among individuals. To verify the feasibility of the model, we simulate four types of swarm intelligence. As the simulations show, our model is truly generic and can describe the emergence of a variety of swarm intelligence, and it is also very simple and can be easily applied to demonstrate the emergence of swarm intelligence without needing complicated computations.


Empirical Evaluation of Kernel PCA Approximation Methods in Classification Tasks

Kernel Principal Component Analysis (KPCA) is a popular dimensionality reduction technique with a wide range of applications. However, it suffers from the problem of poor scalability. Various approximation methods have been proposed in the past to overcome this problem. The Nystr\’om method, Randomized Nonlinear Component Analysis (RNCA) and Streaming Kernel Principal Component Analysis (SKPCA) were proposed to deal with the scalability issue of KPCA. Despite having theoretical guarantees, their performance in real world learning tasks have not been explored previously. In this work the evaluation of SKPCA, RNCA and Nystr\’om method for the task of classification is done for several real world datasets. The results obtained indicate that SKPCA based features gave much better classification accuracy when compared to the other methods for a very large dataset.


Deep Echo State Network (DeepESN): A Brief Survey

The study of deep recurrent neural networks (RNNs) and, in particular, of deep Reservoir Computing (RC) is gaining an increasing research attention in the neural networks community. The recently introduced deep Echo State Network (deepESN) model opened the way to an extremely efficient approach for designing deep neural networks for temporal data. At the same time, the study of deepESNs allowed to shed light on the intrinsic properties of state dynamics developed by hierarchical compositions of recurrent layers, i.e. on the bias of depth in RNNs architectural design. In this paper, we summarize the advancements in the development, analysis and applications of deepESNs.


Real-time Text Analytics Pipeline Using Open-source Big Data Tools

Real-time text processing systems are required in many domains to quickly identify patterns, trends, sentiments, and insights. Nowadays, social networks, e-commerce stores, blogs, scientific experiments, and server logs are main sources generating huge text data. However, to process huge text data in real time requires building a data processing pipeline. The main challenge in building such pipeline is to minimize latency to process high-throughput data. In this paper, we explain and evaluate our proposed real-time text processing pipeline using open-source big data tools which minimize the latency to process data streams. Our proposed data processing pipeline is based on Apache Kafka for data ingestion, Apache Spark for in-memory data processing, Apache Cassandra for storing processed results, and D3 JavaScript library for visualization. We evaluate the effectiveness of the proposed pipeline under varying deployment scenarios to perform sentiment analysis using Twitter dataset. Our experimental evaluations show less than a minute latency to process 466,700 Tweets in 10.7 minutes when three virtual machines allocated to the proposed pipeline.


CUSBoost: Cluster-based Under-sampling with Boosting for Imbalanced Classification

Class imbalance classification is a challenging research problem in data mining and machine learning, as most of the real-life datasets are often imbalanced in nature. Existing learning algorithms maximise the classification accuracy by correctly classifying the majority class, but misclassify the minority class. However, the minority class instances are representing the concept with greater interest than the majority class instances in real-life applications. Recently, several techniques based on sampling methods (under-sampling of the majority class and over-sampling the minority class), cost-sensitive learning methods, and ensemble learning have been used in the literature for classifying imbalanced datasets. In this paper, we introduce a new clustering-based under-sampling approach with boosting (AdaBoost) algorithm, called CUSBoost, for effective imbalanced classification. The proposed algorithm provides an alternative to RUSBoost (random under-sampling with AdaBoost) and SMOTEBoost (synthetic minority over-sampling with AdaBoost) algorithms. We evaluated the performance of CUSBoost algorithm with the state-of-the-art methods based on ensemble learning like AdaBoost, RUSBoost, SMOTEBoost on 13 imbalance binary and multi-class datasets with various imbalance ratios. The experimental results show that the CUSBoost is a promising and effective approach for dealing with highly imbalanced datasets.


Machine Learning simulates Agent-Based Model

Running agent-based models (ABMs) is a burdensome computational task, specially so when considering the flexibility ABMs intrinsically provide. This paper uses a bundle of model configuration parameters along with obtained results from a validated ABM to train some Machine Learning methods for socioeconomic optimal cases. A larger space of possible parameters and combinations of parameters are then used as input to predict optimal cases and confirm parameters calibration. Analysis of the parameters of the optimal cases are then compared to the baseline model. This exploratory initial exercise confirms the adequacy of most of the parameters and rules and suggests changing of directions to two parameters. Additionally, it helps highlight metropolitan regions of higher quality of life. Better understanding of ABM mechanisms and parameters’ influence may nudge policy-making slightly closer to optimal level.


A Mathematical Programming Approach for Integrated Multiple Linear Regression Subset Selection and Validation

Subset selection for multiple linear regression aims to construct a regression model that minimizes errors by selecting a small number of explanatory variables. Once a model is built, various statistical tests and diagnostics are conducted to validate the model and to determine whether regression assumptions are met. Most traditional approaches require human decisions at this step, for example, the user adding or removing a variable until a satisfactory model is obtained. However, this trial-and-error strategy cannot guarantee that a subset that minimizes the errors while satisfying all regression assumptions will be found. In this paper, we propose a fully automated model building procedure for multiple linear regression subset selection that integrates model building and validation based on mathematical programming. The proposed model minimizes mean squared errors while ensuring that the majority of the important regression assumptions are met. When no subset satisfies all of the considered regression assumptions, our model provides an alternative subset that satisfies most of these assumptions. Computational results show that our model yields better solutions (i.e., satisfying more regression assumptions) compared to benchmark models while maintaining similar explanatory power.


Practical Bayesian optimization in the presence of outliers

Inference in the presence of outliers is an important field of research as outliers are ubiquitous and may arise across a variety of problems and domains. Bayesian optimization is method that heavily relies on probabilistic inference. This allows outstanding sample efficiency because the probabilistic machinery provides a memory of the whole optimization process. However, that virtue becomes a disadvantage when the memory is populated with outliers, inducing bias in the estimation. In this paper, we present an empirical evaluation of Bayesian optimization methods in the presence of outliers. The empirical evidence shows that Bayesian optimization with robust regression often produces suboptimal results. We then propose a new algorithm which combines robust regression (a Gaussian process with Student-t likelihood) with outlier diagnostics to classify data points as outliers or inliers. By using an scheduler for the classification of outliers, our method is more efficient and has better convergence over the standard robust regression. Furthermore, we show that even in controlled situations with no expected outliers, our method is able to produce better results.


Deep Quaternion Networks

The field of deep learning has seen significant advancement in recent years. However, much of the existing work has been focused on real-valued numbers. Recent work has shown that a deep learning system using the complex numbers can be deeper for a set parameter budget compared to its real-valued counterpart. In this work, we explore the benefits of generalizing one step further into the hyper-complex numbers, quaternions specifically, and provide the architecture components needed to build deep quaternion networks. We go over quaternion convolutions, present a quaternion weight initialization scheme, and present algorithms for quaternion batch-normalization. These pieces are tested by end-to-end training on the CIFAR-10 and CIFAR-100 data sets to show the improved convergence to a real-valued network.


Inverse Reinforcement Learning for Marketing

Learning customer preferences from an observed behaviour is an important topic in the marketing literature. Structural models typically model forward-looking customers or firms as utility-maximizing agents whose utility is estimated using methods of Stochastic Optimal Control. We suggest an alternative approach to study dynamic consumer demand, based on Inverse Reinforcement Learning (IRL). We develop a version of the Maximum Entropy IRL that leads to a highly tractable model formulation that amounts to low-dimensional convex optimization in the search for optimal model parameters. Using simulations of consumer demand, we show that observational noise for identical customers can be easily confused with an apparent consumer heterogeneity.


ROAST: Rapid Orthogonal Approximate Slepian Transform

In this paper, we provide a Rapid Orthogonal Approximate Slepian Transform (ROAST) for the discrete vector one obtains when collecting a finite set of uniform samples from a baseband analog signal. The ROAST offers an orthogonal projection which is an approximation to the orthogonal projection onto the leading discrete prolate spheroidal sequence (DPSS) vectors (also known as Slepian basis vectors). As such, the ROAST is guaranteed to accurately and compactly represent not only oversampled bandlimited signals but also the leading DPSS vectors themselves. Moreover, the subspace angle between the ROAST subspace and the corresponding DPSS subspace can be made arbitrarily small. The complexity of computing the representation of a signal using the ROAST is comparable to the FFT, which is much less than the complexity of using the DPSS basis vectors. We also give non-asymptotic results to guarantee that the proposed basis not only provides a very high degree of approximation accuracy in a mean-square error sense for bandlimited sample vectors, but also that it can provide high-quality approximations of all sampled sinusoids within the band of interest.


Eye In-Painting with Exemplar Generative Adversarial Networks
Social Media Writing Style Fingerprint
Press-Dyson Analysis of Asynchronous, Sequential Prisoner’s Dilemma
‘Lion-Man’ and the Fixed Point Property
Training Ensembles to Detect Adversarial Examples
Investigation on How Data Volume Affects Transfer Learning Performances in Business Applications
Detecting Qualia in Natural and Artificial Agents
A state enumeration of the foil knot
An asymptotic property of large matrices with identically distributed Boolean independent entries
Learning Robust Dialog Policies in Noisy Environments
Diversity Combining via Universal Orthogonal Space-Time Transformations
How to navigate through obstacles?
Recursive computation of the invariant distributions of Feller processes: Original applications
Choose your path wisely: gradient descent in a Bregman distance framework
Attention networks for image-to-text
Automan: a simple, Python-based, automation framework for numerical computing
Cascading Failures as Continuous Phase-Space Transitions
Many-body synchronization of interacting qubits by engineered ac-driving
Distinguishing differential susceptibility, diathesis-stress and vantage sensitivity: beyond the single gene and environment model
A multi-parameter variant of the Erdős distance problem
Bounds on the Jensen Gap, and Implications for Mean-Concentrated Distributions
Distributed Bayesian Filtering using Logarithmic Opinion Pool for Dynamic Sensor Networks
The Eigenoption-Critic Framework
Tail asymptotics of light-tailed Weibull-like sums
Diagnosing added value of convection-permitting regional models using precipitation event identification and tracking
Matroids, antimatroids, and the generalized external order
Hypergraphs not containing a tight tree with a bounded trunk
Learning Compressible 360° Video Isomers
Zero-Modified Poisson-Lindley distribution with applications in zero-inflated and zero-deflated count data
Systems of Points with Coulomb Interactions
Normal Convergence Using Malliavin Calculus With Applications and Examples
Towards a proof of the 24-cell conjecture
Convergence Rates for Deterministic and Stochastic Subgradient Methods Without Lipschitz Continuity
Sparse Phase Retrieval via Sparse PCA Despite Model Misspecification: A Simplified and Extended Analysis
Incremental View Maintenance for Property Graph Queries
It’s good to be $φ$: a solution to a problem of Gosper and Knuth
Im2Flow: Motion Hallucination from Static Images for Action Recognition
Document Generation with Hierarchical Latent Tree Models
200x Low-dose PET Reconstruction using Deep Learning
Performance guarantees for greedy maximization of non-submodular set functions in systems and control
On the Ergodic Capacity of Composite Fading Channels in Cognitive Radios with the Product of $κ$-$μ$ and $α$-$μ$ Variates
On the existence of a cherry-picking sequence
Topology of Privacy: Lattice Structures and Information Bubbles for Inference and Obfuscation
Attaching leaves and picking cherries to characterise the hybridisation number for a set of phylogenies
The Gaussian Interference Channel in the Presence of Malicious Jammers
Deep Learning for Reliable Mobile Edge Analytics in Intelligent Transportation Systems
Sequential Prediction of Social Media Popularity with Deep Temporal Context Networks
Non-Commutative Chern Numbers for Generic Aperiodic Discrete Systems
A vision based system for underwater docking
Deep learning enhanced mobile-phone microscopy
Direction-aware Spatial Context Features for Shadow Detection
RESIDE: A Benchmark for Single Image Dehazing
Localization of multiplex networks by the optimized single-layer rewiring
Information Perspective to Probabilistic Modeling: Boltzmann Machines versus Born Machines
Transportation analysis of denoising autoencoders: a novel method for analyzing deep neural networks
A Random Sample Partition Data Model for Big Data Analysis
Toward `verifying’ a Water Treatment System
Tracing a Loose Wordhood for Chinese Input Method Engine
Mining Non-Redundant Sets of Generalizing Patterns from Sequence Databases
How Better is Distributed SDN? An Analytical Approach
A Low-Cost Ethics Shaping Approach for Designing Reinforcement Learning Agents
Backpropagation generalized for output derivatives
Planar Ising model at criticality: state-of-the-art and perspectives
Concept Formation and Dynamics of Repeated Inference in Deep Generative Models
Approximating multivariate posterior distribution functions from Monte Carlo samples for sequential Bayesian inference
Interactive graph query language for multidimensional data in Collaboration Spotting visual analytics framework
The Deterministic and Stochastic Shallow Lake Problem
Dynamic Discrete Tomography
Identifiability of tree-child phylogenetic networks under a probabilistic recombination-mutation model of evolution
Piecewise interlacing zeros of polynomials satisfying some recurrence of order two
On some Graphs with a Unique Perfect Matching
Common zeros of polynomials satisfying a recurrence of order two
Ultra valuations
Approximation of Supremum of Max-Stable Stationary Processes and Pickands Constants
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models
On three dimensional multivariate version of q-Normal distribution and probabilistic interpretations of Askey–Wilson, Al-Salam–Chihara and q-ultraspherical polynomials
Diffusion limits for networks of Markov-modulated infinite-server queues
Upper bounds for Z$_1$-eigenvalues of generalized Hilbert tensors
Robustness, Evolvability and Phenotypic Complexity: Insights from Evolving Digital Circuits
Efficient Approximation Algorithms for String Kernel Based Sequence Classification
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-antenna Base Stations
On the Gaussian Multiple Access Wiretap Channel and the Gaussian Wiretap Channel with a Helper: Achievable Schemes and Upper Bounds
Multi-Speaker Localization Using Convolutional Neural Network Trained with Noise
Robust Fragmentation Modeling of Hegselmann-Krause-Type Dynamics
Computational Complexity of the Interleaving Distance
Regression with genuinely functional errors-in-covariates
Borel selector for hypergraphons
Learning Spontaneity to Improve Emotion Recognition In Speech
The Zero Resource Speech Challenge 2017
Generating and Estimating Nonverbal Alphabets for Situated and Multimodal Communications
On McKean’s martingale in the Bovier-Hartung extremal process
Mean-field approach for frequency synchronization in complex networks of two oscillator types
Simulated Autonomous Driving on Realistic Road Networks using Deep Reinforcement Learning
Quantifying a qualitative framework of patients perceptions, attitudes and behavior relevant to oral health related quality of life
Semi-reflexive polytopes
Hawkes Processes for Invasive Species Modeling and Management
An Erdős-Gallai type theorem for vertex colored graphs
Review. Machine learning techniques for traffic sign detection
A characterization of colorless anonymous $t$-resilient task computability
Freeness for 13 lines arrangements is combinatorial
Android Malware Characterization using Metadata and Machine Learning Techniques
Statistical estimation in a randomly structured branching population
Logo Synthesis and Manipulation with Clustered Generative Adversarial Networks
On the gap between Gamma-limit and pointwise limit for a non-local approximation of the total variation
Deception Detection in Videos
Fair valuation of Lévy-type drawdown-drawup contracts with general insured and penalty functions
Photovoltaic Generation in Distribution Networks: Optimal vs. Random Installation
Conditional Generative Adversarial Networks for Emoji Synthesis with Word Embedding Manipulation
Binary Parseval frames from group orbits
3D Object Classification via Spherical Projections
Small-Scale Markets for Bilateral Resource Trading in the Sharing Economy
Integrated Model and Data Parallelism in Training Neural Networks
Data Distillation: Towards Omni-Supervised Learning
Enhancing approximation abilities of neural networks by training derivatives
Learning a Complete Image Indexing Pipeline
Image Registration for the Alignment of Digitized Historical Documents
Topological mixture estimation
Fingerprint Spoof Buster
A Data-Driven Sparse-Learning Approach to Model Reduction in Chemical Reaction Networks
Intra-node Memory Safe GPU Co-Scheduling
Computational Properties of Slime Trail
Pixel-Level Statistical Analyses of Prescribed Fire Spread
Colloquium: Criticality and dynamical scaling in living systems
Camera Calibration for Daylight Specular-Point Locus
Face-from-Depth for Head Pose Estimation on Depth Images
To Refine or Not to Refine: Topology Optimization of Adaptively Refined Infill Structures for Additive Manufacturing
$k$-Conflict-Free Coloring of String Graphs
Bursting endemic bubbles in an adaptive network
Learning Sparse Graphs for Prediction and Filtering of Multivariate Data Processes
Hierarchical Bloom Filter Trees for Approximate Matching
Accessible Percolation with Crossing Valleys on $n$-ary Trees
Minors of two-connected graphs of large path-width
From a $(p,2)$-Theorem to a Tight $(p,q)$-Theorem
A bandwidth theorem for approximate decompositions
Symmetry and other Combinatorial Relations in Strategic Games
Im2Pano3D: Extrapolating 360 Structure and Semantics Beyond the Field of View
Fusing Multiple Multiband Images
Learning From Noisy Singly-labeled Data
Over the Air Deep Learning Based Radio Signal Classification
Potential-Function Proofs for First-Order Methods
Yang-Baxter field for spin Hall-Littlewood symmetric functions
Bobkov’s inequality via optimal control theory
Mutual synchronization of spin-torque oscillators consisting of perpendicularly magnetized free layers and in-plane magnetized pinned layers
Finite-Sample Optimal Estimation and Inference on Average Treatment Effects Under Unconfoundedness
Fractal dimension and lower bounds for geometric problems
Consideration on Example 2 of ‘An Algorithm of General Fuzzy InferenceWith The Reductive Property’
Approximate method for cutting pattern optimization of frame-supported and pneumatic membrane structures
On the organization of grid and place cells: Neural de-noising via subspace learning
Multi-focus Attention Network for Efficient Deep Reinforcement Learning
QLBS: Q-Learner in the Black-Scholes(-Merton) Worlds

Advertisements