Distributed One-class Learning

We propose a cloud-based filter trained to block third parties from uploading privacy-sensitive images of others to online social media. The proposed filter uses Distributed One-Class Learning, which decomposes the cloud-based filter into multiple one-class classifiers. Each one-class classifier captures the properties of a class of privacy-sensitive images with an autoencoder. The multi-class filter is then reconstructed by combining the parameters of the one-class autoencoders. The training takes place on edge devices (e.g. smartphones) and therefore users do not need to upload their private and/or sensitive images to the cloud. A major advantage of the proposed filter over existing distributed learning approaches is that users cannot access, even indirectly, the parameters of other users. Moreover, the filter can cope with the imbalanced and complex distribution of the image content and the independent probability of addition of new users. We evaluate the performance of the proposed distributed filter using the exemplar task of blocking a user from sharing privacy-sensitive images of other users. In particular, we validate the behavior of the proposed multi-class filter with non-privacy-sensitive images, the accuracy when the number of classes increases, and the robustness to attacks when an adversary user has access to privacy-sensitive images of other users.

Deep Meta-Learning: Learning to Learn in the Concept Space

Few-shot learning remains challenging for meta-learning that learns a learning algorithm (meta-learner) from many related tasks. In this work, we argue that this is due to the lack of a good representation for meta-learning, and propose deep meta-learning to integrate the representation power of deep learning into meta-learning. The framework is composed of three modules, a concept generator, a meta-learner, and a concept discriminator, which are learned jointly. The concept generator, e.g. a deep residual net, extracts a representation for each instance that captures its high-level concept, on which the meta-learner performs few-shot learning, and the concept discriminator recognizes the concepts. By learning to learn in the concept space rather than in the complicated instance space, deep meta-learning can substantially improve vanilla meta-learning, which is demonstrated on various few-shot image recognition problems. For example, on 5-way-1-shot image recognition on CIFAR-100 and CUB-200, it improves Matching Nets from 50.53% and 56.53% to 58.18% and 63.47%, improves MAML from 49.28% and 50.45% to 56.65% and 64.63%, and improves Meta-SGD from 53.83% and 53.34% to 61.62% and 66.95%, respectively.

Deep Visual Domain Adaptation: A Survey

Deep domain adaption has emerged as a new learning technique to address the lack of massive amounts of labeled data. Compared to conventional methods, which learn shared feature subspaces or reuse important source instances with shallow representations, deep domain adaption methods leverage deep networks to learn more transferable representations by embedding domain adaptation in the pipeline of deep learning. There have been comprehensive surveys for shallow domain adaption, but few timely reviews the emerging deep learning based methods. In this paper, we provide a comprehensive survey of deep domain adaptation methods for computer vision applications with four major contributions. First, we present a taxonomy of different deep domain adaption scenarios according to the properties of data that define how two domains are diverged. Second, we summarize deep domain adaption approaches into several categories based on training loss, and analyze and compare briefly the state-of-the-art methods under these categories. Third, we overview the computer vision applications that go beyond image classification, such as face recognition, semantic segmentation and object detection. Fourth, some potential deficiencies of current methods and several future directions are highlighted.

Running genetic algorithms on Hadoop for solving high dimensional optimization problems

Hadoop is a popular MapReduce framework for developing parallel applications in distributed environments. Several advantages of MapReduce such as programming ease and ability to use commodity hardware make the applicability of soft computing methods for parallel and distributed systems easier than before. In this paper, we present the results of an experimental study on running soft computing algorithms using Hadoop. This study shows how a simple genetic algorithm running on Hadoop can be used to produce solutions for high dimensional optimization problems. In addition, a simple but effective technique, which did not need MapReduce chains, has been proposed.

Feature-Distributed SVRG for High-Dimensional Linear Classification

Linear classification has been widely used in many high-dimensional applications like text classification. To perform linear classification for large-scale tasks, we often need to design distributed learning methods on a cluster of multiple machines. In this paper, we propose a new distributed learning method, called feature-distributed stochastic variance reduced gradient (FD-SVRG) for high-dimensional linear classification. Unlike most existing distributed learning methods which are instance-distributed, FD-SVRG is feature-distributed. FD-SVRG has lower communication cost than other instance-distributed methods when the data dimensionality is larger than the number of data instances. Experimental results on real data demonstrate that FD-SVRG can outperform other state-of-the-art distributed methods for high-dimensional linear classification in terms of both communication cost and wall-clock time, when the dimensionality is larger than the number of instances in training data.

Combinets: Learning New Classifiers via Recombination

Problems with few examples of a new class of objects prove challenging to most classifiers. One solution to is to reuse existing data through transfer methods such as one-shot learning or domain adaption. However these approaches require an explicit hand-authored or learned definition of how reuse can occur. We present an approach called conceptual expansion that learns how to reuse existing machine-learned knowledge when classifying new cases. We evaluate our approach by adding new classes of objects to the CIFAR-10 dataset and varying the number of available examples of these new classes.

Distributed NLP

In this paper we present the performance of parallel text processing with Map Reduce on a cloud platform. Scientific papers in Turkish language are processed using Zemberek NLP library. Experiments were run on a Hadoop cluster and compared with the single machines performance.

Learning Correlation Space for Time Series

We propose an approximation algorithm for efficient correlation search in time series data. In our method, we use Fourier transform and neural network to embed time series into a low-dimensional Euclidean space. The given space is learned such that time series correlation can be effectively approximated from Euclidean distance between corresponding embedded vectors. Therefore, search for correlated time series can be done using an index in the embedding space for efficient nearest neighbor search. Our theoretical analysis illustrates that our method’s accuracy can be guaranteed under certain regularity conditions. We further conduct experiments on real-world datasets and the results show that our method indeed outperforms the baseline solution. In particular, for approximation of correlation, our method reduces the approximation loss by a half in most test cases compared to the baseline solution. For top-k highest correlation search, our method improves the precision from 5\% to 20\% while the query time is similar to the baseline approach query time.

Forget Markov Logic: Efficient Mining of Prediction Rules in Large Graphs

Graph representations of large knowledge bases may comprise billions of edges. Usually built upon human-generated ontologies, several knowledge bases do not feature declared ontological rules and are far from being complete. Current rule mining approaches rely on schemata or store the graph in-memory, which can be unfeasible for large graphs. In this paper, we introduce HornConcerto, an algorithm to discover Horn clauses in large graphs without the need of a schema. Using a standard fact-based confidence score, we can mine close Horn rules having an arbitrary body size. We show that our method can outperform existing approaches in terms of runtime and memory consumption and mine high-quality rules for the link prediction task, achieving state-of-the-art results on a widely-used benchmark. Moreover, we find that rules alone can perform inference significantly faster than embedding-based methods and achieve accuracies on link prediction comparable to resource-demanding approaches such as Markov Logic Networks.

Low-Rank Methods in Event Detection

We present low-rank methods for event detection. We assume that normal observation come from a low-rank subspace, prior to being corrupted by a uniformly distributed noise. Correspondingly, we aim at recovering a representation of the subspace, and perform event detection by running point-to-subspace distance query in \ell^\infty, for each incoming observation. In particular, we use a variant of matrix completion under interval uncertainty on a suitable flattening M \in R^{m \times n} of the input data to obtain a low-rank model M \approx L \times R, L \in R^{m \times r}, R \in R^{r \times n}, r \ll m. On-line, we compute the distance of each incoming x \in R^n to the space spanned by R. For the distance computation, we present a constant-time algorithm with a one-sided error bounded by a function of the number of coordinates employed.

Beyond the One Step Greedy Approach in Reinforcement Learning

The famous Policy Iteration algorithm alternates between policy improvement and policy evaluation. Implementations of this algorithm with several variants of the latter evaluation stage, e.g, n-step and trace-based returns, have been analyzed in previous works. However, the case of multiple-step lookahead policy improvement, despite the recent increase in empirical evidence of its strength, has to our knowledge not been carefully analyzed yet. In this work, we introduce the first such analysis. Namely, we formulate variants of multiple-step policy improvement, derive new algorithms using these definitions and prove their convergence. Moreover, we show that recent prominent Reinforcement Learning algorithms are, in fact, instances of our framework. We thus shed light on their empirical success and give a recipe for deriving new algorithms for future study.

Understanding Convolutional Networks with APPLE : Automatic Patch Pattern Labeling for Explanation

With the success of deep learning, recent efforts have been focused on analyzing how learned networks make their classifications. We are interested in analyzing the network output based on the network structure and information flow through the network layers. We contribute an algorithm for 1) analyzing a deep network to find neurons that are ‘important’ in terms of the network classification outcome, and 2)automatically labeling the patches of the input image that activate these important neurons. We propose several measures of importance for neurons and demonstrate that our technique can be used to gain insight into, and explain how a network decomposes an image to make its final classification.

Nearly Optimal Adaptive Procedure for Piecewise-Stationary Bandit: a Change-Point Detection Approach

Multi-armed bandit (MAB) is a class of online learning problems where a learning agent aims to maximize its expected cumulative reward while repeatedly selecting to pull arms with unknown reward distributions. In this paper, we consider a scenario in which the arms’ reward distributions may change in a piecewise-stationary fashion at unknown time steps. By connecting change-detection techniques with classic UCB algorithms, we motivate and propose a learning algorithm called M-UCB, which can detect and adapt to changes, for the considered scenario. We also establish an O(\sqrt{MKT\log T}) regret bound for M-UCB, where T is the number of time steps, K is the number of arms, and M is the number of stationary segments. % and \Delta is the gap between the expected rewards of the optimal and best suboptimal arms. Comparison with the best available lower bound shows that M-UCB is nearly optimal in T up to a logarithmic factor. We also compare M-UCB with state-of-the-art algorithms in a numerical experiment based on a public Yahoo! dataset. In this experiment, M-UCB achieves about 50 \% regret reduction with respect to the best performing state-of-the-art algorithm.

PCA-Based Missing Information Imputation for Real-Time Crash Likelihood Prediction Under Imbalanced Data

The real-time crash likelihood prediction has been an important research topic. Various classifiers, such as support vector machine (SVM) and tree-based boosting algorithms, have been proposed in traffic safety studies. However, few research focuses on the missing data imputation in real-time crash likelihood prediction, although missing values are commonly observed due to breakdown of sensors or external interference. Besides, classifying imbalanced data is also a difficult problem in real-time crash likelihood prediction, since it is hard to distinguish crash-prone cases from non-crash cases which compose the majority of the observed samples. In this paper, principal component analysis (PCA) based approaches, including LS-PCA, PPCA, and VBPCA, are employed for imputing missing values, while two kinds of solutions are developed to solve the problem in imbalanced data. The results show that PPCA and VBPCA not only outperform LS-PCA and other imputation methods (including mean imputation and k-means clustering imputation), in terms of the root mean square error (RMSE), but also help the classifiers achieve better predictive performance. The two solutions, i.e., cost-sensitive learning and synthetic minority oversampling technique (SMOTE), help improve the sensitivity by adjusting the classifiers to pay more attention to the minority class.

Optimizing Neural Networks in the Equivalent Class Space

It has been widely observed that many activation functions and pooling methods of neural network models have (positive-) rescaling-invariant property, including ReLU, PReLU, max-pooling, and average pooling, which makes fully-connected neural networks (FNNs) and convolutional neural networks (CNNs) invariant to (positive) rescaling operation across layers. This may cause unneglectable problems with their optimization: (1) different NN models could be equivalent, but their gradients can be very different from each other; (2) it can be proven that the loss functions may have many spurious critical points in the redundant weight space. To tackle these problems, in this paper, we first characterize the rescaling-invariant properties of NN models using equivalent classes and prove that the dimension of the equivalent class space is significantly smaller than the dimension of the original weight space. Then we represent the loss function in the compact equivalent class space and develop novel algorithms that conduct optimization of the NN models directly in the equivalent class space. We call these algorithms Equivalent Class Optimization (abbreviated as EC-Opt) algorithms. Moreover, we design efficient tricks to compute the gradients in the equivalent class, which almost have no extra computational complexity as compared to standard back-propagation (BP). We conducted experimental study to demonstrate the effectiveness of our proposed new optimization algorithms. In particular, we show that by using the idea of EC-Opt, we can significantly improve the accuracy of the learned model (for both FNN and CNN), as compared to using conventional stochastic gradient descent algorithms.

QRkit: Sparse, Composable QR Decompositions for Efficient and Stable Solutions to Problems in Computer Vision

Embedded computer vision applications increasingly require the speed and power benefits of single-precision (32 bit) floating point. However, applications which make use of Levenberg-like optimization can lose significant accuracy when reducing to single precision, sometimes unrecoverably so. This accuracy can be regained using solvers based on QR rather than Cholesky decomposition, but the absence of sparse QR solvers for common sparsity patterns found in computer vision means that many applications cannot benefit. We introduce an open-source suite of solvers for Eigen, which efficiently compute the QR decomposition for matrices with some common sparsity patterns (block diagonal, horizontal and vertical concatenation, and banded). For problems with very particular sparsity structures, these elements can be composed together in ‘kit’ form, hence the name QRkit. We apply our methods to several computer vision problems, showing competitive performance and suitability especially in single precision arithmetic.

PRIL: Perceptron Ranking Using Interval Labeled Data

In this paper, we propose an online learning algorithm PRIL for learning ranking classifiers using interval labeled data and show its correctness. We show its convergence in finite number of steps if there exists an ideal classifier such that the rank given by it for an example always lies in its label interval. We then generalize this mistake bound result for the general case. We also provide regret bound for the proposed algorithm. We propose a multiplicative update algorithm for PRIL called M-PRIL. We provide its correctness and convergence results. We show the effectiveness of PRIL by showing its performance on various datasets.

Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications

To ensure undisrupted business, large Internet companies need to closely monitor various KPIs (e.g., Page Views, number of online users, and number of orders) of its Web applications, to accurately detect anomalies and trigger timely troubleshooting/mitigation. However, anomaly detection for these seasonal KPIs with various patterns and data quality has been a great challenge, especially without labels. In this paper, we proposed Donut, an unsupervised anomaly detection algorithm based on VAE. Thanks to a few of our key techniques, Donut greatly outperforms a state-of-arts supervised ensemble approach and a baseline VAE approach, and its best F-scores range from 0.75 to 0.9 for the studied KPIs from a top global Internet company. We come up with a novel KDE interpretation of reconstruction for Donut, making it the first VAE-based anomaly detection algorithm with solid theoretical explanation.

Email Classification into Relevant Category Using Neural Networks

In the real world, many online shopping websites or service provider have single email-id where customers can send their query, concern etc. At the back-end service provider receive million of emails every week, how they can identify which email is belonged of a particular department? This paper presents an artificial neural network (ANN) model that is used to solve this problem and experiments are carried out on user personal Gmail emails datasets. This problem can be generalised as typical Text Classification or Categorization.

Notable Characteristics Search through Knowledge Graphs

Query answering routinely employs knowledge graphs to assist the user in the search process. Given a knowledge graph that represents entities and relationships among them, one aims at complementing the search with intuitive but effective mechanisms. In particular, we focus on the comparison of two or more entities and the detection of unexpected, surprising properties, called notable characteristics. Such characteristics provide intuitive explanations of the peculiarities of the selected entities with respect to similar entities. We propose a solid probabilistic approach that first retrieves entity nodes similar to the query nodes provided by the user, and then exploits distributional properties to understand whether a certain attribute is interesting or not. Our preliminary experiments demonstrate the solidity of our approach and show that we are able to discover notable characteristics that are indeed interesting and relevant for the user.

Randomized Block Cubic Newton Method

We study the problem of minimizing the sum of three convex functions: a differentiable, twice-differentiable and a non-smooth term in a high dimensional setting. To this effect we propose and analyze a randomized block cubic Newton (RBCN) method, which in each iteration builds a model of the objective function formed as the sum of the natural models of its three components: a linear model with a quadratic regularizer for the differentiable term, a quadratic model with a cubic regularizer for the twice differentiable term, and perfect (proximal) model for the nonsmooth term. Our method in each iteration minimizes the model over a random subset of blocks of the search variable. RBCN is the first algorithm with these properties, generalizing several existing methods, matching the best known bounds in all special cases. We establish {\cal O}(1/\epsilon), {\cal O}(1/\sqrt{\epsilon}) and {\cal O}(\log (1/\epsilon)) rates under different assumptions on the component functions. Lastly, we show numerically that our method outperforms the state-of-the-art on a variety of machine learning problems, including cubically regularized least-squares, logistic regression with constraints, and Poisson regression.

State Representation Learning for Control: An Overview

Representation learning algorithms are designed to learn abstract features that characterize data. State representation learning (SRL) focuses on a particular kind of representation learning where learned features are in low dimension, evolve through time, and are influenced by actions of an agent. As the representation learned captures the variation in the environment generated by agents, this kind of representation is particularly suitable for robotics and control scenarios. In particular, the low dimension helps to overcome the curse of dimensionality, provides easier interpretation and utilization by humans and can help improve performance and speed in policy learning algorithms such as reinforcement learning. This survey aims at covering the state-of-the-art on state representation learning in the most recent years. It reviews different SRL methods that involve interaction with the environment, their implementations and their applications in robotics control tasks (simulated or real). In particular, it highlights how generic learning objectives are differently exploited in the reviewed algorithms. Finally, it discusses evaluation methods to assess the representation learned and summarizes current and future lines of research.

Critères de qualité d’un classifieur généraliste
Tips, guidelines and tools for managing multi-label datasets: the mldr.datasets R package and the Cometa data repository
Riemannian Manifold Kernel for Persistence Diagrams
Downlink User Association and Uplink Scheduling for Energy Harvesting Users in Software-Defined Mobile Networks
On weighted safe set problem on paths and cycles
2-gram-based Phonetic Feature Generation for Convolutional Neural Network in Assessment of Trademark Similarity
The full moment problem on subsets of probabilities and point configurations
Joint Learning for Pulmonary Nodule Segmentation, Attributes and Malignancy Prediction
Network Flow-Based Refinement for Multilevel Hypergraph Partitioning
Distributed Log Analysis on the Cloud Using MapReduce
Dynamics of observables in rank-based models and performance of functionally generated portfolios
Online Learning for Effort Reduction in Interactive Neural Machine Translation
Document Classification Using Distributed Machine Learning
Laplacian Dynamics on Cographs: Controllability Analysis through Joins and Unions
MOEA/D with Angle-based Constrained Dominance Principle for Constrained Multi-objective Optimization Problems
On the additive complexity of a Thue-Morse like sequence
Searching isomorphic graphs
Optimize transfer learning for lung diseases in bronchoscopy using a new concept: sequential fine-tuning
Optimal approximation of continuous functions by very deep ReLU networks
Difffusion Dynamics on the Coexistence Subspace in a Stochastic Evolutionary Game
Detecting Multiple Step Changes Using Adaptive Regression Splines with Application to Neural Recordings
On the Tractability of (k,i)-Coloring
Probabilistic modelling and reconstruction of strain
Effect of predomination and vertex removal on the game total domination number of a graph
Martingale Characterizations of Risk-Averse Stochastic Optimization Problems
Same Same, but Different: A Descriptive Differentiation of Intra-cloud Iaas Services
Graph Planning with Expected Finite Horizon
Learning to Recommend via Inverse Optimal Matching
On the Universal Approximability of Quantized ReLU Neural Networks
Turán, involution and shifting
Deep learning with t-exponential Bayesian kitchen sinks
Approximating Sparse Graphs: The Random Overlapping Communities Model
On Symplectic Optimization
TextZoo, a New Benchmark for Reconsidering Text Classification
Generalized Fitch Graphs: Edge-labeled Graphs that are explained by Edge-labeled Trees
A geometric approach to integer factorization
Backward Stochastic Volterra Integral Equations— Representation of Adapted Solutions
Sparse Random Matrices have Simple Spectrum
The Power Allocation Game on A Network: A Paradox
Faster Distributed Shortest Path Approximations via Shortcuts
Compressive Spectrum Sensing for Cognitive Radio Networks
Differentiable Dynamic Programming for Structured Prediction and Attention
Unthule: An Incremental Graph Construction Process for Robust Road Map Extraction from Aerial Images
On the boundary of the zero set of super-Brownian motion and its local time
Learning a SAT Solver from Single-Bit Supervision
On the Rates of Convergence from Surrogate Risk Minimizers to the Bayes Optimal Classifier
Dual Control Memory Augmented Neural Networks for Treatment Recommendations
On the Generalization of Equivariance and Convolution in Neural Networks to the Action of Compact Groups
Tree-to-tree Neural Networks for Program Translation
Stochastic Non-preemptive Co-flow Scheduling with Time-Indexed Relaxation
Formal Ontology Learning from English IS-A Sentences
Stochastic Spectral and Conjugate Descent Methods
TARM: A Turbo-type Algorithm for Affine Rank Minimization
FDM-Structured Preamble Optimization for Channel Estimation in MIMO-OQAM/FBMC Systems
The Need for Speed of AI Applications: Performance Comparison of Native vs. Browser-based Algorithm Implementations
Covariate-assisted Spectral Clustering in Dynamic Networks
Kazhdan-Lusztig polynomials of fan matroids, wheel matroids and whirl matroids
Syntax and Semantics of Italian Poetry in the First Half of the 20th Century
Lightweight Classification of IoT Malware based on Image Recognition
Encoding and avoiding 2-connected patterns in polygon dissections and outerplanar graphs
Double Minimum Variance Beamforming Method to Enhance Photoacoustic Imaging
Evolving Latent Space Model for Dynamic Networks
Separation choosability and dense bipartite induced subgraphs
Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers
The Use of Presence Data in Modelling Demand for Transportation
On a linearization trick
Binary Pebbling Algorithms for In-Place Reversal of One-Way Hash Chains
Improving Locality of Unstructured Mesh Algorithms on GPUs
FD-MobileNet: Improved MobileNet with a Fast Downsampling Strategy
Supervised classification of Dermatological diseases by Deep neural networks
Sample Efficient Deep Reinforcement Learning for Dialogue Systems with Large Action Spaces
Partial immunization of trees
Complementability and maximality in different contexts: ergodic theory, Brownian and poly-adic filtrations
Multi-set Canonical Correlation Analysis simply explained
Distributed Evaluation of Subgraph Queries Using Worstcase Optimal LowMemory Dataflows
On the Latent Space of Wasserstein Auto-Encoders
Convex Formulations for Fair Principal Component Analysis
Learning Deep Convolutional Networks for Demosaicing
Learning Multiple Levels of Representations with Kernel Machines
Sample Design for Audit Populations
The continuum limit of the Kuramoto model on sparse directed graphs
Influence-Directed Explanations for Deep Convolutional Networks
Validation and Topic-driven Ranking for Biomedical Hypothesis Generation Systems
Curriculum Learning by Transfer Learning: Theory and Experiments with Deep Networks
SGD and Hogwild! Convergence Without the Bounded Gradients Assumption
FlipDial: A Generative Model for Two-Way Visual Dialogue
ThUnderVolt: Enabling Aggressive Voltage Underscaling and Timing Error Resilience for Energy Efficient Deep Neural Network Accelerators
RF-based Energy Harvesting in Decode-and-Forward Relaying Systems: Ergodic and Outage Capacities
Recognizing Read-Once Functions from Depth-Three Formulas
Understanding Recurrent Neural State Using Memory Signatures
Inducibility of d-ary trees
Distributed Readability Analysis Of Turkish Elementary School Textbooks
Decentralized Submodular Maximization: Bridging Discrete and Continuous Settings
Successive Convexification for 6-DoF Mars Rocket Powered Landing with Free-Final-Time
Smale Strategies For The N-Person Iterated Prisoner’s Dilemma
Distributed Stochastic Multi-Task Learning with Graph Regularization
Quadrature-based features for kernel approximation
Continuum directed random polymers on disordered hierarchical diamond lattices
Edge-Host Partitioning of Deep Neural Networks with Feature Space Encoding for Resource-Constrained Internet-of-Things Platforms
Integrated Millimeter Wave and Sub-6 GHz Wireless Networks: A Roadmap for Ultra-Reliable Low-Latency Communications
Band Target Entropy Minimization and Target Partial Least Squares for Single Target Multivariate Curve Resolution and Calibration
Uncharted Forest a Technique for Exploratory Data Analysis of Provenance Studies
Is Compare-and-Swap Really Necessary?
Region Detection in Markov Random Fields: Gaussian Case
Large Deviations of Convex Polyominoes
Steinberg’s theorem for crystallographic complex reflection groups
MedTQ: Dynamic Topic Discovery and Query Generation for Medical Ontologies
Quantum Algorithms for Optimization and Polynomial Systems Solving over Finite Fields
Machine Learning-based Variability Handling in IoT Agents
Katyusha X: Practical Momentum Method for Stochastic Sum-of-Nonconvex Optimization
High-Resolution Angle Tracking for Mobile Wideband Millimeter-Wave Systems with Antenna Array Calibration
A New Combinatorial Design of Coded Distributed Computing
Pseudo-Recursal: Solving the Catastrophic Forgetting Problem in Deep Neural Networks
Brownian motion between two random trajectories
Gaussian Process Classification with Privileged Information by Soft-to-Hard Labeling Transfer
Towards the Standardization of Non-orthogonal Multiple Access for Next Generation Wireless Networks
Answerer in Questioner’s Mind for Goal-Oriented Visual Dialogue
Random Hinge Forest for Differentiable Learning
Simultaneous Rank Tests in Analysis of Covariance Based on Pairwise Ranking
ClosNets: a Priori Sparse Topologies for Faster DNN Training
Consistent Individualized Feature Attribution for Tree Ensembles
Convergence Analysis of Alternating Nonconvex Projections
Three levels of neural reuse through the dynamical lens: structural network, autonomous dynamics and transient dynamics
Q-learning with Nearest Neighbors
How to Match when All Vertices Arrive Online
UAV-Enabled Mobile Edge Computing: Offloading Optimization and Trajectory Design
Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT
Assessing the Utility of Weather Data for Photovoltaic Power Prediction
BagMinHash – Minwise Hashing Algorithm for Weighted Sets
Detecting and Correcting for Label Shift with Black Box Predictors
Improved bounds for rainbow numbers of matchings in plane triangulations
On Minrank and the Lovász Theta Function
Safe Triplet Screening for Distance Metric Learning
Algorithms for robust production scheduling with energy consumption limits
Visualizing Neural Network Developing Perturbation Theory
Deep feature compression for collaborative object detection
Frobenius Additive Fast Fourier Transform
Object Detection with Mask-based Feature Encoding
Dynamic monopolies for interval graphs with bounded thresholds
On the Needs for Rotations in Hypercubic Quantization Hashing
Revisiting the Vector Space Model: Sparse Weighted Nearest-Neighbor Method for Extreme Multi-Label Classification
On the convergence of FK-Ising Percolation to SLE$(16/3, 16/3-6)$
Temporal and Volumetric Denoising via Quantile Sparse Image (QuaSI) Prior in Optical Coherence Tomography and Beyond
Estimating Diffusion With Compound Poisson Jumps Based On Self-normalized Residuals
Optimizing Bivariate Partial Information Decomposition
Fast and rigorous arbitrary-precision computation of Gauss-Legendre quadrature nodes and weights
On Dynamic Programming Principle for Stochastic Control under Expectation Constraints
Signal Processing for High Throughput Satellite Systems: Challenges in New Interference-Limited Scenarios
Large deviations for the maximum of a branching random walk
Optimality Conditions in Variational Form for Non-Linear Constrained Stochastic Control Problems
From the difference of structures to the structure of the difference
Self-exciting Point Processes: Infections and Implementations
McKean-Vlasov SDEs under Measure Dependent Lyapunov Conditions
A note on reinforcement learning with Wasserstein distance regularisation, with applications to multipolicy learning
Integration of Absolute Orientation Measurements in the KinectFusion Reconstruction pipeline
Spectral Filtering for General Linear Dynamical Systems
Latent variable time-varying network inference
Subspace Support Vector Data Description
Hybrid TDOA/RSS Based Localization for Visible Light Systems
Targeted Damage to Interdependent Networks
Invariant measures for the stochastic one-dimensional compressible Navier-Stokes equations
Merits of the Incremental Method for modeling Piecewise Linear functions
ProofWatch: Watchlist Guidance for Large Theories in E
Distinguishing Question Subjectivity from Difficulty for Improved Crowdsourcing
Raz-McKenzie simulation: new gadget and unimprovability of Thickness Lemma
Efficient Bias-Span-Constrained Exploration-Exploitation in Reinforcement Learning
Controllability Analysis of Threshold Graphs and Cographs
Fair and Diverse DPP-based Data Summarization
Automatic Generation of Language-Independent Features for Cross-Lingual Classification
Introducer Concepts in n-Dimensional Contexts
Rack-Aware Regenerating Codes for Data Centers
Average Size of Implicational Bases
Lipschitz-Margin Training: Scalable Certification of Perturbation Invariance for Deep Neural Networks
Orientation of plastic rearrangements in two-dimensional model glasses under shear
Inferring the time-varying functional connectivity of large-scale computer networks from emitted events
Extinction time for the weaker of two competing SIS epidemics
Empirical measures: regularity is a counter-curse to dimensionality
Directed and non-directed path constrained Last-Passage Percolation
Exact and efficient inference for Partial Bayes problems
One Deep Music Representation to Rule Them All? : A comparative analysis of different representation learning strategies
Taking gradients through experiments: LSTMs and memory proximal policy optimization for black-box quantum control
Practical Evaluation and Optimization of Contextual Bandit Algorithms
Predicting short-term Bitcoin price fluctuations from buy and sell orders
Towards an Open Science Platform for the Evaluation of Data Fusion
Solving Bilinear Inverse Problems using Deep Generative Priors
Accelerated Stochastic Matrix Inversion: General Theory and Speeding up BFGS Rules for Faster Second-Order Optimization
Efficient Empirical Risk Minimization with Smooth Loss Functions in Non-interactive Local Differential Privacy
The Complex Event Recognition Group
Deep learning based supervised semantic segmentation of Electron Cryo-Subtomograms
Threshold phenomena for high-dimensional random polytopes
On a toy network of neurons interacting through their dendrites
Integer completely positive matrices of order two
A New Uzawa-exact type Algorithm for Nonsymmetric Saddle Point Problems
DCFNet: Deep Neural Network with Decomposed Convolutional Filters
Policy Gradients for Contextual Bandits
Permutation monoids and MB-homogeneous structures
Design of Experiments for Model Discrimination Hybridising Analytical and Data-Driven Approaches
Coded Distributed Computing with Node Cooperation Substantially Increases Speedup Factors
Poisson processes and a log-concave Bernstein theorem
Planar graphs without cycles of length 4 or 5 are (11:3)-colorable
On Index Codes for Interlinked Cycle Structured Side-Information Graphs
Electric Vehicle Driver Clustering using Statistical Model and Machine Learning
On large deviations of interface motions for statistical mechanics models
client2vec: Towards Systematic Baselines for Banking Applications
Integral representation of the subelliptic heat kernel on the complex anti-de Sitter fibration
End-to-End Automatic Speech Translation of Audiobooks
Fast Interactive Image Retrieval using large-scale unlabeled data
Leveraging Task Knowledge for Robot Motion Planning Under Uncertainty
One-Bit Precoding and Constellation Range Design for Massive MIMO with QAM Signaling
Synthesizing Audio with Generative Adversarial Networks
Basic Parallel and Distributed Computing Curriculum
Classification of minimal 1-saturating sets in PG(v, 2), 2 <= v <= 6
Image-based Synthesis for Deep 3D Human Pose Estimation
Antenna Selection in Full-Duplex Cooperative NOMA Systems
Augment and Reduce: Stochastic Inference for Large Categorical Distributions
Let’s be honest: An optimal no-regret framework for zero-sum games
SparseMAP: Differentiable Sparse Structured Inference
Large deviations for functionals of Gaussian processes
On a conjecture of Erdős on locally sparse Steiner triple systems
Some effects in adaptive robust estimation under sparsity
Embedding Complexity In the Data Representation Instead of In the Model: A Case Study Using Heterogeneous Medical Data
Sparse and Robust Reject Option Classifier using Successive Linear Programming
Deep Reinforcement Learning for Solving the Vehicle Routing Problem
Chow Rings of Vector Space Matroids
Hamilton $\ell$-cycles in randomly-perturbed hypergraphs
Scalarization Methods for Many-Objective Virtual Machine Placement of Elastic Infrastructures in Overbooked Cloud Computing Data Centers Under Uncertainty
Structure and regularity for subsets of groups with finite VC-dimension
DiSLR: Distributed Sampling with Limited Redundancy For Triangle Counting in Graph Streams