Anomaly Detection for Industrial Big Data

As the Industrial Internet of Things (IIoT) grows, systems are increasingly being monitored by arrays of sensors returning time-series data at ever-increasing ‘volume, velocity and variety’ (i.e. Industrial Big Data). An obvious use for these data is real-time systems condition monitoring and prognostic time to failure analysis (remaining useful life, RUL). (e.g. See white papers by, and output of the NASA Prognostics Center of Excellence (PCoE).) However, as noted by Agrawal and Choudhary ‘Our ability to collect ‘big data’ has greatly surpassed our capability to analyze it, underscoring the emergence of the fourth paradigm of science, which is data-driven discovery.’ In order to fully utilize the potential of Industrial Big Data we need data-driven techniques that operate at scales that process models cannot. Here we present a prototype technique for data-driven anomaly detection to operate at industrial scale. The method generalizes to application with almost any multivariate dataset based on independent ordinations of repeated (bootstrapped) partitions of the dataset and inspection of the joint distribution of ordinal distances.

Faster Anomaly Detection via Matrix Sketching

We present efficient streaming algorithms to compute two commonly used anomaly measures: the rank-k leverage scores (aka Mahalanobis distance) and the rank-k projection distance, in the row-streaming model. We show that commonly used matrix sketching techniques such as the Frequent Directions sketch and random projections can be used to approximate these measures. Our main technical contribution is to prove matrix perturbation inequalities for operators arising in the computation of these measures.

Predictive Process Monitoring Methods: Which One Suits Me Best?

Predictive process monitoring has recently gained traction in academia and is maturing also in companies. However, with the growing body of research, it might be daunting for companies to navigate in this domain in order to find, provided certain data, what can be predicted and what methods to use. The main objective of this paper is developing a value-driven framework for classifying existing work on predictive process monitoring. This objective is achieved by systematically identifying, categorizing, and analyzing existing approaches for predictive process monitoring. The review is then used to develop a value-driven framework that can support organizations to navigate in the predictive process monitoring field and help them to find value and exploit the opportunities enabled by these analysis techniques.

Programmatically Interpretable Reinforcement Learning

We study the problem of generating interpretable and verifiable policies through reinforcement learning. Unlike the popular Deep Reinforcement Learning (DRL) paradigm, in which the policy is represented by a neural network, the aim in Programmatically Interpretable Reinforcement Learning is to find a policy that can be represented in a high-level programming language. Such programmatic policies have the benefits of being more easily interpreted than neural networks, and being amenable to verification by symbolic methods. We propose a new method, called Neurally Directed Program Search (NDPS), for solving the challenging nonsmooth optimization problem of finding a programmatic policy with maxima reward. NDPS works by first learning a neural policy network using DRL, and then performing a local search over programmatic policies that seeks to minimize a distance from this neural ‘oracle’. We evaluate NDPS on the task of learning to drive a simulated car in the TORCS car-racing environment. We demonstrate that NDPS is able to discover human-readable policies that pass some significant performance bars. We also find that a well-designed policy language can serve as a regularizer, and result in the discovery of policies that lead to smoother trajectories and are more easily transferred to environments not encountered during training.

Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations

Deep networks have achieved impressive results across a variety of important tasks. However a known weakness is a failure to perform well when evaluated on data which differ from the training distribution, even if these differences are very small, as is the case with adversarial examples. We propose Fortified Networks, a simple transformation of existing networks, which fortifies the hidden layers in a deep network by identifying when the hidden states are off of the data manifold, and maps these hidden states back to parts of the data manifold where the network performs well. Our principal contribution is to show that fortifying these hidden states improves the robustness of deep networks and our experiments (i) demonstrate improved robustness to standard adversarial attacks in both black-box and white-box threat models; (ii) suggest that our improvements are not primarily due to the gradient masking problem and (iii) show the advantage of doing this fortification in the hidden layers instead of the input space.

ANNETT-O: An Ontology for Describing Artificial Neural Network Evaluation, Topology and Training

Deep learning models, while effective and versatile, are becoming increasingly complex, often including multiple overlapping networks of arbitrary depths, multiple objectives and non-intuitive training methodologies. This makes it increasingly difficult for researchers and practitioners to design, train and understand them. In this paper we present ANNETT-O, a much-needed, generic and computer-actionable vocabulary for researchers and practitioners to describe their deep learning configurations, training procedures and experiments. The proposed ontology focuses on topological, training and evaluation aspects of complex deep neural configurations, while keeping peripheral entities more succinct. Knowledge bases implementing ANNETT-O can support a wide variety of queries, providing relevant insights to users. In addition to a detailed description of the ontology, we demonstrate its suitability to the task via a number of hypothetical use-cases of increasing complexity.

IDEBench: A Benchmark for Interactive Data Exploration

Existing benchmarks for analytical database systems such as TPC-DS and TPC-H are designed for static reporting scenarios. The main metric of these benchmarks is the performance of running individual SQL queries over a synthetic database. In this paper, we argue that such benchmarks are not suitable for evaluating database workloads originating from interactive data exploration (IDE) systems where most queries are ad-hoc, not based on predefined reports, and built incrementally. As a main contribution, we present a novel benchmark called IDEBench that can be used to evaluate the performance of database systems for IDE workloads. As opposed to traditional benchmarks for analytical database systems, our goal is to provide more meaningful workloads and datasets that can be used to benchmark IDE query engines, with a particular focus on metrics that capture the trade-off between query performance and quality of the result. As a second contribution, this paper evaluates and discusses the performance results of selected IDE query engines using our benchmark. The study includes two commercial systems, as well as two research prototypes (IDEA, approXimateDB/XDB), and one traditional analytical database system (MonetDB).

PingAn: An Insurance Scheme for Job Acceleration in Geo-distributed Big Data Analytics System

Geo-distributed data analysis in a cloud-edge system is emerging as a daily demand. Out of saving time in wide area data transfer, some tasks are dispersed to the edge clusters satisfied data locality. However, execution in the edge clusters is less well, due to limited resource, overload interference and cluster-level unreachable troubles, which obstructs the guarantee on the speed and completion of jobs. Synthesizing the impact of cluster heterogeneity and costly inter-cluster data fetch, we expect to make effective copies across clusters for tasks to provide both success and efficiency of the arriving jobs. To this end, we design PingAn, an online insurance algorithm making redundance across-cluster copies for tasks, promising (1+\varepsilon)-speed \, o(\frac{1}{\varepsilon^2+\varepsilon})-competitive in sum of the job flowtimes. PingAn shares resource among a part of jobs with an adjustable \varepsilon fraction to fit the system load condition and insures for tasks following efficiency-first reliability-aware principle to optimize the effect of copies on jobs’ performance. Trace-driven simulations demonstrate that PingAn can reduce the average job flowtimes by at least 14\% more than the state-of-the-art speculation mechanisms. We also build PingAn in Spark on Yarn System to verify its practicality and generality. Experiments show that PingAn can reduce the average job completion time by up to 40\% comparing to the default Spark execution.

First Experiments with a Flexible Infrastructure for Normative Reasoning

A flexible infrastructure for normative reasoning is outlined. A small-scale demonstrator version of the envisioned system has been implemented in the proof assistant Isabelle/HOL by utilising the first authors universal logical reasoning approach based on shallow semantical embeddings in meta-logic HOL. The need for such a flexible reasoning infrastructure is motivated and illustrated with a contrary-to-duty example scenario selected from the General Data Protection Regulation.

Towards Reproducible Research: Automatic Classification of Empirical Requirements Engineering Papers

Research must be reproducible in order to make an impact on science and to contribute to the body of knowledge in our field. Yet studies have shown that 70% of research from academic labs cannot be reproduced. In software engineering, and more specifically requirements engineering (RE), reproducible research is rare, with datasets not always available or methods not fully described. This lack of reproducible research hinders progress, with researchers having to replicate an experiment from scratch. A researcher starting out in RE has to sift through conference papers, finding ones that are empirical, then must look through the data available from the empirical paper (if any) to make a preliminary determination if the paper can be reproduced. This paper addresses two parts of that problem, identifying RE papers and identifying empirical papers within the RE papers. Recent RE and empirical conference papers were used to learn features and to build an automatic classifier to identify RE and empirical papers. We introduce the Empirical Requirements Research Classifier (ERRC) method, which uses natural language processing and machine learning to perform supervised classification of conference papers. We compare our method to a baseline keyword-based approach. To evaluate our approach, we examine sets of papers from the IEEE Requirements Engineering conference and the IEEE International Symposium on Software Testing and Analysis. We found that the ERRC method performed better than the baseline method in all but a few cases.

A review of possible effects of cognitive biases on interpretation of rule-based machine learning models
Fast Decentralized Optimization over Networks

The present work introduces the hybrid consensus alternating direction method of multipliers (H-CADMM), a novel framework for optimization over networks which unifies existing distributed optimization approaches, including the centralized and the decentralized consensus ADMM. H-CADMM provides a flexible tool that leverages the underlying graph topology in order to achieve a desirable sweet-spot between node-to-node communication overhead and rate of convergence — thereby alleviating known limitations of both C-CADMM and D-CADMM. A rigorous analysis of the novel method establishes linear convergence rate, and also guides the choice of parameters to optimize this rate. The novel hybrid update rules of H-CADMM lend themselves to ‘in-network acceleration’ that is shown to effect considerable — and essentially ‘free-of-charge’ — performance boost over the fully decentralized ADMM. Comprehensive numerical tests validate the analysis and showcase the potential of the method in tackling efficiently, widely useful learning tasks.

Continuously Constructive Deep Neural Networks

Traditionally, deep learning algorithms update the network weights whereas the network architecture is chosen manually, using a process of trial and error. In this work, we propose two novel approaches that automatically update the network structure while also learning its weights. The novelty of our approach lies in our parameterization where the depth, or additional complexity, is encapsulated continuously in the parameter space through control parameters that add additional complexity. We propose two methods: In tunnel networks, this selection is done at the level of a hidden unit, and in budding perceptrons, this is done at the level of a network layer; updating this control parameter introduces either another hidden unit or another hidden layer. We show the effectiveness of our methods on the synthetic two-spirals data and on two real data sets of MNIST and MIRFLICKR, where we see that our proposed methods, with the same set of hyperparameters, can correctly adjust the network complexity to the task complexity.

Principal Component Analysis: A Natural Approach to Data Exploration

Principal component analysis (PCA) is often used for analysing data in the most diverse areas. In this work, we report an integrated approach to several theoretical and practical aspects of PCA. We start by providing, in an intuitive and accessible manner, the basic principles underlying PCA and its applications. Next, we present a systematic, though no exclusive, survey of some representative works illustrating the potential of PCA applications to a wide range of areas. An experimental investigation of the ability of PCA for variance explanation and dimensionality reduction is also developed, which confirms the efficacy of PCA and also shows that standardizing or not the original data can have important effects on the obtained results. Overall, we believe the several covered issues can assist researchers from the most diverse areas in using and interpreting PCA.

Statistical transformer networks: learning shape and appearance models via self supervision

We generalise Spatial Transformer Networks (STN) by replacing the parametric transformation of a fixed, regular sampling grid with a deformable, statistical shape model which is itself learnt. We call this a Statistical Transformer Network (StaTN). By training a network containing a StaTN end-to-end for a particular task, the network learns the optimal nonrigid alignment of the input data for the task. Moreover, the statistical shape model is learnt with no direct supervision (such as landmarks) and can be reused for other tasks. Besides training for a specific task, we also show that a StaTN can learn a shape model using generic loss functions. This includes a loss inspired by the minimum description length principle in which an appearance model is also learnt from scratch. In this configuration, our model learns an active appearance model and a means to fit the model from scratch with no supervision at all, even identity labels.

Not quite unreasonable effectiveness of machine learning algorithms

State-of-the-art machine learning algorithms demonstrate close to absolute performance in selected challenges. We provide arguments that the reason can be in low variability of the samples and high effectiveness in learning typical patterns. Due to this fact, standard performance metrics do not reveal model capacity and new metrics are required for the better understanding of state-of-the-art.

Penetrating a Social Network: The Follow-back Problem

Modern threats have emerged from the prevalence of social networks. Hostile actors, such as extremist groups or foreign governments, utilize these networks to run propaganda campaigns with different aims. For extremists, these campaigns are designed for recruiting new members or inciting violence. For foreign governments, the aim may be to create instability in rival nations. Proper social network counter-measures are needed to combat these threats. Here we present one important counter-measure: penetrating social networks. This means making target users connect with or follow agents deployed in the social network. Once such connections are established with the targets, the agents can influence them by sharing content which counters the influence campaign. In this work we study how to penetrate a social network, which we call the follow-back problem. The goal here is to find a policy that maximizes the number of targets that follow the agent. We conduct an empirical study to understand what behavioral and network features affect the probability of a target following an agent. We find that the degree of the target and the size of the mutual neighborhood of the agent and target in the network affect this probability. Based on our empirical findings, we then propose a model for targets following an agent. Using this model, we solve the follow-back problem exactly on directed acyclic graphs and derive a closed form expression for the expected number of follows an agent receives under the optimal policy. We then formulate the follow-back problem on an arbitrary graph as an integer program. To evaluate our integer program based policies, we conduct simulations on real social network topologies in Twitter. We find that our polices result in more effective network penetration, with significant increases in the expected number of targets that follow the agent.

Language Modeling with Generative AdversarialNetworks

Generative Adversarial Networks (GANs) have been promising in the field of image generation, however, they have been hard to train for language generation. GANs were originally designed to output differentiable values, so discrete language generation is challenging for them which causes high levels of instability in training GANs. Consequently, past work has resorted to pre-training with maximum-likelihood or training GANs without pre-training with a WGAN objective with a gradient penalty. In this study, we present a comparison of those approaches. Furthermore, we present the results of some experiments that indicate better training and convergence of Wasserstein GANs (WGANs) when a weaker regularization term is enforcing the Lipschitz constraint.

A Proposal of Interactive Growing Hierarchical SOM

Self Organizing Map is trained using unsupervised learning to produce a two-dimensional discretized representation of input space of the training cases. Growing Hierarchical SOM is an architecture which grows both in a hierarchical way representing the structure of data distribution and in a horizontal way representation the size of each individual maps. The control method of the growing degree of GHSOM by pruning off the redundant branch of hierarchy in SOM is proposed in this paper. Moreover, the interface tool for the proposed method called interactive GHSOM is developed. We discuss the computation results of Iris data by using the developed tool.

Ordinal Pooling Networks: For Preserving Information over Shrinking Feature Maps

In the framework of convolutional neural networks that lie at the heart of deep learning, downsampling is often performed with a max-pooling operation that however completely discards the information from other activations in a pooling region. To address this issue, a novel pooling scheme, Ordinal Pooling Network (OPN), is introduced in this work. OPN rearranges all the elements of a pooling region in a sequence and assigns different weights to all the elements based upon their orders in the sequence, where the weights are learned via the gradient-based optimisation. The results of our small-scale experiments on image classification task on MNIST database demonstrate that this scheme leads to a consistent improvement in the accuracy over max-pooling operation. This improvement is expected to increase in the deep networks, where several layers of pooling become necessary.

Discovering Process Maps from Event Streams

Automated process discovery is a class of process mining methods that allow analysts to extract business process models from event logs. Traditional process discovery methods extract process models from a snapshot of an event log stored in its entirety. In some scenarios, however, events keep coming with a high arrival rate to the extent that it is impractical to store the entire event log and to continuously re-discover a process model from scratch. Such scenarios require online process discovery approaches. Given an event stream produced by the execution of a business process, the goal of an online process discovery method is to maintain a continuously updated model of the process with a bounded amount of memory while at the same time achieving similar accuracy as offline methods. However, existing online discovery approaches require relatively large amounts of memory to achieve levels of accuracy comparable to that of offline methods. Therefore, this paper proposes an approach that addresses this limitation by mapping the problem of online process discovery to that of cache memory management, and applying well-known cache replacement policies to the problem of online process discovery. The approach has been implemented in .NET, experimentally integrated with the Minit process mining tool and comparatively evaluated against an existing baseline using real-life datasets.

From Regular Expression Matching to Parsing

Given a regular expression R and a string Q the regular expression matching problem is to determine if Q is a member of the language generated by R. The classic textbook algorithm by Thompson [C. ACM 1968] constructs and simulates a non-deterministic finite automaton in O(nm) time and O(m) space, where n and m are the lengths of the string and the regular expression, respectively. Assuming the strong exponential time hypothesis Backurs and Indyk [FOCS 2016] showed that this result is nearly optimal. However, for most applications determining membership is insufficient and we need to compute \emph{how we match}, i.e., to identify or replace matches or submatches in the string. Using backtracking we can extend Thompson’s algorithm to solve this problem, called regular expression parsing, in the same asymptotic time but with a blow up in space to \Omega(nm). Surprisingly, all existing approaches suffer the same or a similar quadratic blow up in space and no known solutions for regular expression parsing significantly improve this gap between matching and parsing. In this paper, we overcome this gap and present a new algorithm for regular expression parsing using O(nm) time and O(n + m) space. To achieve our result, we develop a novel divide and conquer approach similar in spirit to the classic divide and conquer technique by Hirshberg [C. ACM 1975] for computing a longest common subsequence of two strings in quadratic time and linear space. We show how to carefully decompose the problem to handle cyclic interactions in the automaton leading to a subproblem construction of independent interest. Finally, we generalize our techniques to convert other existing state-set transition algorithms for matching to parsing using only linear space.

HyperDense-Net: A hyper-densely connected CNN for multi-modal image segmentation

Recently, dense connections have attracted substantial attention in computer vision because they facilitate gradient flow and implicit deep supervision during training. Particularly, DenseNet, which connects each layer to every other layer in a feed-forward fashion, has shown impressive performances in natural image classification tasks. We propose HyperDenseNet, a 3D fully convolutional neural network that extends the definition of dense connectivity to multi-modal segmentation problems. Each imaging modality has a path, and dense connections occur not only between the pairs of layers within the same path, but also between those across different paths. This contrasts with the existing multi-modal CNN approaches, in which modeling several modalities relies entirely on a single joint layer (or level of abstraction) for fusion, typically either at the input or at the output of the network. Therefore, the proposed network has total freedom to learn more complex combinations between the modalities, within and in-between all the levels of abstraction, which increases significantly the learning representation. We report extensive evaluations over two different and highly competitive multi-modal brain tissue segmentation challenges, iSEG 2017 and MRBrainS 2013, with the former focusing on 6-month infant data and the latter on adult images. HyperDenseNet yielded significant improvements over many state-of-the-art segmentation networks, ranking at the top on both benchmarks. We further provide a comprehensive experimental analysis of features re-use, which confirms the importance of hyper-dense connections in multi-modal representation learning. Our code is publicly available at https://…/HyperDenseNet.

High-dimensional Linear Discriminant Analysis: Optimality, Adaptive Algorithm, and Missing Data

This paper aims to develop an optimality theory for linear discriminant analysis in the high-dimensional setting. A data-driven and tuning free classification rule, which is based on an adaptive constrained \ell_1 minimization approach, is proposed and analyzed. Minimax lower bounds are obtained and this classification rule is shown to be simultaneously rate optimal over a collection of parameter spaces. In addition, we consider classification with incomplete data under the missing completely at random (MCR) model. An adaptive classifier with theoretical guarantees is introduced and optimal rate of convergence for high-dimensional linear discriminant analysis under the MCR model is established. The technical analysis for the case of missing data is much more challenging than that for the complete data. We establish a large deviation result for the generalized sample covariance matrix, which serves as a key technical tool and can be of independent interest. An application to lung cancer and leukemia studies is also discussed.

k-NN Graph Construction: a Generic Online Approach

Nearest neighbor search and k-nearest neighbor graph construction are two fundamental issues arise from many disciplines such as information retrieval, data-mining, machine learning and computer vision. Despite continuous efforts have been taken in the last several decades, these two issues remain challenging. They become more and more imminent given the big data emerges in various fields and has been expanded significantly over the years. In this paper, a simple but effective solution both for k-nearest neighbor search and k-nearest neighbor graph construction is presented. Namely, these two issues are addressed jointly. On one hand, the k-nearest neighbor graph construction is treated as a nearest neighbor search task. Each data sample along with its k-nearest neighbors are joined into the k-nearest neighbor graph by sequentially performing the nearest neighbor search on the graph under construction. On the other hand, the built k-nearest neighbor graph is used to support k-nearest neighbor search. Since the graph is built online, dynamic updating of the graph, which is not desirable from most of the existing solutions, is supported. Moreover, this solution is feasible for various distance measures. Its effectiveness both as a k-nearest neighbor construction and k-nearest neighbor search approach is verified across various datasets in different scales, various dimensions and under different metrics.

Clustrophile 2: Guided Visual Clustering Analysis

Data clustering is a common unsupervised learning method frequently used in exploratory data analysis. However, identifying relevant structures in unlabeled, high-dimensional data is nontrivial, requiring iterative experimentation with clustering parameters as well as data features and instances. The space of possible clusterings for a typical dataset is vast, and navigating in this vast space is also challenging. The absence of ground-truth labels makes it impossible to define an optimal solution, thus requiring user judgment to establish what can be considered a satisfiable clustering result. Data scientists need adequate interactive tools to effectively explore and navigate the large space of clusterings so as to improve the effectiveness of exploratory clustering analysis. We introduce \textit{Clustrophile 2}, a new interactive tool for guided clustering analysis. \textit{Clustrophile 2} guides users in clustering-based exploratory analysis, adapts user feedback to improve user guidance, facilitates the interpretation of clusters, and helps quickly reason about differences between clusterings. To this end, \textit{Clustrophile 2} contributes a novel feature, the clustering tour, to help users choose clustering parameters and assess the quality of different clustering results in relation to current analysis goals and user expectations. We evaluate \textit{Clustrophile 2} through a user study with 12 data scientists, who used our tool to explore and interpret sub-cohorts in a dataset of Parkinson’s disease patients. Results suggest that \textit{Clustrophile 2} improves the speed and effectiveness of exploratory clustering analysis for both experts and non-experts.

Data2Vis: Automatic Generation of Data Visualizations Using Sequence-to-Sequence Recurrent Neural Networks

Rapidly creating effective visualizations using expressive grammars is challenging for users who have limited time and limited skills in statistics and data visualization. Even high-level, dedicated visualization tools often require users to manually select among data attributes, decide which transformations to apply, and specify mappings between visual encoding variables and raw or transformed attributes. In this paper, we introduce Data2Vis, a neural translation model, for automatically generating visualizations from given datasets. We formulate visualization generation as a sequence to sequence translation problem where data specification is mapped to a visualization specification in a declarative language (Vega-Lite). To this end, we train a multilayered Long Short-Term Memory (LSTM) model with attention on a corpus of visualization specifications. Qualitative results show that our model learns the vocabulary and syntax for a valid visualization specification, appropriate transformations (count, bins, mean) and how to use common data selection patterns that occur within data visualizations. Our model generates visualizations that are comparable to manually-created visualizations in a fraction of the time, with potential to learn more complex visualization strategies at scale.

Analysis and improvement of the VTT mold growth model: application to bamboo fiberboard
Inferring transportation modes from GPS trajectories using a convolutional neural network
Design of multi-layer materials using inverse homogenization and a level set method
Portfolio Optimization under Fast Mean-reverting and Rough Fractional Stochastic Environment
Learn To Pay Attention
Analysis and development of a novel algorithm for the in-vehicle hand-usage of a smartphone
Formal Ways for Measuring Relations between Concepts in Conceptual Spaces
Short Term Load Forecasts of Low Voltage Demand and the Effects of Weather
Structured Evolution with Compact Architectures for Scalable Policy Optimization
Least Squares Wavelet-based Estimation for Additive Regression Models using Non Equally-Spaced Designs
Quantum Machine Learning Matrix Product States
The Loss Surface of XOR Artificial Neural Networks
Image Segmentation Using Subspace Representation and Sparse Decomposition
A quantum Monte Carlo study of the long-ranged site-diluted XXZ-model as realized by polar molecules
A Local Sensory and Control Strategy for Following Hydrodynamic Signals
Extracting Scientific Figures with Distantly Supervised Neural Networks
Three-colour bipartite Ramsey number for graphs with small bandwidth
Discussion of the article ‘Bayesian cluster analysis: point estimation and credible balls’ by Wade and Ghahramani
Deep Person Detection in 2D Range Data
Differentiable plasticity: training plastic neural networks with backpropagation
Reconstructing Point Sets from Distance Distributions
Additive quaternary codes related to exceptional linear quaternary codes
Coding of Graphs with Application to Graph Anomaly Detection
Visual Tracking Using Sparse Coding and Earth Mover’s Distance
Neural models of factuality
New Perspectives on Neighborhood-Prime Labelings of Graphs
On the discretized sum-product problem
Associative Compression Networks
Complexity of the CNF-satisfiability problem
The Geometry of some Fibonacci Identities in the Hosoya Triangle
High-dimensional Adaptive Minimax Sparse Estimation with Interactions
Approximating Hamiltonian dynamics with the Nyström method
Lecture Hall Tableaux
Involutions and the Gelfand character
A group-based approach to the least squares regression for handling multicollinearity from strongly correlated variables
Scalable Sentiment for Sequence-to-sequence Chatbot Response with Performance Analysis
MVSNet: Depth Inference for Unstructured Multi-view Stereo
A fully non-linear optimization approach to acousto-electric tomography
Evolution leads to a diversity of motion-detection neuronal circuits
Incentivizing the Dissemination of Truth Versus Fake News in Social Networks
Efficient Reciprocal Collision Avoidance between Heterogeneous Agents Using CTMAT
Distributed Maximal Independent Set on Scale-Free Networks
Learning a Text-Video Embedding from Incomplete and Heterogeneous Data
A Near-Optimal Depth-Hierarchy Theorem for Small-Depth Multilinear Circuits
Quootstrap: Scalable Unsupervised Extraction of Quotation-Speaker Pairs from Large News Corpora via Bootstrapping
Likelihood-Free Parameter Estimation for Dynamic Queueing Networks
$\varepsilon$-Coresets for Clustering (with Outliers) in Doubling Metrics
On the ratio of prefix codes to all uniquely decodable codes with a given length distribution
Total domination in cubic Knödel graphs
Tight Lower Bounds for List Edge Coloring
Evaluating historical text normalization systems: How well do they generalize?
A multidimensional problem of optimal dividends with irreversible switching: a convergent numerical scheme
A comparison of recent waveform generation and acoustic modeling methods for neural-network-based speech synthesis
Domination in 4-regular Knödel graphs
Efficient No-Reference Quality Assessment and Classification Model for Contrast Distorted Images
Drive Video Analysis for the Detection of Traffic Near-Miss Incidents
Guiding Neural Machine Translation with Retrieved Translation Pieces
Nonconvex Proximal Incremental Aggregated Gradient Method with Linear Convergence
Hindsight is Only 50/50: Unsuitability of MDP based Approximate POMDP Solvers for Multi-resolution Information Gathering
Application of Superpixels to Segment Several Landmarks in Running Rodents
POL-LWIR Vehicle Detection: Convolutional Neural Networks Meet Polarised Infrared Sensors
Erdős-Szekeres theorem for cyclic permutations
Adaptive Proximal Method for Variational Inequalities
Comprehensive Modeling of Electric Vehicles in California Demand Response Markets
Random Order Contention Resolution Schemes
Semi-supervised multi-organ segmentation via multi-planar co-training
Estimation of Camera Locations in Highly Corrupted Scenarios: All About that Base, No Shape Trouble
Linear Mixed-Effects Models for Non-Gaussian Repeated Measurement Data
Training Multi-organ Segmentation Networks with Sample Selection by Relaxed Upper Confident Bound
Simple Models for Word Formation in English Slang
Real-world Noisy Image Denoising: A New Benchmark
Moving Beyond Sub-Gaussianity in High-Dimensional Statistics: Applications in Covariance Estimation and Linear Regression
On Remote Estimation with Multiple Communication Channels
Next Generation of Phonon Tests of Lorentz Invariance using Quartz BAW Resonators
A Simple Steady-State Analysis of Load Balancing Algorithms in the Sub-Halfin-Whitt Regime
Dimensionality’s Blessing: Clustering Images by Underlying Distribution
Multi-Level Steiner Trees
Clustering and Retrieval Method of Immunological Memory Cell in Clonal Selection Algorithm
Stackelberg Game for Distributed Time Scheduling in RF-Powered Backscatter Cognitive Radio Networks
On stiff problems via Dirichlet forms
OATM: Occlusion Aware Template Matching by Consensus Set Maximization
Quantized Vershik-Kerov Theory and Quantized Central Measures on Branching Graphs
Random walks and induced Dirichlet forms on compact spaces of homogeneous type
Wiener Index, Hyper-wiener Index, Harary Index and Hamiltonicity of graphs
Efficient Computational Algorithm for Optimal Continuous Experimental Designs
Emotion Orientated Recommendation System for Hiroshima Tourist by Fuzzy Petri Net
Method of fractal diversity in data science problems
Environmental Sound Recognition using Masked Conditional Neural Networks
Accelerating Prototype-Based Drug Discovery using Conditional Diversity Networks
Modeling collective behaviors: A moment-based approach
An Accelerated Directional Derivative Method for Smooth Stochastic Convex Optimization
Anticipating Traffic Accidents with Adaptive Loss and Large-scale Incident DB
The Communication Complexity of Local Search
Supervised Convolutional Sparse Coding
Learning-based Video Motion Magnification
Complex energy landscapes in spiked-tensor and simple glassy models: ruggedness, arrangements of local minima and phase transitions
Fast Single Image Rain Removal via a Deep Decomposition-Composition Network
Detecting Multi-Oriented Text with Corner-based Region Proposals
On the Access Complexity of PIR Schemes
Path to Stochastic Stability: Comparative Analysis of Stochastic Learning Dynamics in Games
Hierarchical Modular Reinforcement Learning Method and Knowledge Acquisition of State-Action Rule for Multi-target Problem
Mean-field model for the density of states of jammed soft spheres
On differentiability of strongly cone paraconvex vector-valued mappings
Machine learning of phase transitions in the percolation and XY models
Meta Distribution of the SIR in Large-Scale Uplink and Downlink NOMA Networks
Decomposition and Completion of Sum-of-Squares Matrices
DeepMimic: Example-Guided Deep Reinforcement Learning of Physics-Based Character Skills
Accelerating MCMC Algorithms
Image Segmentation using Sparse Subset Selection
Verifier Non-Locality in Interactive Proofs
Distributed Non-Convex First-Order Optimization and Information Processing: Lower Complexity Bounds and Rate Optimal Algorithms
Unexpected curves arising from special line arrangements
A 3/2-approximation algorithm for the Student-Project Allocation problem
A Structure-Oriented Unsupervised Crawling Strategy for Social Media Sites
Improving QC Relaxations of OPF Problems via Voltage Magnitude Difference Constraints and Envelopes for Trilinear Monomials
eQTL Mapping via Effective SNP Ranking and Screening
A note on recurrence of the Vertex reinforced jump process and fractional moments localization
Facial Aging and Rejuvenation by Conditional Multi-Adversarial Autoencoder with Ordinal Regression
Bayesian Calibration of Force-fields from Experimental Data: TIP4P Water
Robust Bounds on Choosing from Large Tournaments
Unsupervised Learning of Mixture Models with a Uniform Background Component
Direct Estimation of Pharmacokinetic Parameters from DCE-MRI using Deep CNN with Forward Physical Model Loss
Fast Conditional Independence Test for Vector Variables with Large Sample Sizes
Scaling Egocentric Vision: The EPIC-KITCHENS Dataset
DeepASL: Kinetic Model Incorporated Loss for Denoising Arterial Spin Labeled MRI via Deep Residual Learning
Pointwise adaptation via stagewise aggregation of local estimates for multiclass classification
A Bayesian sequential test for the drift of a fractional Brownian motion
Order Effects for Queries in Intelligent Systems
Tamari Lattices for Parabolic Quotients of the Symmetric Group
Comparison of non-linear activation functions for deep neural networks on MNIST classification task
YOLOv3: An Incremental Improvement
Estimating Depth from RGB and Sparse Sensing
Active Mini-Batch Sampling using Repulsive Point Processes
Novelty and Foreseeing Research Trends; The Case of Astrophysics and Astronomy
Aldous’ Spectral Gap Conjecture for Normal Sets
Counting Triangles under Updates in Worst-Case Optimal Time
Bayesian Estimation of Attribute and Identification Disclosure Risks in Synthetic Data
Maximizing the Number of Spanning Trees in a Connected Graph
Dimension of the space of invariant finitely additive measures of general Markov chains and their ergodic properties
Occluded Person Re-identification
Distribution of the Number of Corners in Tree–like Tableaux
Caching with Time Domain Buffer Sharing
Deep Learning of the Nonlinear Schrödinger Equation in Fiber-Optic Communications
Universal and Succinct Source Coding of Deep Neural Networks
A $5k$-vertex Kernel for $P_2$-packing
A note on 1-guardable graphs in the cops and robber game
Prior Independent Equilibria and Linear Multi-dimensional Bayesian Games
Latent Space Policies for Hierarchical Reinforcement Learning
A Novel Multi-Task Tensor Correlation Neural Network for Facial Attribute Prediction
Connecting Dots — from Local Covariance to Empirical Intrinsic Geometry and Locally Linear Embedding
Multi-target Voice Conversion without Parallel Data by Adversarially Learning Disentangled Audio Representations
An Adaptive Learning Method of Personality Trait Based Mood in Mental State Transition Network by Recurrent Neural Network
Recovering Realistic Texture in Image Super-resolution by Deep Spatial Feature Transform
A Generation Method of Immunological Memory in Clonal Selection Algorithm by using Restricted Boltzmann Machines
Analysis of the Social Community Based on the Network Growing Model in Open Source Software Community
On central limit theorems in stochastic geometry
Composing photomosaic images using clustering based evolutionary programming
Optimal Covariance Control for Stochastic Systems Under Chance Constraints
A Novel Geometry-based Stochastic Double Directional Analytical Model for Millimeter Wave Outdoor NLOS Channels
Photometric Stereo in Participating Media Considering Shape-Dependent Forward Scatter
Memoryless scalar quantization for random frames
Information and Set Algebras: Interpretation and Uniqueness of Conditional Independence
$\mathbf{ \textit{Viewpoint} }$-aware Video Summarization
Normal numbers with digit dependencies
Whale swarm algorithm with iterative counter for multimodal function optimization
Colorings v.s. list colorings of uniform hypergraphs
Hardness of Consensus Problems for Circular Strings and Time Series Averaging
A quantitative discounted central limit theorem using the Fourier metric
Solving Pooling Problems by LP and SOCP Relaxations and Rescheduling Methods
PHP-Based Coverage Analysis in Millimeter Wave Heterogeneous Cellular Network
Semantic Edge Detection with Diverse Deep Supervision
Multiband Plasmonic Sierpinski Carpet Fractal Antennas
Variational 3D-PIV with Sparse Descriptors
Policy Gradient With Value Function Approximation For Collective Multiagent Planning
Some Reduction Operations to Pairwise Compatibility Graphs
Characterizing Star-PCGs
Gasper’s determinant theorem, revisited
A Fully Progressive Approach to Single-Image Super-Resolution
Some indices to measure departures from stochastic order
On the spherical quasi-convexity of quadratic functions
Bringing Alive Blurred Moments!
AutoRVO: Local Navigation with Dynamic Constraints in Dense Heterogeneous Traffic
Sublinear-Time Quantum Computation of the Diameter in CONGEST Networks
Distributional Regression Forests for Probabilistic Precipitation Forecasting in Complex Terrain
Partial synchronization of relaxation oscillators with repulsive coupling in autocatalytic integrate-and-fire model and electrochemical experiments
Neural network decoder for topological color codes with circuit level noise
Symmetric Circuits for Rank Logic
Distribution-Aware Binarization of Neural Networks for Sketch Recognition
The distribution of Gaussian multiplicative chaos on the unit interval
Abdominal Aortic Aneurysm Segmentation with a Small Number of Training Subjects
Sample-Derived Disjunctive Rules for Secure Power System Operation
Personalized PageRank dimensionality and algorithmic implications
A theory of consciousness: computation, algorithm, and neurobiological realization
Generative Adversarial Networks for Extreme Learned Image Compression
Optimizing wearable assistive devices with neuromuscular models and optimal control
Numerical stability analysis of the class of communication hiding pipelined Conjugate Gradient methods
Predicting Dynamic Replication based on Fuzzy System in Data Grid
Face Sketch Synthesis Style Similarity:A New Structure Co-occurrence Texture Measure
Compact Formulation of the First Evolution Equation for Optimal Control Computation
Formulas for translative functions
Balancedness of Social Choice Correspondences
Multi-views Fusion CNN for Left Ventricular Volumes Estimation on Cardiac MR Images
A Bayes-Sard Cubature Method
Learning at the Ends: From Hand to Tool Affordances in Humanoid Robots
Implementing Line-Hermitian Grassmann codes
Estimation in a simple linear regression model with measurement error
Fenchel-Moreau Conjugation Inequalities with Three Couplings and Application to Stochastic Bellman Equation
3D Fluid Flow Estimation with Integrated Particle Reconstruction
Optimal Control of AGC Systems Considering Non-Gaussian Wind Power Uncertainty
Gromov Product Decomposition of 7-point Metric Spaces
Vision as an Interlingua: Learning Multilingual Semantic Embeddings of Untranscribed Speech
Set Similarity Search for Skewed Data
Convex fair partitions into twice a prime power of pieces
On marginal and conditional parameters in logistic regression models
Robust fusion algorithms for unsupervised change detection between multi-band optical images – A comprehensive case study
Cutting resilient networks
The correlation constant of a field
A plug-in approach to maximising precision at the top and recall at the top
User Scheduling for Millimeter Wave Hybrid Beamforming Systems with Low-Resolution ADCs
Binge Watching: Scaling Affordance Learning from Sitcoms
Routing Game on Parallel Networks: the Convergence of Atomic to Nonatomic
Attribute-Centered Loss for Soft-Biometrics Guided Face Sketch-Photo Recognition
How costly punishment, diversity, and density of connectivity influence cooperation in a biological network
Localization transitions and mobility edges in coupled Aubry-André chains
Stochastic Comparisons of Two-Units Markovian Repairable Systems
Central limit theorems via Stein’s method for randomized experiments under interference
Optimal Transport over Deterministic Discrete-time Nonlinear Systems using Stochastic Feedback Laws
Tensor Mixed Effects Model with Applications in Nanomanufacturing Inspection
Beating the integrality ratio for s-t-tours in graphs
AMNet: Memorability Estimation with Attention
First passage percolation in the mean field limit
Topological Tverberg Theorem: the proofs and the counterexamples
Bayesian Predictive Inference For Finite Population Quantities Under Informative Sampling
Leveraging Intra-User and Inter-User Representation Learning for Automated Hate Speech Detection
Blazingly Fast Video Object Segmentation with Pixel-Wise Metric Learning