arxiv.org.rss.10.xml - sfeed_tests - sfeed tests and RSS and Atom files
 (HTM) git clone git://git.codemadness.org/sfeed_tests
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
 (DIR) LICENSE
       ---
       arxiv.org.rss.10.xml (863940B)
       ---
            1 <?xml version="1.0" encoding="UTF-8"?>
            2 
            3 <rdf:RDF
            4  xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
            5  xmlns="http://purl.org/rss/1.0/"
            6  xmlns:content="http://purl.org/rss/1.0/modules/content/"
            7  xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/"
            8  xmlns:dc="http://purl.org/dc/elements/1.1/"
            9  xmlns:syn="http://purl.org/rss/1.0/modules/syndication/"
           10  xmlns:admin="http://webns.net/mvcb/"
           11 >
           12 
           13 <channel rdf:about="http://fr.arxiv.org/">
           14 <title>cs updates on arXiv.org</title>
           15 <link>http://fr.arxiv.org/</link>
           16 <description rdf:parseType="Literal">Computer Science (cs) updates on the arXiv.org e-print archive</description>
           17 <dc:language>en-us</dc:language>
           18 <dc:date>2020-10-29T20:30:00-05:00</dc:date>
           19 <dc:publisher>www-admin@arxiv.org</dc:publisher>
           20 <dc:subject>Computer Science</dc:subject>
           21 <syn:updateBase>1901-01-01T00:00+00:00</syn:updateBase>
           22 <syn:updateFrequency>1</syn:updateFrequency>
           23 <syn:updatePeriod>daily</syn:updatePeriod>
           24 <items>
           25  <rdf:Seq>
           26   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15120" />
           27   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15138" />
           28   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15149" />
           29   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15153" />
           30   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15155" />
           31   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15156" />
           32   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15157" />
           33   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15158" />
           34   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15162" />
           35   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15166" />
           36   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15169" />
           37   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15171" />
           38   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15174" />
           39   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15187" />
           40   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15193" />
           41   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15195" />
           42   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15196" />
           43   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15201" />
           44   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15203" />
           45   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15206" />
           46   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15209" />
           47   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15210" />
           48   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15211" />
           49   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15217" />
           50   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15218" />
           51   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15221" />
           52   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15222" />
           53   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15225" />
           54   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15229" />
           55   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15232" />
           56   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15233" />
           57   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15234" />
           58   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15236" />
           59   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15237" />
           60   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15239" />
           61   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15240" />
           62   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15245" />
           63   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15250" />
           64   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15251" />
           65   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15255" />
           66   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15258" />
           67   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15260" />
           68   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15261" />
           69   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15266" />
           70   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15268" />
           71   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15269" />
           72   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15271" />
           73   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15272" />
           74   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15274" />
           75   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15275" />
           76   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15277" />
           77   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15280" />
           78   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15283" />
           79   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15288" />
           80   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15289" />
           81   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15296" />
           82   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15297" />
           83   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15300" />
           84   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15302" />
           85   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15303" />
           86   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15306" />
           87   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15311" />
           88   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15313" />
           89   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15314" />
           90   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15315" />
           91   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15316" />
           92   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15317" />
           93   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15320" />
           94   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15322" />
           95   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15327" />
           96   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15329" />
           97   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15335" />
           98   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15336" />
           99   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15338" />
          100   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15343" />
          101   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15344" />
          102   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15346" />
          103   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15347" />
          104   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15350" />
          105   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15352" />
          106   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15353" />
          107   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15354" />
          108   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15356" />
          109   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15358" />
          110   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15360" />
          111   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15363" />
          112   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15364" />
          113   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15365" />
          114   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15366" />
          115   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15371" />
          116   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15372" />
          117   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15376" />
          118   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15377" />
          119   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15378" />
          120   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15379" />
          121   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15382" />
          122   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15388" />
          123   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15389" />
          124   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15390" />
          125   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15391" />
          126   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15392" />
          127   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15393" />
          128   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15394" />
          129   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15396" />
          130   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15399" />
          131   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15404" />
          132   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15411" />
          133   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15413" />
          134   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15415" />
          135   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15417" />
          136   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15421" />
          137   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15423" />
          138   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15425" />
          139   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15426" />
          140   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15427" />
          141   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15434" />
          142   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15435" />
          143   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15436" />
          144   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15437" />
          145   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15438" />
          146   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15440" />
          147   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15441" />
          148   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15444" />
          149   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15446" />
          150   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15453" />
          151   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15454" />
          152   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15455" />
          153   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15456" />
          154   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15457" />
          155   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15458" />
          156   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15461" />
          157   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15464" />
          158   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15466" />
          159   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15469" />
          160   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15470" />
          161   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15476" />
          162   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15479" />
          163   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15482" />
          164   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15487" />
          165   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15490" />
          166   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15491" />
          167   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15492" />
          168   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15502" />
          169   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15504" />
          170   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15506" />
          171   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15507" />
          172   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15508" />
          173   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15509" />
          174   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15510" />
          175   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15511" />
          176   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15521" />
          177   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15524" />
          178   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15525" />
          179   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15526" />
          180   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15527" />
          181   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15528" />
          182   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15530" />
          183   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15531" />
          184   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15533" />
          185   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15534" />
          186   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15535" />
          187   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15538" />
          188   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15541" />
          189   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15545" />
          190   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15549" />
          191   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15550" />
          192   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15551" />
          193   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15552" />
          194   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15556" />
          195   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15559" />
          196   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15560" />
          197   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15561" />
          198   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15562" />
          199   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15571" />
          200   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15572" />
          201   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15577" />
          202   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15578" />
          203   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15579" />
          204   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15581" />
          205   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15582" />
          206   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15583" />
          207   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15584" />
          208   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15585" />
          209   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15586" />
          210   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15588" />
          211   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15590" />
          212   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15594" />
          213   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15596" />
          214   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15597" />
          215   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15598" />
          216   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15599" />
          217   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15600" />
          218   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15601" />
          219   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15602" />
          220   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15603" />
          221   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15604" />
          222   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15605" />
          223   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15606" />
          224   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15607" />
          225   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15614" />
          226   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15618" />
          227   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15620" />
          228   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15622" />
          229   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15623" />
          230   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15638" />
          231   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15639" />
          232   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15643" />
          233   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15647" />
          234   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15651" />
          235   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15653" />
          236   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15654" />
          237   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15658" />
          238   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15662" />
          239   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15665" />
          240   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15668" />
          241   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15669" />
          242   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15670" />
          243   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15671" />
          244   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15672" />
          245   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15673" />
          246   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15674" />
          247   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15675" />
          248   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15676" />
          249   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15678" />
          250   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15679" />
          251   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15680" />
          252   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15682" />
          253   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15683" />
          254   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15684" />
          255   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15687" />
          256   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15689" />
          257   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15690" />
          258   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15692" />
          259   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15694" />
          260   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15697" />
          261   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15698" />
          262   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15703" />
          263   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15711" />
          264   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15716" />
          265   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15718" />
          266   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15727" />
          267   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15728" />
          268   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15729" />
          269   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15738" />
          270   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15740" />
          271   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15745" />
          272   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15750" />
          273   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15755" />
          274   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15760" />
          275   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15761" />
          276   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15764" />
          277   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15768" />
          278   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15770" />
          279   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15772" />
          280   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15773" />
          281   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15775" />
          282   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15776" />
          283   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15778" />
          284   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15784" />
          285   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15785" />
          286   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15786" />
          287   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15792" />
          288   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15793" />
          289   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15794" />
          290   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15801" />
          291   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15803" />
          292   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15805" />
          293   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15809" />
          294   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15811" />
          295   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15814" />
          296   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15819" />
          297   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15820" />
          298   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15821" />
          299   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15823" />
          300   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15824" />
          301   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15831" />
          302   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15832" />
          303   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1602.05829" />
          304   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1605.09124" />
          305   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1608.03533" />
          306   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1712.06431" />
          307   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1801.07485" />
          308   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1810.00635" />
          309   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1901.07849" />
          310   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1902.06626" />
          311   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1906.01786" />
          312   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1906.05586" />
          313   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1906.06642" />
          314   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1906.06836" />
          315   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1907.02237" />
          316   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1907.06226" />
          317   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1907.06630" />
          318   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1907.08813" />
          319   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1908.01146" />
          320   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1908.06634" />
          321   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1909.05176" />
          322   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1909.09318" />
          323   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1909.12473" />
          324   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1910.04267" />
          325   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1910.08845" />
          326   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1910.13067" />
          327   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1911.02711" />
          328   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1911.03849" />
          329   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1911.03875" />
          330   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1911.04209" />
          331   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1911.09565" />
          332   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.00187" />
          333   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.02290" />
          334   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.05320" />
          335   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.05699" />
          336   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.08026" />
          337   <rdf:li rdf:resource="http://fr.arxiv.org/abs/1912.10321" />
          338   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2001.10477" />
          339   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2002.04025" />
          340   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2002.06195" />
          341   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2002.08247" />
          342   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2002.12165" />
          343   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.01367" />
          344   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.02960" />
          345   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.03824" />
          346   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.03977" />
          347   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.06475" />
          348   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.08196" />
          349   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2003.09946" />
          350   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.00499" />
          351   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.03096" />
          352   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.04685" />
          353   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.11362" />
          354   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.12130" />
          355   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.13363" />
          356   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2004.14632" />
          357   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.00858" />
          358   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.01192" />
          359   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.02683" />
          360   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.03482" />
          361   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.09635" />
          362   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.10963" />
          363   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.12451" />
          364   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.12889" />
          365   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.13969" />
          366   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.14435" />
          367   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2005.14441" />
          368   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.02080" />
          369   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.03267" />
          370   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.03829" />
          371   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.03992" />
          372   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.06459" />
          373   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.06648" />
          374   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.06677" />
          375   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.07214" />
          376   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.07225" />
          377   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.08205" />
          378   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.09859" />
          379   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.10085" />
          380   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.10498" />
          381   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.12681" />
          382   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.13258" />
          383   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2006.14950" />
          384   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.00124" />
          385   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.00772" />
          386   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.00796" />
          387   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.01293" />
          388   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.02261" />
          389   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.02835" />
          390   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.06267" />
          391   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.06271" />
          392   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.07632" />
          393   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.09483" />
          394   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.10497" />
          395   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.11078" />
          396   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.12153" />
          397   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.12159" />
          398   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2007.13404" />
          399   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.00226" />
          400   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.02464" />
          401   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.02834" />
          402   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.04717" />
          403   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.09293" />
          404   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.11370" />
          405   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.12775" />
          406   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2008.13567" />
          407   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.00110" />
          408   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.00142" />
          409   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.01194" />
          410   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.03133" />
          411   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.05524" />
          412   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.07165" />
          413   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.07203" />
          414   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.07253" />
          415   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.08276" />
          416   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.11329" />
          417   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.12729" />
          418   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2009.12829" />
          419   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.00182" />
          420   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.02480" />
          421   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.02510" />
          422   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.02519" />
          423   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.04831" />
          424   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.05446" />
          425   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.05768" />
          426   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.06351" />
          427   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.07485" />
          428   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.08182" />
          429   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.08321" />
          430   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.08841" />
          431   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.09843" />
          432   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.10436" />
          433   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.10695" />
          434   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.10742" />
          435   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.10759" />
          436   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.11150" />
          437   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.11175" />
          438   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.11505" />
          439   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.11775" />
          440   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.11925" />
          441   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.12191" />
          442   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.12234" />
          443   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.12674" />
          444   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.12899" />
          445   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.12931" />
          446   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.13119" />
          447   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.13178" />
          448   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.13273" />
          449   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.13285" />
          450   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.13956" />
          451   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14367" />
          452   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14501" />
          453   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14571" />
          454   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14584" />
          455   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14771" />
          456   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14919" />
          457   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15003" />
          458   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15032" />
          459   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.15058" />
          460   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14544" />
          461   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14734" />
          462   <rdf:li rdf:resource="http://fr.arxiv.org/abs/2010.14746" />
          463  </rdf:Seq>
          464 </items>
          465 <image rdf:resource="http://fr.arxiv.org/icons/sfx.gif" />
          466 </channel>
          467 <image rdf:about="http://fr.arxiv.org/icons/sfx.gif">
          468 <title>arXiv.org</title>
          469 <url>http://fr.arxiv.org/icons/sfx.gif</url>
          470 <link>http://fr.arxiv.org/</link>
          471 </image>
          472 <item rdf:about="http://fr.arxiv.org/abs/2010.15120">
          473 <title>Raw Audio for Depression Detection Can Be More Robust Against Gender Imbalance than Mel-Spectrogram Features. (arXiv:2010.15120v1 [cs.SD])</title>
          474 <link>http://fr.arxiv.org/abs/2010.15120</link>
          475 <description rdf:parseType="Literal">&lt;p&gt;Depression is a large-scale mental health problem and a challenging area for
          476 machine learning researchers in terms of the detection of depression. Datasets
          477 such as the Distress Analysis Interview Corpus - Wizard of Oz have been created
          478 to aid research in this area. However, on top of the challenges inherent in
          479 accurately detecting depression, biases in datasets may result in skewed
          480 classification performance. In this paper we examine gender bias in the
          481 DAIC-WOZ dataset using audio-based deep neural networks. We show that gender
          482 biases in DAIC-WOZ can lead to an overreporting of performance, which has been
          483 overlooked in the past due to the same gender biases being present in the test
          484 set. By using raw audio and different concepts from Fair Machine Learning, such
          485 as data re-distribution, we can mitigate against the harmful effects of bias.
          486 &lt;/p&gt;
          487 </description>
          488 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bailey_A/0/1/0/all/0/1&quot;&gt;Andrew Bailey&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plumbley_M/0/1/0/all/0/1&quot;&gt;Mark D. Plumbley&lt;/a&gt;</dc:creator>
          489 </item>
          490 <item rdf:about="http://fr.arxiv.org/abs/2010.15138">
          491 <title>papaya2: 2D Irreducible Minkowski Tensor computation. (arXiv:2010.15138v1 [cs.GR])</title>
          492 <link>http://fr.arxiv.org/abs/2010.15138</link>
          493 <description rdf:parseType="Literal">&lt;p&gt;A common challenge in scientific and technical domains is the quantitative
          494 description of geometries and shapes, e.g. in the analysis of microscope
          495 imagery or astronomical observation data. Frequently, it is desirable to go
          496 beyond scalar shape metrics such as porosity and surface to volume ratios
          497 because the samples are anisotropic or because direction-dependent quantities
          498 such as conductances or elasticity are of interest. Minkowski Tensors are a
          499 systematic family of versatile and robust higher-order shape descriptors that
          500 allow for shape characterization of arbitrary order and promise a path to
          501 systematic structure-function relationships for direction-dependent properties.
          502 Papaya2 is a software to calculate 2D higher-order shape metrics with a library
          503 interface, support for Irreducible Minkowski Tensors and interpolated marching
          504 squares. Extensions to Matlab, JavaScript and Python are provided as well.
          505 While the tensor of inertia is computed by many tools, we are not aware of
          506 other open-source software which provides higher-rank shape characterization in
          507 2D.
          508 &lt;/p&gt;
          509 </description>
          510 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schaller_F/0/1/0/all/0/1&quot;&gt;Fabian M. Schaller&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wagner_J/0/1/0/all/0/1&quot;&gt;Jenny Wagner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kapfer_S/0/1/0/all/0/1&quot;&gt;Sebastian C. Kapfer&lt;/a&gt;</dc:creator>
          511 </item>
          512 <item rdf:about="http://fr.arxiv.org/abs/2010.15149">
          513 <title>DeSMOG: Detecting Stance in Media On Global Warming. (arXiv:2010.15149v1 [cs.CL])</title>
          514 <link>http://fr.arxiv.org/abs/2010.15149</link>
          515 <description rdf:parseType="Literal">&lt;p&gt;Citing opinions is a powerful yet understudied strategy in argumentation. For
          516 example, an environmental activist might say, &quot;Leading scientists agree that
          517 global warming is a serious concern,&quot; framing a clause which affirms their own
          518 stance (&quot;that global warming is serious&quot;) as an opinion endorsed (&quot;[scientists]
          519 agree&quot;) by a reputable source (&quot;leading&quot;). In contrast, a global warming denier
          520 might frame the same clause as the opinion of an untrustworthy source with a
          521 predicate connoting doubt: &quot;Mistaken scientists claim [...].&quot; Our work studies
          522 opinion-framing in the global warming (GW) debate, an increasingly partisan
          523 issue that has received little attention in NLP. We introduce DeSMOG, a dataset
          524 of stance-labeled GW sentences, and train a BERT classifier to study novel
          525 aspects of argumentation in how different sides of a debate represent their own
          526 and each other&apos;s opinions. From 56K news articles, we find that similar
          527 linguistic devices for self-affirming and opponent-doubting discourse are used
          528 across GW-accepting and skeptic media, though GW-skeptical media shows more
          529 opponent-doubt. We also find that authors often characterize sources as
          530 hypocritical, by ascribing opinions expressing the author&apos;s own view to source
          531 entities known to publicly endorse the opposing view. We release our stance
          532 dataset, model, and lexicons of framing devices for future work on
          533 opinion-framing and the automatic detection of GW stance.
          534 &lt;/p&gt;
          535 </description>
          536 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Luo_Y/0/1/0/all/0/1&quot;&gt;Yiwei Luo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Card_D/0/1/0/all/0/1&quot;&gt;Dallas Card&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jurafsky_D/0/1/0/all/0/1&quot;&gt;Dan Jurafsky&lt;/a&gt;</dc:creator>
          537 </item>
          538 <item rdf:about="http://fr.arxiv.org/abs/2010.15153">
          539 <title>On the Optimality and Convergence Properties of the Learning Model Predictive Controller. (arXiv:2010.15153v1 [math.OC])</title>
          540 <link>http://fr.arxiv.org/abs/2010.15153</link>
          541 <description rdf:parseType="Literal">&lt;p&gt;In this technical note we analyse the performance improvement and optimality
          542 properties of the Learning Model Predictive Control (LMPC) strategy for linear
          543 deterministic systems. The LMPC framework is a policy iteration scheme where
          544 closed-loop trajectories are used to update the control policy for the next
          545 execution of the control task. We show that, when a Linear Independence
          546 Constraint Qualification (LICQ) condition holds, the LMPC scheme guarantees
          547 strict iterative performance improvement and optimality, meaning that the
          548 closed-loop cost evaluated over the entire task converges asymptotically to the
          549 optimal cost of the infinite-horizon control problem. Compared to previous
          550 works this sufficient LICQ condition can be easily checked, it holds for a
          551 larger class of systems and it can be used to adaptively select the prediction
          552 horizon of the controller, as demonstrated by a numerical example.
          553 &lt;/p&gt;
          554 </description>
          555 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Rosolia_U/0/1/0/all/0/1&quot;&gt;Ugo Rosolia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Lian_Y/0/1/0/all/0/1&quot;&gt;Yingzhao Lian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Maddalena_E/0/1/0/all/0/1&quot;&gt;Emilio T. Maddalena&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Ferrari_Trecate_G/0/1/0/all/0/1&quot;&gt;Giancarlo Ferrari-Trecate&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Jones_C/0/1/0/all/0/1&quot;&gt;Colin N. Jones&lt;/a&gt;</dc:creator>
          556 </item>
          557 <item rdf:about="http://fr.arxiv.org/abs/2010.15155">
          558 <title>Kernel Aggregated Fast Multipole Method: Efficient summation of Laplace and Stokes kernel functions. (arXiv:2010.15155v1 [math.NA])</title>
          559 <link>http://fr.arxiv.org/abs/2010.15155</link>
          560 <description rdf:parseType="Literal">&lt;p&gt;Many different simulation methods for Stokes flow problems involve a common
          561 computationally intense task---the summation of a kernel function over $O(N^2)$
          562 pairs of points. One popular technique is the Kernel Independent Fast Multipole
          563 Method (KIFMM), which constructs a spatial adaptive octree and places a small
          564 number of equivalent multipole and local points around each octree box, and
          565 completes the kernel sum with $O(N)$ performance. However, the KIFMM cannot be
          566 used directly with nonlinear kernels, can be inefficient for complicated linear
          567 kernels, and in general is difficult to implement compared to less-efficient
          568 alternatives such as Ewald-type methods. Here we present the Kernel Aggregated
          569 Fast Multipole Method (KAFMM), which overcomes these drawbacks by allowing
          570 different kernel functions to be used for specific stages of octree traversal.
          571 In many cases a simpler linear kernel suffices during the most extensive stage
          572 of octree traversal, even for nonlinear kernel summation problems. The KAFMM
          573 thereby improves computational efficiency in general and also allows efficient
          574 evaluation of some nonlinear kernel functions such as the regularized
          575 Stokeslet. We have implemented our method as an open-source software library
          576 STKFMM with support for Laplace kernels, the Stokeslet, regularized Stokeslet,
          577 Rotne-Prager-Yamakawa (RPY) tensor, and the Stokes double-layer and traction
          578 operators. Open and periodic boundary conditions are supported for all kernels,
          579 and the no-slip wall boundary condition is supported for the Stokeslet and RPY
          580 tensor. The package is designed to be ready-to-use as well as being readily
          581 extensible to additional kernels. Massive parallelism is supported with mixed
          582 OpenMP and MPI.
          583 &lt;/p&gt;
          584 </description>
          585 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Yan_W/0/1/0/all/0/1&quot;&gt;Wen Yan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Blackwell_R/0/1/0/all/0/1&quot;&gt;Robert Blackwell&lt;/a&gt;</dc:creator>
          586 </item>
          587 <item rdf:about="http://fr.arxiv.org/abs/2010.15156">
          588 <title>Diagnostic data integration using deep neural networks for real-time plasma analysis. (arXiv:2010.15156v1 [physics.comp-ph])</title>
          589 <link>http://fr.arxiv.org/abs/2010.15156</link>
          590 <description rdf:parseType="Literal">&lt;p&gt;Recent advances in acquisition equipment is providing experiments with
          591 growing amounts of precise yet affordable sensors. At the same time an improved
          592 computational power, coming from new hardware resources (GPU, FPGA, ACAP), has
          593 been made available at relatively low costs. This led us to explore the
          594 possibility of completely renewing the chain of acquisition for a fusion
          595 experiment, where many high-rate sources of data, coming from different
          596 diagnostics, can be combined in a wide framework of algorithms. If on one hand
          597 adding new data sources with different diagnostics enriches our knowledge about
          598 physical aspects, on the other hand the dimensions of the overall model grow,
          599 making relations among variables more and more opaque. A new approach for the
          600 integration of such heterogeneous diagnostics, based on composition of deep
          601 \textit{variational autoencoders}, could ease this problem, acting as a
          602 structural sparse regularizer. This has been applied to RFX-mod experiment
          603 data, integrating the soft X-ray linear images of plasma temperature with the
          604 magnetic state.
          605 &lt;/p&gt;
          606 &lt;p&gt;However to ensure a real-time signal analysis, those algorithmic techniques
          607 must be adapted to run in well suited hardware. In particular it is shown that,
          608 attempting a quantization of neurons transfer functions, such models can be
          609 modified to create an embedded firmware. This firmware, approximating the deep
          610 inference model to a set of simple operations, fits well with the simple logic
          611 units that are largely abundant in FPGAs. This is the key factor that permits
          612 the use of affordable hardware with complex deep neural topology and operates
          613 them in real-time.
          614 &lt;/p&gt;
          615 </description>
          616 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Garola_A/0/1/0/all/0/1&quot;&gt;A. Rigoni Garola&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Cavazzana_R/0/1/0/all/0/1&quot;&gt;R. Cavazzana&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Gobbin_M/0/1/0/all/0/1&quot;&gt;M. Gobbin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Delogu_R/0/1/0/all/0/1&quot;&gt;R.S. Delogu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Manduchi_G/0/1/0/all/0/1&quot;&gt;G. Manduchi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Taliercio_C/0/1/0/all/0/1&quot;&gt;C. Taliercio&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Luchetta_A/0/1/0/all/0/1&quot;&gt;A. Luchetta&lt;/a&gt;</dc:creator>
          617 </item>
          618 <item rdf:about="http://fr.arxiv.org/abs/2010.15157">
          619 <title>Panoster: End-to-end Panoptic Segmentation of LiDAR Point Clouds. (arXiv:2010.15157v1 [cs.CV])</title>
          620 <link>http://fr.arxiv.org/abs/2010.15157</link>
          621 <description rdf:parseType="Literal">&lt;p&gt;Panoptic segmentation has recently unified semantic and instance
          622 segmentation, previously addressed separately, thus taking a step further
          623 towards creating more comprehensive and efficient perception systems. In this
          624 paper, we present Panoster, a novel proposal-free panoptic segmentation method
          625 for point clouds. Unlike previous approaches relying on several steps to group
          626 pixels or points into objects, Panoster proposes a simplified framework
          627 incorporating a learning-based clustering solution to identify instances. At
          628 inference time, this acts as a class-agnostic semantic segmentation, allowing
          629 Panoster to be fast, while outperforming prior methods in terms of accuracy.
          630 Additionally, we showcase how our approach can be flexibly and effectively
          631 applied on diverse existing semantic architectures to deliver panoptic
          632 predictions.
          633 &lt;/p&gt;
          634 </description>
          635 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gasperini_S/0/1/0/all/0/1&quot;&gt;Stefano Gasperini&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mahani_M/0/1/0/all/0/1&quot;&gt;Mohammad-Ali Nikouei Mahani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Marcos_Ramiro_A/0/1/0/all/0/1&quot;&gt;Alvaro Marcos-Ramiro&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Navab_N/0/1/0/all/0/1&quot;&gt;Nassir Navab&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tombari_F/0/1/0/all/0/1&quot;&gt;Federico Tombari&lt;/a&gt;</dc:creator>
          636 </item>
          637 <item rdf:about="http://fr.arxiv.org/abs/2010.15158">
          638 <title>CNN Profiler on Polar Coordinate Images for Tropical Cyclone Structure Analysis. (arXiv:2010.15158v1 [cs.CV])</title>
          639 <link>http://fr.arxiv.org/abs/2010.15158</link>
          640 <description rdf:parseType="Literal">&lt;p&gt;Convolutional neural networks (CNN) have achieved great success in analyzing
          641 tropical cyclones (TC) with satellite images in several tasks, such as TC
          642 intensity estimation. In contrast, TC structure, which is conventionally
          643 described by a few parameters estimated subjectively by meteorology
          644 specialists, is still hard to be profiled objectively and routinely. This study
          645 applies CNN on satellite images to create the entire TC structure profiles,
          646 covering all the structural parameters. By utilizing the meteorological domain
          647 knowledge to construct TC wind profiles based on historical structure
          648 parameters, we provide valuable labels for training in our newly released
          649 benchmark dataset. With such a dataset, we hope to attract more attention to
          650 this crucial issue among data scientists. Meanwhile, a baseline is established
          651 with a specialized convolutional model operating on polar-coordinates. We
          652 discovered that it is more feasible and physically reasonable to extract
          653 structural information on polar-coordinates, instead of Cartesian coordinates,
          654 according to a TC&apos;s rotational and spiral natures. Experimental results on the
          655 released benchmark dataset verified the robustness of the proposed model and
          656 demonstrated the potential for applying deep learning techniques for this
          657 barely developed yet important topic.
          658 &lt;/p&gt;
          659 </description>
          660 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1&quot;&gt;Boyo Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1&quot;&gt;Buo-Fu Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hsiao_C/0/1/0/all/0/1&quot;&gt;Chun-Min Hsiao&lt;/a&gt;</dc:creator>
          661 </item>
          662 <item rdf:about="http://fr.arxiv.org/abs/2010.15162">
          663 <title>Sizeless: Predicting the optimal size of serverless functions. (arXiv:2010.15162v1 [cs.DC])</title>
          664 <link>http://fr.arxiv.org/abs/2010.15162</link>
          665 <description rdf:parseType="Literal">&lt;p&gt;Serverless functions are a cloud computing paradigm that reduces operational
          666 overheads for developers, because the cloud provider takes care of resource
          667 management tasks such as resource provisioning, deployment, and auto-scaling.
          668 The only resource management task that developers are still in charge of is
          669 resource sizing, that is, selecting how much resources are allocated to each
          670 worker instance. However, due to the challenging nature of resource sizing,
          671 developers often neglect it despite its significant cost and performance
          672 benefits. Existing approaches aiming to automate serverless functions resource
          673 sizing require dedicated performance tests, which are time consuming to
          674 implement and maintain.
          675 &lt;/p&gt;
          676 &lt;p&gt;In this paper, we introduce Sizeless -- an approach to predict the optimal
          677 resource size of a serverless function using monitoring data from a single
          678 resource size. As our approach requires only production monitoring data,
          679 developers no longer need to implement and maintain representative performance
          680 tests. Furthermore, it enables cloud providers, which cannot engage in testing
          681 the performance of user functions, to implement resource sizing on a platform
          682 level and automate the last resource management task associated with serverless
          683 functions. In our evaluation, Sizeless was able to predict the execution time
          684 of the serverless functions of a realistic server-less application with a
          685 median prediction accuracy of 93.1%. Using Sizeless to optimize the memory size
          686 of this application results in a speedup of 16.7% while simultaneously
          687 decreasing costs by 2.5%.
          688 &lt;/p&gt;
          689 </description>
          690 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Eismann_S/0/1/0/all/0/1&quot;&gt;Simon Eismann&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bui_L/0/1/0/all/0/1&quot;&gt;Long Bui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Grohmann_J/0/1/0/all/0/1&quot;&gt;Johannes Grohmann&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Abad_C/0/1/0/all/0/1&quot;&gt;Cristina L. Abad&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Herbst_N/0/1/0/all/0/1&quot;&gt;Nikolas Herbst&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kounev_S/0/1/0/all/0/1&quot;&gt;Samuel Kounev&lt;/a&gt;</dc:creator>
          691 </item>
          692 <item rdf:about="http://fr.arxiv.org/abs/2010.15166">
          693 <title>Polymer Informatics with Multi-Task Learning. (arXiv:2010.15166v1 [cond-mat.mtrl-sci])</title>
          694 <link>http://fr.arxiv.org/abs/2010.15166</link>
          695 <description rdf:parseType="Literal">&lt;p&gt;Modern data-driven tools are transforming application-specific polymer
          696 development cycles. Surrogate models that can be trained to predict the
          697 properties of new polymers are becoming commonplace. Nevertheless, these models
          698 do not utilize the full breadth of the knowledge available in datasets, which
          699 are oftentimes sparse; inherent correlations between different property
          700 datasets are disregarded. Here, we demonstrate the potency of multi-task
          701 learning approaches that exploit such inherent correlations effectively,
          702 particularly when some property dataset sizes are small. Data pertaining to 36
          703 different properties of over $13, 000$ polymers (corresponding to over $23,000$
          704 data points) are coalesced and supplied to deep-learning multi-task
          705 architectures. Compared to conventional single-task learning models (that are
          706 trained on individual property datasets independently), the multi-task approach
          707 is accurate, efficient, scalable, and amenable to transfer learning as more
          708 data on the same or different properties become available. Moreover, these
          709 models are interpretable. Chemical rules, that explain how certain features
          710 control trends in specific property values, emerge from the present work,
          711 paving the way for the rational design of application specific polymers meeting
          712 desired property or performance objectives.
          713 &lt;/p&gt;
          714 </description>
          715 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Kunneth_C/0/1/0/all/0/1&quot;&gt;Christopher K&amp;#xfc;nneth&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Rajan_A/0/1/0/all/0/1&quot;&gt;Arunkumar Chitteth Rajan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Tran_H/0/1/0/all/0/1&quot;&gt;Huan Tran&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Chen_L/0/1/0/all/0/1&quot;&gt;Lihua Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Kim_C/0/1/0/all/0/1&quot;&gt;Chiho Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Ramprasad_R/0/1/0/all/0/1&quot;&gt;Rampi Ramprasad&lt;/a&gt;</dc:creator>
          716 </item>
          717 <item rdf:about="http://fr.arxiv.org/abs/2010.15169">
          718 <title>Semi-Grant-Free NOMA: Ergodic Rates Analysis with Random Deployed Users. (arXiv:2010.15169v1 [cs.IT])</title>
          719 <link>http://fr.arxiv.org/abs/2010.15169</link>
          720 <description rdf:parseType="Literal">&lt;p&gt;Semi-grant-free (Semi-GF) non-orthogonal multiple access (NOMA) enables
          721 grant-free (GF) and grant-based (GB) users to share the same resource blocks,
          722 thereby balancing the connectivity and stability of communications. This letter
          723 analyzes ergodic rates of Semi-GF NOMA systems. First, this paper exploits a
          724 Semi-GF protocol, denoted as dynamic protocol, for selecting GF users into the
          725 occupied GB channels via the GB user&apos;s instantaneous received power. Under this
          726 protocol, the closed-form analytical and approximated expressions for ergodic
          727 rates are derived. The numerical results illustrate that the GF user (weak NOMA
          728 user) has a performance upper limit, while the ergodic rate of the GB user
          729 (strong NOMA user) increases linearly versus the transmit signal-to-noise
          730 ratio.
          731 &lt;/p&gt;
          732 </description>
          733 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1&quot;&gt;Chao Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1&quot;&gt;Yuanwei Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yi_W/0/1/0/all/0/1&quot;&gt;Wenqiang Yi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qin_Z/0/1/0/all/0/1&quot;&gt;Zhijin Qin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ding_Z/0/1/0/all/0/1&quot;&gt;Zhiguo Ding&lt;/a&gt;</dc:creator>
          734 </item>
          735 <item rdf:about="http://fr.arxiv.org/abs/2010.15171">
          736 <title>Slicing a single wireless collision channel among throughput- and timeliness-sensitive services. (arXiv:2010.15171v1 [cs.IT])</title>
          737 <link>http://fr.arxiv.org/abs/2010.15171</link>
          738 <description rdf:parseType="Literal">&lt;p&gt;The fifth generation (5G) wireless system has a platform-driven approach,
          739 aiming to support heterogeneous connections with very diverse requirements. The
          740 shared wireless resources should be sliced in a way that each user perceives
          741 that its requirement has been met. Heterogeneity challenges the traditional
          742 notion of resource efficiency, as the resource usage has cater for, e.g. rate
          743 maximization for one user and timeliness requirement for another user. This
          744 paper treats a model for radio access network (RAN) uplink, where a
          745 throughput-demanding broadband user shares wireless resources with an
          746 intermittently active user that wants to optimize the timeliness, expressed in
          747 terms of latency-reliability or Age of Information (AoI). We evaluate the
          748 trade-offs between throughput and timeliness for Orthogonal Multiple Access
          749 (OMA) as well as Non-Orthogonal Multiple Access (NOMA) with successive
          750 interference cancellation (SIC). We observe that NOMA with SIC, in a
          751 conservative scenario with destructive collisions, is just slightly inferior to
          752 that of OMA, which indicates that it may offer significant benefits in
          753 practical deployments where the capture effect is frequently encountered. On
          754 the other hand, finding the optimal configuration of NOMA with SIC depends on
          755 the activity pattern of the intermittent user, to which OMA is insensitive.
          756 &lt;/p&gt;
          757 </description>
          758 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leyva_Mayorga_I/0/1/0/all/0/1&quot;&gt;Israel Leyva-Mayorga&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chiariotti_F/0/1/0/all/0/1&quot;&gt;Federico Chiariotti&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stefanovic_C/0/1/0/all/0/1&quot;&gt;&amp;#x10c;edomir Stefanovi&amp;#x107;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kalor_A/0/1/0/all/0/1&quot;&gt;Anders E. Kal&amp;#xf8;r&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Popovski_P/0/1/0/all/0/1&quot;&gt;Petar Popovski&lt;/a&gt;</dc:creator>
          759 </item>
          760 <item rdf:about="http://fr.arxiv.org/abs/2010.15174">
          761 <title>Improving Perceptual Quality by Phone-Fortified Perceptual Loss for Speech Enhancement. (arXiv:2010.15174v1 [cs.SD])</title>
          762 <link>http://fr.arxiv.org/abs/2010.15174</link>
          763 <description rdf:parseType="Literal">&lt;p&gt;Speech enhancement (SE) aims to improve speech quality and intelligibility,
          764 which are both related to a smooth transition in speech segments that may carry
          765 linguistic information, e.g. phones and syllables. In this study, we took
          766 phonetic characteristics into account in the SE training process. Hence, we
          767 designed a phone-fortified perceptual (PFP) loss, and the training of our SE
          768 model was guided by PFP loss. In PFP loss, phonetic characteristics are
          769 extracted by wav2vec, an unsupervised learning model based on the contrastive
          770 predictive coding (CPC) criterion. Different from previous deep-feature-based
          771 approaches, the proposed approach explicitly uses the phonetic information in
          772 the deep feature extraction process to guide the SE model training. To test the
          773 proposed approach, we first confirmed that the wav2vec representations carried
          774 clear phonetic information using a t-distributed stochastic neighbor embedding
          775 (t-SNE) analysis. Next, we observed that the proposed PFP loss was more
          776 strongly correlated with the perceptual evaluation metrics than point-wise and
          777 signal-level losses, thus achieving higher scores for standardized quality and
          778 intelligibility evaluation metrics in the Voice Bank--DEMAND dataset.
          779 &lt;/p&gt;
          780 </description>
          781 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hsieh_T/0/1/0/all/0/1&quot;&gt;Tsun-An Hsieh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yu_C/0/1/0/all/0/1&quot;&gt;Cheng Yu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fu_S/0/1/0/all/0/1&quot;&gt;Szu-Wei Fu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lu_X/0/1/0/all/0/1&quot;&gt;Xugang Lu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tsao_Y/0/1/0/all/0/1&quot;&gt;Yu Tsao&lt;/a&gt;</dc:creator>
          782 </item>
          783 <item rdf:about="http://fr.arxiv.org/abs/2010.15187">
          784 <title>A Study on Efficiency in Continual Learning Inspired by Human Learning. (arXiv:2010.15187v1 [cs.LG])</title>
          785 <link>http://fr.arxiv.org/abs/2010.15187</link>
          786 <description rdf:parseType="Literal">&lt;p&gt;Humans are efficient continual learning systems; we continually learn new
          787 skills from birth with finite cells and resources. Our learning is highly
          788 optimized both in terms of capacity and time while not suffering from
          789 catastrophic forgetting. In this work we study the efficiency of continual
          790 learning systems, taking inspiration from human learning. In particular,
          791 inspired by the mechanisms of sleep, we evaluate popular pruning-based
          792 continual learning algorithms, using PackNet as a case study. First, we
          793 identify that weight freezing, which is used in continual learning without
          794 biological justification, can result in over $2\times$ as many weights being
          795 used for a given level of performance. Secondly, we note the similarity in
          796 human day and night time behaviors to the training and pruning phases
          797 respectively of PackNet. We study a setting where the pruning phase is given a
          798 time budget, and identify connections between iterative pruning and multiple
          799 sleep cycles in humans. We show there exists an optimal choice of iteration
          800 v.s. epochs given different tasks.
          801 &lt;/p&gt;
          802 </description>
          803 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ball_P/0/1/0/all/0/1&quot;&gt;Philip J. Ball&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1&quot;&gt;Yingzhen Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lamb_A/0/1/0/all/0/1&quot;&gt;Angus Lamb&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1&quot;&gt;Cheng Zhang&lt;/a&gt;</dc:creator>
          804 </item>
          805 <item rdf:about="http://fr.arxiv.org/abs/2010.15193">
          806 <title>Explicit stabilized multirate method for stiff stochastic differential equations. (arXiv:2010.15193v1 [math.NA])</title>
          807 <link>http://fr.arxiv.org/abs/2010.15193</link>
          808 <description rdf:parseType="Literal">&lt;p&gt;Stabilized explicit methods are particularly efficient for large systems of
          809 stiff stochastic differential equations (SDEs) due to their extended stability
          810 domain. However, they loose their efficiency when a severe stiffness is induced
          811 by very few &quot;fast&quot; degrees of freedom, as the stiff and nonstiff terms are
          812 evaluated concurrently. Therefore, inspired by [A. Abdulle, M. J. Grote, and G.
          813 Rosilho de Souza, Preprint (2020), &lt;a href=&quot;/abs/2006.00744&quot;&gt;arXiv:2006.00744&lt;/a&gt;] we introduce a stochastic
          814 modified equation whose stiffness depends solely on the &quot;slow&quot; terms. By
          815 integrating this modified equation with a stabilized explicit scheme we devise
          816 a multirate method which overcomes the bottleneck caused by a few severely
          817 stiff terms and recovers the efficiency of stabilized schemes for large systems
          818 of nonlinear SDEs. The scheme is not based on any scale separation assumption
          819 of the SDE and therefore it is employable for problems stemming from the
          820 spatial discretization of stochastic parabolic partial differential equations
          821 on locally refined grids. The multirate scheme has strong order 1/2, weak order
          822 1 and its stability is proved on a model problem. Numerical experiments confirm
          823 the efficiency and accuracy of the scheme.
          824 &lt;/p&gt;
          825 </description>
          826 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Abdulle_A/0/1/0/all/0/1&quot;&gt;Assyr Abdulle&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Souza_G/0/1/0/all/0/1&quot;&gt;Giacomo Rosilho de Souza&lt;/a&gt;</dc:creator>
          827 </item>
          828 <item rdf:about="http://fr.arxiv.org/abs/2010.15195">
          829 <title>Reinforcement Learning for Sparse-Reward Object-Interaction Tasks in First-person Simulated 3D Environments. (arXiv:2010.15195v1 [cs.LG])</title>
          830 <link>http://fr.arxiv.org/abs/2010.15195</link>
          831 <description rdf:parseType="Literal">&lt;p&gt;First-person object-interaction tasks in high-fidelity, 3D, simulated
          832 environments such as the AI2Thor virtual home-environment pose significant
          833 sample-efficiency challenges for reinforcement learning (RL) agents learning
          834 from sparse task rewards. To alleviate these challenges, prior work has
          835 provided extensive supervision via a combination of reward-shaping,
          836 ground-truth object-information, and expert demonstrations. In this work, we
          837 show that one can learn object-interaction tasks from scratch without
          838 supervision by learning an attentive object-model as an auxiliary task during
          839 task learning with an object-centric relational RL agent. Our key insight is
          840 that learning an object-model that incorporates object-attention into forward
          841 prediction provides a dense learning signal for unsupervised representation
          842 learning of both objects and their relationships. This, in turn, enables faster
          843 policy learning for an object-centric relational RL agent. We demonstrate our
          844 agent by introducing a set of challenging object-interaction tasks in the
          845 AI2Thor environment where learning with our attentive object-model is key to
          846 strong performance. Specifically, we compare our agent and relational RL agents
          847 with alternative auxiliary tasks to a relational RL agent equipped with
          848 ground-truth object-information, and show that learning with our object-model
          849 best closes the performance gap in terms of both learning speed and maximum
          850 success rate. Additionally, we find that incorporating object-attention into an
          851 object-model&apos;s forward predictions is key to learning representations which
          852 capture object-category and object-state.
          853 &lt;/p&gt;
          854 </description>
          855 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Carvalho_W/0/1/0/all/0/1&quot;&gt;Wilka Carvalho&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liang_A/0/1/0/all/0/1&quot;&gt;Anthony Liang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_K/0/1/0/all/0/1&quot;&gt;Kimin Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sohn_S/0/1/0/all/0/1&quot;&gt;Sungryull Sohn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1&quot;&gt;Honglak Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lewis_R/0/1/0/all/0/1&quot;&gt;Richard L. Lewis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_S/0/1/0/all/0/1&quot;&gt;Satinder Singh&lt;/a&gt;</dc:creator>
          856 </item>
          857 <item rdf:about="http://fr.arxiv.org/abs/2010.15196">
          858 <title>A fast and scalable computational framework for large-scale and high-dimensional Bayesian optimal experimental design. (arXiv:2010.15196v1 [math.NA])</title>
          859 <link>http://fr.arxiv.org/abs/2010.15196</link>
          860 <description rdf:parseType="Literal">&lt;p&gt;We develop a fast and scalable computational framework to solve large-scale
          861 and high-dimensional Bayesian optimal experimental design problems. In
          862 particular, we consider the problem of optimal observation sensor placement for
          863 Bayesian inference of high-dimensional parameters governed by partial
          864 differential equations (PDEs), which is formulated as an optimization problem
          865 that seeks to maximize an expected information gain (EIG). Such optimization
          866 problems are particularly challenging due to the curse of dimensionality for
          867 high-dimensional parameters and the expensive solution of large-scale PDEs. To
          868 address these challenges, we exploit two essential properties of such problems:
          869 the low-rank structure of the Jacobian of the parameter-to-observable map to
          870 extract the intrinsically low-dimensional data-informed subspace, and the high
          871 correlation of the approximate EIGs by a series of approximations to reduce the
          872 number of PDE solves. We propose an efficient offline-online decomposition for
          873 the optimization problem: an offline stage of computing all the quantities that
          874 require a limited number of PDE solves independent of parameter and data
          875 dimensions, and an online stage of optimizing sensor placement that does not
          876 require any PDE solve. For the online optimization, we propose a swapping
          877 greedy algorithm that first construct an initial set of sensors using leverage
          878 scores and then swap the chosen sensors with other candidates until certain
          879 convergence criteria are met. We demonstrate the efficiency and scalability of
          880 the proposed computational framework by a linear inverse problem of inferring
          881 the initial condition for an advection-diffusion equation, and a nonlinear
          882 inverse problem of inferring the diffusion coefficient of a log-normal
          883 diffusion equation, with both the parameter and data dimensions ranging from a
          884 few tens to a few thousands.
          885 &lt;/p&gt;
          886 </description>
          887 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Wu_K/0/1/0/all/0/1&quot;&gt;Keyi Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Chen_P/0/1/0/all/0/1&quot;&gt;Peng Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Ghattas_O/0/1/0/all/0/1&quot;&gt;Omar Ghattas&lt;/a&gt;</dc:creator>
          888 </item>
          889 <item rdf:about="http://fr.arxiv.org/abs/2010.15201">
          890 <title>Forecasting Hamiltonian dynamics without canonical coordinates. (arXiv:2010.15201v1 [cs.LG])</title>
          891 <link>http://fr.arxiv.org/abs/2010.15201</link>
          892 <description rdf:parseType="Literal">&lt;p&gt;Conventional neural networks are universal function approximators, but
          893 because they are unaware of underlying symmetries or physical laws, they may
          894 need impractically many training data to approximate nonlinear dynamics.
          895 Recently introduced Hamiltonian neural networks can efficiently learn and
          896 forecast dynamical systems that conserve energy, but they require special
          897 inputs called canonical coordinates, which may be hard to infer from data. Here
          898 we significantly expand the scope of such networks by demonstrating a simple
          899 way to train them with any set of generalised coordinates, including easily
          900 observable ones.
          901 &lt;/p&gt;
          902 </description>
          903 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Choudhary_A/0/1/0/all/0/1&quot;&gt;Anshul Choudhary&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lindner_J/0/1/0/all/0/1&quot;&gt;John F. Lindner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Holliday_E/0/1/0/all/0/1&quot;&gt;Elliott G. Holliday&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Miller_S/0/1/0/all/0/1&quot;&gt;Scott T. Miller&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sinha_S/0/1/0/all/0/1&quot;&gt;Sudeshna Sinha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ditto_W/0/1/0/all/0/1&quot;&gt;William L. Ditto&lt;/a&gt;</dc:creator>
          904 </item>
          905 <item rdf:about="http://fr.arxiv.org/abs/2010.15203">
          906 <title>Micromobility in Smart Cities: A Closer Look at Shared Dockless E-Scooters via Big Social Data. (arXiv:2010.15203v1 [cs.SI])</title>
          907 <link>http://fr.arxiv.org/abs/2010.15203</link>
          908 <description rdf:parseType="Literal">&lt;p&gt;The micromobility is shaping first- and last-mile travels in urban areas.
          909 Recently, shared dockless electric scooters (e-scooters) have emerged as a
          910 daily alternative to driving for short-distance commuters in large cities due
          911 to the affordability, easy accessibility via an app, and zero emissions.
          912 Meanwhile, e-scooters come with challenges in city management, such as traffic
          913 rules, public safety, parking regulations, and liability issues. In this paper,
          914 we collected and investigated 5.8 million scooter-tagged tweets and 144,197
          915 images, generated by 2.7 million users from October 2018 to March 2020, to take
          916 a closer look at shared e-scooters via crowdsourcing data analytics. We
          917 profiled e-scooter usages from spatial-temporal perspectives, explored
          918 different business roles (i.e., riders, gig workers, and ridesharing
          919 companies), examined operation patterns (e.g., injury types, and parking
          920 behaviors), and conducted sentiment analysis. To our best knowledge, this paper
          921 is the first large-scale systematic study on shared e-scooters using big social
          922 data.
          923 &lt;/p&gt;
          924 </description>
          925 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1&quot;&gt;Yunhe Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhong_D/0/1/0/all/0/1&quot;&gt;Dong Zhong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sun_P/0/1/0/all/0/1&quot;&gt;Peng Sun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zheng_W/0/1/0/all/0/1&quot;&gt;Weijian Zheng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cao_Q/0/1/0/all/0/1&quot;&gt;Qinglei Cao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Luo_X/0/1/0/all/0/1&quot;&gt;Xi Luo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lu_Z/0/1/0/all/0/1&quot;&gt;Zheng Lu&lt;/a&gt;</dc:creator>
          926 </item>
          927 <item rdf:about="http://fr.arxiv.org/abs/2010.15206">
          928 <title>Rosella: A Self-Driving Distributed Scheduler for Heterogeneous Clusters. (arXiv:2010.15206v1 [cs.DC])</title>
          929 <link>http://fr.arxiv.org/abs/2010.15206</link>
          930 <description rdf:parseType="Literal">&lt;p&gt;Large-scale interactive web services and advanced AI applications make
          931 sophisticated decisions in real-time, based on executing a massive amount of
          932 computation tasks on thousands of servers. Task schedulers, which often operate
          933 in heterogeneous and volatile environments, require high throughput, i.e.,
          934 scheduling millions of tasks per second, and low latency, i.e., incurring
          935 minimal scheduling delays for millisecond-level tasks. Scheduling is further
          936 complicated by other users&apos; workloads in a shared system, other background
          937 activities, and the diverse hardware configurations inside datacenters.
          938 &lt;/p&gt;
          939 &lt;p&gt;We present Rosella, a new self-driving, distributed approach for task
          940 scheduling in heterogeneous clusters. Our system automatically learns the
          941 compute environment and adjust its scheduling policy in real-time. The solution
          942 provides high throughput and low latency simultaneously, because it runs in
          943 parallel on multiple machines with minimum coordination and only performs
          944 simple operations for each scheduling decision. Our learning module monitors
          945 total system load, and uses the information to dynamically determine optimal
          946 estimation strategy for the backends&apos; compute-power. Our scheduling policy
          947 generalizes power-of-two-choice algorithms to handle heterogeneous workers,
          948 reducing the max queue length of $O(\log n)$ obtained by prior algorithms to
          949 $O(\log \log n)$. We implement a Rosella prototype and evaluate it with a
          950 variety of workloads. Experimental results show that Rosella significantly
          951 reduces task response times, and adapts to environment changes quickly.
          952 &lt;/p&gt;
          953 </description>
          954 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_Q/0/1/0/all/0/1&quot;&gt;Qiong Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Manandhar_S/0/1/0/all/0/1&quot;&gt;Sunil Manandhar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1&quot;&gt;Zhenming Liu&lt;/a&gt;</dc:creator>
          955 </item>
          956 <item rdf:about="http://fr.arxiv.org/abs/2010.15209">
          957 <title>Ground Roll Suppression using Convolutional Neural Networks. (arXiv:2010.15209v1 [eess.IV])</title>
          958 <link>http://fr.arxiv.org/abs/2010.15209</link>
          959 <description rdf:parseType="Literal">&lt;p&gt;Seismic data processing plays a major role in seismic exploration as it
          960 conditions much of the seismic interpretation performance. In this context,
          961 generating reliable post-stack seismic data depends also on disposing of an
          962 efficient pre-stack noise attenuation tool. Here we tackle ground roll noise,
          963 one of the most challenging and common noises observed in pre-stack seismic
          964 data. Since ground roll is characterized by relative low frequencies and high
          965 amplitudes, most commonly used approaches for its suppression are based on
          966 frequency-amplitude filters for ground roll characteristic bands. However, when
          967 signal and noise share the same frequency ranges, these methods usually deliver
          968 also signal suppression or residual noise. In this paper we take advantage of
          969 the highly non-linear features of convolutional neural networks, and propose to
          970 use different architectures to detect ground roll in shot gathers and
          971 ultimately to suppress them using conditional generative adversarial networks.
          972 Additionally, we propose metrics to evaluate ground roll suppression, and
          973 report strong results compared to expert filtering. Finally, we discuss
          974 generalization of trained models for similar and different geologies to better
          975 understand the feasibility of our proposal in real applications.
          976 &lt;/p&gt;
          977 </description>
          978 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Oliveira_D/0/1/0/all/0/1&quot;&gt;Dario Augusto Borges Oliveira&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Semin_D/0/1/0/all/0/1&quot;&gt;Daniil Semin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zaytsev_S/0/1/0/all/0/1&quot;&gt;Semen Zaytsev&lt;/a&gt;</dc:creator>
          979 </item>
          980 <item rdf:about="http://fr.arxiv.org/abs/2010.15210">
          981 <title>On Linearizability and the Termination of Randomized Algorithms. (arXiv:2010.15210v1 [cs.DC])</title>
          982 <link>http://fr.arxiv.org/abs/2010.15210</link>
          983 <description rdf:parseType="Literal">&lt;p&gt;We study the question of whether the &quot;termination with probability 1&quot;
          984 property of a randomized algorithm is preserved when one replaces the atomic
          985 registers that the algorithm uses with linearizable (implementations of)
          986 registers. We show that in general this is not so: roughly speaking, every
          987 randomized algorithm A has a corresponding algorithm A&apos; that solves the same
          988 problem if the registers that it uses are atomic or strongly-linearizable, but
          989 does not terminate if these registers are replaced with &quot;merely&quot; linearizable
          990 ones. Together with a previous result shown in [15], this implies that one
          991 cannot use the well-known ABD implementation of registers in message-passing
          992 systems to automatically transform any randomized algorithm that works in
          993 shared-memory systems into a randomized algorithm that works in message-passing
          994 systems: with a strong adversary the resulting algorithm may not terminate.
          995 &lt;/p&gt;
          996 </description>
          997 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hadzilacos_V/0/1/0/all/0/1&quot;&gt;Vassos Hadzilacos&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hu_X/0/1/0/all/0/1&quot;&gt;Xing Hu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Toueg_S/0/1/0/all/0/1&quot;&gt;Sam Toueg&lt;/a&gt;</dc:creator>
          998 </item>
          999 <item rdf:about="http://fr.arxiv.org/abs/2010.15211">
         1000 <title>Safety-Aware Cascade Controller Tuning Using Constrained Bayesian Optimization. (arXiv:2010.15211v1 [eess.SY])</title>
         1001 <link>http://fr.arxiv.org/abs/2010.15211</link>
         1002 <description rdf:parseType="Literal">&lt;p&gt;This paper presents an automated, model-free, data-driven method for the safe
         1003 tuning of PID cascade controller gains based on Bayesian optimization. The
         1004 optimization objective is composed of data-driven performance metrics and
         1005 modeled using Gaussian processes. We further introduce a data-driven constraint
         1006 that captures the stability requirements from system data. Numerical evaluation
         1007 shows that the proposed approach outperforms relay feedback autotuning and
         1008 quickly converges to the global optimum, thanks to a tailored stopping
         1009 criterion. We demonstrate the performance of the method in simulations and
         1010 experiments on a linear axis drive of a grinding machine. For experimental
         1011 implementation, in addition to the introduced safety constraint, we integrate a
         1012 method for automatic detection of the critical gains and extend the
         1013 optimization objective with a penalty depending on the proximity of the current
         1014 candidate points to the critical gains. The resulting automated tuning method
         1015 optimizes system performance while ensuring stability and standardization.
         1016 &lt;/p&gt;
         1017 </description>
         1018 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Konig_C/0/1/0/all/0/1&quot;&gt;Christopher K&amp;#xf6;nig&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Khosravi_M/0/1/0/all/0/1&quot;&gt;Mohammad Khosravi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Maier_M/0/1/0/all/0/1&quot;&gt;Markus Maier&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Smith_R/0/1/0/all/0/1&quot;&gt;Roy S. Smith&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Rupenyan_A/0/1/0/all/0/1&quot;&gt;Alisa Rupenyan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Lygeros_J/0/1/0/all/0/1&quot;&gt;John Lygeros&lt;/a&gt;</dc:creator>
         1019 </item>
         1020 <item rdf:about="http://fr.arxiv.org/abs/2010.15217">
         1021 <title>Away from Trolley Problems and Toward Risk Management. (arXiv:2010.15217v1 [cs.CY])</title>
         1022 <link>http://fr.arxiv.org/abs/2010.15217</link>
         1023 <description rdf:parseType="Literal">&lt;p&gt;As automated vehicles receive more attention from the media, there has been
         1024 an equivalent increase in the coverage of the ethical choices a vehicle may be
         1025 forced to make in certain crash situations with no clear safe outcome. Much of
         1026 this coverage has focused on a philosophical thought experiment known as the
         1027 &quot;trolley problem,&quot; and substituting an automated vehicle for the trolley and
         1028 the car&apos;s software for the bystander. While this is a stark and straightforward
         1029 example of ethical decision making for an automated vehicle, it risks
         1030 marginalizing the entire field if it is to become the only ethical problem in
         1031 the public&apos;s mind. In this chapter, I discuss the shortcomings of the trolley
         1032 problem, and introduce more nuanced examples that involve crash risk and
         1033 uncertainty. Risk management is introduced as an alternative approach, and its
         1034 ethical dimensions are discussed.
         1035 &lt;/p&gt;
         1036 </description>
         1037 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goodall_N/0/1/0/all/0/1&quot;&gt;Noah J. Goodall&lt;/a&gt;</dc:creator>
         1038 </item>
         1039 <item rdf:about="http://fr.arxiv.org/abs/2010.15218">
         1040 <title>StencilFlow: Mapping Large Stencil Programs to Distributed Spatial Computing Systems. (arXiv:2010.15218v1 [cs.DC])</title>
         1041 <link>http://fr.arxiv.org/abs/2010.15218</link>
         1042 <description rdf:parseType="Literal">&lt;p&gt;Spatial computing devices have been shown to significantly accelerate stencil
         1043 computations, but have so far relied on unrolling the iterative dimension of a
         1044 single stencil operation to increase temporal locality. This work considers the
         1045 general case of mapping directed acyclic graphs of heterogeneous stencil
         1046 computations to spatial computing systems, assuming large input programs
         1047 without an iterative component. StencilFlow maximizes temporal locality and
         1048 ensures deadlock freedom in this setting, providing end-to-end analysis and
         1049 mapping from a high-level program description to distributed hardware. We
         1050 evaluate the generated architectures on an FPGA testbed, demonstrating the
         1051 highest single-device and multi-device performance recorded for stencil
         1052 programs on FPGAs to date, then leverage the framework to study a complex
         1053 stencil program from a production weather simulation application. Our work
         1054 enables productively targeting distributed spatial computing systems with large
         1055 stencil programs, and offers insight into architecture characteristics required
         1056 for their efficient execution in practice.
         1057 &lt;/p&gt;
         1058 </description>
         1059 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Licht_J/0/1/0/all/0/1&quot;&gt;Johannes de Fine Licht&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kuster_A/0/1/0/all/0/1&quot;&gt;Andreas Kuster&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Matteis_T/0/1/0/all/0/1&quot;&gt;Tiziano De Matteis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ben_Nun_T/0/1/0/all/0/1&quot;&gt;Tal Ben-Nun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hofer_D/0/1/0/all/0/1&quot;&gt;Dominic Hofer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hoefler_T/0/1/0/all/0/1&quot;&gt;Torsten Hoefler&lt;/a&gt;</dc:creator>
         1060 </item>
         1061 <item rdf:about="http://fr.arxiv.org/abs/2010.15221">
         1062 <title>Geometric Sampling of Networks. (arXiv:2010.15221v1 [math.DG])</title>
         1063 <link>http://fr.arxiv.org/abs/2010.15221</link>
         1064 <description rdf:parseType="Literal">&lt;p&gt;Motivated by the methods and results of manifold sampling based on Ricci
         1065 curvature, we propose a similar approach for networks. To this end we make
         1066 appeal to three types of discrete curvature, namely the graph Forman-, full
         1067 Forman- and Haantjes-Ricci curvatures for edge-based and node-based sampling.
         1068 We present the results of experiments on real life networks, as well as for
         1069 square grids arising in Image Processing. Moreover, we consider fitting Ricci
         1070 flows and we employ them for the detection of networks&apos; backbone. We also
         1071 develop embedding kernels related to the Forman-Ricci curvatures and employ
         1072 them for the detection of the coarse structure of networks, as well as for
         1073 network visualization with applications to SVM. The relation between the Ricci
         1074 curvature of the original manifold and that of a Ricci curvature driven
         1075 discretization is also studied.
         1076 &lt;/p&gt;
         1077 </description>
         1078 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Barkanass_V/0/1/0/all/0/1&quot;&gt;Vladislav Barkanass&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Jost_J/0/1/0/all/0/1&quot;&gt;J&amp;#xfc;rgen Jost&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Saucan_E/0/1/0/all/0/1&quot;&gt;Emil Saucan&lt;/a&gt;</dc:creator>
         1079 </item>
         1080 <item rdf:about="http://fr.arxiv.org/abs/2010.15222">
         1081 <title>Exploring complex networks with the ICON R package. (arXiv:2010.15222v1 [cs.SI])</title>
         1082 <link>http://fr.arxiv.org/abs/2010.15222</link>
         1083 <description rdf:parseType="Literal">&lt;p&gt;We introduce ICON, an R package that contains 1075 complex network datasets
         1084 in a standard edgelist format. All provided datasets have associated citations
         1085 and have been indexed by the Colorado Index of Complex Networks - also referred
         1086 to as ICON. In addition to supplying a large and diverse corpus of useful
         1087 real-world networks, ICON also implements an S3 generic to work with the
         1088 network and ggnetwork R packages for network analysis and visualization,
         1089 respectively. Sample code in this report also demonstrates how ICON can be used
         1090 in conjunction with the igraph package. Currently, the Comprehensive R Archive
         1091 Network hosts ICON v0.4.0. We hope that ICON will serve as a standard corpus
         1092 for complex network research and prevent redundant work that would be otherwise
         1093 necessary by individual research groups. The open source code for ICON and for
         1094 this reproducible report can be found at https://github.com/rrrlw/ICON.
         1095 &lt;/p&gt;
         1096 </description>
         1097 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wadhwa_R/0/1/0/all/0/1&quot;&gt;Raoul R. Wadhwa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Scott_J/0/1/0/all/0/1&quot;&gt;Jacob G. Scott&lt;/a&gt;</dc:creator>
         1098 </item>
         1099 <item rdf:about="http://fr.arxiv.org/abs/2010.15225">
         1100 <title>A Visuospatial Dataset for Naturalistic Verb Learning. (arXiv:2010.15225v1 [cs.CL])</title>
         1101 <link>http://fr.arxiv.org/abs/2010.15225</link>
         1102 <description rdf:parseType="Literal">&lt;p&gt;We introduce a new dataset for training and evaluating grounded language
         1103 models. Our data is collected within a virtual reality environment and is
         1104 designed to emulate the quality of language data to which a pre-verbal child is
         1105 likely to have access: That is, naturalistic, spontaneous speech paired with
         1106 richly grounded visuospatial context. We use the collected data to compare
         1107 several distributional semantics models for verb learning. We evaluate neural
         1108 models based on 2D (pixel) features as well as feature-engineered models based
         1109 on 3D (symbolic, spatial) features, and show that neither modeling approach
         1110 achieves satisfactory performance. Our results are consistent with evidence
         1111 from child language acquisition that emphasizes the difficulty of learning
         1112 verbs from naive distributional data. We discuss avenues for future work on
         1113 cognitively-inspired grounded language learning, and release our corpus with
         1114 the intent of facilitating research on the topic.
         1115 &lt;/p&gt;
         1116 </description>
         1117 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ebert_D/0/1/0/all/0/1&quot;&gt;Dylan Ebert&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pavlick_E/0/1/0/all/0/1&quot;&gt;Ellie Pavlick&lt;/a&gt;</dc:creator>
         1118 </item>
         1119 <item rdf:about="http://fr.arxiv.org/abs/2010.15229">
         1120 <title>Speech-Based Emotion Recognition using Neural Networks and Information Visualization. (arXiv:2010.15229v1 [cs.HC])</title>
         1121 <link>http://fr.arxiv.org/abs/2010.15229</link>
         1122 <description rdf:parseType="Literal">&lt;p&gt;Emotions recognition is commonly employed for health assessment. However, the
         1123 typical metric for evaluation in therapy is based on patient-doctor appraisal.
         1124 This process can fall into the issue of subjectivity, while also requiring
         1125 healthcare professionals to deal with copious amounts of information. Thus,
         1126 machine learning algorithms can be a useful tool for the classification of
         1127 emotions. While several models have been developed in this domain, there is a
         1128 lack of userfriendly representations of the emotion classification systems for
         1129 therapy. We propose a tool which enables users to take speech samples and
         1130 identify a range of emotions (happy, sad, angry, surprised, neutral, clam,
         1131 disgust, and fear) from audio elements through a machine learning model. The
         1132 dashboard is designed based on local therapists&apos; needs for intuitive
         1133 representations of speech data in order to gain insights and informative
         1134 analyses of their sessions with their patients.
         1135 &lt;/p&gt;
         1136 </description>
         1137 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Almahmoud_J/0/1/0/all/0/1&quot;&gt;Jumana Almahmoud&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kikkeri_K/0/1/0/all/0/1&quot;&gt;Kruthika Kikkeri&lt;/a&gt;</dc:creator>
         1138 </item>
         1139 <item rdf:about="http://fr.arxiv.org/abs/2010.15232">
         1140 <title>Construction Payment Automation Using Blockchain-Enabled Smart Contracts and Reality Capture Technologies. (arXiv:2010.15232v1 [cs.CR])</title>
         1141 <link>http://fr.arxiv.org/abs/2010.15232</link>
         1142 <description rdf:parseType="Literal">&lt;p&gt;This paper presents a smart contract-based solution for autonomous
         1143 administration of construction progress payments. It bridges the gap between
         1144 payments (cash flow) and the progress assessments at job sites (product flow)
         1145 enabled by reality capture technologies and building information modeling
         1146 (BIM). The approach eliminates the reliance on the centralized and heavily
         1147 intermediated mechanisms of existing payment applications. The construction
         1148 progress is stored in a distributed manner using content addressable file
         1149 sharing; it is broadcasted to a smart contract which automates the on-chain
         1150 payment settlements and the transfer of lien rights. The method was
         1151 successfully used for processing payments to 7 subcontractors in two commercial
         1152 construction projects where progress monitoring was performed using a
         1153 camera-equipped unmanned aerial vehicle (UAV) and an unmanned ground vehicle
         1154 (UGV) equipped with a laser scanner. The results show promise for the method&apos;s
         1155 potential for increasing the frequency, granularity, and transparency of
         1156 payments. The paper is concluded with a discussion of implications for project
         1157 management, introducing a new model of project as a singleton state machine.
         1158 &lt;/p&gt;
         1159 </description>
         1160 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hamledari_H/0/1/0/all/0/1&quot;&gt;Hesam Hamledari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fischer_M/0/1/0/all/0/1&quot;&gt;Martin Fischer&lt;/a&gt;</dc:creator>
         1161 </item>
         1162 <item rdf:about="http://fr.arxiv.org/abs/2010.15233">
         1163 <title>Accurate Prostate Cancer Detection and Segmentation on Biparametric MRI using Non-local Mask R-CNN with Histopathological Ground Truth. (arXiv:2010.15233v1 [eess.IV])</title>
         1164 <link>http://fr.arxiv.org/abs/2010.15233</link>
         1165 <description rdf:parseType="Literal">&lt;p&gt;Purpose: We aimed to develop deep machine learning (DL) models to improve the
         1166 detection and segmentation of intraprostatic lesions (IL) on bp-MRI by using
         1167 whole amount prostatectomy specimen-based delineations. We also aimed to
         1168 investigate whether transfer learning and self-training would improve results
         1169 with small amount labelled data.
         1170 &lt;/p&gt;
         1171 &lt;p&gt;Methods: 158 patients had suspicious lesions delineated on MRI based on
         1172 bp-MRI, 64 patients had ILs delineated on MRI based on whole mount
         1173 prostatectomy specimen sections, 40 patients were unlabelled. A non-local Mask
         1174 R-CNN was proposed to improve the segmentation accuracy. Transfer learning was
         1175 investigated by fine-tuning a model trained using MRI-based delineations with
         1176 prostatectomy-based delineations. Two label selection strategies were
         1177 investigated in self-training. The performance of models was evaluated by 3D
         1178 detection rate, dice similarity coefficient (DSC), 95 percentile Hausdrauff (95
         1179 HD, mm) and true positive ratio (TPR).
         1180 &lt;/p&gt;
         1181 &lt;p&gt;Results: With prostatectomy-based delineations, the non-local Mask R-CNN with
         1182 fine-tuning and self-training significantly improved all evaluation metrics.
         1183 For the model with the highest detection rate and DSC, 80.5% (33/41) of lesions
         1184 in all Gleason Grade Groups (GGG) were detected with DSC of 0.548[0.165], 95 HD
         1185 of 5.72[3.17] and TPR of 0.613[0.193]. Among them, 94.7% (18/19) of lesions
         1186 with GGG &amp;gt; 2 were detected with DSC of 0.604[0.135], 95 HD of 6.26[3.44] and
         1187 TPR of 0.580[0.190].
         1188 &lt;/p&gt;
         1189 &lt;p&gt;Conclusion: DL models can achieve high prostate cancer detection and
         1190 segmentation accuracy on bp-MRI based on annotations from histologic images. To
         1191 further improve the performance, more data with annotations of both MRI and
         1192 whole amount prostatectomy specimens are required.
         1193 &lt;/p&gt;
         1194 </description>
         1195 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Dai_Z/0/1/0/all/0/1&quot;&gt;Zhenzhen Dai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Jambor_I/0/1/0/all/0/1&quot;&gt;Ivan Jambor&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Taimen_P/0/1/0/all/0/1&quot;&gt;Pekka Taimen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pantelic_M/0/1/0/all/0/1&quot;&gt;Milan Pantelic&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Elshaikh_M/0/1/0/all/0/1&quot;&gt;Mohamed Elshaikh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Rogers_C/0/1/0/all/0/1&quot;&gt;Craig Rogers&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ettala_O/0/1/0/all/0/1&quot;&gt;Otto Ettala&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Bostrom_P/0/1/0/all/0/1&quot;&gt;Peter Bostr&amp;#xf6;m&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Aronen_H/0/1/0/all/0/1&quot;&gt;Hannu Aronen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Merisaari_H/0/1/0/all/0/1&quot;&gt;Harri Merisaari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wen_N/0/1/0/all/0/1&quot;&gt;Ning Wen&lt;/a&gt;</dc:creator>
         1196 </item>
         1197 <item rdf:about="http://fr.arxiv.org/abs/2010.15234">
         1198 <title>Linear Regression Games: Convergence Guarantees to Approximate Out-of-Distribution Solutions. (arXiv:2010.15234v1 [cs.LG])</title>
         1199 <link>http://fr.arxiv.org/abs/2010.15234</link>
         1200 <description rdf:parseType="Literal">&lt;p&gt;Recently, invariant risk minimization (IRM) (Arjovsky et al.) was proposed as
         1201 a promising solution to address out-of-distribution (OOD) generalization. In
         1202 Ahuja et al., it was shown that solving for the Nash equilibria of a new class
         1203 of &quot;ensemble-games&quot; is equivalent to solving IRM. In this work, we extend the
         1204 framework in Ahuja et al. for linear regressions by projecting the
         1205 ensemble-game on an $\ell_{\infty}$ ball. We show that such projections help
         1206 achieve non-trivial OOD guarantees despite not achieving perfect invariance.
         1207 For linear models with confounders, we prove that Nash equilibria of these
         1208 games are closer to the ideal OOD solutions than the standard empirical risk
         1209 minimization (ERM) and we also provide learning algorithms that provably
         1210 converge to these Nash Equilibria. Empirical comparisons of the proposed
         1211 approach with the state-of-the-art show consistent gains in achieving OOD
         1212 solutions in several settings involving anti-causal variables and confounders.
         1213 &lt;/p&gt;
         1214 </description>
         1215 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ahuja_K/0/1/0/all/0/1&quot;&gt;Kartik Ahuja&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shanmugam_K/0/1/0/all/0/1&quot;&gt;Karthikeyan Shanmugam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dhurandhar_A/0/1/0/all/0/1&quot;&gt;Amit Dhurandhar&lt;/a&gt;</dc:creator>
         1216 </item>
         1217 <item rdf:about="http://fr.arxiv.org/abs/2010.15236">
         1218 <title>SD-Access: Practical Experiences in Designing and Deploying Software Defined Enterprise Networks. (arXiv:2010.15236v1 [cs.NI])</title>
         1219 <link>http://fr.arxiv.org/abs/2010.15236</link>
         1220 <description rdf:parseType="Literal">&lt;p&gt;Enterprise Networks, over the years, have become more and more complex trying
         1221 to keep up with new requirements that challenge traditional solutions. Just to
         1222 mention one out of many possible examples, technologies such as Virtual LANs
         1223 (VLANs) struggle to address the scalability and operational requirements
         1224 introduced by Internet of Things (IoT) use cases. To keep up with these
         1225 challenges we have identified four main requirements that are common across
         1226 modern enterprise networks: (i) scalable mobility, (ii) endpoint segmentation,
         1227 (iii) simplified administration, and (iv) resource optimization. To address
         1228 these challenges we designed SDA (Software Defined Access), a solution for
         1229 modern enterprise networks that leverages Software-Defined Networking (SDN) and
         1230 other state of the art techniques. In this paper we present the design,
         1231 implementation and evaluation of SDA. Specifically, SDA: (i) leverages a
         1232 combination of an overlay approach with an event-driven protocol (LISP) to
         1233 dynamically adapt to traffic and mobility patterns while preserving resources,
         1234 and (ii) enforces dynamic endpoint groups for scalable segmentation with low
         1235 operational burden. We present our experience with deploying SDA in two
         1236 real-life scenarios: an enterprise campus, and a large warehouse with mobile
         1237 robots. Our evaluation shows that SDA, when compared with traditional
         1238 enterprise networks, can (i) reduce overall data plane forwarding state up to
         1239 70% thanks to a reactive protocol using a centralized routing server, and (ii)
         1240 reduce by an order of magnitude the handover delays in scenarios of massive
         1241 mobility with respect to other approaches. Finally, we discuss lessons learned
         1242 while deploying and operating SDA, and possible optimizations regarding the use
         1243 of an event-driven protocol and group-based segmentation.
         1244 &lt;/p&gt;
         1245 </description>
         1246 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Paillisse_J/0/1/0/all/0/1&quot;&gt;Jordi Paillisse&lt;/a&gt; (1 and 2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Portoles_M/0/1/0/all/0/1&quot;&gt;Marc Portoles&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lopez_A/0/1/0/all/0/1&quot;&gt;Albert Lopez&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rodriguez_Natal_A/0/1/0/all/0/1&quot;&gt;Alberto Rodriguez-Natal&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Iacobacci_D/0/1/0/all/0/1&quot;&gt;David Iacobacci&lt;/a&gt; (3), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leong_J/0/1/0/all/0/1&quot;&gt;Johnson Leong&lt;/a&gt; (4), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moreno_V/0/1/0/all/0/1&quot;&gt;Victor Moreno&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cabellos_A/0/1/0/all/0/1&quot;&gt;Albert Cabellos&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maino_F/0/1/0/all/0/1&quot;&gt;Fabio Maino&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hooda_S/0/1/0/all/0/1&quot;&gt;Sanjay Hooda&lt;/a&gt; (2) ((1) UPC-BarcelonaTech, Barcelona, Spain, (2) Cisco, San Jose, USA, (3) BMP LLP, (4) Uber Technologies Inc., San Francisco, USA)</dc:creator>
         1247 </item>
         1248 <item rdf:about="http://fr.arxiv.org/abs/2010.15237">
         1249 <title>Bandit Policies for Reliable Cellular Network Handovers in Extreme Mobility. (arXiv:2010.15237v1 [cs.LG])</title>
         1250 <link>http://fr.arxiv.org/abs/2010.15237</link>
         1251 <description rdf:parseType="Literal">&lt;p&gt;The demand for seamless Internet access under extreme user mobility, such as
         1252 on high-speed trains and vehicles, has become a norm rather than an exception.
         1253 However, the 4G/5G mobile network is not always reliable to meet this demand,
         1254 with non-negligible failures during the handover between base stations. A
         1255 fundamental challenge of reliability is to balance the exploration of more
         1256 measurements for satisfactory handover, and exploitation for timely handover
         1257 (before the fast-moving user leaves the serving base station&apos;s radio coverage).
         1258 This paper formulates this trade-off in extreme mobility as a composition of
         1259 two distinct multi-armed bandit problems. We propose Bandit and Threshold
         1260 Tuning (BATT) to minimize the regret of handover failures in extreme mobility.
         1261 BATT uses $\epsilon$-binary-search to optimize the threshold of the serving
         1262 cell&apos;s signal strength to initiate the handover procedure with
         1263 $\mathcal{O}(\log J \log T)$ regret.It further devises opportunistic Thompson
         1264 sampling, which optimizes the sequence of the target cells to measure for
         1265 reliable handover with $\mathcal{O}(\log T)$ regret.Our experiment over a real
         1266 LTE dataset from Chinese high-speed rails validates significant regret
         1267 reduction and a 29.1% handover failure reduction.
         1268 &lt;/p&gt;
         1269 </description>
         1270 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1&quot;&gt;Yuanjie Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Datta_E/0/1/0/all/0/1&quot;&gt;Esha Datta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ding_J/0/1/0/all/0/1&quot;&gt;Jiaxin Ding&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shroff_N/0/1/0/all/0/1&quot;&gt;Ness Shroff&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_X/0/1/0/all/0/1&quot;&gt;Xin Liu&lt;/a&gt;</dc:creator>
         1271 </item>
         1272 <item rdf:about="http://fr.arxiv.org/abs/2010.15239">
         1273 <title>Cloud-Based Dynamic Programming for an Electric City Bus Energy Management Considering Real-Time Passenger Load Prediction. (arXiv:2010.15239v1 [eess.SY])</title>
         1274 <link>http://fr.arxiv.org/abs/2010.15239</link>
         1275 <description rdf:parseType="Literal">&lt;p&gt;Electric city bus gains popularity in recent years for its low greenhouse gas
         1276 emission, low noise level, etc. Different from a passenger car, the weight of a
         1277 city bus varies significantly with different amounts of onboard passengers,
         1278 which is not well studied in existing literature. This study proposes a
         1279 passenger load prediction model using day-of-week, time-of-day, weather,
         1280 temperatures, wind levels, and holiday information as inputs. The average
         1281 model, Regression Tree, Gradient Boost Decision Tree, and Neural Networks
         1282 models are compared in the passenger load prediction. The Gradient Boost
         1283 Decision Tree model is selected due to its best accuracy and high stability.
         1284 Given the predicted passenger load, dynamic programming algorithm determines
         1285 the optimal power demand for supercapacitor and battery by optimizing the
         1286 battery aging and energy usage in the cloud. Then rule extraction is conducted
         1287 on dynamic programming results, and the rule is real-time loaded to onboard
         1288 controllers of vehicles. The proposed cloud-based dynamic programming and rule
         1289 extraction framework with the passenger load prediction shows 4% and 11% fewer
         1290 bus operating costs in off-peak and peak hours, respectively. The operating
         1291 cost by the proposed framework is less than 1% shy of the dynamic programming
         1292 with the true passenger load information.
         1293 &lt;/p&gt;
         1294 </description>
         1295 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1&quot;&gt;Junzhe Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Xu_B/0/1/0/all/0/1&quot;&gt;Bin Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhou_X/0/1/0/all/0/1&quot;&gt;Xingyu Zhou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hou_J/0/1/0/all/0/1&quot;&gt;Jun Hou&lt;/a&gt;</dc:creator>
         1296 </item>
         1297 <item rdf:about="http://fr.arxiv.org/abs/2010.15240">
         1298 <title>Test Set Optimization by Machine Learning Algorithms. (arXiv:2010.15240v1 [cs.LG])</title>
         1299 <link>http://fr.arxiv.org/abs/2010.15240</link>
         1300 <description rdf:parseType="Literal">&lt;p&gt;Diagnosis results are highly dependent on the volume of test set. To derive
         1301 the most efficient test set, we propose several machine learning based methods
         1302 to predict the minimum amount of test data that produces relatively accurate
         1303 diagnosis. By collecting outputs from failing circuits, the feature matrix and
         1304 label vector are generated, which involves the inference information of the
         1305 test termination point. Thus we develop a prediction model to fit the data and
         1306 determine when to terminate testing. The considered methods include LASSO and
         1307 Support Vector Machine(SVM) where the relationship between goals(label) and
         1308 predictors(feature matrix) are considered to be linear in LASSO and nonlinear
         1309 in SVM. Numerical results show that SVM reaches a diagnosis accuracy of 90.4%
         1310 while deducting the volume of test set by 35.24%.
         1311 &lt;/p&gt;
         1312 </description>
         1313 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fu_K/0/1/0/all/0/1&quot;&gt;Kaiming Fu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jin_Y/0/1/0/all/0/1&quot;&gt;Yulu Jin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Z/0/1/0/all/0/1&quot;&gt;Zhousheng Chen&lt;/a&gt;</dc:creator>
         1314 </item>
         1315 <item rdf:about="http://fr.arxiv.org/abs/2010.15245">
         1316 <title>A marine radioisotope gamma-ray spectrum analysis method based on Monte Carlo simulation and MLP neural network. (arXiv:2010.15245v1 [physics.ins-det])</title>
         1317 <link>http://fr.arxiv.org/abs/2010.15245</link>
         1318 <description rdf:parseType="Literal">&lt;p&gt;A multilayer perceptron (MLP) neural network is built to analyze the Cs-137
         1319 concentration in seawater via gamma-ray spectrums measured by a LaBr3 detector.
         1320 The MLP is trained and tested by a large data set generated by combining
         1321 measured and Monte Carlo simulated spectrums under the assumption that all the
         1322 measured spectrums have 0 Cs-137 concentration. And the performance of MLP is
         1323 evaluated and compared with the traditional net-peak area method. The results
         1324 show an improvement of 7% in accuracy and 0.036 in the ROC-curve area compared
         1325 to those of the net peak area method. And the influence of the assumption of
         1326 Cs-137 concentration in the training data set on the classifying performance of
         1327 MLP is evaluated.
         1328 &lt;/p&gt;
         1329 </description>
         1330 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Dai_W/0/1/0/all/0/1&quot;&gt;Wenhan Dai&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Zeng_Z/0/1/0/all/0/1&quot;&gt;Zhi Zeng&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Dou_D/0/1/0/all/0/1&quot;&gt;Daowei Dou&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Ma_H/0/1/0/all/0/1&quot;&gt;Hao Ma&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Chen_J/0/1/0/all/0/1&quot;&gt;Jianping Chen&lt;/a&gt; (1 and 2), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Li_J/0/1/0/all/0/1&quot;&gt;Junli Li&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Zhang_H/0/1/0/all/0/1&quot;&gt;Hui Zhang&lt;/a&gt; (1) ((1) Department of Engineering Physics, Tsinghua University, Beijing, China, (2) College of Nuclear Science and Technology, Beijing Normal University, Beijing, China)</dc:creator>
         1331 </item>
         1332 <item rdf:about="http://fr.arxiv.org/abs/2010.15250">
         1333 <title>Semantic video segmentation for autonomous driving. (arXiv:2010.15250v1 [cs.CV])</title>
         1334 <link>http://fr.arxiv.org/abs/2010.15250</link>
         1335 <description rdf:parseType="Literal">&lt;p&gt;We aim to solve semantic video segmentation in autonomous driving, namely
         1336 road detection in real time video, using techniques discussed in (Shelhamer et
         1337 al., 2016a). While fully convolutional network gives good result, we show that
         1338 the speed can be halved while preserving the accuracy. The test dataset being
         1339 used is KITTI, which consists of real footage from Germany&apos;s streets.
         1340 &lt;/p&gt;
         1341 </description>
         1342 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chau_M/0/1/0/all/0/1&quot;&gt;Minh Triet Chau&lt;/a&gt;</dc:creator>
         1343 </item>
         1344 <item rdf:about="http://fr.arxiv.org/abs/2010.15251">
         1345 <title>Fusion Models for Improved Visual Captioning. (arXiv:2010.15251v1 [cs.CV])</title>
         1346 <link>http://fr.arxiv.org/abs/2010.15251</link>
         1347 <description rdf:parseType="Literal">&lt;p&gt;Visual captioning aims to generate textual descriptions given images.
         1348 Traditionally, the captioning models are trained on human annotated datasets
         1349 such as Flickr30k and MS-COCO, which are limited in size and diversity. This
         1350 limitation hinders the generalization capabilities of these models while also
         1351 rendering them to often make mistakes. Language models can, however, be trained
         1352 on vast amounts of freely available unlabelled data and have recently emerged
         1353 as successful language encoders and coherent text generators. Meanwhile,
         1354 several unimodal and multimodal fusion techniques have been proven to work well
         1355 for natural language generation and automatic speech recognition. Building on
         1356 these recent developments, and with an aim of improving the quality of
         1357 generated captions, the contribution of our work in this paper is two-fold:
         1358 First, we propose a generic multimodal model fusion framework for caption
         1359 generation as well as emendation where we utilize different fusion strategies
         1360 to integrate a pretrained Auxiliary Language Model (AuxLM) within the
         1361 traditional encoder-decoder visual captioning frameworks. Next, we employ the
         1362 same fusion strategies to integrate a pretrained Masked Language Model (MLM),
         1363 namely BERT, with a visual captioning model, viz. Show, Attend, and Tell, for
         1364 emending both syntactic and semantic errors in captions. Our caption emendation
         1365 experiments on three benchmark image captioning datasets, viz. Flickr8k,
         1366 Flickr30k, and MSCOCO, show improvements over the baseline, indicating the
         1367 usefulness of our proposed multimodal fusion strategies. Further, we perform a
         1368 preliminary qualitative analysis on the emended captions and identify error
         1369 categories based on the type of corrections.
         1370 &lt;/p&gt;
         1371 </description>
         1372 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kalimuthu_M/0/1/0/all/0/1&quot;&gt;Marimuthu Kalimuthu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mogadala_A/0/1/0/all/0/1&quot;&gt;Aditya Mogadala&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mosbach_M/0/1/0/all/0/1&quot;&gt;Marius Mosbach&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Klakow_D/0/1/0/all/0/1&quot;&gt;Dietrich Klakow&lt;/a&gt;</dc:creator>
         1373 </item>
         1374 <item rdf:about="http://fr.arxiv.org/abs/2010.15255">
         1375 <title>Model Minimization For Online Predictability. (arXiv:2010.15255v1 [cs.AI])</title>
         1376 <link>http://fr.arxiv.org/abs/2010.15255</link>
         1377 <description rdf:parseType="Literal">&lt;p&gt;For humans in a teaming scenario, context switching between reasoning about a
         1378 teammate&apos;s behavior and thinking about thier own task can slow us down,
         1379 especially if the cognitive cost of predicting the teammate&apos;s actions is high.
         1380 So if we can make the prediction of a robot-teammate&apos;s actions quicker, then
         1381 the human can be more productive. In this paper we present an approach to
         1382 constrain the actions of a robot so as to increase predictability (specifically
         1383 online predictability) while keeping the plan costs of the robot within
         1384 acceptable limits. Existing works on human-robot interaction do not consider
         1385 the computational cost for predictability, which we consider in our approach.
         1386 We approach this problem from the perspective of directed graph minimization,
         1387 and we connect the concept of predictability to the out-degree of vertices. We
         1388 present an algorithm to minimize graphs for predictability, and contrast this
         1389 with minimization for legibility (goal inference) and optimality.
         1390 &lt;/p&gt;
         1391 </description>
         1392 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gopalakrishnan_S/0/1/0/all/0/1&quot;&gt;Sriram Gopalakrishnan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kambhampati_S/0/1/0/all/0/1&quot;&gt;Subbarao Kambhampati&lt;/a&gt;</dc:creator>
         1393 </item>
         1394 <item rdf:about="http://fr.arxiv.org/abs/2010.15258">
         1395 <title>DNSMOS: A Non-Intrusive Perceptual Objective Speech Quality metric to evaluate Noise Suppressors. (arXiv:2010.15258v1 [cs.SD])</title>
         1396 <link>http://fr.arxiv.org/abs/2010.15258</link>
         1397 <description rdf:parseType="Literal">&lt;p&gt;Human subjective evaluation is the gold standard to evaluate speech quality
         1398 optimized for human perception. Perceptual objective metrics serve as a proxy
         1399 for subjective scores. The conventional and widely used metrics require a
         1400 reference clean speech signal, which is unavailable in real recordings. The
         1401 no-reference approaches correlate poorly with human ratings and are not widely
         1402 adopted in the research community. One of the biggest use cases of these
         1403 perceptual objective metrics is to evaluate noise suppression algorithms. This
         1404 paper introduces a multi-stage self-teaching based perceptual objective metric
         1405 that is designed to evaluate noise suppressors. The proposed method generalizes
         1406 well in challenging test conditions with a high correlation to human ratings.
         1407 &lt;/p&gt;
         1408 </description>
         1409 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Reddy_C/0/1/0/all/0/1&quot;&gt;Chandan K A Reddy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gopal_V/0/1/0/all/0/1&quot;&gt;Vishak Gopal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cutler_R/0/1/0/all/0/1&quot;&gt;Ross Cutler&lt;/a&gt;</dc:creator>
         1410 </item>
         1411 <item rdf:about="http://fr.arxiv.org/abs/2010.15260">
         1412 <title>Object sieving and morphological closing to reduce false detections in wide-area aerial imagery. (arXiv:2010.15260v1 [cs.CV])</title>
         1413 <link>http://fr.arxiv.org/abs/2010.15260</link>
         1414 <description rdf:parseType="Literal">&lt;p&gt;For object detection in wide-area aerial imagery, post-processing is usually
         1415 needed to reduce false detections. We propose a two-stage post-processing
         1416 scheme which comprises an area-thresholding sieving process and a morphological
         1417 closing operation. We use two wide-area aerial videos to compare the
         1418 performance of five object detection algorithms in the absence and in the
         1419 presence of our post-processing scheme. The automatic detection results are
         1420 compared with the ground-truth objects. Several metrics are used for
         1421 performance comparison.
         1422 &lt;/p&gt;
         1423 </description>
         1424 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gao_X/0/1/0/all/0/1&quot;&gt;Xin Gao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ram_S/0/1/0/all/0/1&quot;&gt;Sundaresh Ram&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rodriguez_J/0/1/0/all/0/1&quot;&gt;Jeffrey J. Rodriguez&lt;/a&gt;</dc:creator>
         1425 </item>
         1426 <item rdf:about="http://fr.arxiv.org/abs/2010.15261">
         1427 <title>Deep Shells: Unsupervised Shape Correspondence with Optimal Transport. (arXiv:2010.15261v1 [cs.CV])</title>
         1428 <link>http://fr.arxiv.org/abs/2010.15261</link>
         1429 <description rdf:parseType="Literal">&lt;p&gt;We propose a novel unsupervised learning approach to 3D shape correspondence
         1430 that builds a multiscale matching pipeline into a deep neural network. This
         1431 approach is based on smooth shells, the current state-of-the-art axiomatic
         1432 correspondence method, which requires an a priori stochastic search over the
         1433 space of initial poses. Our goal is to replace this costly preprocessing step
         1434 by directly learning good initializations from the input surfaces. To that end,
         1435 we systematically derive a fully differentiable, hierarchical matching pipeline
         1436 from entropy regularized optimal transport. This allows us to combine it with a
         1437 local feature extractor based on smooth, truncated spectral convolution
         1438 filters. Finally, we show that the proposed unsupervised method significantly
         1439 improves over the state-of-the-art on multiple datasets, even in comparison to
         1440 the most recent supervised methods. Moreover, we demonstrate compelling
         1441 generalization results by applying our learned filters to examples that
         1442 significantly deviate from the training set.
         1443 &lt;/p&gt;
         1444 </description>
         1445 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Eisenberger_M/0/1/0/all/0/1&quot;&gt;Marvin Eisenberger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Toker_A/0/1/0/all/0/1&quot;&gt;Aysim Toker&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leal_Taixe_L/0/1/0/all/0/1&quot;&gt;Laura Leal-Taix&amp;#xe9;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cremers_D/0/1/0/all/0/1&quot;&gt;Daniel Cremers&lt;/a&gt;</dc:creator>
         1446 </item>
         1447 <item rdf:about="http://fr.arxiv.org/abs/2010.15266">
         1448 <title>CopyNext: Explicit Span Copying and Alignment in Sequence to Sequence Models. (arXiv:2010.15266v1 [cs.CL])</title>
         1449 <link>http://fr.arxiv.org/abs/2010.15266</link>
         1450 <description rdf:parseType="Literal">&lt;p&gt;Copy mechanisms are employed in sequence to sequence models (seq2seq) to
         1451 generate reproductions of words from the input to the output. These frameworks,
         1452 operating at the lexical type level, fail to provide an explicit alignment that
         1453 records where each token was copied from. Further, they require contiguous
         1454 token sequences from the input (spans) to be copied individually. We present a
         1455 model with an explicit token-level copy operation and extend it to copying
         1456 entire spans. Our model provides hard alignments between spans in the input and
         1457 output, allowing for nontraditional applications of seq2seq, like information
         1458 extraction. We demonstrate the approach on Nested Named Entity Recognition,
         1459 achieving near state-of-the-art accuracy with an order of magnitude increase in
         1460 decoding speed.
         1461 &lt;/p&gt;
         1462 </description>
         1463 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_A/0/1/0/all/0/1&quot;&gt;Abhinav Singh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xia_P/0/1/0/all/0/1&quot;&gt;Patrick Xia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qin_G/0/1/0/all/0/1&quot;&gt;Guanghui Qin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yarmohammadi_M/0/1/0/all/0/1&quot;&gt;Mahsa Yarmohammadi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Durme_B/0/1/0/all/0/1&quot;&gt;Benjamin Van Durme&lt;/a&gt;</dc:creator>
         1464 </item>
         1465 <item rdf:about="http://fr.arxiv.org/abs/2010.15268">
         1466 <title>Understanding the Pathologies of Approximate Policy Evaluation when Combined with Greedification in Reinforcement Learning. (arXiv:2010.15268v1 [cs.LG])</title>
         1467 <link>http://fr.arxiv.org/abs/2010.15268</link>
         1468 <description rdf:parseType="Literal">&lt;p&gt;Despite empirical success, the theory of reinforcement learning (RL) with
         1469 value function approximation remains fundamentally incomplete. Prior work has
         1470 identified a variety of pathological behaviours that arise in RL algorithms
         1471 that combine approximate on-policy evaluation and greedification. One prominent
         1472 example is policy oscillation, wherein an algorithm may cycle indefinitely
         1473 between policies, rather than converging to a fixed point. What is not well
         1474 understood however is the quality of the policies in the region of oscillation.
         1475 In this paper we present simple examples illustrating that in addition to
         1476 policy oscillation and multiple fixed points -- the same basic issue can lead
         1477 to convergence to the worst possible policy for a given approximation. Such
         1478 behaviours can arise when algorithms optimize evaluation accuracy weighted by
         1479 the distribution of states that occur under the current policy, but greedify
         1480 based on the value of states which are rare or nonexistent under this
         1481 distribution. This means the values used for greedification are unreliable and
         1482 can steer the policy in undesirable directions. Our observation that this can
         1483 lead to the worst possible policy shows that in a general sense such algorithms
         1484 are unreliable. The existence of such examples helps to narrow the kind of
         1485 theoretical guarantees that are possible and the kind of algorithmic ideas that
         1486 are likely to be helpful. We demonstrate analytically and experimentally that
         1487 such pathological behaviours can impact a wide range of RL and dynamic
         1488 programming algorithms; such behaviours can arise both with and without
         1489 bootstrapping, and with linear function approximation as well as with more
         1490 complex parameterized functions like neural networks.
         1491 &lt;/p&gt;
         1492 </description>
         1493 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Young_K/0/1/0/all/0/1&quot;&gt;Kenny Young&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sutton_R/0/1/0/all/0/1&quot;&gt;Richard S. Sutton&lt;/a&gt;</dc:creator>
         1494 </item>
         1495 <item rdf:about="http://fr.arxiv.org/abs/2010.15269">
         1496 <title>GloFlow: Global Image Alignment for Creation of Whole Slide Images for Pathology from Video. (arXiv:2010.15269v1 [eess.IV])</title>
         1497 <link>http://fr.arxiv.org/abs/2010.15269</link>
         1498 <description rdf:parseType="Literal">&lt;p&gt;The application of deep learning to pathology assumes the existence of
         1499 digital whole slide images of pathology slides. However, slide digitization is
         1500 bottlenecked by the high cost of precise motor stages in slide scanners that
         1501 are needed for position information used for slide stitching. We propose
         1502 GloFlow, a two-stage method for creating a whole slide image using optical
         1503 flow-based image registration with global alignment using a computationally
         1504 tractable graph-pruning approach. In the first stage, we train an optical flow
         1505 predictor to predict pairwise translations between successive video frames to
         1506 approximate a stitch. In the second stage, this approximate stitch is used to
         1507 create a neighborhood graph to produce a corrected stitch. On a simulated
         1508 dataset of video scans of WSIs, we find that our method outperforms known
         1509 approaches to slide-stitching, and stitches WSIs resembling those produced by
         1510 slide scanners.
         1511 &lt;/p&gt;
         1512 </description>
         1513 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Krishna_V/0/1/0/all/0/1&quot;&gt;Viswesh Krishna&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Joshi_A/0/1/0/all/0/1&quot;&gt;Anirudh Joshi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Bulterys_P/0/1/0/all/0/1&quot;&gt;Philip L. Bulterys&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Yang_E/0/1/0/all/0/1&quot;&gt;Eric Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ng_A/0/1/0/all/0/1&quot;&gt;Andrew Y. Ng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Rajpurkar_P/0/1/0/all/0/1&quot;&gt;Pranav Rajpurkar&lt;/a&gt;</dc:creator>
         1514 </item>
         1515 <item rdf:about="http://fr.arxiv.org/abs/2010.15271">
         1516 <title>A globally convergent modified Newton method for the direct minimization of the Ohta-Kawasaki energy with application to the directed self-assembly of diblock copolymers. (arXiv:2010.15271v1 [physics.comp-ph])</title>
         1517 <link>http://fr.arxiv.org/abs/2010.15271</link>
         1518 <description rdf:parseType="Literal">&lt;p&gt;We propose a fast and robust scheme for the direct minimization of the
         1519 Ohta-Kawasaki energy that characterizes the microphase separation of diblock
         1520 copolymer melts. The scheme employs a globally convergent modified Newton
         1521 method with line search which is shown to be mass-conservative,
         1522 energy-descending, asymptotically quadratically convergent, and three orders of
         1523 magnitude more efficient than the commonly-used gradient flow approach. The
         1524 regularity and the first-order condition of minimizers are analyzed. A
         1525 numerical study of the chemical substrate guided directed self-assembly of
         1526 diblock copolymer melts, based on a novel polymer-substrate interaction model
         1527 and the proposed scheme, is provided.
         1528 &lt;/p&gt;
         1529 </description>
         1530 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Cao_L/0/1/0/all/0/1&quot;&gt;Lianghao Cao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Ghattas_O/0/1/0/all/0/1&quot;&gt;Omar Ghattas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Oden_J/0/1/0/all/0/1&quot;&gt;J. Tinsley Oden&lt;/a&gt;</dc:creator>
         1531 </item>
         1532 <item rdf:about="http://fr.arxiv.org/abs/2010.15272">
         1533 <title>The distribution of inhibitory neurons in the C. elegans connectome facilitates self-optimization of coordinated neural activity. (arXiv:2010.15272v1 [q-bio.NC])</title>
         1534 <link>http://fr.arxiv.org/abs/2010.15272</link>
         1535 <description rdf:parseType="Literal">&lt;p&gt;The nervous system of the nematode soil worm Caenorhabditis elegans exhibits
         1536 remarkable complexity despite the worm&apos;s small size. A general challenge is to
         1537 better understand the relationship between neural organization and neural
         1538 activity at the system level, including the functional roles of inhibitory
         1539 connections. Here we implemented an abstract simulation model of the C. elegans
         1540 connectome that approximates the neurotransmitter identity of each neuron, and
         1541 we explored the functional role of these physiological differences for neural
         1542 activity. In particular, we created a Hopfield neural network in which all of
         1543 the worm&apos;s neurons characterized by inhibitory neurotransmitters are assigned
         1544 inhibitory outgoing connections. Then, we created a control condition in which
         1545 the same number of inhibitory connections are arbitrarily distributed across
         1546 the network. A comparison of these two conditions revealed that the biological
         1547 distribution of inhibitory connections facilitates the self-optimization of
         1548 coordinated neural activity compared with an arbitrary distribution of
         1549 inhibitory connections.
         1550 &lt;/p&gt;
         1551 </description>
         1552 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Morales_A/0/1/0/all/0/1&quot;&gt;Alejandro Morales&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Froese_T/0/1/0/all/0/1&quot;&gt;Tom Froese&lt;/a&gt;</dc:creator>
         1553 </item>
         1554 <item rdf:about="http://fr.arxiv.org/abs/2010.15274">
         1555 <title>Representation learning for improved interpretability and classification accuracy of clinical factors from EEG. (arXiv:2010.15274v1 [cs.LG])</title>
         1556 <link>http://fr.arxiv.org/abs/2010.15274</link>
         1557 <description rdf:parseType="Literal">&lt;p&gt;Despite extensive standardization, diagnostic interviews for mental health
         1558 disorders encompass substantial subjective judgment. Previous studies have
         1559 demonstrated that EEG-based neural measures can function as reliable objective
         1560 correlates of depression, or even predictors of depression and its course.
         1561 However, their clinical utility has not been fully realized because of 1) the
         1562 lack of automated ways to deal with the inherent noise associated with EEG data
         1563 at scale, and 2) the lack of knowledge of which aspects of the EEG signal may
         1564 be markers of a clinical disorder. Here we adapt an unsupervised pipeline from
         1565 the recent deep representation learning literature to address these problems by
         1566 1) learning a disentangled representation using $\beta$-VAE to denoise the
         1567 signal, and 2) extracting interpretable features associated with a sparse set
         1568 of clinical labels using a Symbol-Concept Association Network (SCAN). We
         1569 demonstrate that our method is able to outperform the canonical hand-engineered
         1570 baseline classification method on a number of factors, including participant
         1571 age and depression diagnosis. Furthermore, our method recovers a representation
         1572 that can be used to automatically extract denoised Event Related Potentials
         1573 (ERPs) from novel, single EEG trajectories, and supports fast supervised
         1574 re-mapping to various clinical labels, allowing clinicians to re-use a single
         1575 EEG representation regardless of updates to the standardized diagnostic system.
         1576 Finally, single factors of the learned disentangled representations often
         1577 correspond to meaningful markers of clinical factors, as automatically detected
         1578 by SCAN, allowing for human interpretability and post-hoc expert analysis of
         1579 the recommendations made by the model.
         1580 &lt;/p&gt;
         1581 </description>
         1582 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Honke_G/0/1/0/all/0/1&quot;&gt;Garrett Honke&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Higgins_I/0/1/0/all/0/1&quot;&gt;Irina Higgins&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Thigpen_N/0/1/0/all/0/1&quot;&gt;Nina Thigpen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Miskovic_V/0/1/0/all/0/1&quot;&gt;Vladimir Miskovic&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Link_K/0/1/0/all/0/1&quot;&gt;Katie Link&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gupta_P/0/1/0/all/0/1&quot;&gt;Pramod Gupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Klawohn_J/0/1/0/all/0/1&quot;&gt;Julia Klawohn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hajcak_G/0/1/0/all/0/1&quot;&gt;Greg Hajcak&lt;/a&gt;</dc:creator>
         1583 </item>
         1584 <item rdf:about="http://fr.arxiv.org/abs/2010.15275">
         1585 <title>A direct method for solving inverse Sturm-Liouville problems. (arXiv:2010.15275v1 [math.NA])</title>
         1586 <link>http://fr.arxiv.org/abs/2010.15275</link>
         1587 <description rdf:parseType="Literal">&lt;p&gt;We consider two main inverse Sturm-Liouville problems: the problem of
         1588 recovery of the potential and the boundary conditions from two spectra or from
         1589 a spectral density function. A simple method for practical solution of such
         1590 problems is developed, based on the transmutation operator approach, new
         1591 Neumann series of Bessel functions representations for solutions and the
         1592 Gelfand-Levitan equation. The method allows one to reduce the inverse
         1593 Sturm-Liouville problem directly to a system of linear algebraic equations,
         1594 such that the potential is recovered from the first element of the solution
         1595 vector. We prove the stability of the method and show its numerical efficiency
         1596 with several numerical examples.
         1597 &lt;/p&gt;
         1598 </description>
         1599 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Kravchenko_V/0/1/0/all/0/1&quot;&gt;Vladislav V. Kravchenko&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Torba_S/0/1/0/all/0/1&quot;&gt;Sergii M. Torba&lt;/a&gt;</dc:creator>
         1600 </item>
         1601 <item rdf:about="http://fr.arxiv.org/abs/2010.15277">
         1602 <title>Class-incremental learning: survey and performance evaluation. (arXiv:2010.15277v1 [cs.LG])</title>
         1603 <link>http://fr.arxiv.org/abs/2010.15277</link>
         1604 <description rdf:parseType="Literal">&lt;p&gt;For future learning systems incremental learning is desirable, because it
         1605 allows for: efficient resource usage by eliminating the need to retrain from
         1606 scratch at the arrival of new data; reduced memory usage by preventing or
         1607 limiting the amount of data required to be stored -- also important when
         1608 privacy limitations are imposed; and learning that more closely resembles human
         1609 learning. The main challenge for incremental learning is catastrophic
         1610 forgetting, which refers to the precipitous drop in performance on previously
         1611 learned tasks after learning a new one. Incremental learning of deep neural
         1612 networks has seen explosive growth in recent years. Initial work focused on
         1613 task incremental learning, where a task-ID is provided at inference time.
         1614 Recently we have seen a shift towards class-incremental learning where the
         1615 learner must classify at inference time between all classes seen in previous
         1616 tasks without recourse to a task-ID. In this paper, we provide a complete
         1617 survey of existing methods for incremental learning, and in particular we
         1618 perform an extensive experimental evaluation on twelve class-incremental
         1619 methods. We consider several new experimental scenarios, including a comparison
         1620 of class-incremental methods on multiple large-scale datasets, investigation
         1621 into small and large domain shifts, and comparison on various network
         1622 architectures.
         1623 &lt;/p&gt;
         1624 </description>
         1625 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Masana_M/0/1/0/all/0/1&quot;&gt;Marc Masana&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_X/0/1/0/all/0/1&quot;&gt;Xialei Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Twardowski_B/0/1/0/all/0/1&quot;&gt;Bartlomiej Twardowski&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Menta_M/0/1/0/all/0/1&quot;&gt;Mikel Menta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bagdanov_A/0/1/0/all/0/1&quot;&gt;Andrew D. Bagdanov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Weijer_J/0/1/0/all/0/1&quot;&gt;Joost van de Weijer&lt;/a&gt;</dc:creator>
         1626 </item>
         1627 <item rdf:about="http://fr.arxiv.org/abs/2010.15280">
         1628 <title>Specification description and verification of multitask hybrid systems in the OTS/CafeOBJ method. (arXiv:2010.15280v1 [cs.SE])</title>
         1629 <link>http://fr.arxiv.org/abs/2010.15280</link>
         1630 <description rdf:parseType="Literal">&lt;p&gt;To develop IoT and/or CSP systems, we need consider both continuous data from
         1631 physical world and discrete data in computer systems. Such a system is called a
         1632 hybrid system. Because of density of continuous data, it is not easy to do
         1633 software testing to ensure reliability of hybrid systems. Moreover, the size of
         1634 the state space increases exponentially for multitask systems. Formal
         1635 descriptions of hybrid systems may help us to verify desired properties of a
         1636 given system formally with computer supports. In this paper, we propose a way
         1637 to describe a formal specification of a given multitask hybrid system as an
         1638 observational transition system in CafeOBJ algebraic specification language and
         1639 verify it by the proof score method based on equational reasoning implemented
         1640 in CafeOBJ interpreter.
         1641 &lt;/p&gt;
         1642 </description>
         1643 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nakamura_M/0/1/0/all/0/1&quot;&gt;Masaki Nakamura&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sakakibara_K/0/1/0/all/0/1&quot;&gt;Kazutoshi Sakakibara&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ogata_K/0/1/0/all/0/1&quot;&gt;Kazuhiro Ogata&lt;/a&gt;</dc:creator>
         1644 </item>
         1645 <item rdf:about="http://fr.arxiv.org/abs/2010.15283">
         1646 <title>GENs: Generative Encoding Networks. (arXiv:2010.15283v1 [cs.LG])</title>
         1647 <link>http://fr.arxiv.org/abs/2010.15283</link>
         1648 <description rdf:parseType="Literal">&lt;p&gt;Mapping data from and/or onto a known family of distributions has become an
         1649 important topic in machine learning and data analysis. Deep generative models
         1650 (e.g., generative adversarial networks ) have been used effectively to match
         1651 known and unknown distributions. Nonetheless, when the form of the target
         1652 distribution is known, analytical methods are advantageous in providing robust
         1653 results with provable properties. In this paper, we propose and analyze the use
         1654 of nonparametric density methods to estimate the Jensen-Shannon divergence for
         1655 matching unknown data distributions to known target distributions, such
         1656 Gaussian or mixtures of Gaussians, in latent spaces. This analytical method has
         1657 several advantages: better behavior when training sample quantity is low,
         1658 provable convergence properties, and relatively few parameters, which can be
         1659 derived analytically. Using the proposed method, we enforce the latent
         1660 representation of an autoencoder to match a target distribution in a learning
         1661 framework that we call a {\em generative encoding network}. Here, we present
         1662 the numerical methods; derive the expected distribution of the data in the
         1663 latent space; evaluate the properties of the latent space, sample
         1664 reconstruction, and generated samples; show the advantages over the adversarial
         1665 counterpart; and demonstrate the application of the method in real world.
         1666 &lt;/p&gt;
         1667 </description>
         1668 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Saha_S/0/1/0/all/0/1&quot;&gt;Surojit Saha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Elhabian_S/0/1/0/all/0/1&quot;&gt;Shireen Elhabian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Whitaker_R/0/1/0/all/0/1&quot;&gt;Ross T. Whitaker&lt;/a&gt;</dc:creator>
         1669 </item>
         1670 <item rdf:about="http://fr.arxiv.org/abs/2010.15288">
         1671 <title>Speech-Image Semantic Alignment Does Not Depend on Any Prior Classification Tasks. (arXiv:2010.15288v1 [cs.LG])</title>
         1672 <link>http://fr.arxiv.org/abs/2010.15288</link>
         1673 <description rdf:parseType="Literal">&lt;p&gt;Semantically-aligned $(speech, image)$ datasets can be used to explore
         1674 &quot;visually-grounded speech&quot;. In a majority of existing investigations, features
         1675 of an image signal are extracted using neural networks &quot;pre-trained&quot; on other
         1676 tasks (e.g., classification on ImageNet). In still others, pre-trained networks
         1677 are used to extract audio features prior to semantic embedding. Without
         1678 &quot;transfer learning&quot; through pre-trained initialization or pre-trained feature
         1679 extraction, previous results have tended to show low rates of recall in $speech
         1680 \rightarrow image$ and $image \rightarrow speech$ queries.
         1681 &lt;/p&gt;
         1682 &lt;p&gt;Choosing appropriate neural architectures for encoders in the speech and
         1683 image branches and using large datasets, one can obtain competitive recall
         1684 rates without any reliance on any pre-trained initialization or feature
         1685 extraction: $(speech,image)$ semantic alignment and $speech \rightarrow image$
         1686 and $image \rightarrow speech$ retrieval are canonical tasks worthy of
         1687 independent investigation of their own and allow one to explore other
         1688 questions---e.g., the size of the audio embedder can be reduced significantly
         1689 with little loss of recall rates in $speech \rightarrow image$ and $image
         1690 \rightarrow speech$ queries.
         1691 &lt;/p&gt;
         1692 </description>
         1693 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mortazavi_M/0/1/0/all/0/1&quot;&gt;Masood S. Mortazavi&lt;/a&gt;</dc:creator>
         1694 </item>
         1695 <item rdf:about="http://fr.arxiv.org/abs/2010.15289">
         1696 <title>Link inference of noisy delay-coupled networks: Machine learning and opto-electronic experimental tests. (arXiv:2010.15289v1 [nlin.AO])</title>
         1697 <link>http://fr.arxiv.org/abs/2010.15289</link>
         1698 <description rdf:parseType="Literal">&lt;p&gt;We devise a machine learning technique to solve the general problem of
         1699 inferring network links that have time-delays. The goal is to do this purely
         1700 from time-series data of the network nodal states. This task has applications
         1701 in fields ranging from applied physics and engineering to neuroscience and
         1702 biology. To achieve this, we first train a type of machine learning system
         1703 known as reservoir computing to mimic the dynamics of the unknown network. We
         1704 formulate and test a technique that uses the trained parameters of the
         1705 reservoir system output layer to deduce an estimate of the unknown network
         1706 structure. Our technique, by its nature, is non-invasive, but is motivated by
         1707 the widely-used invasive network inference method whereby the responses to
         1708 active perturbations applied to the network are observed and employed to infer
         1709 network links (e.g., knocking down genes to infer gene regulatory networks). We
         1710 test this technique on experimental and simulated data from delay-coupled
         1711 opto-electronic oscillator networks. We show that the technique often yields
         1712 very good results particularly if the system does not exhibit synchrony. We
         1713 also find that the presence of dynamical noise can strikingly enhance the
         1714 accuracy and ability of our technique, especially in networks that exhibit
         1715 synchrony.
         1716 &lt;/p&gt;
         1717 </description>
         1718 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/nlin/1/au:+Banerjee_A/0/1/0/all/0/1&quot;&gt;Amitava Banerjee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/nlin/1/au:+Hart_J/0/1/0/all/0/1&quot;&gt;Joseph D. Hart&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/nlin/1/au:+Roy_R/0/1/0/all/0/1&quot;&gt;Rajarshi Roy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/nlin/1/au:+Ott_E/0/1/0/all/0/1&quot;&gt;Edward Ott&lt;/a&gt;</dc:creator>
         1719 </item>
         1720 <item rdf:about="http://fr.arxiv.org/abs/2010.15296">
         1721 <title>Fact or Factitious? Contextualized Opinion Spam Detection. (arXiv:2010.15296v1 [cs.AI])</title>
         1722 <link>http://fr.arxiv.org/abs/2010.15296</link>
         1723 <description rdf:parseType="Literal">&lt;p&gt;In this paper we perform an analytic comparison of a number of techniques
         1724 used to detect fake and deceptive online reviews. We apply a number machine
         1725 learning approaches found to be effective, and introduce our own approach by
         1726 fine-tuning state of the art contextualised embeddings. The results we obtain
         1727 show the potential of contextualised embeddings for fake review detection, and
         1728 lay the groundwork for future research in this area.
         1729 &lt;/p&gt;
         1730 </description>
         1731 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kennedy_S/0/1/0/all/0/1&quot;&gt;Stefan Kennedy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Walsh_N/0/1/0/all/0/1&quot;&gt;Niall Walsh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sloka_K/0/1/0/all/0/1&quot;&gt;Kirils Sloka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Foster_J/0/1/0/all/0/1&quot;&gt;Jennifer Foster&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+McCarren_A/0/1/0/all/0/1&quot;&gt;Andrew McCarren&lt;/a&gt;</dc:creator>
         1732 </item>
         1733 <item rdf:about="http://fr.arxiv.org/abs/2010.15297">
         1734 <title>Analysis of Chorin-Type Projection Methods for the Stochastic Stokes Equations with General Multiplicative Noises. (arXiv:2010.15297v1 [math.NA])</title>
         1735 <link>http://fr.arxiv.org/abs/2010.15297</link>
         1736 <description rdf:parseType="Literal">&lt;p&gt;This paper is concerned with numerical analysis of two fully discrete
         1737 Chorin-type projection methods for the stochastic Stokes equations with general
         1738 non-solenoidal multiplicative noise. The first scheme is the standard Chorin
         1739 scheme and the second one is a modified Chorin scheme which is designed by
         1740 employing the Helmholtz decomposition on the noise function at each time step
         1741 to produce a projected divergence-free noise and a &quot;pseudo pressure&quot; after
         1742 combining the original pressure and the curl-free part of the decomposition.
         1743 Optimal order rates of the convergence are proved for both velocity and
         1744 pressure approximations of these two (semi-discrete) Chorin schemes. It is
         1745 crucial to measure the errors in appropriate norms. The fully discrete finite
         1746 element methods are formulated by discretizing both semi-discrete Chorin
         1747 schemes in space by the standard finite element method. Suboptimal order error
         1748 estimates are derived for both fully discrete methods. It is proved that all
         1749 spatial error constants contain a growth factor $k^{-1/2}$, where $k$ denotes
         1750 the time step size, which explains the deteriorating performance of the
         1751 standard Chorin scheme when $k\to 0$ and the space mesh size is fixed as
         1752 observed earlier in the numerical tests of [9]. Numerical results are also
         1753 provided to guage the performance of the proposed numerical methods and to
         1754 validate the sharpness of the theoretical error estimates.
         1755 &lt;/p&gt;
         1756 </description>
         1757 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Feng_X/0/1/0/all/0/1&quot;&gt;Xiaobing Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Vo_L/0/1/0/all/0/1&quot;&gt;Liet Vo&lt;/a&gt;</dc:creator>
         1758 </item>
         1759 <item rdf:about="http://fr.arxiv.org/abs/2010.15300">
         1760 <title>Uncovering Latent Biases in Text: Method and Application to Peer Review. (arXiv:2010.15300v1 [cs.CL])</title>
         1761 <link>http://fr.arxiv.org/abs/2010.15300</link>
         1762 <description rdf:parseType="Literal">&lt;p&gt;Quantifying systematic disparities in numerical quantities such as employment
         1763 rates and wages between population subgroups provides compelling evidence for
         1764 the existence of societal biases. However, biases in the text written for
         1765 members of different subgroups (such as in recommendation letters for male and
         1766 non-male candidates), though widely reported anecdotally, remain challenging to
         1767 quantify. In this work, we introduce a novel framework to quantify bias in text
         1768 caused by the visibility of subgroup membership indicators. We develop a
         1769 nonparametric estimation and inference procedure to estimate this bias. We then
         1770 formalize an identification strategy to causally link the estimated bias to the
         1771 visibility of subgroup membership indicators, provided observations from time
         1772 periods both before and after an identity-hiding policy change. We identify an
         1773 application wherein &quot;ground truth&quot; bias can be inferred to evaluate our
         1774 framework, instead of relying on synthetic or secondary data. Specifically, we
         1775 apply our framework to quantify biases in the text of peer reviews from a
         1776 reputed machine learning conference before and after the conference adopted a
         1777 double-blind reviewing policy. We show evidence of biases in the review ratings
         1778 that serves as &quot;ground truth&quot;, and show that our proposed framework accurately
         1779 detects these biases from the review text without having access to the review
         1780 ratings.
         1781 &lt;/p&gt;
         1782 </description>
         1783 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Manzoor_E/0/1/0/all/0/1&quot;&gt;Emaad Manzoor&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shah_N/0/1/0/all/0/1&quot;&gt;Nihar B. Shah&lt;/a&gt;</dc:creator>
         1784 </item>
         1785 <item rdf:about="http://fr.arxiv.org/abs/2010.15302">
         1786 <title>Point Cloud Attribute Compression via Successive Subspace Graph Transform. (arXiv:2010.15302v1 [cs.CV])</title>
         1787 <link>http://fr.arxiv.org/abs/2010.15302</link>
         1788 <description rdf:parseType="Literal">&lt;p&gt;Inspired by the recently proposed successive subspace learning (SSL)
         1789 principles, we develop a successive subspace graph transform (SSGT) to address
         1790 point cloud attribute compression in this work. The octree geometry structure
         1791 is utilized to partition the point cloud, where every node of the octree
         1792 represents a point cloud subspace with a certain spatial size. We design a
         1793 weighted graph with self-loop to describe the subspace and define a graph
         1794 Fourier transform based on the normalized graph Laplacian. The transforms are
         1795 applied to large point clouds from the leaf nodes to the root node of the
         1796 octree recursively, while the represented subspace is expanded from the
         1797 smallest one to the whole point cloud successively. It is shown by experimental
         1798 results that the proposed SSGT method offers better R-D performances than the
         1799 previous Region Adaptive Haar Transform (RAHT) method.
         1800 &lt;/p&gt;
         1801 </description>
         1802 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yueru Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shao_Y/0/1/0/all/0/1&quot;&gt;Yiting Shao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_J/0/1/0/all/0/1&quot;&gt;Jing Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_G/0/1/0/all/0/1&quot;&gt;Ge Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kuo_C/0/1/0/all/0/1&quot;&gt;C.-C. Jay Kuo&lt;/a&gt;</dc:creator>
         1803 </item>
         1804 <item rdf:about="http://fr.arxiv.org/abs/2010.15303">
         1805 <title>Automatic joint damage quantification using computer vision and deep learning. (arXiv:2010.15303v1 [cs.CV])</title>
         1806 <link>http://fr.arxiv.org/abs/2010.15303</link>
         1807 <description rdf:parseType="Literal">&lt;p&gt;Joint raveled or spalled damage (henceforth called joint damage) can affect
         1808 the safety and long-term performance of concrete pavements. It is important to
         1809 assess and quantify the joint damage over time to assist in building action
         1810 plans for maintenance, predicting maintenance costs, and maximize the concrete
         1811 pavement service life. A framework for the accurate, autonomous, and rapid
         1812 quantification of joint damage with a low-cost camera is proposed using a
         1813 computer vision technique with a deep learning (DL) algorithm. The DL model is
         1814 employed to train 263 images of sawcuts with joint damage. The trained DL model
         1815 is used for pixel-wise color-masking joint damage in a series of query 2D
         1816 images, which are used to reconstruct a 3D image using open-source structure
         1817 from motion algorithm. Another damage quantification algorithm using a color
         1818 threshold is applied to detect and compute the surface area of the damage in
         1819 the 3D reconstructed image. The effectiveness of the framework was validated
         1820 through inspecting joint damage at four transverse contraction joints in
         1821 Illinois, USA, including three acceptable joints and one unacceptable joint by
         1822 visual inspection. The results show the framework achieves 76% recall and 10%
         1823 error.
         1824 &lt;/p&gt;
         1825 </description>
         1826 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tran_Q/0/1/0/all/0/1&quot;&gt;Quang Tran&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Roesler_J/0/1/0/all/0/1&quot;&gt;Jeffery R. Roesler&lt;/a&gt;</dc:creator>
         1827 </item>
         1828 <item rdf:about="http://fr.arxiv.org/abs/2010.15306">
         1829 <title>ACCDOA: Activity-Coupled Cartesian Direction of Arrival Representation for Sound Event Localization and Detection. (arXiv:2010.15306v1 [eess.AS])</title>
         1830 <link>http://fr.arxiv.org/abs/2010.15306</link>
         1831 <description rdf:parseType="Literal">&lt;p&gt;Neural-network (NN)-based methods show high performance in sound event
         1832 localization and detection (SELD). Conventional NN-based methods use two
         1833 branches for a sound event detection (SED) target and a direction-of-arrival
         1834 (DOA) target. The two-branch representation with a single network has to decide
         1835 how to balance the two objectives during optimization. Using two networks
         1836 dedicated to each task increases system complexity and network size. To address
         1837 these problems, we propose an activity-coupled Cartesian DOA (ACCDOA)
         1838 representation, which assigns a sound event activity to the length of a
         1839 corresponding Cartesian DOA vector. The ACCDOA representation enables us to
         1840 solve a SELD task with a single target and has two advantages: avoiding the
         1841 necessity of balancing the objectives and model size increase. In experimental
         1842 evaluations with the DCASE 2020 Task 3 dataset, the ACCDOA representation
         1843 outperformed the two-branch representation in SELD metrics with a smaller
         1844 network size. The ACCDOA-based SELD system also performed better than
         1845 state-of-the-art SELD systems in terms of localization and location-dependent
         1846 detection.
         1847 &lt;/p&gt;
         1848 </description>
         1849 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shimada_K/0/1/0/all/0/1&quot;&gt;Kazuki Shimada&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Koyama_Y/0/1/0/all/0/1&quot;&gt;Yuichiro Koyama&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Takahashi_N/0/1/0/all/0/1&quot;&gt;Naoya Takahashi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Takahashi_S/0/1/0/all/0/1&quot;&gt;Shusuke Takahashi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Mitsufuji_Y/0/1/0/all/0/1&quot;&gt;Yuki Mitsufuji&lt;/a&gt;</dc:creator>
         1850 </item>
         1851 <item rdf:about="http://fr.arxiv.org/abs/2010.15311">
         1852 <title>DeviceTTS: A Small-Footprint, Fast, Stable Network for On-Device Text-to-Speech. (arXiv:2010.15311v1 [eess.AS])</title>
         1853 <link>http://fr.arxiv.org/abs/2010.15311</link>
         1854 <description rdf:parseType="Literal">&lt;p&gt;With the number of smart devices increasing, the demand for on-device
         1855 text-to-speech (TTS) increases rapidly. In recent years, many prominent
         1856 End-to-End TTS methods have been proposed, and have greatly improved the
         1857 quality of synthesized speech. However, to ensure the qualified speech, most
         1858 TTS systems depend on large and complex neural network models, and it&apos;s hard to
         1859 deploy these TTS systems on-device. In this paper, a small-footprint, fast,
         1860 stable network for on-device TTS is proposed, named as DeviceTTS. DeviceTTS
         1861 makes use of a duration predictor as a bridge between encoder and decoder so as
         1862 to avoid the problem of words skipping and repeating in Tacotron. As we all
         1863 know, model size is a key factor for on-device TTS. For DeviceTTS, Deep
         1864 Feedforward Sequential Memory Network (DFSMN) is used as the basic component.
         1865 Moreover, to speed up inference, mix-resolution decoder is proposed for balance
         1866 the inference speed and speech quality. Experiences are done with WORLD and
         1867 LPCNet vocoder. Finally, with only 1.4 million model parameters and 0.099
         1868 GFLOPS, DeviceTTS achieves comparable performance with Tacotron and FastSpeech.
         1869 As far as we know, the DeviceTTS can meet the needs of most of the devices in
         1870 practical application.
         1871 &lt;/p&gt;
         1872 </description>
         1873 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Huang_Z/0/1/0/all/0/1&quot;&gt;Zhiying Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_H/0/1/0/all/0/1&quot;&gt;Hao Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Lei_M/0/1/0/all/0/1&quot;&gt;Ming Lei&lt;/a&gt;</dc:creator>
         1874 </item>
         1875 <item rdf:about="http://fr.arxiv.org/abs/2010.15313">
         1876 <title>&quot;where is this relationship going?&quot;: Understanding Relationship Trajectories in Narrative Text. (arXiv:2010.15313v1 [cs.CL])</title>
         1877 <link>http://fr.arxiv.org/abs/2010.15313</link>
         1878 <description rdf:parseType="Literal">&lt;p&gt;We examine a new commonsense reasoning task: given a narrative describing a
         1879 social interaction that centers on two protagonists, systems make inferences
         1880 about the underlying relationship trajectory. Specifically, we propose two
         1881 evaluation tasks: Relationship Outlook Prediction MCQ and Resolution Prediction
         1882 MCQ. In Relationship Outlook Prediction, a system maps an interaction to a
         1883 relationship outlook that captures how the interaction is expected to change
         1884 the relationship. In Resolution Prediction, a system attributes a given
         1885 relationship outlook to a particular resolution that explains the outcome.
         1886 These two tasks parallel two real-life questions that people frequently ponder
         1887 upon as they navigate different social situations: &quot;where is this relationship
         1888 going?&quot; and &quot;how did we end up here?&quot;. To facilitate the investigation of human
         1889 social relationships through these two tasks, we construct a new dataset,
         1890 Social Narrative Tree, which consists of 1250 stories documenting a variety of
         1891 daily social interactions. The narratives encode a multitude of social elements
         1892 that interweave to give rise to rich commonsense knowledge of how relationships
         1893 evolve with respect to social interactions. We establish baseline performances
         1894 using language models and the accuracies are significantly lower than human
         1895 performance. The results demonstrate that models need to look beyond syntactic
         1896 and semantic signals to comprehend complex human relationships.
         1897 &lt;/p&gt;
         1898 </description>
         1899 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+You_K/0/1/0/all/0/1&quot;&gt;Keen You&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goldwasser_D/0/1/0/all/0/1&quot;&gt;Dan Goldwasser&lt;/a&gt;</dc:creator>
         1900 </item>
         1901 <item rdf:about="http://fr.arxiv.org/abs/2010.15314">
         1902 <title>Recurrent neural circuits for contour detection. (arXiv:2010.15314v1 [cs.CV])</title>
         1903 <link>http://fr.arxiv.org/abs/2010.15314</link>
         1904 <description rdf:parseType="Literal">&lt;p&gt;We introduce a deep recurrent neural network architecture that approximates
         1905 visual cortical circuits. We show that this architecture, which we refer to as
         1906 the gamma-net, learns to solve contour detection tasks with better sample
         1907 efficiency than state-of-the-art feedforward networks, while also exhibiting a
         1908 classic perceptual illusion, known as the orientation-tilt illusion. Correcting
         1909 this illusion significantly reduces gamma-net contour detection accuracy by
         1910 driving it to prefer low-level edges over high-level object boundary contours.
         1911 Overall, our study suggests that the orientation-tilt illusion is a byproduct
         1912 of neural circuits that help biological visual systems achieve robust and
         1913 efficient contour detection, and that incorporating these circuits in
         1914 artificial neural networks can improve computer vision.
         1915 &lt;/p&gt;
         1916 </description>
         1917 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Linsley_D/0/1/0/all/0/1&quot;&gt;Drew Linsley&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1&quot;&gt;Junkyung Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ashok_A/0/1/0/all/0/1&quot;&gt;Alekh Ashok&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Serre_T/0/1/0/all/0/1&quot;&gt;Thomas Serre&lt;/a&gt;</dc:creator>
         1918 </item>
         1919 <item rdf:about="http://fr.arxiv.org/abs/2010.15315">
         1920 <title>Exploring Generative Adversarial Networks for Image-to-Image Translation in STEM Simulation. (arXiv:2010.15315v1 [cs.CV])</title>
         1921 <link>http://fr.arxiv.org/abs/2010.15315</link>
         1922 <description rdf:parseType="Literal">&lt;p&gt;The use of accurate scanning transmission electron microscopy (STEM) image
         1923 simulation methods require large computation times that can make their use
         1924 infeasible for the simulation of many images. Other simulation methods based on
         1925 linear imaging models, such as the convolution method, are much faster but are
         1926 too inaccurate to be used in application. In this paper, we explore deep
         1927 learning models that attempt to translate a STEM image produced by the
         1928 convolution method to a prediction of the high accuracy multislice image. We
         1929 then compare our results to those of regression methods. We find that using the
         1930 deep learning model Generative Adversarial Network (GAN) provides us with the
         1931 best results and performs at a similar accuracy level to previous regression
         1932 models on the same dataset. Codes and data for this project can be found in
         1933 this GitHub repository, https://github.com/uw-cmg/GAN-STEM-Conv2MultiSlice.
         1934 &lt;/p&gt;
         1935 </description>
         1936 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lawrence_N/0/1/0/all/0/1&quot;&gt;Nick Lawrence&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shen_M/0/1/0/all/0/1&quot;&gt;Mingren Shen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yin_R/0/1/0/all/0/1&quot;&gt;Ruiqi Yin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_C/0/1/0/all/0/1&quot;&gt;Cloris Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Morgan_D/0/1/0/all/0/1&quot;&gt;Dane Morgan&lt;/a&gt;</dc:creator>
         1937 </item>
         1938 <item rdf:about="http://fr.arxiv.org/abs/2010.15316">
         1939 <title>Multiple Sclerosis Severity Classification From Clinical Text. (arXiv:2010.15316v1 [cs.CL])</title>
         1940 <link>http://fr.arxiv.org/abs/2010.15316</link>
         1941 <description rdf:parseType="Literal">&lt;p&gt;Multiple Sclerosis (MS) is a chronic, inflammatory and degenerative
         1942 neurological disease, which is monitored by a specialist using the Expanded
         1943 Disability Status Scale (EDSS) and recorded in unstructured text in the form of
         1944 a neurology consult note. An EDSS measurement contains an overall &quot;EDSS&quot; score
         1945 and several functional subscores. Typically, expert knowledge is required to
         1946 interpret consult notes and generate these scores. Previous approaches used
         1947 limited context length Word2Vec embeddings and keyword searches to predict
         1948 scores given a consult note, but often failed when scores were not explicitly
         1949 stated. In this work, we present MS-BERT, the first publicly available
         1950 transformer model trained on real clinical data other than MIMIC. Next, we
         1951 present MSBC, a classifier that applies MS-BERT to generate embeddings and
         1952 predict EDSS and functional subscores. Lastly, we explore combining MSBC with
         1953 other models through the use of Snorkel to generate scores for unlabelled
         1954 consult notes. MSBC achieves state-of-the-art performance on all metrics and
         1955 prediction tasks and outperforms the models generated from the Snorkel
         1956 ensemble. We improve Macro-F1 by 0.12 (to 0.88) for predicting EDSS and on
         1957 average by 0.29 (to 0.63) for predicting functional subscores over previous
         1958 Word2Vec CNN and rule-based approaches.
         1959 &lt;/p&gt;
         1960 </description>
         1961 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Costa_A/0/1/0/all/0/1&quot;&gt;Alister D Costa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Denkovski_S/0/1/0/all/0/1&quot;&gt;Stefan Denkovski&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Malyska_M/0/1/0/all/0/1&quot;&gt;Michal Malyska&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moon_S/0/1/0/all/0/1&quot;&gt;Sae Young Moon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rufino_B/0/1/0/all/0/1&quot;&gt;Brandon Rufino&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_Z/0/1/0/all/0/1&quot;&gt;Zhen Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Killian_T/0/1/0/all/0/1&quot;&gt;Taylor Killian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ghassemi_M/0/1/0/all/0/1&quot;&gt;Marzyeh Ghassemi&lt;/a&gt;</dc:creator>
         1962 </item>
         1963 <item rdf:about="http://fr.arxiv.org/abs/2010.15317">
         1964 <title>The IQIYI System for Voice Conversion Challenge 2020. (arXiv:2010.15317v1 [cs.SD])</title>
         1965 <link>http://fr.arxiv.org/abs/2010.15317</link>
         1966 <description rdf:parseType="Literal">&lt;p&gt;This paper presents the IQIYI voice conversion system (T24) for Voice
         1967 Conversion 2020. In the competition, each target speaker has 70 sentences. We
         1968 have built an end-to-end voice conversion system based on PPG. First, the ASR
         1969 acoustic model calculates the BN feature, which represents the content-related
         1970 information in the speech. Then the Mel feature is calculated through an
         1971 improved prosody tacotron model. Finally, the Mel spectrum is converted to wav
         1972 through an improved LPCNet. The evaluation results show that this system can
         1973 achieve better voice conversion effects. In the case of using 16k rather than
         1974 24k sampling rate audio, the conversion result is relatively good in
         1975 naturalness and similarity. Among them, our best results are in the similarity
         1976 evaluation of the Task 2, the 2nd in the ASV-based objective evaluation and the
         1977 5th in the subjective evaluation.
         1978 &lt;/p&gt;
         1979 </description>
         1980 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gan_W/0/1/0/all/0/1&quot;&gt;Wendong Gan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_H/0/1/0/all/0/1&quot;&gt;Haitao Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yan_Y/0/1/0/all/0/1&quot;&gt;Yin Yan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1&quot;&gt;Jianwei Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wen_B/0/1/0/all/0/1&quot;&gt;Bolong Wen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xu_X/0/1/0/all/0/1&quot;&gt;Xueping Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_H/0/1/0/all/0/1&quot;&gt;Hai Li&lt;/a&gt;</dc:creator>
         1981 </item>
         1982 <item rdf:about="http://fr.arxiv.org/abs/2010.15320">
         1983 <title>Gaussian Processes Model-based Control of Underactuated Balance Robots. (arXiv:2010.15320v1 [cs.RO])</title>
         1984 <link>http://fr.arxiv.org/abs/2010.15320</link>
         1985 <description rdf:parseType="Literal">&lt;p&gt;Ranging from cart-pole systems and autonomous bicycles to bipedal robots,
         1986 control of these underactuated balance robots aims to achieve both external
         1987 (actuated) subsystem trajectory tracking and internal (unactuated) subsystem
         1988 balancing tasks with limited actuation authority. This paper proposes a
         1989 learning model-based control framework for underactuated balance robots. The
         1990 key idea to simultaneously achieve tracking and balancing tasks is to design
         1991 control strategies in slow- and fast-time scales, respectively. In slow-time
         1992 scale, model predictive control (MPC) is used to generate the desired internal
         1993 subsystem trajectory that encodes the external subsystem tracking performance
         1994 and control input. In fast-time scale, the actual internal trajectory is
         1995 stabilized to the desired internal trajectory by using an inverse dynamics
         1996 controller. The coupling effects between the external and internal subsystems
         1997 are captured through the planned internal trajectory profile and the dual
         1998 structural properties of the robotic systems. The control design is based on
         1999 Gaussian processes (GPs) regression model that are learned from experiments
         2000 without need of priori knowledge about the robot dynamics nor successful
         2001 balance demonstration. The GPs provide estimates of modeling uncertainties of
         2002 the robotic systems and these uncertainty estimations are incorporated in the
         2003 MPC design to enhance the control robustness to modeling errors. The
         2004 learning-based control design is analyzed with guaranteed stability and
         2005 performance. The proposed design is demonstrated by experiments on a Furuta
         2006 pendulum and an autonomous bikebot.
         2007 &lt;/p&gt;
         2008 </description>
         2009 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_K/0/1/0/all/0/1&quot;&gt;Kuo Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yi_J/0/1/0/all/0/1&quot;&gt;Jingang Yi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Song_D/0/1/0/all/0/1&quot;&gt;Dezhen Song&lt;/a&gt;</dc:creator>
         2010 </item>
         2011 <item rdf:about="http://fr.arxiv.org/abs/2010.15322">
         2012 <title>Improvement of EAST Data Acquisition Configuration Management. (arXiv:2010.15322v1 [physics.ins-det])</title>
         2013 <link>http://fr.arxiv.org/abs/2010.15322</link>
         2014 <description rdf:parseType="Literal">&lt;p&gt;The data acquisition console is an important component of the EAST data
         2015 acquisition system which provides unified data acquisition and long-term data
         2016 storage for diagnostics. The data acquisition console is used to manage the
         2017 data acquisition configuration information and control the data acquisition
         2018 workflow. The data acquisition console has been developed many years, and with
         2019 increasing of data acquisition nodes and emergence of new control nodes, the
         2020 function of configuration management has become inadequate. It is going to
         2021 update the configuration management function of data acquisition console. The
         2022 upgraded data acquisition console based on LabVIEW should be oriented to the
         2023 data acquisition administrator, with the functions of managing data acquisition
         2024 nodes, managing control nodes, setting and publishing configuration parameters,
         2025 batch management, database backup, monitoring the status of data acquisition
         2026 nodes, controlling the data acquisition workflow, and shot simulation data
         2027 acquisition test. The upgraded data acquisition console has been designed and
         2028 under testing recently.
         2029 &lt;/p&gt;
         2030 </description>
         2031 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Ying_C/0/1/0/all/0/1&quot;&gt;Chen Ying&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Shi_L/0/1/0/all/0/1&quot;&gt;Li Shi&lt;/a&gt;</dc:creator>
         2032 </item>
         2033 <item rdf:about="http://fr.arxiv.org/abs/2010.15327">
         2034 <title>Do Wide and Deep Networks Learn the Same Things? Uncovering How Neural Network Representations Vary with Width and Depth. (arXiv:2010.15327v1 [cs.LG])</title>
         2035 <link>http://fr.arxiv.org/abs/2010.15327</link>
         2036 <description rdf:parseType="Literal">&lt;p&gt;A key factor in the success of deep neural networks is the ability to scale
         2037 models to improve performance by varying the architecture depth and width. This
         2038 simple property of neural network design has resulted in highly effective
         2039 architectures for a variety of tasks. Nevertheless, there is limited
         2040 understanding of effects of depth and width on the learned representations. In
         2041 this paper, we study this fundamental question. We begin by investigating how
         2042 varying depth and width affects model hidden representations, finding a
         2043 characteristic block structure in the hidden representations of larger capacity
         2044 (wider or deeper) models. We demonstrate that this block structure arises when
         2045 model capacity is large relative to the size of the training set, and is
         2046 indicative of the underlying layers preserving and propagating the dominant
         2047 principal component of their representations. This discovery has important
         2048 ramifications for features learned by different models, namely, representations
         2049 outside the block structure are often similar across architectures with varying
         2050 widths and depths, but the block structure is unique to each model. We analyze
         2051 the output predictions of different model architectures, finding that even when
         2052 the overall accuracy is similar, wide and deep models exhibit distinctive error
         2053 patterns and variations across classes.
         2054 &lt;/p&gt;
         2055 </description>
         2056 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nguyen_T/0/1/0/all/0/1&quot;&gt;Thao Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Raghu_M/0/1/0/all/0/1&quot;&gt;Maithra Raghu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kornblith_S/0/1/0/all/0/1&quot;&gt;Simon Kornblith&lt;/a&gt;</dc:creator>
         2057 </item>
         2058 <item rdf:about="http://fr.arxiv.org/abs/2010.15329">
         2059 <title>Scalable Attack-Resistant Obfuscation of Logic Circuits. (arXiv:2010.15329v1 [cs.CR])</title>
         2060 <link>http://fr.arxiv.org/abs/2010.15329</link>
         2061 <description rdf:parseType="Literal">&lt;p&gt;Hardware IP protection has been one of the most critical areas of research in
         2062 the past years. Recently, attacks on hardware IPs (such as reverse engineering
         2063 or cloning) have evolved as attackers have developed sophisticated techniques.
         2064 Therefore, hardware obfuscation has been introduced as a powerful tool to
         2065 protect IPs against piracy attacks. However, many recent attempts to break
         2066 existing obfuscation methods have been successful in unlocking the IP and
         2067 restoring its functionality. In this paper, we propose SARO, a Scalable
         2068 Attack-Resistant Obfuscation that provides a robust functional and structural
         2069 design transformation process. SARO treats the target circuit as a graph, and
         2070 performs a partitioning algorithm to produce a set of sub-graphs, then applies
         2071 our novel Truth Table Transformation (T3) process to each partition. We also
         2072 propose the $T3_{metric}$, which is developed to quantify the structural and
         2073 functional design transformation level caused by the obfuscation process. We
         2074 evaluate SARO on ISCAS85 and EPFL benchmarks, and provide full security and
         2075 performance analysis of our proposed framework.
         2076 &lt;/p&gt;
         2077 </description>
         2078 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Alaql_A/0/1/0/all/0/1&quot;&gt;Abdulrahman Alaql&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bhunia_S/0/1/0/all/0/1&quot;&gt;Swarup Bhunia&lt;/a&gt;</dc:creator>
         2079 </item>
         2080 <item rdf:about="http://fr.arxiv.org/abs/2010.15335">
         2081 <title>Learning Sampling Distributions Using Local 3D Workspace Decompositions for Motion Planning in High Dimensions. (arXiv:2010.15335v1 [cs.RO])</title>
         2082 <link>http://fr.arxiv.org/abs/2010.15335</link>
         2083 <description rdf:parseType="Literal">&lt;p&gt;Earlier work has shown that reusing experience from prior motion planning
         2084 problems can improve the efficiency of similar, future motion planning queries.
         2085 However, for robots with many degrees-of-freedom, these methods exhibit poor
         2086 generalization across different environments and often require large datasets
         2087 that are impractical to gather. We present SPARK and FLAME , two
         2088 experience-based frameworks for sampling-based planning applicable to complex
         2089 manipulators in 3 D environments. Both combine samplers associated with
         2090 features from a workspace decomposition into a global biased sampling
         2091 distribution. SPARK decomposes the environment based on exact geometry while
         2092 FLAME is more general, and uses an octree-based decomposition obtained from
         2093 sensor data. We demonstrate the effectiveness of SPARK and FLAME on a Fetch
         2094 robot tasked with challenging pick-and-place manipulation problems. Our
         2095 approaches can be trained incrementally and significantly improve performance
         2096 with only a handful of examples, generalizing better over diverse tasks and
         2097 environments as compared to prior approaches.
         2098 &lt;/p&gt;
         2099 </description>
         2100 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chamzas_C/0/1/0/all/0/1&quot;&gt;Constantinos Chamzas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kingston_Z/0/1/0/all/0/1&quot;&gt;Zachary Kingston&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Quintero_Pena_C/0/1/0/all/0/1&quot;&gt;Carlos Quintero-Pe&amp;#xf1;a&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shrivastava_A/0/1/0/all/0/1&quot;&gt;Anshumali Shrivastava&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kavraki_L/0/1/0/all/0/1&quot;&gt;Lydia E. Kavraki&lt;/a&gt;</dc:creator>
         2101 </item>
         2102 <item rdf:about="http://fr.arxiv.org/abs/2010.15336">
         2103 <title>SAR-NAS: Skeleton-based Action Recognition via Neural Architecture Searching. (arXiv:2010.15336v1 [cs.CV])</title>
         2104 <link>http://fr.arxiv.org/abs/2010.15336</link>
         2105 <description rdf:parseType="Literal">&lt;p&gt;This paper presents a study of automatic design of neural network
         2106 architectures for skeleton-based action recognition. Specifically, we encode a
         2107 skeleton-based action instance into a tensor and carefully define a set of
         2108 operations to build two types of network cells: normal cells and reduction
         2109 cells. The recently developed DARTS (Differentiable Architecture Search) is
         2110 adopted to search for an effective network architecture that is built upon the
         2111 two types of cells. All operations are 2D based in order to reduce the overall
         2112 computation and search space. Experiments on the challenging NTU RGB+D and
         2113 Kinectics datasets have verified that most of the networks developed to date
         2114 for skeleton-based action recognition are likely not compact and efficient. The
         2115 proposed method provides an approach to search for such a compact network that
         2116 is able to achieve comparative or even better performance than the
         2117 state-of-the-art methods.
         2118 &lt;/p&gt;
         2119 </description>
         2120 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_H/0/1/0/all/0/1&quot;&gt;Haoyuan Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hou_Y/0/1/0/all/0/1&quot;&gt;Yonghong Hou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_P/0/1/0/all/0/1&quot;&gt;Pichao Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Guo_Z/0/1/0/all/0/1&quot;&gt;Zihui Guo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1&quot;&gt;Wanqing Li&lt;/a&gt;</dc:creator>
         2121 </item>
         2122 <item rdf:about="http://fr.arxiv.org/abs/2010.15338">
         2123 <title>A New &quot;Model-Free&quot; Method Combined with Neural Network for MIMO Systems. (arXiv:2010.15338v1 [eess.SY])</title>
         2124 <link>http://fr.arxiv.org/abs/2010.15338</link>
         2125 <description rdf:parseType="Literal">&lt;p&gt;In this brief, a model-free adaptive predictive control (MFAPC) is proposed.
         2126 It outperforms the current model-free adaptive control (MFAC) for not only
         2127 solving the time delay problem in multiple-input multiple-output (MIMO) systems
         2128 but also relaxing the current rigorous assumptions for sake of a wider
         2129 applicable range. The most attractive merit of the proposed controller is that
         2130 the controller design, performance analysis and applications are easy for
         2131 engineers to realize. Furthermore, the problem of how to choose the matrix
         2132 {\lambda} is finished by analyzing the function of the closed-loop poles rather
         2133 than the previous contraction mapping method. Additionally, in view of the
         2134 nonlinear modeling capability and adaptability of neural networks (NNs), we
         2135 combine these two classes of algorithms together. The feasibility and several
         2136 interesting results of the proposed method are shown in simulations.
         2137 &lt;/p&gt;
         2138 </description>
         2139 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_F/0/1/0/all/0/1&quot;&gt;Feilong Zhang&lt;/a&gt;</dc:creator>
         2140 </item>
         2141 <item rdf:about="http://fr.arxiv.org/abs/2010.15343">
         2142 <title>Identifying safe intersection design through unsupervised feature extraction from satellite imagery. (arXiv:2010.15343v1 [cs.CV])</title>
         2143 <link>http://fr.arxiv.org/abs/2010.15343</link>
         2144 <description rdf:parseType="Literal">&lt;p&gt;The World Health Organization has listed the design of safer intersections as
         2145 a key intervention to reduce global road trauma. This article presents the
         2146 first study to systematically analyze the design of all intersections in a
         2147 large country, based on aerial imagery and deep learning. Approximately 900,000
         2148 satellite images were downloaded for all intersections in Australia and
         2149 customized computer vision techniques emphasized the road infrastructure. A
         2150 deep autoencoder extracted high-level features, including the intersection&apos;s
         2151 type, size, shape, lane markings, and complexity, which were used to cluster
         2152 similar designs. An Australian telematics data set linked infrastructure design
         2153 to driving behaviors captured during 66 million kilometers of driving. This
         2154 showed more frequent hard acceleration events (per vehicle) at four- than
         2155 three-way intersections, relatively low hard deceleration frequencies at
         2156 T-intersections, and consistently low average speeds on roundabouts. Overall,
         2157 domain-specific feature extraction enabled the identification of infrastructure
         2158 improvements that could result in safer driving behaviors, potentially reducing
         2159 road trauma.
         2160 &lt;/p&gt;
         2161 </description>
         2162 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wijnands_J/0/1/0/all/0/1&quot;&gt;Jasper S. Wijnands&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_H/0/1/0/all/0/1&quot;&gt;Haifeng Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nice_K/0/1/0/all/0/1&quot;&gt;Kerry A. Nice&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Thompson_J/0/1/0/all/0/1&quot;&gt;Jason Thompson&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Scully_K/0/1/0/all/0/1&quot;&gt;Katherine Scully&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Guo_J/0/1/0/all/0/1&quot;&gt;Jingqiu Guo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stevenson_M/0/1/0/all/0/1&quot;&gt;Mark Stevenson&lt;/a&gt;</dc:creator>
         2163 </item>
         2164 <item rdf:about="http://fr.arxiv.org/abs/2010.15344">
         2165 <title>Sea-Net: Squeeze-And-Excitation Attention Net For Diabetic Retinopathy Grading. (arXiv:2010.15344v1 [cs.CV])</title>
         2166 <link>http://fr.arxiv.org/abs/2010.15344</link>
         2167 <description rdf:parseType="Literal">&lt;p&gt;Diabetes is one of the most common disease in individuals. \textit{Diabetic
         2168 retinopathy} (DR) is a complication of diabetes, which could lead to blindness.
         2169 Automatic DR grading based on retinal images provides a great diagnostic and
         2170 prognostic value for treatment planning. However, the subtle differences among
         2171 severity levels make it difficult to capture important features using
         2172 conventional methods. To alleviate the problems, a new deep learning
         2173 architecture for robust DR grading is proposed, referred to as SEA-Net, in
         2174 which, spatial attention and channel attention are alternatively carried out
         2175 and boosted with each other, improving the classification performance. In
         2176 addition, a hybrid loss function is proposed to further maximize the
         2177 inter-class distance and reduce the intra-class variability. Experimental
         2178 results have shown the effectiveness of the proposed architecture.
         2179 &lt;/p&gt;
         2180 </description>
         2181 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_Z/0/1/0/all/0/1&quot;&gt;Ziyuan Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chopra_K/0/1/0/all/0/1&quot;&gt;Kartik Chopra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zeng_Z/0/1/0/all/0/1&quot;&gt;Zeng Zeng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1&quot;&gt;Xiaoli Li&lt;/a&gt;</dc:creator>
         2182 </item>
         2183 <item rdf:about="http://fr.arxiv.org/abs/2010.15346">
         2184 <title>Developing Augmented Reality based Gaming Model to Teach Ethical Education in Primary Schools. (arXiv:2010.15346v1 [cs.CY])</title>
         2185 <link>http://fr.arxiv.org/abs/2010.15346</link>
         2186 <description rdf:parseType="Literal">&lt;p&gt;Education sector is adopting new technologies for both teaching and learning
         2187 pedagogy. Augmented Reality (AR) is a new technology that can be used in the
         2188 educational pedagogy to enhance the engagement with students. Students interact
         2189 with AR-based educational material for more visualization and explanation.
         2190 Therefore, the use of AR in education is becoming more popular. However, most
         2191 researches narrate the use of AR technologies in the field of English, Maths,
         2192 Science, Culture, Arts, and History education but the absence of ethical
         2193 education is visible. In our paper, we design the system and develop an
         2194 AR-based mobile game model in the field of Ethical education for pre-primary
         2195 students. Students from pre-primary require more interactive lessons than
         2196 theoretical concepts. So, we use AR technology to develop a game which offers
         2197 interactive procedures where students can learn with fun and engage with the
         2198 context. Finally, we develop a prototype that works with our research
         2199 objective. We conclude our paper with future works.
         2200 &lt;/p&gt;
         2201 </description>
         2202 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ali_M/0/1/0/all/0/1&quot;&gt;Mohammad Ali&lt;/a&gt;</dc:creator>
         2203 </item>
         2204 <item rdf:about="http://fr.arxiv.org/abs/2010.15347">
         2205 <title>Distance Invariant Sparse Autoencoder for Wireless Signal Strength Mapping. (arXiv:2010.15347v1 [eess.SP])</title>
         2206 <link>http://fr.arxiv.org/abs/2010.15347</link>
         2207 <description rdf:parseType="Literal">&lt;p&gt;Wireless signal strength based localization can enable robust localization
         2208 for robots using inexpensive sensors. For this, a location-to-signal-strength
         2209 map has to be learned for each access point in the environment. Due to the
         2210 ubiquity of Wireless networks in most environments, this can result in tens or
         2211 hundreds of maps. To reduce the dimensionality of this problem, we employ
         2212 autoencoders, which are a popular unsupervised approach for feature extraction
         2213 and data compression. In particular, we propose the use of sparse autoencoders
         2214 that learn latent spaces that preserve the relative distance between inputs.
         2215 Distance invariance between input and latent spaces allows our system to
         2216 successfully learn compact representations that allow precise data
         2217 reconstruction but also have a low impact on localization performance when
         2218 using maps from the latent space rather than the input space. We demonstrate
         2219 the feasibility of our approach by performing experiments in outdoor
         2220 environments.
         2221 &lt;/p&gt;
         2222 </description>
         2223 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Miyagusuku_R/0/1/0/all/0/1&quot;&gt;Renato Miyagusuku&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ozaki_K/0/1/0/all/0/1&quot;&gt;Koichi Ozaki&lt;/a&gt;</dc:creator>
         2224 </item>
         2225 <item rdf:about="http://fr.arxiv.org/abs/2010.15350">
         2226 <title>A Hybrid Position/Force Controller for Joint Robots. (arXiv:2010.15350v1 [cs.RO])</title>
         2227 <link>http://fr.arxiv.org/abs/2010.15350</link>
         2228 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we present a hybrid position/force controller for operating
         2229 joint robots. The hybrid controller has two goals---motion tracking and force
         2230 regulating. As long as these two goals are not mutually exclusive, they can be
         2231 decoupled in some way. In this work, we make use of the smooth and invertible
         2232 mapping from joint space to task space to decouple the two control goals and
         2233 design controllers separately. The traditional motion controller in task space
         2234 is used for motion control, while the force controller is designed through
         2235 manipulating the desired trajectory to regulate the force indirectly. Two case
         2236 studies---contour tracking/polishing surfaces and grabbing boxes with two
         2237 robotic arms---are presented to show the efficacy of the hybrid controller, and
         2238 simulations with physics engines are carried out to validate the efficacy of
         2239 the proposed method.
         2240 &lt;/p&gt;
         2241 </description>
         2242 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xie_S/0/1/0/all/0/1&quot;&gt;Shengwen Xie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ren_J/0/1/0/all/0/1&quot;&gt;Juan Ren&lt;/a&gt;</dc:creator>
         2243 </item>
         2244 <item rdf:about="http://fr.arxiv.org/abs/2010.15352">
         2245 <title>An automated and multi-parametric algorithm for objective analysis of meibography images. (arXiv:2010.15352v1 [eess.IV])</title>
         2246 <link>http://fr.arxiv.org/abs/2010.15352</link>
         2247 <description rdf:parseType="Literal">&lt;p&gt;Meibography is a non-contact imaging technique used by ophthalmologists to
         2248 assist in the evaluation and diagnosis of meibomian gland dysfunction (MGD).
         2249 While artificial qualitative analysis of meibography images could lead to low
         2250 repeatability and efficiency and multi-parametric analysis is demanding to
         2251 offer more comprehensive information in discovering subtle changes of meibomian
         2252 glands during MGD progression, we developed an automated and multi-parametric
         2253 algorithm for objective and quantitative analysis of meibography images. The
         2254 full architecture of the algorithm can be divided into three steps: (1)
         2255 segmentation of the tarsal conjunctiva area as the region of interest (ROI);
         2256 (2) segmentation and identification of glands within the ROI; and (3)
         2257 quantitative multi-parametric analysis including newly defined gland diameter
         2258 deformation index (DI), gland tortuosity index (TI), and glands signal index
         2259 (SI). To evaluate the performance of the automated algorithm, the similarity
         2260 index (k) and the segmentation error including the false positive rate (r_P)
         2261 and the false negative rate (r_N) are calculated between the manually defined
         2262 ground truth and the automatic segmentations of both the ROI and meibomian
         2263 glands of 15 typical meibography images. The feasibility of the algorithm is
         2264 demonstrated in analyzing typical meibograhy images.
         2265 &lt;/p&gt;
         2266 </description>
         2267 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Xiao_P/0/1/0/all/0/1&quot;&gt;Peng Xiao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Luo_Z/0/1/0/all/0/1&quot;&gt;Zhongzhou Luo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Deng_Y/0/1/0/all/0/1&quot;&gt;Yuqing Deng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wang_G/0/1/0/all/0/1&quot;&gt;Gengyuan Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Yuan_J/0/1/0/all/0/1&quot;&gt;Jin Yuan&lt;/a&gt;</dc:creator>
         2268 </item>
         2269 <item rdf:about="http://fr.arxiv.org/abs/2010.15353">
         2270 <title>Domain decomposition and partitioning methods for mixed finite element discretizations of the Biot system of poroelasticity. (arXiv:2010.15353v1 [math.NA])</title>
         2271 <link>http://fr.arxiv.org/abs/2010.15353</link>
         2272 <description rdf:parseType="Literal">&lt;p&gt;We develop non-overlapping domain decomposition methods for the Biot system
         2273 of poroelasticity in a mixed form. The solid deformation is modeled with a
         2274 mixed three-field formulation with weak stress symmetry. The fluid flow is
         2275 modeled with a mixed Darcy formulation. We introduce displacement and pressure
         2276 Lagrange multipliers on the subdomain interfaces to impose weakly continuity of
         2277 normal stress and normal velocity, respectively. The global problem is reduced
         2278 to an interface problem for the Lagrange multipliers, which is solved by a
         2279 Krylov space iterative method. We study both monolithic and split methods. In
         2280 the monolithic method, a coupled displacement-pressure interface problem is
         2281 solved, with each iteration requiring the solution of local Biot problems. We
         2282 show that the resulting interface operator is positive definite and analyze the
         2283 convergence of the iteration. We further study drained split and fixed stress
         2284 Biot splittings, in which case we solve separate interface problems requiring
         2285 elasticity and Darcy solves. We analyze the stability of the split
         2286 formulations. Numerical experiments are presented to illustrate the convergence
         2287 of the domain decomposition methods and compare their accuracy and efficiency.
         2288 &lt;/p&gt;
         2289 </description>
         2290 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Jayadharan_M/0/1/0/all/0/1&quot;&gt;Manu Jayadharan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Khattatov_E/0/1/0/all/0/1&quot;&gt;Eldar Khattatov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Yotov_I/0/1/0/all/0/1&quot;&gt;Ivan Yotov&lt;/a&gt;</dc:creator>
         2291 </item>
         2292 <item rdf:about="http://fr.arxiv.org/abs/2010.15354">
         2293 <title>Reconfigurable Intelligent Surface Aided Secure Transmission: Outage-Constrained Energy-Efficiency Maximization. (arXiv:2010.15354v1 [cs.IT])</title>
         2294 <link>http://fr.arxiv.org/abs/2010.15354</link>
         2295 <description rdf:parseType="Literal">&lt;p&gt;Reconfigurable intelligent surface (RIS) has the potential to significantly
         2296 enhance the network secure transmission performance by reconfiguring the
         2297 wireless propagation environment. However, due to the passive nature of
         2298 eavesdroppers and the cascaded channel brought by the RIS, the eavesdroppers&apos;
         2299 channel state information is imperfectly obtained at the base station. Under
         2300 the channel uncertainty, the optimal phase-shift, power allocation, and
         2301 transmission rate design for secure transmission is currently unknown due to
         2302 the difficulty of handling the probabilistic constraint with coupled variables.
         2303 To fill this gap, this paper formulates a problem of energy-efficient secure
         2304 transmission design while incorporating the probabilistic constraint. By
         2305 transforming the probabilistic constraint and decoupling variables, the secure
         2306 energy efficiency maximization problem can be solved via alternatively
         2307 executing difference-of-convex programming and semidefinite relaxation
         2308 technique. To scale the solution to massive antennas and reflecting elements
         2309 scenario, a fast first-order algorithm with low complexity is further proposed.
         2310 Simulation results show that the proposed first-order algorithm achieves
         2311 identical performance to the conventional method but saves at least two orders
         2312 of magnitude in computation time. Moreover, the resultant RIS aided secure
         2313 transmission significantly improves the energy efficiency compared to baseline
         2314 schemes of random phase-shift, fixed phase-shift, and RIS ignoring CSI
         2315 uncertainty.
         2316 &lt;/p&gt;
         2317 </description>
         2318 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Z/0/1/0/all/0/1&quot;&gt;Zongze Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shuai Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wen_M/0/1/0/all/0/1&quot;&gt;Miaowen Wen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_Y/0/1/0/all/0/1&quot;&gt;Yik-Chung Wu&lt;/a&gt;</dc:creator>
         2319 </item>
         2320 <item rdf:about="http://fr.arxiv.org/abs/2010.15356">
         2321 <title>Financial ticket intelligent recognition system based on deep learning. (arXiv:2010.15356v1 [cs.LG])</title>
         2322 <link>http://fr.arxiv.org/abs/2010.15356</link>
         2323 <description rdf:parseType="Literal">&lt;p&gt;Facing the rapid growth in the issuance of financial tickets (or bills,
         2324 invoices etc.), traditional manual invoice reimbursement and financial
         2325 accounting system are imposing an increasing burden on financial accountants
         2326 and consuming excessive manpower. To solve this problem, we proposes an
         2327 iterative self-learning Framework of Financial Ticket intelligent Recognition
         2328 System (FFTRS), which can support the fast iterative updating and extensibility
         2329 of the algorithm model, which are the fundamental requirements for a practical
         2330 financial accounting system. In addition, we designed a simple yet efficient
         2331 Financial Ticket Faster Detection network (FTFDNet) and an intelligent data
         2332 warehouse of financial ticket are designed to strengthen its efficiency and
         2333 performance. At present, the system can recognize 194 kinds of financial
         2334 tickets and has an automatic iterative optimization mechanism, which means,
         2335 with the increase of application time, the types of tickets supported by the
         2336 system will continue to increase, and the accuracy of recognition will continue
         2337 to improve. Experimental results show that the average recognition accuracy of
         2338 the system is 97.07%, and the average running time for a single ticket is
         2339 175.67ms. The practical value of the system has been tested in a commercial
         2340 application, which makes a beneficial attempt for the deep learning technology
         2341 in financial accounting work.
         2342 &lt;/p&gt;
         2343 </description>
         2344 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tian_F/0/1/0/all/0/1&quot;&gt;Fukang Tian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_H/0/1/0/all/0/1&quot;&gt;Haiyu Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xu_B/0/1/0/all/0/1&quot;&gt;Bo Xu&lt;/a&gt;</dc:creator>
         2345 </item>
         2346 <item rdf:about="http://fr.arxiv.org/abs/2010.15358">
         2347 <title>A stochastic optimization algorithm for analyzing planar central and balanced configurations in the $n$-body problem. (arXiv:2010.15358v1 [math.DS])</title>
         2348 <link>http://fr.arxiv.org/abs/2010.15358</link>
         2349 <description rdf:parseType="Literal">&lt;p&gt;A stochastic optimization algorithm for analyzing planar central and balanced
         2350 configurations in the $n$-body problem is presented. We find a comprehensive
         2351 list of equal mass central configurations satisfying the Morse equality up to
         2352 $n=12$. We show some exemplary balanced configurations in the case $n=5$, as
         2353 well as some balanced configurations without any axis of symmetry in the cases
         2354 $n=4$ and $n=10$.
         2355 &lt;/p&gt;
         2356 </description>
         2357 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Doicu_A/0/1/0/all/0/1&quot;&gt;Alexandru Doicu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Zhao_L/0/1/0/all/0/1&quot;&gt;Lei Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Doicu_A/0/1/0/all/0/1&quot;&gt;Adrian Doicu&lt;/a&gt;</dc:creator>
         2358 </item>
         2359 <item rdf:about="http://fr.arxiv.org/abs/2010.15360">
         2360 <title>Combining Self-Training and Self-Supervised Learning for Unsupervised Disfluency Detection. (arXiv:2010.15360v1 [cs.CL])</title>
         2361 <link>http://fr.arxiv.org/abs/2010.15360</link>
         2362 <description rdf:parseType="Literal">&lt;p&gt;Most existing approaches to disfluency detection heavily rely on
         2363 human-annotated corpora, which is expensive to obtain in practice. There have
         2364 been several proposals to alleviate this issue with, for instance,
         2365 self-supervised learning techniques, but they still require human-annotated
         2366 corpora. In this work, we explore the unsupervised learning paradigm which can
         2367 potentially work with unlabeled text corpora that are cheaper and easier to
         2368 obtain. Our model builds upon the recent work on Noisy Student Training, a
         2369 semi-supervised learning approach that extends the idea of self-training.
         2370 Experimental results on the commonly used English Switchboard test set show
         2371 that our approach achieves competitive performance compared to the previous
         2372 state-of-the-art supervised systems using contextualized word embeddings (e.g.
         2373 BERT and ELECTRA).
         2374 &lt;/p&gt;
         2375 </description>
         2376 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shaolei Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zhongyuan Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Che_W/0/1/0/all/0/1&quot;&gt;Wanxiang Che&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1&quot;&gt;Ting Liu&lt;/a&gt;</dc:creator>
         2377 </item>
         2378 <item rdf:about="http://fr.arxiv.org/abs/2010.15363">
         2379 <title>Model-Agnostic Counterfactual Reasoning for Eliminating Popularity Bias in Recommender System. (arXiv:2010.15363v1 [cs.IR])</title>
         2380 <link>http://fr.arxiv.org/abs/2010.15363</link>
         2381 <description rdf:parseType="Literal">&lt;p&gt;The general aim of the recommender system is to provide personalized
         2382 suggestions to users, which is opposed to suggesting popular items. However,
         2383 the normal training paradigm, i.e., fitting a recommender model to recover the
         2384 user behavior data with pointwise or pairwise loss, makes the model biased
         2385 towards popular items. This results in the terrible Matthew effect, making
         2386 popular items be more frequently recommended and become even more popular.
         2387 Existing work addresses this issue with Inverse Propensity Weighting (IPW),
         2388 which decreases the impact of popular items on the training and increases the
         2389 impact of long-tail items. Although theoretically sound, IPW methods are highly
         2390 sensitive to the weighting strategy, which is notoriously difficult to tune.
         2391 &lt;/p&gt;
         2392 &lt;p&gt;In this work, we explore the popularity bias issue from a novel and
         2393 fundamental perspective -- cause-effect. We identify that popularity bias lies
         2394 in the direct effect from the item node to the ranking score, such that an
         2395 item&apos;s intrinsic property is the cause of mistakenly assigning it a higher
         2396 ranking score. To eliminate popularity bias, it is essential to answer the
         2397 counterfactual question that what the ranking score would be if the model only
         2398 uses item property. To this end, we formulate a causal graph to describe the
         2399 important cause-effect relations in the recommendation process. During
         2400 training, we perform multi-task learning to achieve the contribution of each
         2401 cause; during testing, we perform counterfactual inference to remove the effect
         2402 of item popularity. Remarkably, our solution amends the learning process of
         2403 recommendation which is agnostic to a wide range of models. We demonstrate it
         2404 on Matrix Factorization (MF) and LightGCN, which are representative of the
         2405 conventional and state-of-the-art model for collaborative filtering.
         2406 Experiments on five real-world datasets demonstrate the effectiveness of our
         2407 method.
         2408 &lt;/p&gt;
         2409 </description>
         2410 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_T/0/1/0/all/0/1&quot;&gt;Tianxin Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_F/0/1/0/all/0/1&quot;&gt;Fuli Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1&quot;&gt;Jiawei Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shi_C/0/1/0/all/0/1&quot;&gt;Chufeng Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_Z/0/1/0/all/0/1&quot;&gt;Ziwei Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yi_J/0/1/0/all/0/1&quot;&gt;Jinfeng Yi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_X/0/1/0/all/0/1&quot;&gt;Xiangnan He&lt;/a&gt;</dc:creator>
         2411 </item>
         2412 <item rdf:about="http://fr.arxiv.org/abs/2010.15364">
         2413 <title>Online State-Time Trajectory Planning Using Timed-ESDF in Highly Dynamic Environments. (arXiv:2010.15364v1 [cs.RO])</title>
         2414 <link>http://fr.arxiv.org/abs/2010.15364</link>
         2415 <description rdf:parseType="Literal">&lt;p&gt;Online state-time trajectory planning in highly dynamic environments remains
         2416 an unsolved problem due to the unpredictable motions of moving obstacles and
         2417 the curse of dimensionality from the state-time space. Existing state-time
         2418 planners are typically implemented based on randomized sampling approaches or
         2419 path searching on discretized state graph. The smoothness, path clearance, and
         2420 planning efficiency of these planners are usually not satisfying. In this work,
         2421 we propose a gradient-based planner over the state-time space for online
         2422 trajectory generation in highly dynamic environments. To enable the
         2423 gradient-based optimization, we propose a Timed-ESDT that supports distance and
         2424 gradient queries with state-time keys. Based on the Timed-ESDT, we also define
         2425 a smooth prior and an obstacle likelihood function that is compatible with the
         2426 state-time space. The trajectory planning is then formulated to a MAP problem
         2427 and solved by an efficient numerical optimizer. Moreover, to improve the
         2428 optimality of the planner, we also define a state-time graph and then conduct
         2429 path searching on it to find a better initialization for the optimizer. By
         2430 integrating the graph searching, the planning quality is significantly
         2431 improved. Experiment results on simulated and benchmark datasets show that our
         2432 planner can outperform the state-of-the-art methods, demonstrating its
         2433 significant advantages over the traditional ones.
         2434 &lt;/p&gt;
         2435 </description>
         2436 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhu_D/0/1/0/all/0/1&quot;&gt;Delong Zhu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_T/0/1/0/all/0/1&quot;&gt;Tong Zhou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lin_J/0/1/0/all/0/1&quot;&gt;Jiahui Lin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fang_Y/0/1/0/all/0/1&quot;&gt;Yuqi Fang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Meng_M/0/1/0/all/0/1&quot;&gt;Max Q.-H. Meng&lt;/a&gt;</dc:creator>
         2437 </item>
         2438 <item rdf:about="http://fr.arxiv.org/abs/2010.15365">
         2439 <title>Infinite Time Solutions of Numerical Schemes for Advection Problems. (arXiv:2010.15365v1 [math.NA])</title>
         2440 <link>http://fr.arxiv.org/abs/2010.15365</link>
         2441 <description rdf:parseType="Literal">&lt;p&gt;This paper addresses the question whether there are numerical schemes for
         2442 constant-coefficient advection problems that can yield convergent solutions for
         2443 an infinite time horizon. The motivation is that such methods may serve as
         2444 building blocks for long-time accurate solutions in more complex
         2445 advection-dominated problems. After establishing a new notion of convergence in
         2446 an infinite time limit of numerical methods, we first show that linear methods
         2447 cannot meet this convergence criterion. Then we present a new numerical
         2448 methodology, based on a nonlinear jet scheme framework. We show that these
         2449 methods do satisfy the new convergence criterion, thus establishing that
         2450 numerical methods exist that converge on an infinite time horizon, and
         2451 demonstrate the long-time accuracy gains incurred by this property.
         2452 &lt;/p&gt;
         2453 </description>
         2454 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Biswas_A/0/1/0/all/0/1&quot;&gt;Abhijit Biswas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Seibold_B/0/1/0/all/0/1&quot;&gt;Benjamin Seibold&lt;/a&gt;</dc:creator>
         2455 </item>
         2456 <item rdf:about="http://fr.arxiv.org/abs/2010.15366">
         2457 <title>Self-supervised Pre-training Reduces Label Permutation Instability of Speech Separation. (arXiv:2010.15366v1 [cs.SD])</title>
         2458 <link>http://fr.arxiv.org/abs/2010.15366</link>
         2459 <description rdf:parseType="Literal">&lt;p&gt;Speech separation has been well-developed while there are still problems
         2460 waiting to be solved. The main problem we focus on in this paper is the
         2461 frequent label permutation switching of permutation invariant training (PIT).
         2462 For N-speaker separation, there would be N! possible label permutations. How to
         2463 stably select correct label permutations is a long-standing problem. In this
         2464 paper, we utilize self-supervised pre-training to stabilize the label
         2465 permutations. Among several types of self-supervised tasks, speech enhancement
         2466 based pre-training tasks show significant effectiveness in our experiments.
         2467 When using off-the-shelf pre-trained models, training duration could be
         2468 shortened to one-third to two-thirds. Furthermore, even taking pre-training
         2469 time into account, the entire training process could still be shorter without a
         2470 performance drop when using a larger batch size.
         2471 &lt;/p&gt;
         2472 </description>
         2473 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huang_S/0/1/0/all/0/1&quot;&gt;Sung-Feng Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chuang_S/0/1/0/all/0/1&quot;&gt;Shun-Po Chuang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_D/0/1/0/all/0/1&quot;&gt;Da-Rong Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yi-Chen Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_G/0/1/0/all/0/1&quot;&gt;Gene-Ping Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1&quot;&gt;Hung-yi Lee&lt;/a&gt;</dc:creator>
         2474 </item>
         2475 <item rdf:about="http://fr.arxiv.org/abs/2010.15371">
         2476 <title>Learning Centric Wireless Resource Allocation for Edge Computing: Algorithm and Experiment. (arXiv:2010.15371v1 [cs.IT])</title>
         2477 <link>http://fr.arxiv.org/abs/2010.15371</link>
         2478 <description rdf:parseType="Literal">&lt;p&gt;Edge intelligence is an emerging network architecture that integrates
         2479 sensing, communication, computing components, and supports various machine
         2480 learning applications, where a fundamental communication question is: how to
         2481 allocate the limited wireless resources (such as time, energy) to the
         2482 simultaneous model training of heterogeneous learning tasks? Existing methods
         2483 ignore two important facts: 1) different models have heterogeneous demands on
         2484 training data; 2) there is a mismatch between the simulated environment and the
         2485 real-world environment. As a result, they could lead to low learning
         2486 performance in practice. This paper proposes the learning centric wireless
         2487 resource allocation (LCWRA) scheme that maximizes the worst learning
         2488 performance of multiple classification tasks. Analysis shows that the optimal
         2489 transmission time has an inverse power relationship with respect to the
         2490 classification error. Finally, both simulation and experimental results are
         2491 provided to verify the performance of the proposed LCWRA scheme and its
         2492 robustness in real implementation.
         2493 &lt;/p&gt;
         2494 </description>
         2495 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_L/0/1/0/all/0/1&quot;&gt;Liangkai Zhou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hong_Y/0/1/0/all/0/1&quot;&gt;Yuncong Hong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shuai Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Han_R/0/1/0/all/0/1&quot;&gt;Ruihua Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_D/0/1/0/all/0/1&quot;&gt;Dachuan Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_R/0/1/0/all/0/1&quot;&gt;Rui Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hao_Q/0/1/0/all/0/1&quot;&gt;Qi Hao&lt;/a&gt;</dc:creator>
         2496 </item>
         2497 <item rdf:about="http://fr.arxiv.org/abs/2010.15372">
         2498 <title>Learning Personalized Discretionary Lane-Change Initiation for Fully Autonomous Driving Based on Reinforcement Learning. (arXiv:2010.15372v1 [cs.HC])</title>
         2499 <link>http://fr.arxiv.org/abs/2010.15372</link>
         2500 <description rdf:parseType="Literal">&lt;p&gt;In this article, the authors present a novel method to learn the personalized
         2501 tactic of discretionary lane-change initiation for fully autonomous vehicles
         2502 through human-computer interactions. Instead of learning from human-driving
         2503 demonstrations, a reinforcement learning technique is employed to learn how to
         2504 initiate lane changes from traffic context, the action of a self-driving
         2505 vehicle, and in-vehicle user feedback. The proposed offline algorithm rewards
         2506 the action-selection strategy when the user gives positive feedback and
         2507 penalizes it when negative feedback. Also, a multi-dimensional driving scenario
         2508 is considered to represent a more realistic lane-change trade-off. The results
         2509 show that the lane-change initiation model obtained by this method can
         2510 reproduce the personal lane-change tactic, and the performance of the
         2511 customized models (average accuracy 86.1%) is much better than that of the
         2512 non-customized models (average accuracy 75.7%). This method allows continuous
         2513 improvement of customization for users during fully autonomous driving even
         2514 without human-driving experience, which will significantly enhance the user
         2515 acceptance of high-level autonomy of self-driving vehicles.
         2516 &lt;/p&gt;
         2517 </description>
         2518 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1&quot;&gt;Zhuoxi Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zheng Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_B/0/1/0/all/0/1&quot;&gt;Bo Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nakano_K/0/1/0/all/0/1&quot;&gt;Kimihiko Nakano&lt;/a&gt;</dc:creator>
         2519 </item>
         2520 <item rdf:about="http://fr.arxiv.org/abs/2010.15376">
         2521 <title>Solving Sparse Linear Inverse Problems in Communication Systems: A Deep Learning Approach With Adaptive Depth. (arXiv:2010.15376v1 [eess.SP])</title>
         2522 <link>http://fr.arxiv.org/abs/2010.15376</link>
         2523 <description rdf:parseType="Literal">&lt;p&gt;Sparse signal recovery problems from noisy linear measurements appear in many
         2524 areas of wireless communications. In recent years, deep learning (DL) based
         2525 approaches have attracted interests of researchers to solve the sparse linear
         2526 inverse problem by unfolding iterative algorithms as neural networks.
         2527 Typically, research concerning DL assume a fixed number of network layers.
         2528 However, it ignores a key character in traditional iterative algorithms, where
         2529 the number of iterations required for convergence changes with varying sparsity
         2530 levels. By investigating on the projected gradient descent, we unveil the
         2531 drawbacks of the existing DL methods with fixed depth. Then we propose an
         2532 end-to-end trainable DL architecture, which involves an extra halting score at
         2533 each layer. Therefore, the proposed method learns how many layers to execute to
         2534 emit an output, and the network depth is dynamically adjusted for each task in
         2535 the inference phase. We conduct experiments using both synthetic data and
         2536 applications including random access in massive MTC and massive MIMO channel
         2537 estimation, and the results demonstrate the improved efficiency for the
         2538 proposed approach.
         2539 &lt;/p&gt;
         2540 </description>
         2541 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chen_W/0/1/0/all/0/1&quot;&gt;Wei Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_B/0/1/0/all/0/1&quot;&gt;Bowen Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Jin_S/0/1/0/all/0/1&quot;&gt;Shi Jin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ai_B/0/1/0/all/0/1&quot;&gt;Bo Ai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhong_Z/0/1/0/all/0/1&quot;&gt;Zhangdui Zhong&lt;/a&gt;</dc:creator>
         2542 </item>
         2543 <item rdf:about="http://fr.arxiv.org/abs/2010.15377">
         2544 <title>Supervised sequential pattern mining of event sequences in sport to identify important patterns of play: an application to rugby union. (arXiv:2010.15377v1 [cs.LG])</title>
         2545 <link>http://fr.arxiv.org/abs/2010.15377</link>
         2546 <description rdf:parseType="Literal">&lt;p&gt;Given a set of sequences comprised of time-ordered events, sequential pattern
         2547 mining is useful to identify frequent sub-sequences from different sequences or
         2548 within the same sequence. However, in sport, these techniques cannot determine
         2549 the importance of particular patterns of play to good or bad outcomes, which is
         2550 often of greater interest to coaches. In this study, we apply a supervised
         2551 sequential pattern mining algorithm called safe pattern pruning (SPP) to 490
         2552 labelled event sequences representing passages of play from one rugby team&apos;s
         2553 matches from the 2018 Japan Top League, and then evaluate the importance of the
         2554 obtained sub-sequences to points-scoring outcomes. Linebreaks, successful
         2555 lineouts, regained kicks in play, repeated phase-breakdown play, and failed
         2556 opposition exit plays were identified as important patterns of play for the
         2557 team scoring. When sequences were labelled with points scoring outcomes for the
         2558 opposition teams, opposition team linebreaks, errors made by the team,
         2559 opposition team lineouts, and repeated phase-breakdown play by the opposition
         2560 team were identified as important patterns of play for the opposition team
         2561 scoring. By virtue of its supervised nature and pruning properties, SPP
         2562 obtained a greater variety of generally more sophisticated patterns than the
         2563 well-known unsupervised PrefixSpan algorithm.
         2564 &lt;/p&gt;
         2565 </description>
         2566 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bunker_R/0/1/0/all/0/1&quot;&gt;Rory Bunker&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fujii_K/0/1/0/all/0/1&quot;&gt;Keisuke Fujii&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hanada_H/0/1/0/all/0/1&quot;&gt;Hiroyuki Hanada&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Takeuchi_I/0/1/0/all/0/1&quot;&gt;Ichiro Takeuchi&lt;/a&gt;</dc:creator>
         2567 </item>
         2568 <item rdf:about="http://fr.arxiv.org/abs/2010.15378">
         2569 <title>Collaborative Method for Incremental Learning on Classification and Generation. (arXiv:2010.15378v1 [cs.CV])</title>
         2570 <link>http://fr.arxiv.org/abs/2010.15378</link>
         2571 <description rdf:parseType="Literal">&lt;p&gt;Although well-trained deep neural networks have shown remarkable performance
         2572 on numerous tasks, they rapidly forget what they have learned as soon as they
         2573 begin to learn with additional data with the previous data stop being provided.
         2574 In this paper, we introduce a novel algorithm, Incremental Class Learning with
         2575 Attribute Sharing (ICLAS), for incremental class learning with deep neural
         2576 networks. As one of its component, we also introduce a generative model,
         2577 incGAN, which can generate images with increased variety compared with the
         2578 training data. Under challenging environment of data deficiency, ICLAS
         2579 incrementally trains classification and the generation networks. Since ICLAS
         2580 trains both networks, our algorithm can perform multiple times of incremental
         2581 class learning. The experiments on MNIST dataset demonstrate the advantages of
         2582 our algorithm.
         2583 &lt;/p&gt;
         2584 </description>
         2585 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_B/0/1/0/all/0/1&quot;&gt;Byungju Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_J/0/1/0/all/0/1&quot;&gt;Jaeyoung Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_K/0/1/0/all/0/1&quot;&gt;Kyungsu Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_S/0/1/0/all/0/1&quot;&gt;Sungjin Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1&quot;&gt;Junmo Kim&lt;/a&gt;</dc:creator>
         2586 </item>
         2587 <item rdf:about="http://fr.arxiv.org/abs/2010.15379">
         2588 <title>The Performance Analysis of Generalized Margin Maximizer (GMM) on Separable Data. (arXiv:2010.15379v1 [stat.ML])</title>
         2589 <link>http://fr.arxiv.org/abs/2010.15379</link>
         2590 <description rdf:parseType="Literal">&lt;p&gt;Logistic models are commonly used for binary classification tasks. The
         2591 success of such models has often been attributed to their connection to
         2592 maximum-likelihood estimators. It has been shown that gradient descent
         2593 algorithm, when applied on the logistic loss, converges to the max-margin
         2594 classifier (a.k.a. hard-margin SVM). The performance of the max-margin
         2595 classifier has been recently analyzed. Inspired by these results, in this
         2596 paper, we present and study a more general setting, where the underlying
         2597 parameters of the logistic model possess certain structures (sparse,
         2598 block-sparse, low-rank, etc.) and introduce a more general framework (which is
         2599 referred to as &quot;Generalized Margin Maximizer&quot;, GMM). While classical max-margin
         2600 classifiers minimize the $2$-norm of the parameter vector subject to linearly
         2601 separating the data, GMM minimizes any arbitrary convex function of the
         2602 parameter vector. We provide a precise analysis of the performance of GMM via
         2603 the solution of a system of nonlinear equations. We also provide a detailed
         2604 study for three special cases: ($1$) $\ell_2$-GMM that is the max-margin
         2605 classifier, ($2$) $\ell_1$-GMM which encourages sparsity, and ($3$)
         2606 $\ell_{\infty}$-GMM which is often used when the parameter vector has binary
         2607 entries. Our theoretical results are validated by extensive simulation results
         2608 across a range of parameter values, problem instances, and model structures.
         2609 &lt;/p&gt;
         2610 </description>
         2611 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Salehi_F/0/1/0/all/0/1&quot;&gt;Fariborz Salehi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Abbasi_E/0/1/0/all/0/1&quot;&gt;Ehsan Abbasi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Hassibi_B/0/1/0/all/0/1&quot;&gt;Babak Hassibi&lt;/a&gt;</dc:creator>
         2612 </item>
         2613 <item rdf:about="http://fr.arxiv.org/abs/2010.15382">
         2614 <title>Learning to Actively Learn: A Robust Approach. (arXiv:2010.15382v1 [cs.LG])</title>
         2615 <link>http://fr.arxiv.org/abs/2010.15382</link>
         2616 <description rdf:parseType="Literal">&lt;p&gt;This work proposes a procedure for designing algorithms for specific adaptive
         2617 data collection tasks like active learning and pure-exploration multi-armed
         2618 bandits. Unlike the design of traditional adaptive algorithms that rely on
         2619 concentration of measure and careful analysis to justify the correctness and
         2620 sample complexity of the procedure, our adaptive algorithm is learned via
         2621 adversarial training over equivalence classes of problems derived from
         2622 information theoretic lower bounds. In particular, a single adaptive learning
         2623 algorithm is learned that competes with the best adaptive algorithm learned for
         2624 each equivalence class. Our procedure takes as input just the available
         2625 queries, set of hypotheses, loss function, and total query budget. This is in
         2626 contrast to existing meta-learning work that learns an adaptive algorithm
         2627 relative to an explicit, user-defined subset or prior distribution over
         2628 problems which can be challenging to define and be mismatched to the instance
         2629 encountered at test time. This work is particularly focused on the regime when
         2630 the total query budget is very small, such as a few dozen, which is much
         2631 smaller than those budgets typically considered by theoretically derived
         2632 algorithms. We perform synthetic experiments to justify the stability and
         2633 effectiveness of the training procedure, and then evaluate the method on tasks
         2634 derived from real data including a noisy 20 Questions game and a joke
         2635 recommendation task.
         2636 &lt;/p&gt;
         2637 </description>
         2638 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jifan Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jamieson_K/0/1/0/all/0/1&quot;&gt;Kevin Jamieson&lt;/a&gt;</dc:creator>
         2639 </item>
         2640 <item rdf:about="http://fr.arxiv.org/abs/2010.15388">
         2641 <title>Prediction-Based Power Oversubscription in Cloud Platforms. (arXiv:2010.15388v1 [cs.DC])</title>
         2642 <link>http://fr.arxiv.org/abs/2010.15388</link>
         2643 <description rdf:parseType="Literal">&lt;p&gt;Datacenter designers rely on conservative estimates of IT equipment power
         2644 draw to provision resources. This leaves resources underutilized and requires
         2645 more datacenters to be built. Prior work has used power capping to shave the
         2646 rare power peaks and add more servers to the datacenter, thereby
         2647 oversubscribing its resources and lowering capital costs. This works well when
         2648 the workloads and their server placements are known. Unfortunately, these
         2649 factors are unknown in public clouds, forcing providers to limit the
         2650 oversubscription so that performance is never impacted.
         2651 &lt;/p&gt;
         2652 &lt;p&gt;In this paper, we argue that providers can use predictions of workload
         2653 performance criticality and virtual machine (VM) resource utilization to
         2654 increase oversubscription. This poses many challenges, such as identifying the
         2655 performance-critical workloads from black-box VMs, creating support for
         2656 criticality-aware power management, and increasing oversubscription while
         2657 limiting the impact of capping. We address these challenges for the hardware
         2658 and software infrastructures of Microsoft Azure. The results show that we
         2659 enable a 2x increase in oversubscription with minimum impact to critical
         2660 workloads.
         2661 &lt;/p&gt;
         2662 </description>
         2663 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kumbhare_A/0/1/0/all/0/1&quot;&gt;Alok Kumbhare&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Azimi_R/0/1/0/all/0/1&quot;&gt;Reza Azimi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Manousakis_I/0/1/0/all/0/1&quot;&gt;Ioannis Manousakis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bonde_A/0/1/0/all/0/1&quot;&gt;Anand Bonde&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frujeri_F/0/1/0/all/0/1&quot;&gt;Felipe Frujeri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mahalingam_N/0/1/0/all/0/1&quot;&gt;Nithish Mahalingam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Misra_P/0/1/0/all/0/1&quot;&gt;Pulkit Misra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Javadi_S/0/1/0/all/0/1&quot;&gt;Seyyed Ahmad Javadi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schroeder_B/0/1/0/all/0/1&quot;&gt;Bianca Schroeder&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fontoura_M/0/1/0/all/0/1&quot;&gt;Marcus Fontoura&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bianchini_R/0/1/0/all/0/1&quot;&gt;Ricardo Bianchini&lt;/a&gt;</dc:creator>
         2664 </item>
         2665 <item rdf:about="http://fr.arxiv.org/abs/2010.15389">
         2666 <title>Learning Audio Embeddings with User Listening Data for Content-based Music Recommendation. (arXiv:2010.15389v1 [cs.SD])</title>
         2667 <link>http://fr.arxiv.org/abs/2010.15389</link>
         2668 <description rdf:parseType="Literal">&lt;p&gt;Personalized recommendation on new track releases has always been a
         2669 challenging problem in the music industry. To combat this problem, we first
         2670 explore user listening history and demographics to construct a user embedding
         2671 representing the user&apos;s music preference. With the user embedding and audio
         2672 data from user&apos;s liked and disliked tracks, an audio embedding can be obtained
         2673 for each track using metric learning with Siamese networks. For a new track, we
         2674 can decide the best group of users to recommend by computing the similarity
         2675 between the track&apos;s audio embedding and different user embeddings,
         2676 respectively. The proposed system yields state-of-the-art performance on
         2677 content-based music recommendation tested with millions of users and tracks.
         2678 Also, we extract audio embeddings as features for music genre classification
         2679 tasks. The results show the generalization ability of our audio embeddings.
         2680 &lt;/p&gt;
         2681 </description>
         2682 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_K/0/1/0/all/0/1&quot;&gt;Ke Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liang_B/0/1/0/all/0/1&quot;&gt;Beici Liang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ma_X/0/1/0/all/0/1&quot;&gt;Xiaoshuan Ma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gu_M/0/1/0/all/0/1&quot;&gt;Minwei Gu&lt;/a&gt;</dc:creator>
         2683 </item>
         2684 <item rdf:about="http://fr.arxiv.org/abs/2010.15390">
         2685 <title>Multitask Bandit Learning through Heterogeneous Feedback Aggregation. (arXiv:2010.15390v1 [cs.LG])</title>
         2686 <link>http://fr.arxiv.org/abs/2010.15390</link>
         2687 <description rdf:parseType="Literal">&lt;p&gt;In many real-world applications, multiple agents seek to learn how to perform
         2688 highly related yet slightly different tasks in an online bandit learning
         2689 protocol. We formulate this problem as the $\epsilon$-multi-player multi-armed
         2690 bandit problem, in which a set of players concurrently interact with a set of
         2691 arms, and for each arm, the reward distributions for all players are similar
         2692 but not necessarily identical. We develop an upper confidence bound-based
         2693 algorithm, RobustAgg$(\epsilon)$, that adaptively aggregates rewards collected
         2694 by different players. In the setting where an upper bound on the pairwise
         2695 similarities of reward distributions between players is known, we achieve
         2696 instance-dependent regret guarantees that depend on the amenability of
         2697 information sharing across players. We complement these upper bounds with
         2698 nearly matching lower bounds. In the setting where pairwise similarities are
         2699 unknown, we provide a lower bound, as well as an algorithm that trades off
         2700 minimax regret guarantees for adaptivity to unknown similarity structure.
         2701 &lt;/p&gt;
         2702 </description>
         2703 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zhi Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_C/0/1/0/all/0/1&quot;&gt;Chicheng Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_M/0/1/0/all/0/1&quot;&gt;Manish Kumar Singh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Riek_L/0/1/0/all/0/1&quot;&gt;Laurel D. Riek&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chaudhuri_K/0/1/0/all/0/1&quot;&gt;Kamalika Chaudhuri&lt;/a&gt;</dc:creator>
         2704 </item>
         2705 <item rdf:about="http://fr.arxiv.org/abs/2010.15391">
         2706 <title>Robustifying Binary Classification to Adversarial Perturbation. (arXiv:2010.15391v1 [cs.LG])</title>
         2707 <link>http://fr.arxiv.org/abs/2010.15391</link>
         2708 <description rdf:parseType="Literal">&lt;p&gt;Despite the enormous success of machine learning models in various
         2709 applications, most of these models lack resilience to (even small)
         2710 perturbations in their input data. Hence, new methods to robustify machine
         2711 learning models seem very essential. To this end, in this paper we consider the
         2712 problem of binary classification with adversarial perturbations. Investigating
         2713 the solution to a min-max optimization (which considers the worst-case loss in
         2714 the presence of adversarial perturbations) we introduce a generalization to the
         2715 max-margin classifier which takes into account the power of the adversary in
         2716 manipulating the data. We refer to this classifier as the &quot;Robust Max-margin&quot;
         2717 (RM) classifier. Under some mild assumptions on the loss function, we
         2718 theoretically show that the gradient descent iterates (with sufficiently small
         2719 step size) converge to the RM classifier in its direction. Therefore, the RM
         2720 classifier can be studied to compute various performance measures (e.g.
         2721 generalization error) of binary classification with adversarial perturbations.
         2722 &lt;/p&gt;
         2723 </description>
         2724 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Salehi_F/0/1/0/all/0/1&quot;&gt;Fariborz Salehi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hassibi_B/0/1/0/all/0/1&quot;&gt;Babak Hassibi&lt;/a&gt;</dc:creator>
         2725 </item>
         2726 <item rdf:about="http://fr.arxiv.org/abs/2010.15392">
         2727 <title>Off-Policy Interval Estimation with Lipschitz Value Iteration. (arXiv:2010.15392v1 [cs.LG])</title>
         2728 <link>http://fr.arxiv.org/abs/2010.15392</link>
         2729 <description rdf:parseType="Literal">&lt;p&gt;Off-policy evaluation provides an essential tool for evaluating the effects
         2730 of different policies or treatments using only observed data. When applied to
         2731 high-stakes scenarios such as medical diagnosis or financial decision-making,
         2732 it is crucial to provide provably correct upper and lower bounds of the
         2733 expected reward, not just a classical single point estimate, to the end-users,
         2734 as executing a poor policy can be very costly. In this work, we propose a
         2735 provably correct method for obtaining interval bounds for off-policy evaluation
         2736 in a general continuous setting. The idea is to search for the maximum and
         2737 minimum values of the expected reward among all the Lipschitz Q-functions that
         2738 are consistent with the observations, which amounts to solving a constrained
         2739 optimization problem on a Lipschitz function space. We go on to introduce a
         2740 Lipschitz value iteration method to monotonically tighten the interval, which
         2741 is simple yet efficient and provably convergent. We demonstrate the practical
         2742 efficiency of our method on a range of benchmarks.
         2743 &lt;/p&gt;
         2744 </description>
         2745 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tang_Z/0/1/0/all/0/1&quot;&gt;Ziyang Tang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1&quot;&gt;Yihao Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_N/0/1/0/all/0/1&quot;&gt;Na Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Peng_J/0/1/0/all/0/1&quot;&gt;Jian Peng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Q/0/1/0/all/0/1&quot;&gt;Qiang Liu&lt;/a&gt;</dc:creator>
         2746 </item>
         2747 <item rdf:about="http://fr.arxiv.org/abs/2010.15393">
         2748 <title>Discovery and classification of Twitter bots. (arXiv:2010.15393v1 [cs.SI])</title>
         2749 <link>http://fr.arxiv.org/abs/2010.15393</link>
         2750 <description rdf:parseType="Literal">&lt;p&gt;A very large number of people use Online Social Networks daily. Such
         2751 platforms thus become attractive targets for agents that seek to gain access to
         2752 the attention of large audiences, and influence perceptions or opinions.
         2753 Botnets, collections of automated accounts controlled by a single agent, are a
         2754 common mechanism for exerting maximum influence. Botnets may be used to better
         2755 infiltrate the social graph over time and to create an illusion of community
         2756 behavior, amplifying their message and increasing persuasion.
         2757 &lt;/p&gt;
         2758 &lt;p&gt;This paper investigates Twitter botnets, their behavior, their interaction
         2759 with user communities and their evolution over time. We analyzed a dense crawl
         2760 of a subset of Twitter traffic, amounting to nearly all interactions by
         2761 Greek-speaking Twitter users for a period of 36 months. We detected over a
         2762 million events where seemingly unrelated accounts tweeted nearly identical
         2763 content at nearly the same time. We filtered these concurrent content injection
         2764 events and detected a set of 1,850 accounts that repeatedly exhibit this
         2765 pattern of behavior, suggesting that they are fully or in part controlled and
         2766 orchestrated by the same software. We found botnets that appear for brief
         2767 intervals and disappear, as well as botnets that evolve and grow, spanning the
         2768 duration of our dataset. We analyze statistical differences between bot
         2769 accounts and human users, as well as botnet interaction with user communities
         2770 and Twitter trending topics.
         2771 &lt;/p&gt;
         2772 </description>
         2773 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shevtsov_A/0/1/0/all/0/1&quot;&gt;Alexander Shevtsov Alexander Shevtsov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Oikonomidou_M/0/1/0/all/0/1&quot;&gt;Maria Oikonomidou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Antonakaki_D/0/1/0/all/0/1&quot;&gt;Despoina Antonakaki&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pratikakis_P/0/1/0/all/0/1&quot;&gt;Polyvios Pratikakis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kanterakis_A/0/1/0/all/0/1&quot;&gt;Alexandros Kanterakis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ioannidis_S/0/1/0/all/0/1&quot;&gt;Sotiris Ioannidis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fragopoulou_P/0/1/0/all/0/1&quot;&gt;Paraskevi Fragopoulou&lt;/a&gt;</dc:creator>
         2774 </item>
         2775 <item rdf:about="http://fr.arxiv.org/abs/2010.15394">
         2776 <title>Smart Homes: Security Challenges and Privacy Concerns. (arXiv:2010.15394v1 [cs.CR])</title>
         2777 <link>http://fr.arxiv.org/abs/2010.15394</link>
         2778 <description rdf:parseType="Literal">&lt;p&gt;Development and growth of Internet of Things (IoT) technology has
         2779 exponentially increased over the course of the last 10 years since its
         2780 inception, and as a result has directly influenced the popularity and size of
         2781 smart homes. In this article we present the main technologies and applications
         2782 that constitute a smart home, we identify the main security and privacy
         2783 challenges that smart home face and we provide good practices to mitigate those
         2784 threats.
         2785 &lt;/p&gt;
         2786 </description>
         2787 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hall_F/0/1/0/all/0/1&quot;&gt;Fraser Hall&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maglaras_L/0/1/0/all/0/1&quot;&gt;Leandros Maglaras&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Aivaliotis_T/0/1/0/all/0/1&quot;&gt;Theodoros Aivaliotis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xagoraris_L/0/1/0/all/0/1&quot;&gt;Loukas Xagoraris&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kantzavelou_I/0/1/0/all/0/1&quot;&gt;Ioanna Kantzavelou&lt;/a&gt;</dc:creator>
         2788 </item>
         2789 <item rdf:about="http://fr.arxiv.org/abs/2010.15396">
         2790 <title>Channel Estimation and Equalization for CP-OFDM-based OTFS in Fractional Doppler Channels. (arXiv:2010.15396v1 [cs.IT])</title>
         2791 <link>http://fr.arxiv.org/abs/2010.15396</link>
         2792 <description rdf:parseType="Literal">&lt;p&gt;Orthogonal time frequency and space (OTFS) modulation is a promising
         2793 technology that satisfies high Doppler requirements for future mobile systems.
         2794 OTFS modulation encodes information symbols and pilot symbols into the
         2795 two-dimensional (2D) delay-Doppler (DD) domain. The received symbols suffer
         2796 from inter-Doppler interference (IDI) in the fading channels with fractional
         2797 Doppler shifts that are sampled at noninteger indices in the DD domain. IDI has
         2798 been treated as an unavoidable effect because the fractional Doppler shifts
         2799 cannot be obtained directly from the received pilot symbols. In this paper, we
         2800 provide a solution to channel estimation for fractional Doppler channels. The
         2801 proposed estimation provides new insight into the OTFS input-output relation in
         2802 the DD domain as a 2D circular convolution with a small approximation.
         2803 According to the input-output relation, we also provide a low-complexity
         2804 channel equalization method using the estimated channel information. We
         2805 demonstrate the error performance of the proposed channel estimation and
         2806 equalization in several channels by simulations. The simulation results show
         2807 that in high-mobility environments, the total system utilizing the proposed
         2808 methods outperforms orthogonal frequency division multiplexing (OFDM) with
         2809 ideal channel estimation and a conventional channel estimation method using a
         2810 pseudo sequence.
         2811 &lt;/p&gt;
         2812 </description>
         2813 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hashimoto_N/0/1/0/all/0/1&quot;&gt;Noriyuki Hashimoto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Osawa_N/0/1/0/all/0/1&quot;&gt;Noboru Osawa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yamazaki_K/0/1/0/all/0/1&quot;&gt;Kosuke Yamazaki&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ibi_S/0/1/0/all/0/1&quot;&gt;Shinsuke Ibi&lt;/a&gt;</dc:creator>
         2814 </item>
         2815 <item rdf:about="http://fr.arxiv.org/abs/2010.15399">
         2816 <title>Free-boundary conformal parameterization of point clouds. (arXiv:2010.15399v1 [cs.CG])</title>
         2817 <link>http://fr.arxiv.org/abs/2010.15399</link>
         2818 <description rdf:parseType="Literal">&lt;p&gt;With the advancement in 3D scanning technology, there has been a surge of
         2819 interest in the use of point clouds in science and engineering. To facilitate
         2820 the computations and analyses of point clouds, prior works have considered
         2821 parameterizing them onto some simple planar domains with a fixed boundary shape
         2822 such as a unit circle or a rectangle. However, the geometry of the fixed shape
         2823 may lead to some undesirable distortion in the parameterization. It is
         2824 therefore more natural to consider free-boundary conformal parameterizations of
         2825 point clouds, which minimize the local geometric distortion of the mapping
         2826 without constraining the overall shape. In this work, we propose a novel
         2827 approximation scheme of the Laplace--Beltrami operator on point clouds and
         2828 utilize it for developing a free-boundary conformal parameterization method for
         2829 disk-type point clouds. With the aid of the free-boundary conformal
         2830 parameterization, high-quality point cloud meshing can be easily achieved.
         2831 Furthermore, we show that using the idea of conformal welding in complex
         2832 analysis, the point cloud conformal parameterization can be computed in a
         2833 divide-and-conquer manner. Experimental results are presented to demonstrate
         2834 the effectiveness of the proposed method.
         2835 &lt;/p&gt;
         2836 </description>
         2837 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1&quot;&gt;Yechen Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Choi_G/0/1/0/all/0/1&quot;&gt;Gary P. T. Choi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lui_L/0/1/0/all/0/1&quot;&gt;Lok Ming Lui&lt;/a&gt;</dc:creator>
         2838 </item>
         2839 <item rdf:about="http://fr.arxiv.org/abs/2010.15404">
         2840 <title>On Efficient and Scalable Time-Continuous Spatial Crowdsourcing -- Full Version. (arXiv:2010.15404v1 [cs.DB])</title>
         2841 <link>http://fr.arxiv.org/abs/2010.15404</link>
         2842 <description rdf:parseType="Literal">&lt;p&gt;The proliferation of advanced mobile terminals opened up a new crowdsourcing
         2843 avenue, spatial crowdsourcing, to utilize the crowd potential to perform
         2844 real-world tasks. In this work, we study a new type of spatial crowdsourcing,
         2845 called time-continuous spatial crowdsourcing (TCSC in short). It supports broad
         2846 applications for long-term continuous spatial data acquisition, ranging from
         2847 environmental monitoring to traffic surveillance in citizen science and
         2848 crowdsourcing projects. However, due to limited budgets and limited
         2849 availability of workers in practice, the data collected is often incomplete,
         2850 incurring data deficiency problem. To tackle that, in this work, we first
         2851 propose an entropy-based quality metric, which captures the joint effects of
         2852 incompletion in data acquisition and the imprecision in data interpolation.
         2853 Based on that, we investigate quality-aware task assignment methods for both
         2854 single- and multi-task scenarios. We show the NP-hardness of the single-task
         2855 case, and design polynomial-time algorithms with guaranteed approximation
         2856 ratios. We study novel indexing and pruning techniques for further enhancing
         2857 the performance in practice. Then, we extend the solution to multi-task
         2858 scenarios and devise a parallel framework for speeding up the process of
         2859 optimization. We conduct extensive experiments on both real and synthetic
         2860 datasets to show the effectiveness of our proposals.
         2861 &lt;/p&gt;
         2862 </description>
         2863 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_T/0/1/0/all/0/1&quot;&gt;Ting Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xie_X/0/1/0/all/0/1&quot;&gt;Xike Xie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cao_X/0/1/0/all/0/1&quot;&gt;Xin Cao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pedersen_T/0/1/0/all/0/1&quot;&gt;Torben Bach Pedersen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yang Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xiao_M/0/1/0/all/0/1&quot;&gt;Mingjun Xiao&lt;/a&gt;</dc:creator>
         2864 </item>
         2865 <item rdf:about="http://fr.arxiv.org/abs/2010.15411">
         2866 <title>Conversation Graph: Data Augmentation, Training and Evaluation for Non-Deterministic Dialogue Management. (arXiv:2010.15411v1 [cs.CL])</title>
         2867 <link>http://fr.arxiv.org/abs/2010.15411</link>
         2868 <description rdf:parseType="Literal">&lt;p&gt;Task-oriented dialogue systems typically rely on large amounts of
         2869 high-quality training data or require complex handcrafted rules. However,
         2870 existing datasets are often limited in size considering the complexity of the
         2871 dialogues. Additionally, conventional training signal inference is not suitable
         2872 for non-deterministic agent behaviour, i.e. considering multiple actions as
         2873 valid in identical dialogue states. We propose the Conversation Graph
         2874 (ConvGraph), a graph-based representation of dialogues that can be exploited
         2875 for data augmentation, multi-reference training and evaluation of
         2876 non-deterministic agents. ConvGraph generates novel dialogue paths to augment
         2877 data volume and diversity. Intrinsic and extrinsic evaluation across three
         2878 datasets shows that data augmentation and/or multi-reference training with
         2879 ConvGraph can improve dialogue success rates by up to 6.4%.
         2880 &lt;/p&gt;
         2881 </description>
         2882 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gritta_M/0/1/0/all/0/1&quot;&gt;Milan Gritta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lampouras_G/0/1/0/all/0/1&quot;&gt;Gerasimos Lampouras&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Iacobacci_I/0/1/0/all/0/1&quot;&gt;Ignacio Iacobacci&lt;/a&gt;</dc:creator>
         2883 </item>
         2884 <item rdf:about="http://fr.arxiv.org/abs/2010.15413">
         2885 <title>Measuring and Harnessing Transference in Multi-Task Learning. (arXiv:2010.15413v1 [cs.LG])</title>
         2886 <link>http://fr.arxiv.org/abs/2010.15413</link>
         2887 <description rdf:parseType="Literal">&lt;p&gt;Multi-task learning can leverage information learned by one task to benefit
         2888 the training of other tasks. Despite this capacity, na\&quot;ive formulations often
         2889 degrade performance and in particular, identifying the tasks that would benefit
         2890 from co-training remains a challenging design question. In this paper, we
         2891 analyze the dynamics of information transfer, or transference, across tasks
         2892 throughout training. Specifically, we develop a similarity measure that can
         2893 quantify transference among tasks and use this quantity to both better
         2894 understand the optimization dynamics of multi-task learning as well as improve
         2895 overall learning performance. In the latter case, we propose two methods to
         2896 leverage our transference metric. The first operates at a macro-level by
         2897 selecting which tasks should train together while the second functions at a
         2898 micro-level by determining how to combine task gradients at each training step.
         2899 We find these methods can lead to significant improvement over prior work on
         2900 three supervised multi-task learning benchmarks and one multi-task
         2901 reinforcement learning paradigm.
         2902 &lt;/p&gt;
         2903 </description>
         2904 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fifty_C/0/1/0/all/0/1&quot;&gt;Christopher Fifty&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Amid_E/0/1/0/all/0/1&quot;&gt;Ehsan Amid&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_Z/0/1/0/all/0/1&quot;&gt;Zhe Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yu_T/0/1/0/all/0/1&quot;&gt;Tianhe Yu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Anil_R/0/1/0/all/0/1&quot;&gt;Rohan Anil&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Finn_C/0/1/0/all/0/1&quot;&gt;Chelsea Finn&lt;/a&gt;</dc:creator>
         2905 </item>
         2906 <item rdf:about="http://fr.arxiv.org/abs/2010.15415">
         2907 <title>A Novel Anomaly Detection Algorithm for Hybrid Production Systems based on Deep Learning and Timed Automata. (arXiv:2010.15415v1 [cs.LG])</title>
         2908 <link>http://fr.arxiv.org/abs/2010.15415</link>
         2909 <description rdf:parseType="Literal">&lt;p&gt;Performing anomaly detection in hybrid systems is a challenging task since it
         2910 requires analysis of timing behavior and mutual dependencies of both discrete
         2911 and continuous signals. Typically, it requires modeling system behavior, which
         2912 is often accomplished manually by human engineers. Using machine learning for
         2913 creating a behavioral model from observations has advantages, such as lower
         2914 development costs and fewer requirements for specific knowledge about the
         2915 system. The paper presents DAD:DeepAnomalyDetection, a new approach for
         2916 automatic model learning and anomaly detection in hybrid production systems. It
         2917 combines deep learning and timed automata for creating behavioral model from
         2918 observations. The ability of deep belief nets to extract binary features from
         2919 real-valued inputs is used for transformation of continuous to discrete
         2920 signals. These signals, together with the original discrete signals are than
         2921 handled in an identical way. Anomaly detection is performed by the comparison
         2922 of actual and predicted system behavior. The algorithm has been applied to few
         2923 data sets including two from real systems and has shown promising results.
         2924 &lt;/p&gt;
         2925 </description>
         2926 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hranisavljevic_N/0/1/0/all/0/1&quot;&gt;Nemanja Hranisavljevic&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Niggemann_O/0/1/0/all/0/1&quot;&gt;Oliver Niggemann&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maier_A/0/1/0/all/0/1&quot;&gt;Alexander Maier&lt;/a&gt;</dc:creator>
         2927 </item>
         2928 <item rdf:about="http://fr.arxiv.org/abs/2010.15417">
         2929 <title>ProCAN: Progressive Growing Channel Attentive Non-Local Network for Lung Nodule Classification. (arXiv:2010.15417v1 [eess.IV])</title>
         2930 <link>http://fr.arxiv.org/abs/2010.15417</link>
         2931 <description rdf:parseType="Literal">&lt;p&gt;Lung cancer classification in screening computed tomography (CT) scans is one
         2932 of the most crucial tasks for early detection of this disease. Many lives can
         2933 be saved if we are able to accurately classify malignant/ cancerous lung
         2934 nodules. Consequently, several deep learning based models have been proposed
         2935 recently to classify lung nodules as malignant or benign. Nevertheless, the
         2936 large variation in the size and heterogeneous appearance of the nodules makes
         2937 this task an extremely challenging one. We propose a new Progressive Growing
         2938 Channel Attentive Non-Local (ProCAN) network for lung nodule classification.
         2939 The proposed method addresses this challenge from three different aspects.
         2940 First, we enrich the Non-Local network by adding channel-wise attention
         2941 capability to it. Second, we apply Curriculum Learning principles, whereby we
         2942 first train our model on easy examples before hard/ difficult ones. Third, as
         2943 the classification task gets harder during the Curriculum learning, our model
         2944 is progressively grown to increase its capability of handling the task at hand.
         2945 We examined our proposed method on two different public datasets and compared
         2946 its performance with state-of-the-art methods in the literature. The results
         2947 show that the ProCAN model outperforms state-of-the-art methods and achieves an
         2948 AUC of 98.05% and accuracy of 95.28% on the LIDC-IDRI dataset. Moreover, we
         2949 conducted extensive ablation studies to analyze the contribution and effects of
         2950 each new component of our proposed method.
         2951 &lt;/p&gt;
         2952 </description>
         2953 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Al_Shabi_M/0/1/0/all/0/1&quot;&gt;Mundher Al-Shabi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shak_K/0/1/0/all/0/1&quot;&gt;Kelvin Shak&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Tan_M/0/1/0/all/0/1&quot;&gt;Maxine Tan&lt;/a&gt;</dc:creator>
         2954 </item>
         2955 <item rdf:about="http://fr.arxiv.org/abs/2010.15421">
         2956 <title>Scalable Graph Neural Networks via Bidirectional Propagation. (arXiv:2010.15421v1 [cs.LG])</title>
         2957 <link>http://fr.arxiv.org/abs/2010.15421</link>
         2958 <description rdf:parseType="Literal">&lt;p&gt;Graph Neural Networks (GNN) is an emerging field for learning on
         2959 non-Euclidean data. Recently, there has been increased interest in designing
         2960 GNN that scales to large graphs. Most existing methods use &quot;graph sampling&quot; or
         2961 &quot;layer-wise sampling&quot; techniques to reduce training time. However, these
         2962 methods still suffer from degrading performance and scalability problems when
         2963 applying to graphs with billions of edges. This paper presents GBP, a scalable
         2964 GNN that utilizes a localized bidirectional propagation process from both the
         2965 feature vectors and the training/testing nodes. Theoretical analysis shows that
         2966 GBP is the first method that achieves sub-linear time complexity for both the
         2967 precomputation and the training phases. An extensive empirical study
         2968 demonstrates that GBP achieves state-of-the-art performance with significantly
         2969 less training/testing time. Most notably, GBP can deliver superior performance
         2970 on a graph with over 60 million nodes and 1.8 billion edges in less than half
         2971 an hour on a single machine.
         2972 &lt;/p&gt;
         2973 </description>
         2974 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_M/0/1/0/all/0/1&quot;&gt;Ming Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_Z/0/1/0/all/0/1&quot;&gt;Zhewei Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ding_B/0/1/0/all/0/1&quot;&gt;Bolin Ding&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1&quot;&gt;Yaliang Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yuan_Y/0/1/0/all/0/1&quot;&gt;Ye Yuan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Du_X/0/1/0/all/0/1&quot;&gt;Xiaoyong Du&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wen_J/0/1/0/all/0/1&quot;&gt;Ji-Rong Wen&lt;/a&gt;</dc:creator>
         2975 </item>
         2976 <item rdf:about="http://fr.arxiv.org/abs/2010.15423">
         2977 <title>Tilde at WMT 2020: News Task Systems. (arXiv:2010.15423v1 [cs.CL])</title>
         2978 <link>http://fr.arxiv.org/abs/2010.15423</link>
         2979 <description rdf:parseType="Literal">&lt;p&gt;This paper describes Tilde&apos;s submission to the WMT2020 shared task on news
         2980 translation for both directions of the English-Polish language pair in both the
         2981 constrained and the unconstrained tracks. We follow our submissions from the
         2982 previous years and build our baseline systems to be morphologically motivated
         2983 sub-word unit-based Transformer base models that we train using the Marian
         2984 machine translation toolkit. Additionally, we experiment with different
         2985 parallel and monolingual data selection schemes, as well as sampled
         2986 back-translation. Our final models are ensembles of Transformer base and
         2987 Transformer big models that feature right-to-left re-ranking.
         2988 &lt;/p&gt;
         2989 </description>
         2990 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Krislauks_R/0/1/0/all/0/1&quot;&gt;Rihards Kri&amp;#x161;lauks&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pinnis_M/0/1/0/all/0/1&quot;&gt;M&amp;#x101;rcis Pinnis&lt;/a&gt;</dc:creator>
         2991 </item>
         2992 <item rdf:about="http://fr.arxiv.org/abs/2010.15425">
         2993 <title>Detection of asteroid trails in Hubble Space Telescope images using Deep Learning. (arXiv:2010.15425v1 [astro-ph.IM])</title>
         2994 <link>http://fr.arxiv.org/abs/2010.15425</link>
         2995 <description rdf:parseType="Literal">&lt;p&gt;We present an application of Deep Learning for the image recognition of
         2996 asteroid trails in single-exposure photos taken by the Hubble Space Telescope.
         2997 Using algorithms based on multi-layered deep Convolutional Neural Networks, we
         2998 report accuracies of above 80% on the validation set. Our project was motivated
         2999 by the Hubble Asteroid Hunter project on Zooniverse, which focused on
         3000 identifying these objects in order to localize and better characterize them. We
         3001 aim to demonstrate that Machine Learning techniques can be very useful in
         3002 trying to solve problems that are closely related to Astronomy and
         3003 Astrophysics, but that they are still not developed enough for very specific
         3004 tasks.
         3005 &lt;/p&gt;
         3006 </description>
         3007 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Parfeni_A/0/1/0/all/0/1&quot;&gt;Andrei A. Parfeni&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Caramete_L/0/1/0/all/0/1&quot;&gt;Laurentiu I. Caramete&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Dobre_A/0/1/0/all/0/1&quot;&gt;Andreea M. Dobre&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Bach_N/0/1/0/all/0/1&quot;&gt;Nguyen Tran Bach&lt;/a&gt;</dc:creator>
         3008 </item>
         3009 <item rdf:about="http://fr.arxiv.org/abs/2010.15426">
         3010 <title>Physics-informed deep learning for flow and deformation in poroelastic media. (arXiv:2010.15426v1 [cs.CE])</title>
         3011 <link>http://fr.arxiv.org/abs/2010.15426</link>
         3012 <description rdf:parseType="Literal">&lt;p&gt;A physics-informed neural network is presented for poroelastic problems with
         3013 coupled flow and deformation processes. The governing equilibrium and mass
         3014 balance equations are discussed and specific derivations for two-dimensional
         3015 cases are presented. A fully-connected deep neural network is used for
         3016 training. Barry and Mercer&apos;s source problem with time-dependent fluid
         3017 injection/extraction in an idealized poroelastic medium, which has an exact
         3018 analytical solution, is used as a numerical example. A random sample from the
         3019 analytical solution is used as training data and the performance of the model
         3020 is tested by predicting the solution on the entire domain after training. The
         3021 deep learning model predicts the horizontal and vertical deformations well
         3022 while the error in the predicted pore pressure predictions is slightly higher
         3023 because of the sparsity of the pore pressure values.
         3024 &lt;/p&gt;
         3025 </description>
         3026 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bekele_Y/0/1/0/all/0/1&quot;&gt;Yared W. Bekele&lt;/a&gt;</dc:creator>
         3027 </item>
         3028 <item rdf:about="http://fr.arxiv.org/abs/2010.15427">
         3029 <title>Sparse Signal Reconstruction for Nonlinear Models via Piecewise Rational Optimization. (arXiv:2010.15427v1 [math.OC])</title>
         3030 <link>http://fr.arxiv.org/abs/2010.15427</link>
         3031 <description rdf:parseType="Literal">&lt;p&gt;We propose a method to reconstruct sparse signals degraded by a nonlinear
         3032 distortion and acquired at a limited sampling rate. Our method formulates the
         3033 reconstruction problem as a nonconvex minimization of the sum of a data fitting
         3034 term and a penalization term. In contrast with most previous works which settle
         3035 for approximated local solutions, we seek for a global solution to the obtained
         3036 challenging nonconvex problem. Our global approach relies on the so-called
         3037 Lasserre relaxation of polynomial optimization. We here specifically include in
         3038 our approach the case of piecewise rational functions, which makes it possible
         3039 to address a wide class of nonconvex exact and continuous relaxations of the
         3040 $\ell_0$ penalization function. Additionally, we study the complexity of the
         3041 optimization problem. It is shown how to use the structure of the problem to
         3042 lighten the computational burden efficiently. Finally, numerical simulations
         3043 illustrate the benefits of our method in terms of both global optimality and
         3044 signal reconstruction.
         3045 &lt;/p&gt;
         3046 </description>
         3047 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Marmin_A/0/1/0/all/0/1&quot;&gt;Arthur Marmin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Castella_M/0/1/0/all/0/1&quot;&gt;Marc Castella&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Pesquet_J/0/1/0/all/0/1&quot;&gt;Jean-Christophe Pesquet&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Duval_L/0/1/0/all/0/1&quot;&gt;Laurent Duval&lt;/a&gt;</dc:creator>
         3048 </item>
         3049 <item rdf:about="http://fr.arxiv.org/abs/2010.15434">
         3050 <title>Self-paced Data Augmentation for Training Neural Networks. (arXiv:2010.15434v1 [cs.LG])</title>
         3051 <link>http://fr.arxiv.org/abs/2010.15434</link>
         3052 <description rdf:parseType="Literal">&lt;p&gt;Data augmentation is widely used for machine learning; however, an effective
         3053 method to apply data augmentation has not been established even though it
         3054 includes several factors that should be tuned carefully. One such factor is
         3055 sample suitability, which involves selecting samples that are suitable for data
         3056 augmentation. A typical method that applies data augmentation to all training
         3057 samples disregards sample suitability, which may reduce classifier performance.
         3058 To address this problem, we propose the self-paced augmentation (SPA) to
         3059 automatically and dynamically select suitable samples for data augmentation
         3060 when training a neural network. The proposed method mitigates the deterioration
         3061 of generalization performance caused by ineffective data augmentation. We
         3062 discuss two reasons the proposed SPA works relative to curriculum learning and
         3063 desirable changes to loss function instability. Experimental results
         3064 demonstrate that the proposed SPA can improve the generalization performance,
         3065 particularly when the number of training samples is small. In addition, the
         3066 proposed SPA outperforms the state-of-the-art RandAugment method.
         3067 &lt;/p&gt;
         3068 </description>
         3069 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Takase_T/0/1/0/all/0/1&quot;&gt;Tomoumi Takase&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Karakida_R/0/1/0/all/0/1&quot;&gt;Ryo Karakida&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Asoh_H/0/1/0/all/0/1&quot;&gt;Hideki Asoh&lt;/a&gt;</dc:creator>
         3070 </item>
         3071 <item rdf:about="http://fr.arxiv.org/abs/2010.15435">
         3072 <title>Group-Harmonic and Group-Closeness Maximization -- Approximation and Engineering. (arXiv:2010.15435v1 [cs.DS])</title>
         3073 <link>http://fr.arxiv.org/abs/2010.15435</link>
         3074 <description rdf:parseType="Literal">&lt;p&gt;Centrality measures characterize important nodes in networks. Efficiently
         3075 computing such nodes has received a lot of attention. When considering the
         3076 generalization of computing central groups of nodes, challenging optimization
         3077 problems occur. In this work, we study two such problems, group-harmonic
         3078 maximization and group-closeness maximization both from a theoretical and from
         3079 an algorithm engineering perspective.
         3080 &lt;/p&gt;
         3081 &lt;p&gt;On the theoretical side, we obtain the following results. For group-harmonic
         3082 maximization, unless $P=NP$, there is no polynomial-time algorithm that
         3083 achieves an approximation factor better than $1-1/e$ (directed) and $1-1/(4e)$
         3084 (undirected), even for unweighted graphs. On the positive side, we show that a
         3085 greedy algorithm achieves an approximation factor of $\lambda(1-2/e)$
         3086 (directed) and $\lambda(1-1/e)/2$ (undirected), where $\lambda$ is the ratio of
         3087 minimal and maximal edge weights. For group-closeness maximization, the
         3088 undirected case is $NP$-hard to be approximated to within a factor better than
         3089 $1-1/(e+1)$ and a constant approximation factor is achieved by a local-search
         3090 algorithm. For the directed case, however, we show that, for any
         3091 $\epsilon&amp;lt;1/2$, the problem is $NP$-hard to be approximated within a factor of
         3092 $4|V|^{-\epsilon}$.
         3093 &lt;/p&gt;
         3094 &lt;p&gt;From the algorithm engineering perspective, we provide efficient
         3095 implementations of the above greedy and local search algorithms. In our
         3096 experimental study we show that, on small instances where an optimum solution
         3097 can be computed in reasonable time, the quality of both the greedy and the
         3098 local search algorithms come very close to the optimum. On larger instances,
         3099 our local search algorithms yield results with superior quality compared to
         3100 existing greedy and local search solutions, at the cost of additional running
         3101 time. We thus advocate local search for scenarios where solution quality is of
         3102 highest concern.
         3103 &lt;/p&gt;
         3104 </description>
         3105 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Angriman_E/0/1/0/all/0/1&quot;&gt;Eugenio Angriman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Becker_R/0/1/0/all/0/1&quot;&gt;Ruben Becker&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+DAngelo_G/0/1/0/all/0/1&quot;&gt;Gianlorenzo D&amp;#x27;Angelo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gilbert_H/0/1/0/all/0/1&quot;&gt;Hugo Gilbert&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Grinten_A/0/1/0/all/0/1&quot;&gt;Alexander van der Grinten&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Meyerhenke_H/0/1/0/all/0/1&quot;&gt;Henning Meyerhenke&lt;/a&gt;</dc:creator>
         3106 </item>
         3107 <item rdf:about="http://fr.arxiv.org/abs/2010.15436">
         3108 <title>Affordance-Aware Handovers with Human Arm Mobility Constraints. (arXiv:2010.15436v1 [cs.RO])</title>
         3109 <link>http://fr.arxiv.org/abs/2010.15436</link>
         3110 <description rdf:parseType="Literal">&lt;p&gt;Reasoning about object handover configurations allows an assistive agent to
         3111 estimate the appropriateness of handover for a receiver with different arm
         3112 mobility capacities. While there are existing approaches to estimating the
         3113 effectiveness of handovers, their findings are limited to users without arm
         3114 mobility impairments and to specific objects. Therefore, current
         3115 state-of-the-art approaches are unable to hand over novel objects to receivers
         3116 with different arm mobility capacities. We propose a method that generalises
         3117 handover behaviours to previously unseen objects, subject to the constraint of
         3118 a user&apos;s arm mobility levels and the task context. We propose a
         3119 heuristic-guided hierarchically optimised cost whose optimisation adapts object
         3120 configurations for receivers with low arm mobility. This also ensures that the
         3121 robot grasps consider the context of the user&apos;s upcoming task, i.e., the usage
         3122 of the object. To understand preferences over handover configurations, we
         3123 report on the findings of an online study, wherein we presented different
         3124 handover methods, including ours, to $259$ users with different levels of arm
         3125 mobility. We encapsulate these preferences in a SRL that is able to reason
         3126 about the most suitable handover configuration given a receiver&apos;s arm mobility
         3127 and upcoming task. We find that people&apos;s preferences over handover methods are
         3128 correlated to their arm mobility capacities. In experiments with a PR2 robotic
         3129 platform, we obtained an average handover accuracy of $90.8\%$ when
         3130 generalising handovers to novel objects.
         3131 &lt;/p&gt;
         3132 </description>
         3133 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ardon_P/0/1/0/all/0/1&quot;&gt;Paola Ard&amp;#xf3;n&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cabrera_M/0/1/0/all/0/1&quot;&gt;Maria E. Cabrera&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pairet_E/0/1/0/all/0/1&quot;&gt;&amp;#xc8;ric Pairet&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Petrick_R/0/1/0/all/0/1&quot;&gt;Ronald P. A. Petrick&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ramamoorthy_S/0/1/0/all/0/1&quot;&gt;Subramanian Ramamoorthy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lohan_K/0/1/0/all/0/1&quot;&gt;Katrin S. Lohan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cakmak_M/0/1/0/all/0/1&quot;&gt;Maya Cakmak&lt;/a&gt;</dc:creator>
         3134 </item>
         3135 <item rdf:about="http://fr.arxiv.org/abs/2010.15437">
         3136 <title>Memory Attentive Fusion: External Language Model Integration for Transformer-based Sequence-to-Sequence Model. (arXiv:2010.15437v1 [cs.CL])</title>
         3137 <link>http://fr.arxiv.org/abs/2010.15437</link>
         3138 <description rdf:parseType="Literal">&lt;p&gt;This paper presents a novel fusion method for integrating an external
         3139 language model (LM) into the Transformer based sequence-to-sequence (seq2seq)
         3140 model. While paired data are basically required to train the seq2seq model, the
         3141 external LM can be trained with only unpaired data. Thus, it is important to
         3142 leverage memorized knowledge in the external LM for building the seq2seq model,
         3143 since it is hard to prepare a large amount of paired data. However, the
         3144 existing fusion methods assume that the LM is integrated with recurrent neural
         3145 network-based seq2seq models instead of the Transformer. Therefore, this paper
         3146 proposes a fusion method that can explicitly utilize network structures in the
         3147 Transformer. The proposed method, called {\bf memory attentive fusion},
         3148 leverages the Transformer-style attention mechanism that repeats source-target
         3149 attention in a multi-hop manner for reading the memorized knowledge in the LM.
         3150 Our experiments on two text-style conversion tasks demonstrate that the
         3151 proposed method performs better than conventional fusion methods.
         3152 &lt;/p&gt;
         3153 </description>
         3154 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ihori_M/0/1/0/all/0/1&quot;&gt;Mana Ihori&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Masumura_R/0/1/0/all/0/1&quot;&gt;Ryo Masumura&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Makishima_N/0/1/0/all/0/1&quot;&gt;Naoki Makishima&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tanaka_T/0/1/0/all/0/1&quot;&gt;Tomohiro Tanaka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Takashima_A/0/1/0/all/0/1&quot;&gt;Akihiko Takashima&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Orihashi_S/0/1/0/all/0/1&quot;&gt;Shota Orihashi&lt;/a&gt;</dc:creator>
         3155 </item>
         3156 <item rdf:about="http://fr.arxiv.org/abs/2010.15438">
         3157 <title>Modeling and Control of COVID-19 Epidemic through Testing Policies. (arXiv:2010.15438v1 [math.OC])</title>
         3158 <link>http://fr.arxiv.org/abs/2010.15438</link>
         3159 <description rdf:parseType="Literal">&lt;p&gt;Testing for the infected cases is one of the most important mechanisms to
         3160 control an epidemic. It enables to isolate the detected infected individuals,
         3161 thereby limiting the disease transmission to the susceptible population.
         3162 However, despite the significance of testing policies, the recent literature on
         3163 the subject lacks a control-theoretic perspective. In this work, an epidemic
         3164 model that incorporates the testing rate as a control input is presented. The
         3165 proposed model differentiates the undetected infected from the detected
         3166 infected cases, who are assumed to be removed from the disease spreading
         3167 process in the population. First, the model is estimated and validated for
         3168 COVID-19 data in France. Then, two testing policies are proposed, the so-called
         3169 best-effort strategy for testing (BEST) and constant optimal strategy for
         3170 testing (COST). The BEST policy is a suppression strategy that provides a lower
         3171 bound on the testing rate such that the epidemic switches from a spreading to a
         3172 non-spreading state. The COST policy is a mitigation strategy that provides an
         3173 optimal value of testing rate that minimizes the peak value of the infected
         3174 population when the total stockpile of tests is limited. Both testing policies
         3175 are evaluated by predicting the number of active intensive care unit (ICU)
         3176 cases and the cumulative number of deaths due to COVID-19.
         3177 &lt;/p&gt;
         3178 </description>
         3179 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Niazi_M/0/1/0/all/0/1&quot;&gt;Muhammad Umar B. Niazi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Kibangou_A/0/1/0/all/0/1&quot;&gt;Alain Kibangou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Canudas_de_Wit_C/0/1/0/all/0/1&quot;&gt;Carlos Canudas-de-Wit&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Nikitin_D/0/1/0/all/0/1&quot;&gt;Denis Nikitin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Tumash_L/0/1/0/all/0/1&quot;&gt;Liudmila Tumash&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Bliman_P/0/1/0/all/0/1&quot;&gt;Pierre-Alexandre Bliman&lt;/a&gt;</dc:creator>
         3180 </item>
         3181 <item rdf:about="http://fr.arxiv.org/abs/2010.15440">
         3182 <title>FlatNet: Towards Photorealistic Scene Reconstruction from Lensless Measurements. (arXiv:2010.15440v1 [eess.IV])</title>
         3183 <link>http://fr.arxiv.org/abs/2010.15440</link>
         3184 <description rdf:parseType="Literal">&lt;p&gt;Lensless imaging has emerged as a potential solution towards realizing
         3185 ultra-miniature cameras by eschewing the bulky lens in a traditional camera.
         3186 Without a focusing lens, the lensless cameras rely on computational algorithms
         3187 to recover the scenes from multiplexed measurements. However, the current
         3188 iterative-optimization-based reconstruction algorithms produce noisier and
         3189 perceptually poorer images. In this work, we propose a non-iterative deep
         3190 learning based reconstruction approach that results in orders of magnitude
         3191 improvement in image quality for lensless reconstructions. Our approach, called
         3192 $\textit{FlatNet}$, lays down a framework for reconstructing high-quality
         3193 photorealistic images from mask-based lensless cameras, where the camera&apos;s
         3194 forward model formulation is known. FlatNet consists of two stages: (1) an
         3195 inversion stage that maps the measurement into a space of intermediate
         3196 reconstruction by learning parameters within the forward model formulation, and
         3197 (2) a perceptual enhancement stage that improves the perceptual quality of this
         3198 intermediate reconstruction. These stages are trained together in an end-to-end
         3199 manner. We show high-quality reconstructions by performing extensive
         3200 experiments on real and challenging scenes using two different types of
         3201 lensless prototypes: one which uses a separable forward model and another,
         3202 which uses a more general non-separable cropped-convolution model. Our
         3203 end-to-end approach is fast, produces photorealistic reconstructions, and is
         3204 easy to adopt for other mask-based lensless cameras.
         3205 &lt;/p&gt;
         3206 </description>
         3207 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Khan_S/0/1/0/all/0/1&quot;&gt;Salman S. Khan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sundar_V/0/1/0/all/0/1&quot;&gt;Varun Sundar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Boominathan_V/0/1/0/all/0/1&quot;&gt;Vivek Boominathan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Veeraraghavan_A/0/1/0/all/0/1&quot;&gt;Ashok Veeraraghavan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Mitra_K/0/1/0/all/0/1&quot;&gt;Kaushik Mitra&lt;/a&gt;</dc:creator>
         3208 </item>
         3209 <item rdf:about="http://fr.arxiv.org/abs/2010.15441">
         3210 <title>Self-awareness in intelligent vehicles: Feature based dynamic Bayesian models for abnormality detection. (arXiv:2010.15441v1 [cs.LG])</title>
         3211 <link>http://fr.arxiv.org/abs/2010.15441</link>
         3212 <description rdf:parseType="Literal">&lt;p&gt;The evolution of Intelligent Transportation Systems in recent times
         3213 necessitates the development of self-awareness in agents. Before the intensive
         3214 use of Machine Learning, the detection of abnormalities was manually programmed
         3215 by checking every variable and creating huge nested conditions that are very
         3216 difficult to track. This paper aims to introduce a novel method to develop
         3217 self-awareness in autonomous vehicles that mainly focuses on detecting abnormal
         3218 situations around the considered agents. Multi-sensory time-series data from
         3219 the vehicles are used to develop the data-driven Dynamic Bayesian Network (DBN)
         3220 models used for future state prediction and the detection of dynamic
         3221 abnormalities. Moreover, an initial level collective awareness model that can
         3222 perform joint anomaly detection in co-operative tasks is proposed. The GNG
         3223 algorithm learns the DBN models&apos; discrete node variables; probabilistic
         3224 transition links connect the node variables. A Markov Jump Particle Filter
         3225 (MJPF) is applied to predict future states and detect when the vehicle is
         3226 potentially misbehaving using learned DBNs as filter parameters. In this paper,
         3227 datasets from real experiments of autonomous vehicles performing various tasks
         3228 used to learn and test a set of switching DBN models.
         3229 &lt;/p&gt;
         3230 </description>
         3231 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kanapram_D/0/1/0/all/0/1&quot;&gt;Divya Thekke Kanapram&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Marin_Plaza_P/0/1/0/all/0/1&quot;&gt;Pablo Marin-Plaza&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Marcenaro_L/0/1/0/all/0/1&quot;&gt;Lucio Marcenaro&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Martin_D/0/1/0/all/0/1&quot;&gt;David Martin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Escalera_A/0/1/0/all/0/1&quot;&gt;Arturo de la Escalera&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Regazzoni_C/0/1/0/all/0/1&quot;&gt;Carlo Regazzoni&lt;/a&gt;</dc:creator>
         3232 </item>
         3233 <item rdf:about="http://fr.arxiv.org/abs/2010.15444">
         3234 <title>Advanced Python Performance Monitoring with Score-P. (arXiv:2010.15444v1 [cs.DC])</title>
         3235 <link>http://fr.arxiv.org/abs/2010.15444</link>
         3236 <description rdf:parseType="Literal">&lt;p&gt;Within the last years, Python became more prominent in the scientific
         3237 community and is now used for simulations, machine learning, and data analysis.
         3238 All these tasks profit from additional compute power offered by parallelism and
         3239 offloading. In the domain of High Performance Computing (HPC), we can look back
         3240 to decades of experience exploiting different levels of parallelism on the
         3241 core, node or inter-node level, as well as utilising accelerators. By using
         3242 performance analysis tools to investigate all these levels of parallelism, we
         3243 can tune applications for unprecedented performance. Unfortunately, standard
         3244 Python performance analysis tools cannot cope with highly parallel programs.
         3245 Since the development of such software is complex and error-prone, we
         3246 demonstrate an easy-to-use solution based on an existing tool infrastructure
         3247 for performance analysis. In this paper, we describe how to apply the
         3248 established instrumentation framework \scorep to trace Python applications. We
         3249 finish with a study of the overhead that users can expect for instrumenting
         3250 their applications.
         3251 &lt;/p&gt;
         3252 </description>
         3253 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gocht_A/0/1/0/all/0/1&quot;&gt;Andreas Gocht&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schone_R/0/1/0/all/0/1&quot;&gt;Robert Sch&amp;#xf6;ne&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frenzel_J/0/1/0/all/0/1&quot;&gt;Jan Frenzel&lt;/a&gt;</dc:creator>
         3254 </item>
         3255 <item rdf:about="http://fr.arxiv.org/abs/2010.15446">
         3256 <title>Progressive Voice Trigger Detection: Accuracy vs Latency. (arXiv:2010.15446v1 [eess.AS])</title>
         3257 <link>http://fr.arxiv.org/abs/2010.15446</link>
         3258 <description rdf:parseType="Literal">&lt;p&gt;We present an architecture for voice trigger detection for virtual
         3259 assistants. The main idea in this work is to exploit information in words that
         3260 immediately follow the trigger phrase. We first demonstrate that by including
         3261 more audio context after a detected trigger phrase, we can indeed get a more
         3262 accurate decision. However, waiting to listen to more audio each time incurs a
         3263 latency increase. Progressive Voice Trigger Detection allows us to trade-off
         3264 latency and accuracy by accepting clear trigger candidates quickly, but waiting
         3265 for more context to decide whether to accept more marginal examples. Using a
         3266 two-stage architecture, we show that by delaying the decision for just 3% of
         3267 detected true triggers in the test set, we are able to obtain a relative
         3268 improvement of 66% in false rejection rate, while incurring only a negligible
         3269 increase in latency.
         3270 &lt;/p&gt;
         3271 </description>
         3272 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sigtia_S/0/1/0/all/0/1&quot;&gt;Siddharth Sigtia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Bridle_J/0/1/0/all/0/1&quot;&gt;John Bridle&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Richards_H/0/1/0/all/0/1&quot;&gt;Hywel Richards&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Clark_P/0/1/0/all/0/1&quot;&gt;Pascal Clark&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Marchi_E/0/1/0/all/0/1&quot;&gt;Erik Marchi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Garg_V/0/1/0/all/0/1&quot;&gt;Vineet Garg&lt;/a&gt;</dc:creator>
         3273 </item>
         3274 <item rdf:about="http://fr.arxiv.org/abs/2010.15453">
         3275 <title>Capacity-achieving codes: a review on double transitivity. (arXiv:2010.15453v1 [cs.IT])</title>
         3276 <link>http://fr.arxiv.org/abs/2010.15453</link>
         3277 <description rdf:parseType="Literal">&lt;p&gt;Recently it was proved that if a linear code is invariant under the action of
         3278 a doubly transitive permutation group, it achieves the capacity of erasure
         3279 channel. Therefore, it is of sufficient interest to classify all codes,
         3280 invariant under such permutation groups. We take a step in this direction and
         3281 give a review of all suitable groups and the known results on codes invariant
         3282 under these groups. It turns out that there are capacity-achieving families of
         3283 algebraic geometric codes.
         3284 &lt;/p&gt;
         3285 </description>
         3286 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ivanov_K/0/1/0/all/0/1&quot;&gt;Kirill Ivanov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Urbanke_R/0/1/0/all/0/1&quot;&gt;R&amp;#xfc;diger L. Urbanke&lt;/a&gt;</dc:creator>
         3287 </item>
         3288 <item rdf:about="http://fr.arxiv.org/abs/2010.15454">
         3289 <title>Scalable Federated Learning over Passive Optical Networks. (arXiv:2010.15454v1 [cs.NI])</title>
         3290 <link>http://fr.arxiv.org/abs/2010.15454</link>
         3291 <description rdf:parseType="Literal">&lt;p&gt;Two-step aggregation is introduced to facilitate scalable federated learning
         3292 (SFL) over passive optical networks (PONs). Results reveal that the SFL keeps
         3293 the required PON upstream bandwidth constant regardless of the number of
         3294 involved clients, while bringing ~10% learning accuracy improvement.
         3295 &lt;/p&gt;
         3296 </description>
         3297 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1&quot;&gt;Jun Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_L/0/1/0/all/0/1&quot;&gt;Lei Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1&quot;&gt;Jiajia Chen&lt;/a&gt;</dc:creator>
         3298 </item>
         3299 <item rdf:about="http://fr.arxiv.org/abs/2010.15455">
         3300 <title>Optimal Sharing and and Fair Cost Allocation of Community Energy Storage. (arXiv:2010.15455v1 [cs.GT])</title>
         3301 <link>http://fr.arxiv.org/abs/2010.15455</link>
         3302 <description rdf:parseType="Literal">&lt;p&gt;This paper studies an ES sharing model where multiple buildings cooperatively
         3303 invest and share a community ES (CES) to harness economic benefits from on-site
         3304 renewable integration and utility price arbitrage. Particularly, we formulate
         3305 the problem that integrates the optimal ES sizing, operation and cost
         3306 allocation as a coalition game, which are generally addressed separately in the
         3307 literature. Particularly, we address the fair ex-post cost allocation which has
         3308 not been well studied. To overcome the computational challenge of computing the
         3309 entire information of explicit characteristic functions that takes exponential
         3310 time, we propose a fair cost allocation based on nucleolus by employing a
         3311 constraints generation technique. We study the fairness and computational
         3312 efficiency of the method through a number of case studies. The numeric results
         3313 imply that the proposed method outperforms the Shapley approach and
         3314 proportional method either in computational efficiency or fairness. Notably,
         3315 for the proposed method, only a small fraction of characteristic functions
         3316 (2.54%) is computed to achieve the cost allocation versus the entire
         3317 information required by Shapley approach. With the proposed cost allocation, we
         3318 investigate the enhanced economic benefits of the CES model for individual
         3319 buildings over individual ES (IES) installation. We see the CES model provides
         3320 higher cost reduction to each committed buildings. Moreover, the value of
         3321 storage is obviously improved (about 1.83 times) with the CES model over the
         3322 IES model.
         3323 &lt;/p&gt;
         3324 </description>
         3325 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_Y/0/1/0/all/0/1&quot;&gt;Yu Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hu_G/0/1/0/all/0/1&quot;&gt;Guoqiang Hu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Spanos_C/0/1/0/all/0/1&quot;&gt;Costas J. Spanos&lt;/a&gt;</dc:creator>
         3326 </item>
         3327 <item rdf:about="http://fr.arxiv.org/abs/2010.15456">
         3328 <title>Multilayer Clustered Graph Learning. (arXiv:2010.15456v1 [cs.LG])</title>
         3329 <link>http://fr.arxiv.org/abs/2010.15456</link>
         3330 <description rdf:parseType="Literal">&lt;p&gt;Multilayer graphs are appealing mathematical tools for modeling multiple
         3331 types of relationship in the data. In this paper, we aim at analyzing
         3332 multilayer graphs by properly combining the information provided by individual
         3333 layers, while preserving the specific structure that allows us to eventually
         3334 identify communities or clusters that are crucial in the analysis of graph
         3335 data. To do so, we learn a clustered representative graph by solving an
         3336 optimization problem that involves a data fidelity term to the observed layers,
         3337 and a regularization pushing for a sparse and community-aware graph. We use the
         3338 contrastive loss as a data fidelity term, in order to properly aggregate the
         3339 observed layers into a representative graph. The regularization is based on a
         3340 measure of graph sparsification called &quot;effective resistance&quot;, coupled with a
         3341 penalization of the first few eigenvalues of the representative graph Laplacian
         3342 matrix to favor the formation of communities. The proposed optimization problem
         3343 is nonconvex but fully differentiable, and thus can be solved via the projected
         3344 gradient method. Experiments show that our method leads to a significant
         3345 improvement w.r.t. state-of-the-art multilayer graph learning algorithms for
         3346 solving clustering problems.
         3347 &lt;/p&gt;
         3348 </description>
         3349 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gheche_M/0/1/0/all/0/1&quot;&gt;Mireille El Gheche&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frossard_P/0/1/0/all/0/1&quot;&gt;Pascal Frossard&lt;/a&gt;</dc:creator>
         3350 </item>
         3351 <item rdf:about="http://fr.arxiv.org/abs/2010.15457">
         3352 <title>FiGLearn: Filter and Graph Learning using Optimal Transport. (arXiv:2010.15457v1 [cs.LG])</title>
         3353 <link>http://fr.arxiv.org/abs/2010.15457</link>
         3354 <description rdf:parseType="Literal">&lt;p&gt;In many applications, a dataset can be considered as a set of observed
         3355 signals that live on an unknown underlying graph structure. Some of these
         3356 signals may be seen as white noise that has been filtered on the graph topology
         3357 by a graph filter. Hence, the knowledge of the filter and the graph provides
         3358 valuable information about the underlying data generation process and the
         3359 complex interactions that arise in the dataset. We hence introduce a novel
         3360 graph signal processing framework for jointly learning the graph and its
         3361 generating filter from signal observations. We cast a new optimisation problem
         3362 that minimises the Wasserstein distance between the distribution of the signal
         3363 observations and the filtered signal distribution model. Our proposed method
         3364 outperforms state-of-the-art graph learning frameworks on synthetic data. We
         3365 then apply our method to a temperature anomaly dataset, and further show how
         3366 this framework can be used to infer missing values if only very little
         3367 information is available.
         3368 &lt;/p&gt;
         3369 </description>
         3370 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Minder_M/0/1/0/all/0/1&quot;&gt;Matthias Minder&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Farsijani_Z/0/1/0/all/0/1&quot;&gt;Zahra Farsijani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shah_D/0/1/0/all/0/1&quot;&gt;Dhruti Shah&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gheche_M/0/1/0/all/0/1&quot;&gt;Mireille El Gheche&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frossard_P/0/1/0/all/0/1&quot;&gt;Pascal Frossard&lt;/a&gt;</dc:creator>
         3371 </item>
         3372 <item rdf:about="http://fr.arxiv.org/abs/2010.15458">
         3373 <title>Named Entity Recognition for Social Media Texts with Semantic Augmentation. (arXiv:2010.15458v1 [cs.CL])</title>
         3374 <link>http://fr.arxiv.org/abs/2010.15458</link>
         3375 <description rdf:parseType="Literal">&lt;p&gt;Existing approaches for named entity recognition suffer from data sparsity
         3376 problems when conducted on short and informal texts, especially user-generated
         3377 social media content. Semantic augmentation is a potential way to alleviate
         3378 this problem. Given that rich semantic information is implicitly preserved in
         3379 pre-trained word embeddings, they are potential ideal resources for semantic
         3380 augmentation. In this paper, we propose a neural-based approach to NER for
         3381 social media texts where both local (from running text) and augmented semantics
         3382 are taken into account. In particular, we obtain the augmented semantic
         3383 information from a large-scale corpus, and propose an attentive semantic
         3384 augmentation module and a gate module to encode and aggregate such information,
         3385 respectively. Extensive experiments are performed on three benchmark datasets
         3386 collected from English and Chinese social media platforms, where the results
         3387 demonstrate the superiority of our approach to previous studies across all
         3388 three datasets.
         3389 &lt;/p&gt;
         3390 </description>
         3391 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nie_Y/0/1/0/all/0/1&quot;&gt;Yuyang Nie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1&quot;&gt;Yuanhe Tian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wan_X/0/1/0/all/0/1&quot;&gt;Xiang Wan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Song_Y/0/1/0/all/0/1&quot;&gt;Yan Song&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dai_B/0/1/0/all/0/1&quot;&gt;Bo Dai&lt;/a&gt;</dc:creator>
         3392 </item>
         3393 <item rdf:about="http://fr.arxiv.org/abs/2010.15461">
         3394 <title>Concatenated Codes for Recovery From Multiple Reads of DNA Sequences. (arXiv:2010.15461v1 [cs.IT])</title>
         3395 <link>http://fr.arxiv.org/abs/2010.15461</link>
         3396 <description rdf:parseType="Literal">&lt;p&gt;Decoding sequences that stem from multiple transmissions of a codeword over
         3397 an insertion, deletion, and substitution channel is a critical component of
         3398 efficient deoxyribonucleic acid (DNA) data storage systems. In this paper, we
         3399 consider a concatenated coding scheme with an outer low-density parity-check
         3400 code and either an inner convolutional code or a block code. We propose two new
         3401 decoding algorithms for inference from multiple received sequences, both
         3402 combining the inner code and channel to a joint hidden Markov model to infer
         3403 symbolwise a posteriori probabilities (APPs). The first decoder computes the
         3404 exact APPs by jointly decoding the received sequences, whereas the second
         3405 decoder approximates the APPs by combining the results of separately decoded
         3406 received sequences. Using the proposed algorithms, we evaluate the performance
         3407 of decoding multiple received sequences by means of achievable information
         3408 rates and Monte-Carlo simulations. We show significant performance gains
         3409 compared to a single received sequence.
         3410 &lt;/p&gt;
         3411 </description>
         3412 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lenz_A/0/1/0/all/0/1&quot;&gt;Andreas Lenz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maarouf_I/0/1/0/all/0/1&quot;&gt;Issam Maarouf&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Welter_L/0/1/0/all/0/1&quot;&gt;Lorenz Welter&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wachter_Zeh_A/0/1/0/all/0/1&quot;&gt;Antonia Wachter-Zeh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rosnes_E/0/1/0/all/0/1&quot;&gt;Eirik Rosnes&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Amat_A/0/1/0/all/0/1&quot;&gt;Alexandre Graell i Amat&lt;/a&gt;</dc:creator>
         3413 </item>
         3414 <item rdf:about="http://fr.arxiv.org/abs/2010.15464">
         3415 <title>Self-Supervised Video Representation Using Pretext-Contrastive Learning. (arXiv:2010.15464v1 [cs.CV])</title>
         3416 <link>http://fr.arxiv.org/abs/2010.15464</link>
         3417 <description rdf:parseType="Literal">&lt;p&gt;Pretext tasks and contrastive learning have been successful in
         3418 self-supervised learning for video retrieval and recognition. In this study, we
         3419 analyze their optimization targets and utilize the hyper-sphere feature space
         3420 to explore the connections between them, indicating the compatibility and
         3421 consistency of these two different learning methods. Based on the analysis, we
         3422 propose a self-supervised training method, referred as Pretext-Contrastive
         3423 Learning (PCL), to learn video representations. Extensive experiments based on
         3424 different combinations of pretext task baselines and contrastive losses confirm
         3425 the strong agreement with their self-supervised learning targets, demonstrating
         3426 the effectiveness and the generality of PCL. The combination of pretext tasks
         3427 and contrastive losses showed significant improvements in both video retrieval
         3428 and recognition over the corresponding baselines. And we can also outperform
         3429 current state-of-the-art methods in the same manner. Further, our PCL is
         3430 flexible and can be applied to almost all existing pretext task methods.
         3431 &lt;/p&gt;
         3432 </description>
         3433 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tao_L/0/1/0/all/0/1&quot;&gt;Li Tao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_X/0/1/0/all/0/1&quot;&gt;Xueting Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yamasaki_T/0/1/0/all/0/1&quot;&gt;Toshihiko Yamasaki&lt;/a&gt;</dc:creator>
         3434 </item>
         3435 <item rdf:about="http://fr.arxiv.org/abs/2010.15466">
         3436 <title>Improving Named Entity Recognition with Attentive Ensemble of Syntactic Information. (arXiv:2010.15466v1 [cs.CL])</title>
         3437 <link>http://fr.arxiv.org/abs/2010.15466</link>
         3438 <description rdf:parseType="Literal">&lt;p&gt;Named entity recognition (NER) is highly sensitive to sentential syntactic
         3439 and semantic properties where entities may be extracted according to how they
         3440 are used and placed in the running text. To model such properties, one could
         3441 rely on existing resources to providing helpful knowledge to the NER task; some
         3442 existing studies proved the effectiveness of doing so, and yet are limited in
         3443 appropriately leveraging the knowledge such as distinguishing the important
         3444 ones for particular context. In this paper, we improve NER by leveraging
         3445 different types of syntactic information through attentive ensemble, which
         3446 functionalizes by the proposed key-value memory networks, syntax attention, and
         3447 the gate mechanism for encoding, weighting and aggregating such syntactic
         3448 information, respectively. Experimental results on six English and Chinese
         3449 benchmark datasets suggest the effectiveness of the proposed model and show
         3450 that it outperforms previous studies on all experiment datasets.
         3451 &lt;/p&gt;
         3452 </description>
         3453 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nie_Y/0/1/0/all/0/1&quot;&gt;Yuyang Nie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1&quot;&gt;Yuanhe Tian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Song_Y/0/1/0/all/0/1&quot;&gt;Yan Song&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ao_X/0/1/0/all/0/1&quot;&gt;Xiang Ao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wan_X/0/1/0/all/0/1&quot;&gt;Xiang Wan&lt;/a&gt;</dc:creator>
         3454 </item>
         3455 <item rdf:about="http://fr.arxiv.org/abs/2010.15469">
         3456 <title>Emergence of Spatial Coordinates via Exploration. (arXiv:2010.15469v1 [cs.LG])</title>
         3457 <link>http://fr.arxiv.org/abs/2010.15469</link>
         3458 <description rdf:parseType="Literal">&lt;p&gt;Spatial knowledge is a fundamental building block for the development of
         3459 advanced perceptive and cognitive abilities. Traditionally, in robotics, the
         3460 Euclidean (x,y,z) coordinate system and the agent&apos;s forward model are defined a
         3461 priori. We show that a naive agent can autonomously build an internal
         3462 coordinate system, with the same dimension and metric regularity as the
         3463 external space, simply by learning to predict the outcome of sensorimotor
         3464 transitions in a self-supervised way.
         3465 &lt;/p&gt;
         3466 </description>
         3467 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Laflaquiere_A/0/1/0/all/0/1&quot;&gt;Alban Laflaqui&amp;#xe8;re&lt;/a&gt;</dc:creator>
         3468 </item>
         3469 <item rdf:about="http://fr.arxiv.org/abs/2010.15470">
         3470 <title>Hybrid mimetic finite-difference and virtual element formulation for coupled poromechanics. (arXiv:2010.15470v1 [math.NA])</title>
         3471 <link>http://fr.arxiv.org/abs/2010.15470</link>
         3472 <description rdf:parseType="Literal">&lt;p&gt;We present a hybrid mimetic finite-difference and virtual element formulation
         3473 for coupled single-phase poromechanics on unstructured meshes. The key
         3474 advantage of the scheme is that it is convergent on complex meshes containing
         3475 highly distorted cells with arbitrary shapes. We use a local pressure-jump
         3476 stabilization method based on unstructured macro-elements to prevent the
         3477 development of spurious pressure modes in incompressible problems approaching
         3478 undrained conditions. A scalable linear solution strategy is obtained using a
         3479 block-triangular preconditioner designed specifically for the saddle-point
         3480 systems arising from the proposed discretization. The accuracy and efficiency
         3481 of our approach are demonstrated numerically on two-dimensional benchmark
         3482 problems.
         3483 &lt;/p&gt;
         3484 </description>
         3485 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Borio_A/0/1/0/all/0/1&quot;&gt;Andrea Borio&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Hamon_F/0/1/0/all/0/1&quot;&gt;Fran&amp;#xe7;ois Hamon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Castelletto_N/0/1/0/all/0/1&quot;&gt;Nicola Castelletto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+White_J/0/1/0/all/0/1&quot;&gt;Joshua A. White&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Settgast_R/0/1/0/all/0/1&quot;&gt;Randolph R. Settgast&lt;/a&gt;</dc:creator>
         3486 </item>
         3487 <item rdf:about="http://fr.arxiv.org/abs/2010.15476">
         3488 <title>Iteratively reweighted greedy set cover. (arXiv:2010.15476v1 [cs.DS])</title>
         3489 <link>http://fr.arxiv.org/abs/2010.15476</link>
         3490 <description rdf:parseType="Literal">&lt;p&gt;We empirically analyze a simple heuristic for large sparse set cover
         3491 problems. It uses the weighted greedy algorithm as a basic building block. By
         3492 multiplicative updates of the weights attached to the elements, the greedy
         3493 solution is iteratively improved. The implementation of this algorithm is
         3494 trivial and the algorithm is essentially free of parameters that would require
         3495 tuning. More iterations can only improve the solution. This set of features
         3496 makes the approach attractive for practical problems.
         3497 &lt;/p&gt;
         3498 </description>
         3499 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Alexa_M/0/1/0/all/0/1&quot;&gt;Marc Alexa&lt;/a&gt;</dc:creator>
         3500 </item>
         3501 <item rdf:about="http://fr.arxiv.org/abs/2010.15479">
         3502 <title>Learned infinite elements. (arXiv:2010.15479v1 [math.NA])</title>
         3503 <link>http://fr.arxiv.org/abs/2010.15479</link>
         3504 <description rdf:parseType="Literal">&lt;p&gt;We study the numerical solution of scalar time-harmonic wave equations on
         3505 unbounded domains which can be split into a bounded interior domain of primary
         3506 interest and an exterior domain with separable geometry. To compute the
         3507 solution in the interior domain, approximations to the Dirichlet-to-Neumann
         3508 (DtN) map of the exterior domain have to be imposed as transparent boundary
         3509 conditions on the artificial coupling boundary. Although the DtN map can be
         3510 computed by separation of variables, it is a nonlocal operator with dense
         3511 matrix representations, and hence computationally inefficient. Therefore,
         3512 approximations of DtN maps by sparse matrices, usually involving additional
         3513 degrees of freedom, have been studied intensively in the literature using a
         3514 variety of approaches including different types of infinite elements, local
         3515 non-reflecting boundary conditions, and perfectly matched layers. The entries
         3516 of these sparse matrices are derived analytically, e.g. from transformations or
         3517 asymptotic expansions of solutions to the differential equation in the exterior
         3518 domain. In contrast, in this paper we propose to `learn&apos; the matrix entries
         3519 from the DtN map in its separated form by solving an optimization problem as a
         3520 preprocessing step. Theoretical considerations suggest that the approximation
         3521 quality of learned infinite elements improves exponentially with increasing
         3522 number of infinite element degrees of freedom, which is confirmed in numerical
         3523 experiments. These numerical studies also show that learned infinite elements
         3524 outperform state-of-the-art methods for the Helmholtz equation. At the same
         3525 time, learned infinite elements are much more flexible than traditional methods
         3526 as they, e.g., work similarly well for exterior domains involving strong
         3527 reflections, for example, for the atmosphere of the Sun, which is strongly
         3528 inhomogeneous and exhibits reflections at the corona.
         3529 &lt;/p&gt;
         3530 </description>
         3531 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Hohage_T/0/1/0/all/0/1&quot;&gt;Thorsten Hohage&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Lehrenfeld_C/0/1/0/all/0/1&quot;&gt;Christoph Lehrenfeld&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Preuss_J/0/1/0/all/0/1&quot;&gt;Janosch Preuss&lt;/a&gt;</dc:creator>
         3532 </item>
         3533 <item rdf:about="http://fr.arxiv.org/abs/2010.15482">
         3534 <title>Convergence of Constrained Anderson Acceleration. (arXiv:2010.15482v1 [math.NA])</title>
         3535 <link>http://fr.arxiv.org/abs/2010.15482</link>
         3536 <description rdf:parseType="Literal">&lt;p&gt;We prove non asymptotic linear convergence rates for the constrained Anderson
         3537 acceleration extrapolation scheme. These guarantees come from new upper bounds
         3538 on the constrained Chebyshev problem, which consists in minimizing the maximum
         3539 absolute value of a polynomial on a bounded real interval with $l_1$
         3540 constraints on its coefficients vector. Constrained Anderson Acceleration has a
         3541 numerical cost comparable to that of the original scheme.
         3542 &lt;/p&gt;
         3543 </description>
         3544 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Barre_M/0/1/0/all/0/1&quot;&gt;Mathieu Barr&amp;#xe9;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Taylor_A/0/1/0/all/0/1&quot;&gt;Adrien Taylor&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+dAspremont_A/0/1/0/all/0/1&quot;&gt;Alexandre d&amp;#x27;Aspremont&lt;/a&gt;</dc:creator>
         3545 </item>
         3546 <item rdf:about="http://fr.arxiv.org/abs/2010.15487">
         3547 <title>Beyond cross-entropy: learning highly separable feature distributions for robust and accurate classification. (arXiv:2010.15487v1 [cs.CV])</title>
         3548 <link>http://fr.arxiv.org/abs/2010.15487</link>
         3549 <description rdf:parseType="Literal">&lt;p&gt;Deep learning has shown outstanding performance in several applications
         3550 including image classification. However, deep classifiers are known to be
         3551 highly vulnerable to adversarial attacks, in that a minor perturbation of the
         3552 input can easily lead to an error. Providing robustness to adversarial attacks
         3553 is a very challenging task especially in problems involving a large number of
         3554 classes, as it typically comes at the expense of an accuracy decrease. In this
         3555 work, we propose the Gaussian class-conditional simplex (GCCS) loss: a novel
         3556 approach for training deep robust multiclass classifiers that provides
         3557 adversarial robustness while at the same time achieving or even surpassing the
         3558 classification accuracy of state-of-the-art methods. Differently from other
         3559 frameworks, the proposed method learns a mapping of the input classes onto
         3560 target distributions in a latent space such that the classes are linearly
         3561 separable. Instead of maximizing the likelihood of target labels for individual
         3562 samples, our objective function pushes the network to produce feature
         3563 distributions yielding high inter-class separation. The mean values of the
         3564 distributions are centered on the vertices of a simplex such that each class is
         3565 at the same distance from every other class. We show that the regularization of
         3566 the latent space based on our approach yields excellent classification accuracy
         3567 and inherently provides robustness to multiple adversarial attacks, both
         3568 targeted and untargeted, outperforming state-of-the-art approaches over
         3569 challenging datasets.
         3570 &lt;/p&gt;
         3571 </description>
         3572 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ali_A/0/1/0/all/0/1&quot;&gt;Arslan Ali&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Migliorati_A/0/1/0/all/0/1&quot;&gt;Andrea Migliorati&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bianchi_T/0/1/0/all/0/1&quot;&gt;Tiziano Bianchi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Magli_E/0/1/0/all/0/1&quot;&gt;Enrico Magli&lt;/a&gt;</dc:creator>
         3573 </item>
         3574 <item rdf:about="http://fr.arxiv.org/abs/2010.15490">
         3575 <title>Linearizing Combinators. (arXiv:2010.15490v1 [math.CT])</title>
         3576 <link>http://fr.arxiv.org/abs/2010.15490</link>
         3577 <description rdf:parseType="Literal">&lt;p&gt;In 2017, Bauer, Johnson, Osborne, Riehl, and Tebbe (BJORT) showed that the
         3578 Abelian functor calculus provides an example of a Cartesian differential
         3579 category. The definition of a Cartesian differential category is based on a
         3580 differential combinator which directly formalizes the total derivative from
         3581 multivariable calculus. However, in the aforementioned work the authors used
         3582 techniques from Goodwillie&apos;s functor calculus to establish a linearization
         3583 process from which they then derived a differential combinator. This raised the
         3584 question of what the precise relationship between linearization and having a
         3585 differential combinator might be.
         3586 &lt;/p&gt;
         3587 &lt;p&gt;In this paper, we introduce the notion of a linearizing combinator which
         3588 abstracts linearization in the Abelian functor calculus. We then use it to
         3589 provide an alternative axiomatization of a Cartesian differential category.
         3590 Every Cartesian differential category comes equipped with a canonical
         3591 linearizing combinator obtained by differentiation at zero. Conversely, a
         3592 differential combinator can be constructed \`a la BJORT when one has a system
         3593 of partial linearizing combinators in each context. Thus, while linearizing
         3594 combinators do provide an alternative axiomatization of Cartesian differential
         3595 categories, an explicit notion of partial linearization is required. This is in
         3596 contrast to the situation for differential combinators where partial
         3597 differentiation is automatic in the presence of total differentiation. The
         3598 ability to form a system of partial linearizing combinators from a total
         3599 linearizing combinator, while not being possible in general, is possible when
         3600 the setting is Cartesian closed.
         3601 &lt;/p&gt;
         3602 </description>
         3603 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Cockett_R/0/1/0/all/0/1&quot;&gt;Robin Cockett&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Lemay_J/0/1/0/all/0/1&quot;&gt;Jean-Simon Pacaud Lemay&lt;/a&gt;</dc:creator>
         3604 </item>
         3605 <item rdf:about="http://fr.arxiv.org/abs/2010.15491">
         3606 <title>A Novel Fast 3D Single Image Super-Resolution Algorithm. (arXiv:2010.15491v1 [eess.IV])</title>
         3607 <link>http://fr.arxiv.org/abs/2010.15491</link>
         3608 <description rdf:parseType="Literal">&lt;p&gt;This paper introduces a novel computationally efficient method of solving the
         3609 3D single image super-resolution (SR) problem, i.e., reconstruction of a
         3610 high-resolution volume from its low-resolution counterpart. The main
         3611 contribution lies in the original way of handling simultaneously the associated
         3612 decimation and blurring operators, based on their underlying properties in the
         3613 frequency domain. In particular, the proposed decomposition technique of the 3D
         3614 decimation operator allows a straightforward implementation for Tikhonov
         3615 regularization, and can be further used to take into consideration other
         3616 regularization functions such as the total variation, enabling the
         3617 computational cost of state-of-the-art algorithms to be considerably decreased.
         3618 Numerical experiments carried out showed that the proposed approach outperforms
         3619 existing 3D SR methods.
         3620 &lt;/p&gt;
         3621 </description>
         3622 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Tuador_N/0/1/0/all/0/1&quot;&gt;Nwigbo Kenule Tuador&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pham_D/0/1/0/all/0/1&quot;&gt;Duong Hung Pham&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Michetti_J/0/1/0/all/0/1&quot;&gt;J&amp;#xe9;r&amp;#xf4;me Michetti&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Basarab_A/0/1/0/all/0/1&quot;&gt;Adrian Basarab&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kouame_D/0/1/0/all/0/1&quot;&gt;Denis Kouam&amp;#xe9;&lt;/a&gt;</dc:creator>
         3623 </item>
         3624 <item rdf:about="http://fr.arxiv.org/abs/2010.15492">
         3625 <title>&quot;What, not how&quot; -- Solving an under-actuated insertion task from scratch. (arXiv:2010.15492v1 [cs.RO])</title>
         3626 <link>http://fr.arxiv.org/abs/2010.15492</link>
         3627 <description rdf:parseType="Literal">&lt;p&gt;Robot manipulation requires a complex set of skills that need to be carefully
         3628 combined and coordinated to solve a task. Yet, most ReinforcementLearning (RL)
         3629 approaches in robotics study tasks which actually consist only of a single
         3630 manipulation skill, such as grasping an object or inserting a pre-grasped
         3631 object. As a result the skill (&apos;how&apos; to solve the task) but not the actual goal
         3632 of a complete manipulation (&apos;what&apos; to solve) is specified. In contrast, we
         3633 study a complex manipulation goal that requires an agent to learn and combine
         3634 diverse manipulation skills. We propose a challenging, highly under-actuated
         3635 peg-in-hole task with a free, rotational asymmetrical peg, requiring a broad
         3636 range of manipulation skills. While correct peg (re-)orientation is a
         3637 requirement for successful insertion, there is no reward associated with it.
         3638 Hence an agent needs to understand this pre-condition and learn the skill to
         3639 fulfil it. The final insertion reward is sparse, allowing freedom in the
         3640 solution and leading to complex emerging behaviour not envisioned during the
         3641 task design. We tackle the problem in a multi-task RL framework using Scheduled
         3642 Auxiliary Control (SAC-X) combined with Regularized Hierarchical Policy
         3643 Optimization (RHPO) which successfully solves the task in simulation and from
         3644 scratch on a single robot where data is severely limited.
         3645 &lt;/p&gt;
         3646 </description>
         3647 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vezzani_G/0/1/0/all/0/1&quot;&gt;Giulia Vezzani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Neunert_M/0/1/0/all/0/1&quot;&gt;Michael Neunert&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wulfmeier_M/0/1/0/all/0/1&quot;&gt;Markus Wulfmeier&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jeong_R/0/1/0/all/0/1&quot;&gt;Rae Jeong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lampe_T/0/1/0/all/0/1&quot;&gt;Thomas Lampe&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Siegel_N/0/1/0/all/0/1&quot;&gt;Noah Siegel&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hafner_R/0/1/0/all/0/1&quot;&gt;Roland Hafner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Abdolmaleki_A/0/1/0/all/0/1&quot;&gt;Abbas Abdolmaleki&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Riedmiller_M/0/1/0/all/0/1&quot;&gt;Martin Riedmiller&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nori_F/0/1/0/all/0/1&quot;&gt;Francesco Nori&lt;/a&gt;</dc:creator>
         3648 </item>
         3649 <item rdf:about="http://fr.arxiv.org/abs/2010.15502">
         3650 <title>Enhancing Vulnerable Road User Safety: A Survey of Existing Practices and Consideration for Using Mobile Devices for V2X Connections. (arXiv:2010.15502v1 [cs.NI])</title>
         3651 <link>http://fr.arxiv.org/abs/2010.15502</link>
         3652 <description rdf:parseType="Literal">&lt;p&gt;Vulnerable road users (VRUs) such as pedestrians, cyclists and motorcyclists
         3653 are at the highest risk in the road traffic environment. Globally, over half of
         3654 road traffic deaths are vulnerable road users. Although substantial efforts are
         3655 being made to improve VRU safety from engineering solutions to law enforcement,
         3656 the death toll of VRUs&apos; continues to rise. The emerging technology, Cooperative
         3657 Intelligent Transportation System (C-ITS), has the proven potential to enhance
         3658 road safety by enabling wireless communication to exchange information among
         3659 road users. Such exchanged information is utilized for creating situational
         3660 awareness and detecting any potential collisions in advance to take necessary
         3661 measures to avoid any possible road casualties. The current state-of-the-art
         3662 solutions of C-ITS for VRU safety, however, are limited to unidirectional
         3663 communication where VRUs are only responsible for alerting their presence to
         3664 drivers with the intention of avoiding collisions. This one-way interaction is
         3665 substantially limiting the enormous potential of C-ITS which otherwise can be
         3666 employed to devise a more effective solution for the VRU safety where VRU can
         3667 be equipped with bidirectional communication with full C-ITS functionalities.
         3668 To address such problems and to explore better C-ITS solution suggestions for
         3669 VRU, this paper reviewed and evaluated the current technologies and safety
         3670 methods proposed for VRU safety over the period 2007-2020. Later, it presents
         3671 the design considerations for a cellular-based Vehicle-to-VRU (V2VRU)
         3672 communication system along with potential challenges of a cellular-based
         3673 approach to provide necessary recommendations.
         3674 &lt;/p&gt;
         3675 </description>
         3676 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dasanayaka_N/0/1/0/all/0/1&quot;&gt;Nishanthi Dasanayaka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hasan_K/0/1/0/all/0/1&quot;&gt;Khondokar Fida Hasan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_C/0/1/0/all/0/1&quot;&gt;Charles Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_Y/0/1/0/all/0/1&quot;&gt;Yanming Feng&lt;/a&gt;</dc:creator>
         3677 </item>
         3678 <item rdf:about="http://fr.arxiv.org/abs/2010.15504">
         3679 <title>A stochastic $\theta$-SEIHRD model: adding randomness to the COVID-19 spread. (arXiv:2010.15504v1 [math.NA])</title>
         3680 <link>http://fr.arxiv.org/abs/2010.15504</link>
         3681 <description rdf:parseType="Literal">&lt;p&gt;In this article we mainly extend the deterministic model developed in [10] to
         3682 a stochastic setting. More precisely, we incorporated randomness in some
         3683 coefficients by assuming that they follow a prescribed stochastic dynamics. In
         3684 this way, the model variables are now represented by stochastic process, that
         3685 can be simulated by appropriately solve the system of stochastic differential
         3686 equations. Thus, the model becomes more complete and flexible than the
         3687 deterministic analogous, as it incorporates additional uncertainties which are
         3688 present in more realistic situations. In particular, confidence intervals for
         3689 the main variables and worst case scenarios can be computed.
         3690 &lt;/p&gt;
         3691 </description>
         3692 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Leitao_A/0/1/0/all/0/1&quot;&gt;&amp;#xc1;lvaro Leitao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Vazquez_C/0/1/0/all/0/1&quot;&gt;Carlos V&amp;#xe1;zquez&lt;/a&gt;</dc:creator>
         3693 </item>
         3694 <item rdf:about="http://fr.arxiv.org/abs/2010.15506">
         3695 <title>Dynamic Formation Reshaping Based on Point Set Registration in a Swarm of Drones. (arXiv:2010.15506v1 [cs.RO])</title>
         3696 <link>http://fr.arxiv.org/abs/2010.15506</link>
         3697 <description rdf:parseType="Literal">&lt;p&gt;This work focuses on the formation reshaping in an optimized manner in
         3698 autonomous swarm of drones. Here, the two main problems are: 1) how to break
         3699 and reshape the initial formation in an optimal manner, and 2) how to do such
         3700 reformation while minimizing the overall deviation of the drones and the
         3701 overall time, i.e., without slowing down. To address the first problem, we
         3702 introduce a set of routines for the drones/agents to follow while reshaping to
         3703 a secondary formation shape. And the second problem is resolved by utilizing
         3704 the temperature function reduction technique, originally used in the point set
         3705 registration process. The goal is to be able to dynamically reform the shape of
         3706 multi-agent based swarm in near-optimal manner while going through narrow
         3707 openings between, for instance obstacles, and then bringing the agents back to
         3708 their original shape after passing through the narrow passage using point set
         3709 registration technique.
         3710 &lt;/p&gt;
         3711 </description>
         3712 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1&quot;&gt;Jawad N. Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1&quot;&gt;Sherif A.S. Mohamed&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1&quot;&gt;Mohammad-Hashem Haghbayan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1&quot;&gt;Jukka Heikkonen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1&quot;&gt;Hannu Tenhunen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_M/0/1/0/all/0/1&quot;&gt;Muhammad Mehboob Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1&quot;&gt;Juha Plosila&lt;/a&gt;</dc:creator>
         3713 </item>
         3714 <item rdf:about="http://fr.arxiv.org/abs/2010.15507">
         3715 <title>Dynamic Resource-aware Corner Detection for Bio-inspired Vision Sensors. (arXiv:2010.15507v1 [cs.CV])</title>
         3716 <link>http://fr.arxiv.org/abs/2010.15507</link>
         3717 <description rdf:parseType="Literal">&lt;p&gt;Event-based cameras are vision devices that transmit only brightness changes
         3718 with low latency and ultra-low power consumption. Such characteristics make
         3719 event-based cameras attractive in the field of localization and object tracking
         3720 in resource-constrained systems. Since the number of generated events in such
         3721 cameras is huge, the selection and filtering of the incoming events are
         3722 beneficial from both increasing the accuracy of the features and reducing the
         3723 computational load. In this paper, we present an algorithm to detect
         3724 asynchronous corners from a stream of events in real-time on embedded systems.
         3725 The algorithm is called the Three Layer Filtering-Harris or TLF-Harris
         3726 algorithm. The algorithm is based on an events&apos; filtering strategy whose
         3727 purpose is 1) to increase the accuracy by deliberately eliminating some
         3728 incoming events, i.e., noise, and 2) to improve the real-time performance of
         3729 the system, i.e., preserving a constant throughput in terms of input events per
         3730 second, by discarding unnecessary events with a limited accuracy loss. An
         3731 approximation of the Harris algorithm, in turn, is used to exploit its
         3732 high-quality detection capability with a low-complexity implementation to
         3733 enable seamless real-time performance on embedded computing platforms. The
         3734 proposed algorithm is capable of selecting the best corner candidate among
         3735 neighbors and achieves an average execution time savings of 59 % compared with
         3736 the conventional Harris score. Moreover, our approach outperforms the competing
         3737 methods, such as eFAST, eHarris, and FA-Harris, in terms of real-time
         3738 performance, and surpasses Arc* in terms of accuracy.
         3739 &lt;/p&gt;
         3740 </description>
         3741 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1&quot;&gt;Sherif A.S. Mohamed&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1&quot;&gt;Jawad N. Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1&quot;&gt;Mohammad-hashem Haghbayan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Miele_A/0/1/0/all/0/1&quot;&gt;Antonio Miele&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1&quot;&gt;Jukka Heikkonen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1&quot;&gt;Hannu Tenhunen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1&quot;&gt;Juha Plosila&lt;/a&gt;</dc:creator>
         3742 </item>
         3743 <item rdf:about="http://fr.arxiv.org/abs/2010.15508">
         3744 <title>FullSubNet: A Full-Band and Sub-Band Fusion Model for Real-Time Single-Channel Speech Enhancement. (arXiv:2010.15508v1 [eess.AS])</title>
         3745 <link>http://fr.arxiv.org/abs/2010.15508</link>
         3746 <description rdf:parseType="Literal">&lt;p&gt;This paper proposes a full-band and sub-band fusion model, named as
         3747 FullSubNet, for single-channel real-time speech enhancement. Full-band and
         3748 sub-band refer to the models that input full-band and sub-band noisy spectral
         3749 feature, output full-band and sub-band speech target, respectively. The
         3750 sub-band model processes each frequency independently. Its input consists of
         3751 one frequency and several context frequencies. The output is the prediction of
         3752 the clean speech target for the corresponding frequency. These two types of
         3753 models have distinct characteristics. The full-band model can capture the
         3754 global spectral context and the long-distance cross-band dependencies. However,
         3755 it lacks the ability to modeling signal stationarity and attending the local
         3756 spectral pattern. The sub-band model is just the opposite. In our proposed
         3757 FullSubNet, we connect a pure full-band model and a pure sub-band model
         3758 sequentially and use practical joint training to integrate these two types of
         3759 models&apos; advantages. We conducted experiments on the DNS challenge (INTERSPEECH
         3760 2020) dataset to evaluate the proposed method. Experimental results show that
         3761 full-band and sub-band information are complementary, and the FullSubNet can
         3762 effectively integrate them. Besides, the performance of the FullSubNet also
         3763 exceeds that of the top-ranked methods in the DNS Challenge (INTERSPEECH 2020).
         3764 &lt;/p&gt;
         3765 </description>
         3766 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1&quot;&gt;Xiang Hao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1&quot;&gt;Xiangdong Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Horaud_R/0/1/0/all/0/1&quot;&gt;Radu Horaud&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_X/0/1/0/all/0/1&quot;&gt;Xiaofei Li&lt;/a&gt;</dc:creator>
         3767 </item>
         3768 <item rdf:about="http://fr.arxiv.org/abs/2010.15509">
         3769 <title>Night vision obstacle detection and avoidance based on Bio-Inspired Vision Sensors. (arXiv:2010.15509v1 [cs.CV])</title>
         3770 <link>http://fr.arxiv.org/abs/2010.15509</link>
         3771 <description rdf:parseType="Literal">&lt;p&gt;Moving towards autonomy, unmanned vehicles rely heavily on state-of-the-art
         3772 collision avoidance systems (CAS). However, the detection of obstacles
         3773 especially during night-time is still a challenging task since the lighting
         3774 conditions are not sufficient for traditional cameras to function properly.
         3775 Therefore, we exploit the powerful attributes of event-based cameras to perform
         3776 obstacle detection in low lighting conditions. Event cameras trigger events
         3777 asynchronously at high output temporal rate with high dynamic range of up to
         3778 120 $dB$. The algorithm filters background activity noise and extracts objects
         3779 using robust Hough transform technique. The depth of each detected object is
         3780 computed by triangulating 2D features extracted utilising LC-Harris. Finally,
         3781 asynchronous adaptive collision avoidance (AACA) algorithm is applied for
         3782 effective avoidance. Qualitative evaluation is compared using event-camera and
         3783 traditional camera.
         3784 &lt;/p&gt;
         3785 </description>
         3786 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1&quot;&gt;Jawad N. Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1&quot;&gt;Sherif A.S. Mohamed&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1&quot;&gt;Mohammad-hashem Haghbayan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1&quot;&gt;Jukka Heikkonen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1&quot;&gt;Hannu Tenhunen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_M/0/1/0/all/0/1&quot;&gt;Muhammad Mehboob Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1&quot;&gt;Juha Plosila&lt;/a&gt;</dc:creator>
         3787 </item>
         3788 <item rdf:about="http://fr.arxiv.org/abs/2010.15510">
         3789 <title>Asynchronous Corner Tracking Algorithm based on Lifetime of Events for DAVIS Cameras. (arXiv:2010.15510v1 [cs.CV])</title>
         3790 <link>http://fr.arxiv.org/abs/2010.15510</link>
         3791 <description rdf:parseType="Literal">&lt;p&gt;Event cameras, i.e., the Dynamic and Active-pixel Vision Sensor (DAVIS) ones,
         3792 capture the intensity changes in the scene and generates a stream of events in
         3793 an asynchronous fashion. The output rate of such cameras can reach up to 10
         3794 million events per second in high dynamic environments. DAVIS cameras use novel
         3795 vision sensors that mimic human eyes. Their attractive attributes, such as high
         3796 output rate, High Dynamic Range (HDR), and high pixel bandwidth, make them an
         3797 ideal solution for applications that require high-frequency tracking. Moreover,
         3798 applications that operate in challenging lighting scenarios can exploit the
         3799 high HDR of event cameras, i.e., 140 dB compared to 60 dB of traditional
         3800 cameras. In this paper, a novel asynchronous corner tracking method is proposed
         3801 that uses both events and intensity images captured by a DAVIS camera. The
         3802 Harris algorithm is used to extract features, i.e., frame-corners from
         3803 keyframes, i.e., intensity images. Afterward, a matching algorithm is used to
         3804 extract event-corners from the stream of events. Events are solely used to
         3805 perform asynchronous tracking until the next keyframe is captured. Neighboring
         3806 events, within a window size of 5x5 pixels around the event-corner, are used to
         3807 calculate the velocity and direction of extracted event-corners by fitting the
         3808 2D planar using a randomized Hough transform algorithm. Experimental evaluation
         3809 showed that our approach is able to update the location of the extracted
         3810 corners up to 100 times during the blind time of traditional cameras, i.e.,
         3811 between two consecutive intensity images.
         3812 &lt;/p&gt;
         3813 </description>
         3814 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohamed_S/0/1/0/all/0/1&quot;&gt;Sherif A.S. Mohamed&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yasin_J/0/1/0/all/0/1&quot;&gt;Jawad N. Yasin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Haghbayan_M/0/1/0/all/0/1&quot;&gt;Mohammad-Hashem Haghbayan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Miele_A/0/1/0/all/0/1&quot;&gt;Antonio Miele&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heikkonen_J/0/1/0/all/0/1&quot;&gt;Jukka Heikkonen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tenhunen_H/0/1/0/all/0/1&quot;&gt;Hannu Tenhunen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plosila_J/0/1/0/all/0/1&quot;&gt;Juha Plosila&lt;/a&gt;</dc:creator>
         3815 </item>
         3816 <item rdf:about="http://fr.arxiv.org/abs/2010.15511">
         3817 <title>An Exact Solution Path Algorithm for SLOPE and Quasi-Spherical OSCAR. (arXiv:2010.15511v1 [stat.ME])</title>
         3818 <link>http://fr.arxiv.org/abs/2010.15511</link>
         3819 <description rdf:parseType="Literal">&lt;p&gt;Sorted $L_1$ penalization estimator (SLOPE) is a regularization technique for
         3820 sorted absolute coefficients in high-dimensional regression. By arbitrarily
         3821 setting its regularization weights $\lambda$ under the monotonicity constraint,
         3822 SLOPE can have various feature selection and clustering properties. On weight
         3823 tuning, the selected features and their clusters are very sensitive to the
         3824 tuning parameters. Moreover, the exhaustive tracking of their changes is
         3825 difficult using grid search methods. This study presents a solution path
         3826 algorithm that provides the complete and exact path of solutions for SLOPE in
         3827 fine-tuning regularization weights. A simple optimality condition for SLOPE is
         3828 derived and used to specify the next splitting point of the solution path. This
         3829 study also proposes a new design of a regularization sequence $\lambda$ for
         3830 feature clustering, which is called the quasi-spherical and octagonal shrinkage
         3831 and clustering algorithm for regression (QS-OSCAR). QS-OSCAR is designed with a
         3832 contour surface of the regularization terms most similar to a sphere. Among
         3833 several regularization sequence designs, sparsity and clustering performance
         3834 are compared through simulation studies. The numerical observations show that
         3835 QS-OSCAR performs feature clustering more efficiently than other designs.
         3836 &lt;/p&gt;
         3837 </description>
         3838 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nomura_S/0/1/0/all/0/1&quot;&gt;Shunichi Nomura&lt;/a&gt;</dc:creator>
         3839 </item>
         3840 <item rdf:about="http://fr.arxiv.org/abs/2010.15521">
         3841 <title>UNetGAN: A Robust Speech Enhancement Approach in Time Domain for Extremely Low Signal-to-noise Ratio Condition. (arXiv:2010.15521v1 [eess.AS])</title>
         3842 <link>http://fr.arxiv.org/abs/2010.15521</link>
         3843 <description rdf:parseType="Literal">&lt;p&gt;Speech enhancement at extremely low signal-to-noise ratio (SNR) condition is
         3844 a very challenging problem and rarely investigated in previous works. This
         3845 paper proposes a robust speech enhancement approach (UNetGAN) based on U-Net
         3846 and generative adversarial learning to deal with this problem. This approach
         3847 consists of a generator network and a discriminator network, which operate
         3848 directly in the time domain. The generator network adopts a U-Net like
         3849 structure and employs dilated convolution in the bottleneck of it. We evaluate
         3850 the performance of the UNetGAN at low SNR conditions (up to -20dB) on the
         3851 public benchmark. The result demonstrates that it significantly improves the
         3852 speech quality and substantially outperforms the representative deep learning
         3853 models, including SEGAN, cGAN fo SE, Bidirectional LSTM using phase-sensitive
         3854 spectrum approximation cost function (PSA-BLSTM) and Wave-U-Net regarding
         3855 Short-Time Objective Intelligibility (STOI) and Perceptual evaluation of speech
         3856 quality (PESQ).
         3857 &lt;/p&gt;
         3858 </description>
         3859 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1&quot;&gt;Xiang Hao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1&quot;&gt;Xiangdong Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zhiyu Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_H/0/1/0/all/0/1&quot;&gt;Hui Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Batushiren/0/1/0/all/0/1&quot;&gt;Batushiren&lt;/a&gt;</dc:creator>
         3860 </item>
         3861 <item rdf:about="http://fr.arxiv.org/abs/2010.15524">
         3862 <title>A brief overview of swarm intelligence-based algorithms for numerical association rule mining. (arXiv:2010.15524v1 [cs.NE])</title>
         3863 <link>http://fr.arxiv.org/abs/2010.15524</link>
         3864 <description rdf:parseType="Literal">&lt;p&gt;Numerical Association Rule Mining is a popular variant of Association Rule
         3865 Mining, where numerical attributes are handled without discretization. This
         3866 means that the algorithms for dealing with this problem can operate directly,
         3867 not only with categorical, but also with numerical attributes. Until recently,
         3868 a big portion of these algorithms were based on a stochastic nature-inspired
         3869 population-based paradigm. As a result, evolutionary and swarm
         3870 intelligence-based algorithms showed big efficiency for dealing with the
         3871 problem. In line with this, the main mission of this chapter is to make a
         3872 historical overview of swarm intelligence-based algorithms for Numerical
         3873 Association Rule Mining, as well as to present the main features of these
         3874 algorithms for the observed problem. A taxonomy of the algorithms was proposed
         3875 on the basis of the applied features found in this overview. Challenges,
         3876 waiting in the future, finish this paper.
         3877 &lt;/p&gt;
         3878 </description>
         3879 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fister_I/0/1/0/all/0/1&quot;&gt;Iztok Fister Jr.&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fister_I/0/1/0/all/0/1&quot;&gt;Iztok Fister&lt;/a&gt;</dc:creator>
         3880 </item>
         3881 <item rdf:about="http://fr.arxiv.org/abs/2010.15525">
         3882 <title>Self-Learning Threshold-Based Load Balancing. (arXiv:2010.15525v1 [cs.PF])</title>
         3883 <link>http://fr.arxiv.org/abs/2010.15525</link>
         3884 <description rdf:parseType="Literal">&lt;p&gt;We consider a large-scale service system where incoming tasks have to be
         3885 instantaneously dispatched to one out of many parallel server pools. The
         3886 dispatcher uses a threshold for balancing the load and keeping the maximum
         3887 number of concurrent tasks across server pools low. We demonstrate that such a
         3888 policy is optimal on the fluid and diffusion scales for a suitable threshold
         3889 value, while only involving a small communication overhead. In order to set the
         3890 threshold optimally, it is important, however, to learn the load of the system,
         3891 which may be uncertain or even time-varying. For that purpose, we design a
         3892 control rule for tuning the threshold in an online manner. We provide
         3893 conditions which guarantee that this adaptive threshold settles at the optimal
         3894 value, along with estimates for the time until this happens.
         3895 &lt;/p&gt;
         3896 </description>
         3897 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goldsztajn_D/0/1/0/all/0/1&quot;&gt;Diego Goldsztajn&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Borst_S/0/1/0/all/0/1&quot;&gt;Sem C. Borst&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leeuwaarden_J/0/1/0/all/0/1&quot;&gt;Johan S. H. van Leeuwaarden&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mukherjee_D/0/1/0/all/0/1&quot;&gt;Debankur Mukherjee&lt;/a&gt; (3), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Whiting_P/0/1/0/all/0/1&quot;&gt;Philip A. Whiting&lt;/a&gt; (4) ((1) Eindhoven University of Technology, (2) Tilburg University, (3) Georgia Institute of Technology, (4) Macquarie University)</dc:creator>
         3898 </item>
         3899 <item rdf:about="http://fr.arxiv.org/abs/2010.15526">
         3900 <title>A comparison of automatic multi-tissue segmentation methods of the human fetal brain using the FeTA Dataset. (arXiv:2010.15526v1 [eess.IV])</title>
         3901 <link>http://fr.arxiv.org/abs/2010.15526</link>
         3902 <description rdf:parseType="Literal">&lt;p&gt;It is critical to quantitatively analyse the developing human fetal brain in
         3903 order to fully understand neurodevelopment in both normal fetuses and those
         3904 with congenital disorders. To facilitate this analysis, automatic multi-tissue
         3905 fetal brain segmentation algorithms are needed, which in turn requires open
         3906 databases of segmented fetal brains. Here we introduce a publicly available
         3907 database of 50 manually segmented pathological and non-pathological fetal
         3908 magnetic resonance brain volume reconstructions across a range of gestational
         3909 ages (20 to 33 weeks) into 7 different tissue categories (external
         3910 cerebrospinal fluid, grey matter, white matter, ventricles, cerebellum, deep
         3911 grey matter, brainstem/spinal cord). In addition, we quantitatively evaluate
         3912 the accuracy of several automatic multi-tissue segmentation algorithms of the
         3913 developing human fetal brain. Four research groups participated, submitting a
         3914 total of 10 algorithms, demonstrating the benefits the database for the
         3915 development of automatic algorithms.
         3916 &lt;/p&gt;
         3917 </description>
         3918 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Payette_K/0/1/0/all/0/1&quot;&gt;Kelly Payette&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Dumast_P/0/1/0/all/0/1&quot;&gt;Priscille de Dumast&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kebiri_H/0/1/0/all/0/1&quot;&gt;Hamza Kebiri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ezhov_I/0/1/0/all/0/1&quot;&gt;Ivan Ezhov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Paetzold_J/0/1/0/all/0/1&quot;&gt;Johannes C. Paetzold&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shit_S/0/1/0/all/0/1&quot;&gt;Suprosanna Shit&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Iqbal_A/0/1/0/all/0/1&quot;&gt;Asim Iqbal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Khan_R/0/1/0/all/0/1&quot;&gt;Romesa Khan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kottke_R/0/1/0/all/0/1&quot;&gt;Raimund Kottke&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Grehten_P/0/1/0/all/0/1&quot;&gt;Patrice Grehten&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ji_H/0/1/0/all/0/1&quot;&gt;Hui Ji&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Lanczi_L/0/1/0/all/0/1&quot;&gt;Levente Lanczi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Nagy_M/0/1/0/all/0/1&quot;&gt;Marianna Nagy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Beresova_M/0/1/0/all/0/1&quot;&gt;Monika Beresova&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Nguyen_T/0/1/0/all/0/1&quot;&gt;Thi Dao Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Natalucci_G/0/1/0/all/0/1&quot;&gt;Giancarlo Natalucci&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Karayannis_T/0/1/0/all/0/1&quot;&gt;Theofanis Karayannis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Menze_B/0/1/0/all/0/1&quot;&gt;Bjoern Menze&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Cuadra_M/0/1/0/all/0/1&quot;&gt;Meritxell Bach Cuadra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Jakab_A/0/1/0/all/0/1&quot;&gt;Andras Jakab&lt;/a&gt;</dc:creator>
         3919 </item>
         3920 <item rdf:about="http://fr.arxiv.org/abs/2010.15527">
         3921 <title>On the robustness of kernel-based pairwise learning. (arXiv:2010.15527v1 [stat.ML])</title>
         3922 <link>http://fr.arxiv.org/abs/2010.15527</link>
         3923 <description rdf:parseType="Literal">&lt;p&gt;It is shown that many results on the statistical robustness of kernel-based
         3924 pairwise learning can be derived under basically no assumptions on the input
         3925 and output spaces. In particular neither moment conditions on the conditional
         3926 distribution of Y given X = x nor the boundedness of the output space is
         3927 needed. We obtain results on the existence and boundedness of the influence
         3928 function and show qualitative robustness of the kernel-based estimator. The
         3929 present paper generalizes results by Christmann and Zhou (2016) by allowing the
         3930 prediction function to take two arguments and can thus be applied in a variety
         3931 of situations such as ranking.
         3932 &lt;/p&gt;
         3933 </description>
         3934 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Gensler_P/0/1/0/all/0/1&quot;&gt;Patrick Gensler&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Christmann_A/0/1/0/all/0/1&quot;&gt;Andreas Christmann&lt;/a&gt;</dc:creator>
         3935 </item>
         3936 <item rdf:about="http://fr.arxiv.org/abs/2010.15528">
         3937 <title>An End to End Network Architecture for Fundamental Matrix Estimation. (arXiv:2010.15528v1 [cs.CV])</title>
         3938 <link>http://fr.arxiv.org/abs/2010.15528</link>
         3939 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we present a novel end-to-end network architecture to estimate
         3940 fundamental matrix directly from stereo images. To establish a complete working
         3941 pipeline, different deep neural networks in charge of finding correspondences
         3942 in images, performing outlier rejection and calculating fundamental matrix, are
         3943 integrated into an end-to-end network architecture.
         3944 &lt;/p&gt;
         3945 &lt;p&gt;To well train the network and preserve geometry properties of fundamental
         3946 matrix, a new loss function is introduced. To evaluate the accuracy of
         3947 estimated fundamental matrix more reasonably, we design a new evaluation metric
         3948 which is highly consistent with visualization result. Experiments conducted on
         3949 both outdoor and indoor data-sets show that this network outperforms
         3950 traditional methods as well as previous deep learning based methods on various
         3951 metrics and achieves significant performance improvements.
         3952 &lt;/p&gt;
         3953 </description>
         3954 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yesheng Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_X/0/1/0/all/0/1&quot;&gt;Xu Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qian_D/0/1/0/all/0/1&quot;&gt;Dahong Qian&lt;/a&gt;</dc:creator>
         3955 </item>
         3956 <item rdf:about="http://fr.arxiv.org/abs/2010.15530">
         3957 <title>Probabilistic interval predictor based on dissimilarity functions. (arXiv:2010.15530v1 [eess.SY])</title>
         3958 <link>http://fr.arxiv.org/abs/2010.15530</link>
         3959 <description rdf:parseType="Literal">&lt;p&gt;This work presents a new method to obtain probabilistic interval predictions
         3960 of a dynamical system. The method uses stored past system measurements to
         3961 estimate the future evolution of the system. The proposed method relies on the
         3962 use of dissimilarity functions to estimate the conditional probability density
         3963 function of the outputs. A family of empirical probability density functions,
         3964 parameterized by means of two parameters, is introduced. It is shown that the
         3965 the proposed family encompasses the multivariable normal probability density
         3966 function as a particular case. We show that the proposed method constitutes a
         3967 generalization of classical estimation methods. A cross-validation scheme is
         3968 used to tune the two parameters on which the methodology relies. In order to
         3969 prove the effectiveness of the methodology presented, some numerical examples
         3970 and comparisons are provided.
         3971 &lt;/p&gt;
         3972 </description>
         3973 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Carnerero_A/0/1/0/all/0/1&quot;&gt;A. Daniel Carnerero&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ramirez_D/0/1/0/all/0/1&quot;&gt;Daniel R. Ramirez&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Alamo_T/0/1/0/all/0/1&quot;&gt;Teodoro Alamo&lt;/a&gt;</dc:creator>
         3974 </item>
         3975 <item rdf:about="http://fr.arxiv.org/abs/2010.15531">
         3976 <title>Coordinated Formation Control for Intelligent and Connected Vehicles in Multiple Traffic Scenarios. (arXiv:2010.15531v1 [eess.SY])</title>
         3977 <link>http://fr.arxiv.org/abs/2010.15531</link>
         3978 <description rdf:parseType="Literal">&lt;p&gt;In this paper, a unified multi-vehicle formation control framework for
         3979 Intelligent and Connected Vehicles (ICVs) that can apply to multiple traffic
         3980 scenarios is proposed. In the one-dimensional scenario, different formation
         3981 geometries are analyzed and the interlaced structure is mathematically
         3982 modelized to improve driving safety while making full use of the lane capacity.
         3983 The assignment problem for vehicles and target positions is solved using
         3984 Hungarian Algorithm to improve the flexibility of the method in multiple
         3985 scenarios. In the two-dimensional scenario, an improved virtual platoon method
         3986 is proposed to transfer the complex two-dimensional passing problem to the
         3987 one-dimensional formation control problem based on the idea of rotation
         3988 projection. Besides, the vehicle regrouping method is proposed to connect the
         3989 two scenarios. Simulation results prove that the proposed multi-vehicle
         3990 formation control framework can apply to multiple typical scenarios and have
         3991 better performance than existing methods.
         3992 &lt;/p&gt;
         3993 </description>
         3994 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Xu_Q/0/1/0/all/0/1&quot;&gt;Qing Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Cai_M/0/1/0/all/0/1&quot;&gt;Mengchi Cai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_K/0/1/0/all/0/1&quot;&gt;Keqiang Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Xu_B/0/1/0/all/0/1&quot;&gt;Biao Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wang_J/0/1/0/all/0/1&quot;&gt;Jianqiang Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wu_X/0/1/0/all/0/1&quot;&gt;Xiangbin Wu&lt;/a&gt;</dc:creator>
         3995 </item>
         3996 <item rdf:about="http://fr.arxiv.org/abs/2010.15533">
         3997 <title>How do Offline Measures for Exploration in Reinforcement Learning behave?. (arXiv:2010.15533v1 [cs.LG])</title>
         3998 <link>http://fr.arxiv.org/abs/2010.15533</link>
         3999 <description rdf:parseType="Literal">&lt;p&gt;Sufficient exploration is paramount for the success of a reinforcement
         4000 learning agent. Yet, exploration is rarely assessed in an algorithm-independent
         4001 way. We compare the behavior of three data-based, offline exploration metrics
         4002 described in the literature on intuitive simple distributions and highlight
         4003 problems to be aware of when using them. We propose a fourth metric,uniform
         4004 relative entropy, and implement it using either a k-nearest-neighbor or a
         4005 nearest-neighbor-ratio estimator, highlighting that the implementation choices
         4006 have a profound impact on these measures.
         4007 &lt;/p&gt;
         4008 </description>
         4009 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hollenstein_J/0/1/0/all/0/1&quot;&gt;Jakob J. Hollenstein&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Auddy_S/0/1/0/all/0/1&quot;&gt;Sayantan Auddy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Saveriano_M/0/1/0/all/0/1&quot;&gt;Matteo Saveriano&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Renaudo_E/0/1/0/all/0/1&quot;&gt;Erwan Renaudo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Piater_J/0/1/0/all/0/1&quot;&gt;Justus Piater&lt;/a&gt;</dc:creator>
         4010 </item>
         4011 <item rdf:about="http://fr.arxiv.org/abs/2010.15534">
         4012 <title>Poster: Benchmarking Financial Data Feed Systems. (arXiv:2010.15534v1 [cs.PF])</title>
         4013 <link>http://fr.arxiv.org/abs/2010.15534</link>
         4014 <description rdf:parseType="Literal">&lt;p&gt;Data-driven solutions for the investment industry require event-based backend
         4015 systems to process high-volume financial data feeds with low latency, high
         4016 throughput, and guaranteed delivery modes.
         4017 &lt;/p&gt;
         4018 &lt;p&gt;At vwd we process an average of 18 billion incoming event notifications from
         4019 500+ data sources for 30 million symbols per day and peak rates of 1+ million
         4020 notifications per second using custom-built platforms that keep audit logs of
         4021 every event.
         4022 &lt;/p&gt;
         4023 &lt;p&gt;We currently assess modern open source event-processing platforms such as
         4024 Kafka, NATS, Redis, Flink or Storm for the use in our ticker plant to reduce
         4025 the maintenance effort for cross-cutting concerns and leverage hybrid
         4026 deployment models. For comparability and repeatability we benchmark candidates
         4027 with a standardized workload we derived from our real data feeds.
         4028 &lt;/p&gt;
         4029 &lt;p&gt;We have enhanced an existing light-weight open source benchmarking tool in
         4030 its processing, logging, and reporting capabilities to cope with our workloads.
         4031 The resulting tool wrench can simulate workloads or replay snapshots in volume
         4032 and dynamics like those we process in our ticker plant. We provide the tool as
         4033 open source.
         4034 &lt;/p&gt;
         4035 &lt;p&gt;As part of ongoing work we contribute details on (a) our workload and
         4036 requirements for benchmarking candidate platforms for financial feed
         4037 processing; (b) the current state of the tool wrench.
         4038 &lt;/p&gt;
         4039 </description>
         4040 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Coenen_M/0/1/0/all/0/1&quot;&gt;Manuel Coenen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wagner_C/0/1/0/all/0/1&quot;&gt;Christoph Wagner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Echler_A/0/1/0/all/0/1&quot;&gt;Alexander Echler&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frischbier_S/0/1/0/all/0/1&quot;&gt;Sebastian Frischbier&lt;/a&gt;</dc:creator>
         4041 </item>
         4042 <item rdf:about="http://fr.arxiv.org/abs/2010.15535">
         4043 <title>Unbabel&apos;s Participation in the WMT20 Metrics Shared Task. (arXiv:2010.15535v1 [cs.CL])</title>
         4044 <link>http://fr.arxiv.org/abs/2010.15535</link>
         4045 <description rdf:parseType="Literal">&lt;p&gt;We present the contribution of the Unbabel team to the WMT 2020 Shared Task
         4046 on Metrics. We intend to participate on the segment-level, document-level and
         4047 system-level tracks on all language pairs, as well as the &apos;QE as a Metric&apos;
         4048 track. Accordingly, we illustrate results of our models in these tracks with
         4049 reference to test sets from the previous year. Our submissions build upon the
         4050 recently proposed COMET framework: We train several estimator models to regress
         4051 on different human-generated quality scores and a novel ranking model trained
         4052 on relative ranks obtained from Direct Assessments. We also propose a simple
         4053 technique for converting segment-level predictions into a document-level score.
         4054 Overall, our systems achieve strong results for all language pairs on previous
         4055 test sets and in many cases set a new state-of-the-art.
         4056 &lt;/p&gt;
         4057 </description>
         4058 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rei_R/0/1/0/all/0/1&quot;&gt;Ricardo Rei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stewart_C/0/1/0/all/0/1&quot;&gt;Craig Stewart&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Farinha_C/0/1/0/all/0/1&quot;&gt;Catarina Farinha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lavie_A/0/1/0/all/0/1&quot;&gt;Alon Lavie&lt;/a&gt;</dc:creator>
         4059 </item>
         4060 <item rdf:about="http://fr.arxiv.org/abs/2010.15538">
         4061 <title>Matern Gaussian Processes on Graphs. (arXiv:2010.15538v1 [stat.ML])</title>
         4062 <link>http://fr.arxiv.org/abs/2010.15538</link>
         4063 <description rdf:parseType="Literal">&lt;p&gt;Gaussian processes are a versatile framework for learning unknown functions
         4064 in a manner that permits one to utilize prior information about their
         4065 properties. Although many different Gaussian process models are readily
         4066 available when the input space is Euclidean, the choice is much more limited
         4067 for Gaussian processes whose input space is an undirected graph. In this work,
         4068 we leverage the stochastic partial differential equation characterization of
         4069 Mat\&apos;{e}rn Gaussian processes - a widely-used model class in the Euclidean
         4070 setting - to study their analog for undirected graphs. We show that the
         4071 resulting Gaussian processes inherit various attractive properties of their
         4072 Euclidean and Riemannian analogs and provide techniques that allow them to be
         4073 trained using standard methods, such as inducing points. This enables graph
         4074 Mat\&apos;{e}rn Gaussian processes to be employed in mini-batch and non-conjugate
         4075 settings, thereby making them more accessible to practitioners and easier to
         4076 deploy within larger learning frameworks.
         4077 &lt;/p&gt;
         4078 </description>
         4079 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Borovitskiy_V/0/1/0/all/0/1&quot;&gt;Viacheslav Borovitskiy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Azangulov_I/0/1/0/all/0/1&quot;&gt;Iskander Azangulov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Terenin_A/0/1/0/all/0/1&quot;&gt;Alexander Terenin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Mostowsky_P/0/1/0/all/0/1&quot;&gt;Peter Mostowsky&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Deisenroth_M/0/1/0/all/0/1&quot;&gt;Marc Peter Deisenroth&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Durrande_N/0/1/0/all/0/1&quot;&gt;Nicolas Durrande&lt;/a&gt;</dc:creator>
         4080 </item>
         4081 <item rdf:about="http://fr.arxiv.org/abs/2010.15541">
         4082 <title>Micromagnetics of thin films in the presence of Dzyaloshinskii-Moriya interaction. (arXiv:2010.15541v1 [math.AP])</title>
         4083 <link>http://fr.arxiv.org/abs/2010.15541</link>
         4084 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we study the thin-film limit of the micromagnetic energy
         4085 functional in the presence of bulk Dzyaloshinskii-Moriya interaction (DMI). Our
         4086 analysis includes both a stationary $\Gamma$-convergence result for the
         4087 micromagnetic energy, as well as the identification of the asymptotic behavior
         4088 of the associated Landau-Lifshitz-Gilbert equation. In particular, we prove
         4089 that, in the limiting model, part of the DMI term behaves like the projection
         4090 of the magnetic moment onto the normal to the film, contributing this way to an
         4091 increase in the shape anisotropy arising from the magnetostatic self-energy.
         4092 Finally, we discuss a convergent finite element approach for the approximation
         4093 of the time-dependent case and use it to numerically compare the original
         4094 three-dimensional model with the two-dimensional thin-film limit.
         4095 &lt;/p&gt;
         4096 </description>
         4097 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Davoli_E/0/1/0/all/0/1&quot;&gt;Elisa Davoli&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Fratta_G/0/1/0/all/0/1&quot;&gt;Giovanni Di Fratta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Praetorius_D/0/1/0/all/0/1&quot;&gt;Dirk Praetorius&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Ruggeri_M/0/1/0/all/0/1&quot;&gt;Michele Ruggeri&lt;/a&gt;</dc:creator>
         4098 </item>
         4099 <item rdf:about="http://fr.arxiv.org/abs/2010.15545">
         4100 <title>Systematic literature review protocol Identification and classification of feature modeling errors. (arXiv:2010.15545v1 [cs.SE])</title>
         4101 <link>http://fr.arxiv.org/abs/2010.15545</link>
         4102 <description rdf:parseType="Literal">&lt;p&gt;Context: The importance of feature modeling languages for software product
         4103 lines and the planning stage for a systematic literature review. Objective: A
         4104 protocol for carrying out a systematic literature review about the evidence for
         4105 identifying and classifying the errors in feature modeling languages. Method:
         4106 The definition of a protocol to conduct a systematic literature review
         4107 according to the guidelines of B. Kitchenham. Results: A validated protocol to
         4108 conduct a systematic literature review. Conclusions: A proposal for the
         4109 protocol definition of a systematic literature review about the identification
         4110 and classification of errors in feature modeling was built. Initial results
         4111 show that the effects and results for solving these errors should be carried
         4112 out.
         4113 &lt;/p&gt;
         4114 </description>
         4115 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sepulveda_S/0/1/0/all/0/1&quot;&gt;Samuel Sep&amp;#xfa;lveda&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Diaz_J/0/1/0/all/0/1&quot;&gt;Jaime D&amp;#xed;az&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Esperguel_M/0/1/0/all/0/1&quot;&gt;Marcelo Esperguel&lt;/a&gt;</dc:creator>
         4116 </item>
         4117 <item rdf:about="http://fr.arxiv.org/abs/2010.15549">
         4118 <title>Multi-Constitutive Neural Network for Large Deformation Poromechanics Problem. (arXiv:2010.15549v1 [cs.LG])</title>
         4119 <link>http://fr.arxiv.org/abs/2010.15549</link>
         4120 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we study the problem of large-strain consolidation in
         4121 poromechanics with deep neural networks. Given different material properties
         4122 and different loading conditions, the goal is to predict pore pressure and
         4123 settlement. We propose a novel method &quot;multi-constitutive neural network&quot;
         4124 (MCNN) such that one model can solve several different constitutive laws. We
         4125 introduce a one-hot encoding vector as an additional input vector, which is
         4126 used to label the constitutive law we wish to solve. Then we build a DNN which
         4127 takes as input (X, t) along with a constitutive model label and outputs the
         4128 corresponding solution. It is the first time, to our knowledge, that we can
         4129 evaluate multi-constitutive laws through only one training process while still
         4130 obtaining good accuracies. We found that MCNN trained to solve multiple PDEs
         4131 outperforms individual neural network solvers trained with PDE.
         4132 &lt;/p&gt;
         4133 </description>
         4134 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Q/0/1/0/all/0/1&quot;&gt;Qi Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yilin Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_Z/0/1/0/all/0/1&quot;&gt;Ziyi Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Darve_E/0/1/0/all/0/1&quot;&gt;Eric Darve&lt;/a&gt;</dc:creator>
         4135 </item>
         4136 <item rdf:about="http://fr.arxiv.org/abs/2010.15550">
         4137 <title>ADABOOK &amp; MULTIBOOK: Adaptive Boosting with Chance Correction. (arXiv:2010.15550v1 [cs.LG])</title>
         4138 <link>http://fr.arxiv.org/abs/2010.15550</link>
         4139 <description rdf:parseType="Literal">&lt;p&gt;There has been considerable interest in boosting and bagging, including the
         4140 combination of the adaptive techniques of AdaBoost with the random selection
         4141 with replacement techniques of Bagging. At the same time there has been a
         4142 revisiting of the way we evaluate, with chance-corrected measures like Kappa,
         4143 Informedness, Correlation or ROC AUC being advocated. This leads to the
         4144 question of whether learning algorithms can do better by optimizing an
         4145 appropriate chance corrected measure. Indeed, it is possible for a weak learner
         4146 to optimize Accuracy to the detriment of the more reaslistic chance-corrected
         4147 measures, and when this happens the booster can give up too early. This
         4148 phenomenon is known to occur with conventional Accuracy-based AdaBoost, and the
         4149 MultiBoost algorithm has been developed to overcome such problems using restart
         4150 techniques based on bagging. This paper thus complements the theoretical work
         4151 showing the necessity of using chance-corrected measures for evaluation, with
         4152 empirical work showing how use of a chance-corrected measure can improve
         4153 boosting. We show that the early surrender problem occurs in MultiBoost too, in
         4154 multiclass situations, so that chance-corrected AdaBook and Multibook can beat
         4155 standard Multiboost or AdaBoost, and we further identify which chance-corrected
         4156 measures to use when.
         4157 &lt;/p&gt;
         4158 </description>
         4159 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Powers_D/0/1/0/all/0/1&quot;&gt;David M. W. Powers&lt;/a&gt;</dc:creator>
         4160 </item>
         4161 <item rdf:about="http://fr.arxiv.org/abs/2010.15551">
         4162 <title>Investigating the Robustness of Artificial Intelligent Algorithms with Mixture Experiments. (arXiv:2010.15551v1 [stat.ML])</title>
         4163 <link>http://fr.arxiv.org/abs/2010.15551</link>
         4164 <description rdf:parseType="Literal">&lt;p&gt;Artificial intelligent (AI) algorithms, such as deep learning and XGboost,
         4165 are used in numerous applications including computer vision, autonomous
         4166 driving, and medical diagnostics. The robustness of these AI algorithms is of
         4167 great interest as inaccurate prediction could result in safety concerns and
         4168 limit the adoption of AI systems. In this paper, we propose a framework based
         4169 on design of experiments to systematically investigate the robustness of AI
         4170 classification algorithms. A robust classification algorithm is expected to
         4171 have high accuracy and low variability under different application scenarios.
         4172 The robustness can be affected by a wide range of factors such as the imbalance
         4173 of class labels in the training dataset, the chosen prediction algorithm, the
         4174 chosen dataset of the application, and a change of distribution in the training
         4175 and test datasets. To investigate the robustness of AI classification
         4176 algorithms, we conduct a comprehensive set of mixture experiments to collect
         4177 prediction performance results. Then statistical analyses are conducted to
         4178 understand how various factors affect the robustness of AI classification
         4179 algorithms. We summarize our findings and provide suggestions to practitioners
         4180 in AI applications.
         4181 &lt;/p&gt;
         4182 </description>
         4183 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Lian_J/0/1/0/all/0/1&quot;&gt;Jiayi Lian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Freeman_L/0/1/0/all/0/1&quot;&gt;Laura Freeman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Hong_Y/0/1/0/all/0/1&quot;&gt;Yili Hong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Deng_X/0/1/0/all/0/1&quot;&gt;Xinwei Deng&lt;/a&gt;</dc:creator>
         4184 </item>
         4185 <item rdf:about="http://fr.arxiv.org/abs/2010.15552">
         4186 <title>Successive Halving Top-k Operator. (arXiv:2010.15552v1 [cs.LG])</title>
         4187 <link>http://fr.arxiv.org/abs/2010.15552</link>
         4188 <description rdf:parseType="Literal">&lt;p&gt;We propose a differentiable successive halving method of relaxing the top-k
         4189 operator, rendering gradient-based optimization possible. The need to perform
         4190 softmax iteratively on the entire vector of scores is avoided by using a
         4191 tournament-style selection. As a result, a much better approximation of top-k
         4192 with lower computational cost is achieved compared to the previous approach.
         4193 &lt;/p&gt;
         4194 </description>
         4195 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pietruszka_M/0/1/0/all/0/1&quot;&gt;Micha&amp;#x142; Pietruszka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Borchmann_L/0/1/0/all/0/1&quot;&gt;&amp;#x141;ukasz Borchmann&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gralinski_F/0/1/0/all/0/1&quot;&gt;Filip Grali&amp;#x144;ski&lt;/a&gt;</dc:creator>
         4196 </item>
         4197 <item rdf:about="http://fr.arxiv.org/abs/2010.15556">
         4198 <title>Modulation Pattern Detection Using Complex Convolutions in Deep Learning. (arXiv:2010.15556v1 [cs.LG])</title>
         4199 <link>http://fr.arxiv.org/abs/2010.15556</link>
         4200 <description rdf:parseType="Literal">&lt;p&gt;Transceivers used for telecommunications transmit and receive specific
         4201 modulation patterns that are represented as sequences of complex numbers.
         4202 Classifying modulation patterns is challenging because noise and channel
         4203 impairments affect the signals in complicated ways such that the received
         4204 signal bears little resemblance to the transmitted signal. Although deep
         4205 learning approaches have shown great promise over statistical methods in this
         4206 problem space, deep learning frameworks continue to lag in support for
         4207 complex-valued data. To address this gap, we study the implementation and use
         4208 of complex convolutions in a series of convolutional neural network
         4209 architectures. Replacement of data structure and convolution operations by
         4210 their complex generalization in an architecture improves performance, with
         4211 statistical significance, at recognizing modulation patterns in complex-valued
         4212 signals with high SNR after being trained on low SNR signals. This suggests
         4213 complex-valued convolutions enables networks to learn more meaningful
         4214 representations. We investigate this hypothesis by comparing the features
         4215 learned in each experiment by visualizing the inputs that results in one-hot
         4216 modulation pattern classification for each network.
         4217 &lt;/p&gt;
         4218 </description>
         4219 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Krzyston_J/0/1/0/all/0/1&quot;&gt;Jakob Krzyston&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bhattacharjea_R/0/1/0/all/0/1&quot;&gt;Rajib Bhattacharjea&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stark_A/0/1/0/all/0/1&quot;&gt;Andrew Stark&lt;/a&gt;</dc:creator>
         4220 </item>
         4221 <item rdf:about="http://fr.arxiv.org/abs/2010.15559">
         4222 <title>Quantum Computing: A Taxonomy, Systematic Review and Future Directions. (arXiv:2010.15559v1 [cs.ET])</title>
         4223 <link>http://fr.arxiv.org/abs/2010.15559</link>
         4224 <description rdf:parseType="Literal">&lt;p&gt;Quantum computing is an emerging paradigm with the potential to offer
         4225 significant computational advantage over conventional classical computing by
         4226 exploiting quantum-mechanical principles such as entanglement and
         4227 superposition. It is anticipated that this computational advantage of quantum
         4228 computing will help to solve many complex and computationally intractable
         4229 problems in several areas of research such as drug design, data science, clean
         4230 energy, finance, industrial chemical development, secure communications, and
         4231 quantum chemistry, among others. In recent years, tremendous progress in both
         4232 quantum hardware development and quantum software/algorithm have brought
         4233 quantum computing much closer to reality. As the quantum devices are expected
         4234 to steadily scale up in the next few years, quantum decoherence and qubit
         4235 interconnectivity are two of the major challenges to achieve quantum advantage
         4236 in the NISQ era. Quantum computing is a highly topical and fast-moving field of
         4237 research with significant ongoing progress in all facets. A systematic review
         4238 of the existing literature on quantum computing will be invaluable to
         4239 understand the current status of this emerging field and identify open
         4240 challenges for the quantum computing community in the coming years. This review
         4241 article presents a comprehensive review of quantum computing literature, and
         4242 taxonomy of quantum computing. Further, the proposed taxonomy is used to map
         4243 various related studies to identify the research gaps. A detailed overview of
         4244 quantum software tools and technologies, post-quantum cryptography and quantum
         4245 computer hardware development to document the current state-of-the-art in the
         4246 respective areas. We finish the article by highlighting various open challenges
         4247 and promising future directions for research.
         4248 &lt;/p&gt;
         4249 </description>
         4250 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gill_S/0/1/0/all/0/1&quot;&gt;Sukhpal Singh Gill&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kumar_A/0/1/0/all/0/1&quot;&gt;Adarsh Kumar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_H/0/1/0/all/0/1&quot;&gt;Harvinder Singh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_M/0/1/0/all/0/1&quot;&gt;Manmeet Singh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kaur_K/0/1/0/all/0/1&quot;&gt;Kamalpreet Kaur&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Usman_M/0/1/0/all/0/1&quot;&gt;Muhammad Usman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Buyya_R/0/1/0/all/0/1&quot;&gt;Rajkumar Buyya&lt;/a&gt;</dc:creator>
         4251 </item>
         4252 <item rdf:about="http://fr.arxiv.org/abs/2010.15560">
         4253 <title>Genetic U-Net: Automatically Designing Lightweight U-shaped CNN Architectures Using the Genetic Algorithm for Retinal Vessel Segmentation. (arXiv:2010.15560v1 [eess.IV])</title>
         4254 <link>http://fr.arxiv.org/abs/2010.15560</link>
         4255 <description rdf:parseType="Literal">&lt;p&gt;Many previous works based on deep learning for retinal vessel segmentation
         4256 have achieved promising performance by manually designing U-shaped
         4257 convolutional neural networks (CNNs). However, the manual design of these CNNs
         4258 is time-consuming and requires extensive empirical knowledge. To address this
         4259 problem, we propose a novel method using genetic algorithms (GAs) to
         4260 automatically design a lightweight U-shaped CNN for retinal vessel
         4261 segmentation, called Genetic U-Net. Here we first design a special search space
         4262 containing the structure of U-Net and its corresponding operations, and then
         4263 use genetic algorithm to search for superior architectures in this search
         4264 space. Experimental results show that the proposed method outperforms the
         4265 existing methods on three public datasets, DRIVE, CHASE_DB1 and STARE. In
         4266 addition, the architectures obtained by the proposed method are more
         4267 lightweight but robust than the state-of-the-art models.
         4268 &lt;/p&gt;
         4269 </description>
         4270 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wei_J/0/1/0/all/0/1&quot;&gt;Jiahong Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Fan_Z/0/1/0/all/0/1&quot;&gt;Zhun Fan&lt;/a&gt;</dc:creator>
         4271 </item>
         4272 <item rdf:about="http://fr.arxiv.org/abs/2010.15561">
         4273 <title>Federated Transfer Learning: concept and applications. (arXiv:2010.15561v1 [cs.LG])</title>
         4274 <link>http://fr.arxiv.org/abs/2010.15561</link>
         4275 <description rdf:parseType="Literal">&lt;p&gt;Development of Artificial Intelligence (AI) is inherently tied to the
         4276 development of data. However, in most industries data exists in form of
         4277 isolated islands, with limited scope of sharing between different
         4278 organizations. This is an hindrance to the further development of AI. Federated
         4279 learning has emerged as a possible solution to this problem in the last few
         4280 years without compromising user privacy. Among different variants of the
         4281 federated learning, noteworthy is federated transfer learning (FTL) that allows
         4282 knowledge to be transferred across domains that do not have many overlapping
         4283 features and users. In this work we provide a comprehensive survey of the
         4284 existing works on this topic. In more details, we study the background of FTL
         4285 and its different existing applications. We further analyze FTL from privacy
         4286 and machine learning perspective.
         4287 &lt;/p&gt;
         4288 </description>
         4289 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Saha_S/0/1/0/all/0/1&quot;&gt;Sudipan Saha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ahmad_T/0/1/0/all/0/1&quot;&gt;Tahir Ahmad&lt;/a&gt;</dc:creator>
         4290 </item>
         4291 <item rdf:about="http://fr.arxiv.org/abs/2010.15562">
         4292 <title>Limitations of the recall capabilities in delay based reservoir computing systems. (arXiv:2010.15562v1 [cs.ET])</title>
         4293 <link>http://fr.arxiv.org/abs/2010.15562</link>
         4294 <description rdf:parseType="Literal">&lt;p&gt;We analyze the memory capacity of a delay based reservoir computer with a
         4295 Hopf normal form as nonlinearity and numerically compute the linear as well as
         4296 the higher order recall capabilities. A possible physical realisation could be
         4297 a laser with external cavity, for which the information is fed via electrical
         4298 injection. A task independent quantification of the computational capability of
         4299 the reservoir system is done via a complete orthonormal set of basis functions.
         4300 Our results suggest that even for constant readout dimension the total memory
         4301 capacity is dependent on the ratio between the information input period, also
         4302 called the clock cycle, and the time delay in the system. Optimal performance
         4303 is found for a time delay about 1.6 times the clock cycle
         4304 &lt;/p&gt;
         4305 </description>
         4306 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Koster_F/0/1/0/all/0/1&quot;&gt;Felix K&amp;#xf6;ster&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ehlert_D/0/1/0/all/0/1&quot;&gt;Dominik Ehlert&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ludge_K/0/1/0/all/0/1&quot;&gt;Kathy L&amp;#xfc;dge&lt;/a&gt;</dc:creator>
         4307 </item>
         4308 <item rdf:about="http://fr.arxiv.org/abs/2010.15571">
         4309 <title>Overcoming The Limitations of Neural Networks in Composite-Pattern Learning with Architopes. (arXiv:2010.15571v1 [cs.NE])</title>
         4310 <link>http://fr.arxiv.org/abs/2010.15571</link>
         4311 <description rdf:parseType="Literal">&lt;p&gt;The effectiveness of neural networks in solving complex problems is well
         4312 recognized; however, little is known about their limitations. We demonstrate
         4313 that the feed-forward architecture, for most commonly used activation
         4314 functions, is incapable of approximating functions comprised of multiple
         4315 sub-patterns while simultaneously respecting their composite-pattern structure.
         4316 We overcome this bottleneck with a simple architecture modification that
         4317 reallocates the neurons of any single feed-forward network across several
         4318 smaller sub-networks, each specialized on a distinct part of the input-space.
         4319 The modified architecture, called an Architope, is more expressive on two
         4320 fronts. First, it is dense in an associated space of piecewise continuous
         4321 functions in which the feed-forward architecture is not dense. Second, it
         4322 achieves the same approximation rate as the feed-forward networks while only
         4323 requiring $\mathscr{O}(N^{-1})$ fewer parameters in its hidden layers.
         4324 Moreover, the architecture achieves these approximation improvements while
         4325 preserving the target&apos;s composite-pattern structure.
         4326 &lt;/p&gt;
         4327 </description>
         4328 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kratsios_A/0/1/0/all/0/1&quot;&gt;Anastasis Kratsios&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zamanlooy_B/0/1/0/all/0/1&quot;&gt;Behnoosh Zamanlooy&lt;/a&gt;</dc:creator>
         4329 </item>
         4330 <item rdf:about="http://fr.arxiv.org/abs/2010.15572">
         4331 <title>Experimental Analysis of Communication Relaying Delay in Low-Energy Ad-hoc Networks. (arXiv:2010.15572v1 [cs.NI])</title>
         4332 <link>http://fr.arxiv.org/abs/2010.15572</link>
         4333 <description rdf:parseType="Literal">&lt;p&gt;In recent years, more and more applications use ad-hoc networks for local M2M
         4334 communications, but in some cases such as when using WSNs, the software
         4335 processing delay induced by packets relaying may not be negligible. In this
         4336 paper, we planned and carried out a delay measurement experiment using
         4337 Raspberry Pi Zero W. The results demonstrated that, in low-energy ad-hoc
         4338 networks, processing delay of the application is always too large to ignore; it
         4339 is at least ten times greater than the kernel routing and corresponds to 30% of
         4340 the transmission delay. Furthermore, if the task is CPU-intensive, such as
         4341 packet encryption, the processing delay can be greater than the transmission
         4342 delay and its behavior is represented by a simple linear model. Our findings
         4343 indicate that the key factor for achieving QoS in ad-hoc networks is an
         4344 appropriate node-to-node load balancing that takes into account the CPU
         4345 performance and the amount of traffic passing through each node.
         4346 &lt;/p&gt;
         4347 </description>
         4348 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Miya_T/0/1/0/all/0/1&quot;&gt;Taichi Miya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ohshima_K/0/1/0/all/0/1&quot;&gt;Kohta Ohshima&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kitaguchi_Y/0/1/0/all/0/1&quot;&gt;Yoshiaki Kitaguchi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yamaoka_K/0/1/0/all/0/1&quot;&gt;Katsunori Yamaoka&lt;/a&gt;</dc:creator>
         4349 </item>
         4350 <item rdf:about="http://fr.arxiv.org/abs/2010.15577">
         4351 <title>Import test questions into Moodle LMS. (arXiv:2010.15577v1 [cs.CY])</title>
         4352 <link>http://fr.arxiv.org/abs/2010.15577</link>
         4353 <description rdf:parseType="Literal">&lt;p&gt;The purpose of the study is to highlight the theoretical and methodological
         4354 aspects of preparing the test questions of the most common types in the form of
         4355 text files for further import into learning management system (LMS) Moodle. The
         4356 subject of the research is the automated filling of the Moodle LMS test
         4357 database. The objectives of the study: to analyze the import files of test
         4358 questions, their advantages and disadvantages; to develop guidelines for the
         4359 preparation of test questions of common types in the form of text files for
         4360 further import into Moodle LMS. The action algorithms for importing questions
         4361 and instructions for submitting question files in such formats as Aiken, GIFT,
         4362 Moodle XML, &quot;True/False&quot; questions, &quot;Multiple Choice&quot; (one of many and many of
         4363 many), &quot;Matching&quot;, with an open answer - &quot;Numerical&quot; or &quot;Short answer&quot; and
         4364 &quot;Essay&quot; are offered in this article. The formats for submitting questions,
         4365 examples of its designing and developed questions were demonstrated in view
         4366 mode in Moodle LMS.
         4367 &lt;/p&gt;
         4368 </description>
         4369 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mintii_I/0/1/0/all/0/1&quot;&gt;Iryna S. Mintii&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shokaliuk_S/0/1/0/all/0/1&quot;&gt;Svitlana V. Shokaliuk&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vakaliuk_T/0/1/0/all/0/1&quot;&gt;Tetiana A. Vakaliuk&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mintii_M/0/1/0/all/0/1&quot;&gt;Mykhailo M. Mintii&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Soloviev_V/0/1/0/all/0/1&quot;&gt;Vladimir N. Soloviev&lt;/a&gt;</dc:creator>
         4370 </item>
         4371 <item rdf:about="http://fr.arxiv.org/abs/2010.15578">
         4372 <title>Exploring the Nuances of Designing (with/for) Artificial Intelligence. (arXiv:2010.15578v1 [cs.CY])</title>
         4373 <link>http://fr.arxiv.org/abs/2010.15578</link>
         4374 <description rdf:parseType="Literal">&lt;p&gt;Solutions relying on artificial intelligence are devised to predict data
         4375 patterns and answer questions that are clearly defined, involve an enumerable
         4376 set of solutions, clear rules, and inherently binary decision mechanisms. Yet,
         4377 as they become exponentially implemented in our daily activities, they begin to
         4378 transcend these initial boundaries and to affect the larger sociotechnical
         4379 system in which they are situated. In this arrangement, a solution is under
         4380 pressure to surpass true or false criteria and move to an ethical evaluation of
         4381 right and wrong. Neither algorithmic solutions, nor purely humanistic ones will
         4382 be enough to fully mitigate undesirable outcomes in the narrow state of AI or
         4383 its future incarnations. We must take a holistic view. In this paper we explore
         4384 the construct of infrastructure as a means to simultaneously address
         4385 algorithmic and societal issues when designing AI.
         4386 &lt;/p&gt;
         4387 </description>
         4388 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stoimenova_N/0/1/0/all/0/1&quot;&gt;Niya Stoimenova&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Price_R/0/1/0/all/0/1&quot;&gt;Rebecca Price&lt;/a&gt;</dc:creator>
         4389 </item>
         4390 <item rdf:about="http://fr.arxiv.org/abs/2010.15579">
         4391 <title>Modeling biomedical breathing signals with convolutional deep probabilistic autoencoders. (arXiv:2010.15579v1 [cs.LG])</title>
         4392 <link>http://fr.arxiv.org/abs/2010.15579</link>
         4393 <description rdf:parseType="Literal">&lt;p&gt;One of the main problems with biomedical signals is the limited amount of
         4394 patient-specific data and the significant amount of time needed to record a
         4395 sufficient number of samples for diagnostic and treatment purposes. We explore
         4396 the use of Variational Autoencoder (VAE) and Adversarial Autoencoder (AAE)
         4397 algorithms based on one-dimensional convolutional neural networks in order to
         4398 build generative models able to capture and represent the variability of a set
         4399 of unlabeled quasi-periodic signals using as few as 10 parameters. Furthermore,
         4400 we introduce a modified AAE architecture that allows simultaneous
         4401 semi-supervised classification and generation of different types of signals.
         4402 Our study is based on physical breathing signals, i.e. time series describing
         4403 the position of chest markers, generally used to describe respiratory motion.
         4404 The time series are discretized into a vector of periods, with each period
         4405 containing 6 time and position values. These vectors can be transformed back
         4406 into time series through an additional reconstruction neural network and allow
         4407 to generate extended signals while simplifying the modeling task. The obtained
         4408 models can be used to generate realistic breathing realizations from patient or
         4409 population data and to classify new recordings. We show that by incorporating
         4410 the labels from around 10-15\% of the dataset during training, the model can be
         4411 guided to group data according to the patient it belongs to, or based on the
         4412 presence of different types of breathing irregularities such as baseline
         4413 shifts. Our specific motivation is to model breathing motion during
         4414 radiotherapy lung cancer treatments, for which the developed model serves as an
         4415 efficient tool to robustify plans against breathing uncertainties. However, the
         4416 same methodology can in principle be applied to any other kind of
         4417 quasi-periodic biomedical signal, representing a generically applicable tool.
         4418 &lt;/p&gt;
         4419 </description>
         4420 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pastor_Serrano_O/0/1/0/all/0/1&quot;&gt;Oscar Pastor-Serrano&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lathouwers_D/0/1/0/all/0/1&quot;&gt;Danny Lathouwers&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Perko_Z/0/1/0/all/0/1&quot;&gt;Zolt&amp;#xe1;n Perk&amp;#xf3;&lt;/a&gt;</dc:creator>
         4421 </item>
         4422 <item rdf:about="http://fr.arxiv.org/abs/2010.15581">
         4423 <title>The De-democratization of AI: Deep Learning and the Compute Divide in Artificial Intelligence Research. (arXiv:2010.15581v1 [cs.CY])</title>
         4424 <link>http://fr.arxiv.org/abs/2010.15581</link>
         4425 <description rdf:parseType="Literal">&lt;p&gt;Increasingly, modern Artificial Intelligence (AI) research has become more
         4426 computationally intensive. However, a growing concern is that due to unequal
         4427 access to computing power, only certain firms and elite universities have
         4428 advantages in modern AI research. Using a novel dataset of 171394 papers from
         4429 57 prestigious computer science conferences, we document that firms, in
         4430 particular, large technology firms and elite universities have increased
         4431 participation in major AI conferences since deep learning&apos;s unanticipated rise
         4432 in 2012. The effect is concentrated among elite universities, which are ranked
         4433 1-50 in the QS World University Rankings. Further, we find two strategies
         4434 through which firms increased their presence in AI research: first, they have
         4435 increased firm-only publications; and second, firms are collaborating primarily
         4436 with elite universities. Consequently, this increased presence of firms and
         4437 elite universities in AI research has crowded out mid-tier (QS ranked 201-300)
         4438 and lower-tier (QS ranked 301-500) universities. To provide causal evidence
         4439 that deep learning&apos;s unanticipated rise resulted in this divergence, we
         4440 leverage the generalized synthetic control method, a data-driven counterfactual
         4441 estimator. Using machine learning based text analysis methods, we provide
         4442 additional evidence that the divergence between these two groups - large firms
         4443 and non-elite universities - is driven by access to computing power or compute,
         4444 which we term as the &quot;compute divide&quot;. This compute divide between large firms
         4445 and non-elite universities increases concerns around bias and fairness within
         4446 AI technology, and presents an obstacle towards &quot;democratizing&quot; AI. These
         4447 results suggest that a lack of access to specialized equipment such as compute
         4448 can de-democratize knowledge production.
         4449 &lt;/p&gt;
         4450 </description>
         4451 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ahmed_N/0/1/0/all/0/1&quot;&gt;Nur Ahmed&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wahed_M/0/1/0/all/0/1&quot;&gt;Muntasir Wahed&lt;/a&gt;</dc:creator>
         4452 </item>
         4453 <item rdf:about="http://fr.arxiv.org/abs/2010.15582">
         4454 <title>Improving Accuracy of Federated Learning in Non-IID Settings. (arXiv:2010.15582v1 [cs.LG])</title>
         4455 <link>http://fr.arxiv.org/abs/2010.15582</link>
         4456 <description rdf:parseType="Literal">&lt;p&gt;Federated Learning (FL) is a decentralized machine learning protocol that
         4457 allows a set of participating agents to collaboratively train a model without
         4458 sharing their data. This makes FL particularly suitable for settings where data
         4459 privacy is desired. However, it has been observed that the performance of FL is
         4460 closely tied with the local data distributions of agents. Particularly, in
         4461 settings where local data distributions vastly differ among agents, FL performs
         4462 rather poorly with respect to the centralized training. To address this
         4463 problem, we hypothesize the reasons behind the performance degradation, and
         4464 develop some techniques to address these reasons accordingly. In this work, we
         4465 identify four simple techniques that can improve the performance of trained
         4466 models without incurring any additional communication overhead to FL, but
         4467 rather, some light computation overhead either on the client, or the
         4468 server-side. In our experimental analysis, combination of our techniques
         4469 improved the validation accuracy of a model trained via FL by more than 12%
         4470 with respect to our baseline. This is about 5% less than the accuracy of the
         4471 model trained on centralized data.
         4472 &lt;/p&gt;
         4473 </description>
         4474 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ozdayi_M/0/1/0/all/0/1&quot;&gt;Mustafa Safa Ozdayi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kantarcioglu_M/0/1/0/all/0/1&quot;&gt;Murat Kantarcioglu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Iyer_R/0/1/0/all/0/1&quot;&gt;Rishabh Iyer&lt;/a&gt;</dc:creator>
         4475 </item>
         4476 <item rdf:about="http://fr.arxiv.org/abs/2010.15583">
         4477 <title>Probabilistic Transformers. (arXiv:2010.15583v1 [cs.LG])</title>
         4478 <link>http://fr.arxiv.org/abs/2010.15583</link>
         4479 <description rdf:parseType="Literal">&lt;p&gt;We show that Transformers are Maximum Posterior Probability estimators for
         4480 Mixtures of Gaussian Models. This brings a probabilistic point of view to
         4481 Transformers and suggests extensions to other probabilistic cases.
         4482 &lt;/p&gt;
         4483 </description>
         4484 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Movellan_J/0/1/0/all/0/1&quot;&gt;Javier R. Movellan&lt;/a&gt;</dc:creator>
         4485 </item>
         4486 <item rdf:about="http://fr.arxiv.org/abs/2010.15584">
         4487 <title>Future Directions of the Cyberinfrastructure for Sustained Scientific Innovation (CSSI) Program. (arXiv:2010.15584v1 [cs.CY])</title>
         4488 <link>http://fr.arxiv.org/abs/2010.15584</link>
         4489 <description rdf:parseType="Literal">&lt;p&gt;The CSSI 2019 workshop was held on October 28-29, 2019, in Austin, Texas. The
         4490 main objectives of this workshop were to (1) understand the impact of the CSSI
         4491 program on the community over the last 9 years, (2) engage workshop
         4492 participants in identifying gaps and opportunities in the current CSSI
         4493 landscape, (3) gather ideas on the cyberinfrastructure needs and expectations
         4494 of the community with respect to the CSSI program, and (4) prepare a report
         4495 summarizing the feedback gathered from the community that can inform the future
         4496 solicitations of the CSSI program. The workshop brought together different
         4497 stakeholders interested in provisioning sustainable cyberinfrastructure that
         4498 can power discoveries impacting the various fields of science and technology
         4499 and maintaining the nation&apos;s competitiveness in the areas such as scientific
         4500 software, HPC, networking, cybersecurity, and data/information science. The
         4501 workshop served as a venue for gathering the community-feedback on the current
         4502 state of the CSSI program and its future directions.
         4503 &lt;/p&gt;
         4504 </description>
         4505 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Arora_R/0/1/0/all/0/1&quot;&gt;Ritu Arora&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1&quot;&gt;Xiaosong Li&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hurwitz_B/0/1/0/all/0/1&quot;&gt;Bonnie Hurwitz&lt;/a&gt; (3), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fay_D/0/1/0/all/0/1&quot;&gt;Daniel Fay&lt;/a&gt; (4), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Panda_D/0/1/0/all/0/1&quot;&gt;Dhabaleswar K. Panda&lt;/a&gt; (5), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Valeev_E/0/1/0/all/0/1&quot;&gt;Edward Valeev&lt;/a&gt; (6), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shaowen Wang&lt;/a&gt; (7), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moore_S/0/1/0/all/0/1&quot;&gt;Shirley Moore&lt;/a&gt; (8), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chandrasekaran_S/0/1/0/all/0/1&quot;&gt;Sunita Chandrasekaran&lt;/a&gt; (9), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cao_T/0/1/0/all/0/1&quot;&gt;Ting Cao&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bik_H/0/1/0/all/0/1&quot;&gt;Holly Bik&lt;/a&gt; (10), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Curry_M/0/1/0/all/0/1&quot;&gt;Matthew Curry&lt;/a&gt; (11), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Islam_T/0/1/0/all/0/1&quot;&gt;Tanzima Islam&lt;/a&gt; (12) ((1) Texas Advanced Computing Center, (2) University of Washington, (3) University of Arizona, (4) Microsoft, (5) The Ohio State University, (6) Virginia Tech University, (7) University of Illinois, (8) Oak Ridge National Lab, (9) University of Delaware, (10) University of California, Riverside, (11) Sandia National Lab, (12) Texas State University)</dc:creator>
         4506 </item>
         4507 <item rdf:about="http://fr.arxiv.org/abs/2010.15585">
         4508 <title>Panel: Economic Policy and Governance during Pandemics using AI. (arXiv:2010.15585v1 [cs.CY])</title>
         4509 <link>http://fr.arxiv.org/abs/2010.15585</link>
         4510 <description rdf:parseType="Literal">&lt;p&gt;The global food supply chain (starting at farms and ending with consumers)
         4511 has been seriously disrupted by many outlier events such as trade wars, the
         4512 China demand shock, natural disasters, and pandemics. Outlier events create
         4513 uncertainty along the entire supply chain in addition to intervening policy
         4514 responses to mitigate their adverse effects. Artificial Intelligence (AI)
         4515 methods (i.e. machine/reinforcement/deep learning) provide an opportunity to
         4516 better understand outcomes during outlier events by identifying regular,
         4517 irregular and contextual components. Employing AI can provide guidance to
         4518 decision making suppliers, farmers, processors, wholesalers, and retailers
         4519 along the supply chain, and policy makers to facilitate welfare-improving
         4520 outcomes. This panel discusses these issues.
         4521 &lt;/p&gt;
         4522 </description>
         4523 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Batarseh_F/0/1/0/all/0/1&quot;&gt;Feras A. Batarseh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gopinath_M/0/1/0/all/0/1&quot;&gt;Munisamy Gopinath&lt;/a&gt;</dc:creator>
         4524 </item>
         4525 <item rdf:about="http://fr.arxiv.org/abs/2010.15586">
         4526 <title>Event-Driven Learning of Systematic Behaviours in Stock Markets. (arXiv:2010.15586v1 [q-fin.ST])</title>
         4527 <link>http://fr.arxiv.org/abs/2010.15586</link>
         4528 <description rdf:parseType="Literal">&lt;p&gt;It is reported that financial news, especially financial events expressed in
         4529 news, provide information to investors&apos; long/short decisions and influence the
         4530 movements of stock markets. Motivated by this, we leverage financial event
         4531 streams to train a classification neural network that detects latent
         4532 event-stock linkages and stock markets&apos; systematic behaviours in the U.S. stock
         4533 market. Our proposed pipeline includes (1) a combined event extraction method
         4534 that utilizes Open Information Extraction and neural co-reference resolution,
         4535 (2) a BERT/ALBERT enhanced representation of events, and (3) an extended
         4536 hierarchical attention network that includes attentions on event, news and
         4537 temporal levels. Our pipeline achieves significantly better accuracies and
         4538 higher simulated annualized returns than state-of-the-art models when being
         4539 applied to predicting Standard\&amp;amp;Poor 500, Dow Jones, Nasdaq indices and 10
         4540 individual stocks.
         4541 &lt;/p&gt;
         4542 </description>
         4543 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/q-fin/1/au:+Wu_X/0/1/0/all/0/1&quot;&gt;Xianchao Wu&lt;/a&gt;</dc:creator>
         4544 </item>
         4545 <item rdf:about="http://fr.arxiv.org/abs/2010.15588">
         4546 <title>Impact of (SARS-CoV-2) COVID 19 on the indigenous language-speaking population in Mexico. (arXiv:2010.15588v1 [cs.CY])</title>
         4547 <link>http://fr.arxiv.org/abs/2010.15588</link>
         4548 <description rdf:parseType="Literal">&lt;p&gt;The importance of the working document is that it allows the analysis of the
         4549 information and the status of cases associated with (SARS-CoV-2) COVID-19 as
         4550 open data at the municipal, state and national level, with a daily record of
         4551 patients, according to a age, sex, comorbidities, for the condition of
         4552 (SARS-CoV-2) COVID-19 according to the following characteristics: a) Positive,
         4553 b) Negative, c) Suspicious. Likewise, it presents information related to the
         4554 identification of an outpatient and / or hospitalized patient, attending to
         4555 their medical development, identifying: a) Recovered, b) Deaths and c) Active,
         4556 in Phase 3 and Phase 4, in the five main population areas speaker of indigenous
         4557 language in the State of Veracruz - Mexico. The data analysis is carried out
         4558 through the application of a data mining algorithm, which provides the
         4559 information, fast and timely, required for the estimation of Medical Care
         4560 Scenarios of (SARS-CoV-2) COVID-19, as well as for know the impact on the
         4561 indigenous language-speaking population in Mexico.
         4562 &lt;/p&gt;
         4563 </description>
         4564 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Medel_Ramirez_C/0/1/0/all/0/1&quot;&gt;Carlos Medel-Ramirez&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Medel_Lopez_H/0/1/0/all/0/1&quot;&gt;Hilario Medel-Lopez&lt;/a&gt;</dc:creator>
         4565 </item>
         4566 <item rdf:about="http://fr.arxiv.org/abs/2010.15590">
         4567 <title>Enjeux \&apos;ethiques de l&apos;IA en sant\&apos;e : une humanisation du parcours de soin par l&apos;intelligence artificielle ?. (arXiv:2010.15590v1 [cs.CY])</title>
         4568 <link>http://fr.arxiv.org/abs/2010.15590</link>
         4569 <description rdf:parseType="Literal">&lt;p&gt;Considering the use of artificial intelligence for greater personalization of
         4570 patient care and better management of human and material resources may seem
         4571 like an opportunity not to be missed. In order to offer a better humanization
         4572 of the care pathway, artificial intelligence is a tool that decision-makers in
         4573 the hospital sector must appropriate by taking care of the new ethical issues
         4574 and conflicts of values that this technology generates.
         4575 &lt;/p&gt;
         4576 &lt;p&gt;Envisager le recours \`a l&apos;intelligence artificielle pour une plus grande
         4577 personnalisation de la prise en charge du patient et une meilleure gestion des
         4578 ressources humaines et mat\&apos;erielles peut sembler une opportunit\&apos;e \`a ne pas
         4579 manquer. Afin de proposer une meilleure humanisation du parcours de soin,
         4580 l&apos;intelligence artificielle est un outil que les d\&apos;ecideurs du milieu
         4581 hospitalier doivent s&apos;approprier en veillant aux nouveaux enjeux \&apos;ethiques et
         4582 conflits de valeurs que cette technologie engendre.
         4583 &lt;/p&gt;
         4584 </description>
         4585 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Muhlenbach_F/0/1/0/all/0/1&quot;&gt;Fabrice Muhlenbach&lt;/a&gt;</dc:creator>
         4586 </item>
         4587 <item rdf:about="http://fr.arxiv.org/abs/2010.15594">
         4588 <title>Shared Space Transfer Learning for analyzing multi-site fMRI data. (arXiv:2010.15594v1 [cs.LG])</title>
         4589 <link>http://fr.arxiv.org/abs/2010.15594</link>
         4590 <description rdf:parseType="Literal">&lt;p&gt;Multi-voxel pattern analysis (MVPA) learns predictive models from task-based
         4591 functional magnetic resonance imaging (fMRI) data, for distinguishing when
         4592 subjects are performing different cognitive tasks -- e.g., watching movies or
         4593 making decisions. MVPA works best with a well-designed feature set and an
         4594 adequate sample size. However, most fMRI datasets are noisy, high-dimensional,
         4595 expensive to collect, and with small sample sizes. Further, training a robust,
         4596 generalized predictive model that can analyze homogeneous cognitive tasks
         4597 provided by multi-site fMRI datasets has additional challenges. This paper
         4598 proposes the Shared Space Transfer Learning (SSTL) as a novel transfer learning
         4599 (TL) approach that can functionally align homogeneous multi-site fMRI datasets,
         4600 and so improve the prediction performance in every site. SSTL first extracts a
         4601 set of common features for all subjects in each site. It then uses TL to map
         4602 these site-specific features to a site-independent shared space in order to
         4603 improve the performance of the MVPA. SSTL uses a scalable optimization
         4604 procedure that works effectively for high-dimensional fMRI datasets. The
         4605 optimization procedure extracts the common features for each site by using a
         4606 single-iteration algorithm and maps these site-specific common features to the
         4607 site-independent shared space. We evaluate the effectiveness of the proposed
         4608 method for transferring between various cognitive tasks. Our comprehensive
         4609 experiments validate that SSTL achieves superior performance to other
         4610 state-of-the-art analysis techniques.
         4611 &lt;/p&gt;
         4612 </description>
         4613 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yousefnezhad_M/0/1/0/all/0/1&quot;&gt;Muhammad Yousefnezhad&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Selvitella_A/0/1/0/all/0/1&quot;&gt;Alessandro Selvitella&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_D/0/1/0/all/0/1&quot;&gt;Daoqiang Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Greenshaw_A/0/1/0/all/0/1&quot;&gt;Andrew J. Greenshaw&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Greiner_R/0/1/0/all/0/1&quot;&gt;Russell Greiner&lt;/a&gt;</dc:creator>
         4614 </item>
         4615 <item rdf:about="http://fr.arxiv.org/abs/2010.15596">
         4616 <title>Verification of Patterns. (arXiv:2010.15596v1 [cs.LO])</title>
         4617 <link>http://fr.arxiv.org/abs/2010.15596</link>
         4618 <description rdf:parseType="Literal">&lt;p&gt;The software patterns provide building blocks to the design and
         4619 implementation of a software system, and try to make the software engineering
         4620 to progress from experience to science. The software patterns were made famous
         4621 because of the introduction as the design patterns. After that, patterns have
         4622 been researched and developed widely and rapidly. The series of books of
         4623 pattern-oriented software architecture should be marked in the development of
         4624 software patterns. As mentioned in these books, formalization of patterns and
         4625 an intermediate pattern language are needed and should be developed in the
         4626 future of patterns. So, in this book, we formalize software patterns according
         4627 to the categories of the series of books of pattern-oriented software
         4628 architecture, and verify the correctness of patterns based on truly concurrent
         4629 process algebra. In one aspect, patterns are formalized and verified; in the
         4630 other aspect, truly concurrent process algebra can play a role of an
         4631 intermediate pattern language for its rigorous theory.
         4632 &lt;/p&gt;
         4633 </description>
         4634 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yong Wang&lt;/a&gt;</dc:creator>
         4635 </item>
         4636 <item rdf:about="http://fr.arxiv.org/abs/2010.15597">
         4637 <title>Enhancing reinforcement learning by a finite reward response filter with a case study in intelligent structural control. (arXiv:2010.15597v1 [cs.LG])</title>
         4638 <link>http://fr.arxiv.org/abs/2010.15597</link>
         4639 <description rdf:parseType="Literal">&lt;p&gt;In many reinforcement learning (RL) problems, it takes some time until a
         4640 taken action by the agent reaches its maximum effect on the environment and
         4641 consequently the agent receives the reward corresponding to that action by a
         4642 delay called action-effect delay. Such delays reduce the performance of the
         4643 learning algorithm and increase the computational costs, as the reinforcement
         4644 learning agent values the immediate rewards more than the future reward that is
         4645 more related to the taken action. This paper addresses this issue by
         4646 introducing an applicable enhanced Q-learning method in which at the beginning
         4647 of the learning phase, the agent takes a single action and builds a function
         4648 that reflects the environments response to that action, called the reflexive
         4649 $\gamma$ - function. During the training phase, the agent utilizes the created
         4650 reflexive $\gamma$- function to update the Q-values. We have applied the
         4651 developed method to a structural control problem in which the goal of the agent
         4652 is to reduce the vibrations of a building subjected to earthquake excitations
         4653 with a specified delay. Seismic control problems are considered as a complex
         4654 task in structural engineering because of the stochastic and unpredictable
         4655 nature of earthquakes and the complex behavior of the structure. Three
         4656 scenarios are presented to study the effects of zero, medium, and long
         4657 action-effect delays and the performance of the Enhanced method is compared to
         4658 the standard Q-learning method. Both RL methods use neural network to learn to
         4659 estimate the state-action value function that is used to control the structure.
         4660 The results show that the enhanced method significantly outperforms the
         4661 performance of the original method in all cases, and also improves the
         4662 stability of the algorithm in dealing with action-effect delays.
         4663 &lt;/p&gt;
         4664 </description>
         4665 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rahmani_H/0/1/0/all/0/1&quot;&gt;Hamid Radmard Rahmani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Koenke_C/0/1/0/all/0/1&quot;&gt;Carsten Koenke&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wiering_M/0/1/0/all/0/1&quot;&gt;Marco A. Wiering&lt;/a&gt;</dc:creator>
         4666 </item>
         4667 <item rdf:about="http://fr.arxiv.org/abs/2010.15598">
         4668 <title>May I Ask Who&apos;s Calling? Named Entity Recognition on Call Center Transcripts for Privacy Law Compliance. (arXiv:2010.15598v1 [cs.CL])</title>
         4669 <link>http://fr.arxiv.org/abs/2010.15598</link>
         4670 <description rdf:parseType="Literal">&lt;p&gt;We investigate using Named Entity Recognition on a new type of user-generated
         4671 text: a call center conversation. These conversations combine problems from
         4672 spontaneous speech with problems novel to conversational Automated Speech
         4673 Recognition, including incorrect recognition, alongside other common problems
         4674 from noisy user-generated text. Using our own corpus with new annotations,
         4675 training custom contextual string embeddings, and applying a BiLSTM-CRF, we
         4676 match state-of-the-art results on our novel task.
         4677 &lt;/p&gt;
         4678 </description>
         4679 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kaplan_M/0/1/0/all/0/1&quot;&gt;Micaela Kaplan&lt;/a&gt;</dc:creator>
         4680 </item>
         4681 <item rdf:about="http://fr.arxiv.org/abs/2010.15599">
         4682 <title>Expert Selection in High-Dimensional Markov Decision Processes. (arXiv:2010.15599v1 [cs.LG])</title>
         4683 <link>http://fr.arxiv.org/abs/2010.15599</link>
         4684 <description rdf:parseType="Literal">&lt;p&gt;In this work we present a multi-armed bandit framework for online expert
         4685 selection in Markov decision processes and demonstrate its use in
         4686 high-dimensional settings. Our method takes a set of candidate expert policies
         4687 and switches between them to rapidly identify the best performing expert using
         4688 a variant of the classical upper confidence bound algorithm, thus ensuring low
         4689 regret in the overall performance of the system. This is useful in applications
         4690 where several expert policies may be available, and one needs to be selected at
         4691 run-time for the underlying environment.
         4692 &lt;/p&gt;
         4693 </description>
         4694 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rubies_Royo_V/0/1/0/all/0/1&quot;&gt;Vicenc Rubies-Royo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mazumdar_E/0/1/0/all/0/1&quot;&gt;Eric Mazumdar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dong_R/0/1/0/all/0/1&quot;&gt;Roy Dong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tomlin_C/0/1/0/all/0/1&quot;&gt;Claire Tomlin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sastry_S/0/1/0/all/0/1&quot;&gt;S. Shankar Sastry&lt;/a&gt;</dc:creator>
         4695 </item>
         4696 <item rdf:about="http://fr.arxiv.org/abs/2010.15600">
         4697 <title>Three computational models and its equivalence. (arXiv:2010.15600v1 [cs.LO])</title>
         4698 <link>http://fr.arxiv.org/abs/2010.15600</link>
         4699 <description rdf:parseType="Literal">&lt;p&gt;The study of computability has its origin in Hilbert&apos;s conference of 1900,
         4700 where an adjacent question, to the ones he asked, is to give a precise
         4701 description of the notion of algorithm. In the search for a good definition
         4702 arose three independent theories: Turing and the Turing machines, G\&quot;odel and
         4703 the recursive functions, Church and the Lambda Calculus.
         4704 &lt;/p&gt;
         4705 &lt;p&gt;Later there were established by Kleene that the classic models of computation
         4706 are equivalent. This fact is widely accepted by many textbooks and the proof is
         4707 omitted since the proof is tedious and unreadable. We intend to fill this gap
         4708 presenting the proof in a modern way, without forgetting the mathematical
         4709 details.
         4710 &lt;/p&gt;
         4711 </description>
         4712 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lopez_C/0/1/0/all/0/1&quot;&gt;Ciro Ivan Garcia Lopez&lt;/a&gt;</dc:creator>
         4713 </item>
         4714 <item rdf:about="http://fr.arxiv.org/abs/2010.15601">
         4715 <title>Using a Binary Classification Model to Predict the Likelihood of Enrolment to the Undergraduate Program of a Philippine University. (arXiv:2010.15601v1 [cs.CY])</title>
         4716 <link>http://fr.arxiv.org/abs/2010.15601</link>
         4717 <description rdf:parseType="Literal">&lt;p&gt;With the recent implementation of the K to 12 Program, academic institutions,
         4718 specifically, Colleges and Universities in the Philippines have been faced with
         4719 difficulties in determining projected freshmen enrollees vis-a-vis
         4720 decision-making factors for efficient resource management. Enrollment targets
         4721 directly impacts success factors of Higher Education Institutions. This study
         4722 covered an analysis of various characteristics of freshmen applicants affecting
         4723 their admission status in a Philippine university. A predictive model was
         4724 developed using Logistic Regression to evaluate the probability that an
         4725 admitted student will pursue to enroll in the Institution or not. The dataset
         4726 used was acquired from the University Admissions Office. The office designed an
         4727 online application form to capture applicants&apos; details. The online form was
         4728 distributed to all student applicants, and most often, students, tend to
         4729 provide incomplete information. Despite this fact, student characteristics, as
         4730 well as geographic and demographic data based on the students&apos; location are
         4731 significant predictors of enrollment decision. The results of the study show
         4732 that given limited information about prospective students, Higher Education
         4733 Institutions can implement machine learning techniques to supplement management
         4734 decisions and provide estimates of class sizes, in this way, it will allow the
         4735 institution to optimize the allocation of resources and will have better
         4736 control over net tuition revenue.
         4737 &lt;/p&gt;
         4738 </description>
         4739 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Esquivel_D/0/1/0/all/0/1&quot;&gt;Dr.Joseph A. Esquivel&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Esquivel_D/0/1/0/all/0/1&quot;&gt;Dr. James A. Esquivel&lt;/a&gt;</dc:creator>
         4740 </item>
         4741 <item rdf:about="http://fr.arxiv.org/abs/2010.15602">
         4742 <title>Designing learning experiences for online teaching and learning. (arXiv:2010.15602v1 [cs.CY])</title>
         4743 <link>http://fr.arxiv.org/abs/2010.15602</link>
         4744 <description rdf:parseType="Literal">&lt;p&gt;Teaching is about constantly innovating strategies, ways and means to engage
         4745 diverse students in active and meaningful learning. In line with this, SUTD
         4746 adopts various student-centric teaching and learning teaching methods and
         4747 approaches. This means that our graduate/undergraduate instructors have to be
         4748 ready to teach using these student student-centric teaching and learning
         4749 pedagogies. In this article, I share my experiences of redesigning this
         4750 teaching course that is typically conducted face-to-face to a synchronous
         4751 online course and also invite one of the participant in this course to reflect
         4752 on his experience as a student.
         4753 &lt;/p&gt;
         4754 </description>
         4755 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sockalingam_N/0/1/0/all/0/1&quot;&gt;Nachamma Sockalingam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_J/0/1/0/all/0/1&quot;&gt;Junhua Liu&lt;/a&gt;</dc:creator>
         4756 </item>
         4757 <item rdf:about="http://fr.arxiv.org/abs/2010.15603">
         4758 <title>Suppressing Mislabeled Data via Grouping and Self-Attention. (arXiv:2010.15603v1 [cs.CV])</title>
         4759 <link>http://fr.arxiv.org/abs/2010.15603</link>
         4760 <description rdf:parseType="Literal">&lt;p&gt;Deep networks achieve excellent results on large-scale clean data but degrade
         4761 significantly when learning from noisy labels. To suppressing the impact of
         4762 mislabeled data, this paper proposes a conceptually simple yet efficient
         4763 training block, termed as Attentive Feature Mixup (AFM), which allows paying
         4764 more attention to clean samples and less to mislabeled ones via sample
         4765 interactions in small groups. Specifically, this plug-and-play AFM first
         4766 leverages a \textit{group-to-attend} module to construct groups and assign
         4767 attention weights for group-wise samples, and then uses a \textit{mixup} module
         4768 with the attention weights to interpolate massive noisy-suppressed samples. The
         4769 AFM has several appealing benefits for noise-robust deep learning. (i) It does
         4770 not rely on any assumptions and extra clean subset. (ii) With massive
         4771 interpolations, the ratio of useless samples is reduced dramatically compared
         4772 to the original noisy ratio. (iii) \pxj{It jointly optimizes the interpolation
         4773 weights with classifiers, suppressing the influence of mislabeled data via low
         4774 attention weights. (iv) It partially inherits the vicinal risk minimization of
         4775 mixup to alleviate over-fitting while improves it by sampling fewer
         4776 feature-target vectors around mislabeled data from the mixup vicinal
         4777 distribution.} Extensive experiments demonstrate that AFM yields
         4778 state-of-the-art results on two challenging real-world noisy datasets: Food101N
         4779 and Clothing1M. The code will be available at
         4780 https://github.com/kaiwang960112/AFM.
         4781 &lt;/p&gt;
         4782 </description>
         4783 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Peng_X/0/1/0/all/0/1&quot;&gt;Xiaojiang Peng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_K/0/1/0/all/0/1&quot;&gt;Kai Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zeng_Z/0/1/0/all/0/1&quot;&gt;Zhaoyang Zeng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1&quot;&gt;Qing Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_J/0/1/0/all/0/1&quot;&gt;Jianfei Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qiao_Y/0/1/0/all/0/1&quot;&gt;Yu Qiao&lt;/a&gt;</dc:creator>
         4784 </item>
         4785 <item rdf:about="http://fr.arxiv.org/abs/2010.15604">
         4786 <title>Autoregressive Asymmetric Linear Gaussian Hidden Markov Models. (arXiv:2010.15604v1 [cs.LG])</title>
         4787 <link>http://fr.arxiv.org/abs/2010.15604</link>
         4788 <description rdf:parseType="Literal">&lt;p&gt;In a real life process evolving over time, the relationship between its
         4789 relevant variables may change. Therefore, it is advantageous to have different
         4790 inference models for each state of the process. Asymmetric hidden Markov models
         4791 fulfil this dynamical requirement and provide a framework where the trend of
         4792 the process can be expressed as a latent variable. In this paper, we modify
         4793 these recent asymmetric hidden Markov models to have an asymmetric
         4794 autoregressive component, allowing the model to choose the order of
         4795 autoregression that maximizes its penalized likelihood for a given training
         4796 set. Additionally, we show how inference, hidden states decoding and parameter
         4797 learning must be adapted to fit the proposed model. Finally, we run experiments
         4798 with synthetic and real data to show the capabilities of this new model.
         4799 &lt;/p&gt;
         4800 </description>
         4801 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Puerto_Santana_C/0/1/0/all/0/1&quot;&gt;Carlos Puerto-Santana&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Larranaga_P/0/1/0/all/0/1&quot;&gt;Pedro Larra&amp;#xf1;aga&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bielza_C/0/1/0/all/0/1&quot;&gt;Concha Bielza&lt;/a&gt;</dc:creator>
         4802 </item>
         4803 <item rdf:about="http://fr.arxiv.org/abs/2010.15605">
         4804 <title>Manifold learning-based feature extraction for structural defect reconstruction. (arXiv:2010.15605v1 [cs.CE])</title>
         4805 <link>http://fr.arxiv.org/abs/2010.15605</link>
         4806 <description rdf:parseType="Literal">&lt;p&gt;Data-driven quantitative defect reconstructions using ultrasonic guided waves
         4807 has recently demonstrated great potential in the area of non-destructive
         4808 testing. In this paper, we develop an efficient deep learning-based defect
         4809 reconstruction framework, called NetInv, which recasts the inverse guided wave
         4810 scattering problem as a data-driven supervised learning progress that realizes
         4811 a mapping between reflection coefficients in wavenumber domain and defect
         4812 profiles in the spatial domain. The superiorities of the proposed NetInv over
         4813 conventional reconstruction methods for defect reconstruction have been
         4814 demonstrated by several examples. Results show that NetInv has the ability to
         4815 achieve the higher quality of defect profiles with remarkable efficiency and
         4816 provides valuable insight into the development of effective data driven
         4817 structural health monitoring and defect reconstruction using machine learning.
         4818 &lt;/p&gt;
         4819 </description>
         4820 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1&quot;&gt;Qi Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_D/0/1/0/all/0/1&quot;&gt;Dianzi Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qian_Z/0/1/0/all/0/1&quot;&gt;Zhenghua Qian&lt;/a&gt;</dc:creator>
         4821 </item>
         4822 <item rdf:about="http://fr.arxiv.org/abs/2010.15606">
         4823 <title>Design and Evaluation of Electric Bus Systems for Metropolitan Cities. (arXiv:2010.15606v1 [cs.CY])</title>
         4824 <link>http://fr.arxiv.org/abs/2010.15606</link>
         4825 <description rdf:parseType="Literal">&lt;p&gt;Over the past decade, most of the metropolitan cities across the world have
         4826 been witnessing a degrading trend in air quality index. Exhaust emission data
         4827 observations show that promotion of public transport could be a potential way
         4828 out of this gridlock. Due to environmental concerns, numerous public transport
         4829 authorities harbor a great interest in introducing zero emission electric
         4830 buses. A shift from conventional diesel buses to electric buses comes with
         4831 several benefits in terms of reduction in local pollution, noise, and fuel
         4832 consumption. This paper proposes the relevant vehicle technologies, powertrain,
         4833 and charging systems, which, in combination, provides a comprehensive
         4834 methodology to design an Electric Bus that can be deployed in metropolitan
         4835 cities to mitigate emission concerns.
         4836 &lt;/p&gt;
         4837 </description>
         4838 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Menon_U/0/1/0/all/0/1&quot;&gt;Unnikrishnan Menon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Panda_D/0/1/0/all/0/1&quot;&gt;Divyani Panda&lt;/a&gt;</dc:creator>
         4839 </item>
         4840 <item rdf:about="http://fr.arxiv.org/abs/2010.15607">
         4841 <title>CRICTRS: Embeddings based Statistical and Semi Supervised Cricket Team Recommendation System. (arXiv:2010.15607v1 [cs.CY])</title>
         4842 <link>http://fr.arxiv.org/abs/2010.15607</link>
         4843 <description rdf:parseType="Literal">&lt;p&gt;Team Recommendation has always been a challenging aspect in team sports. Such
         4844 systems aim to recommend a player combination best suited against the
         4845 opposition players, resulting in an optimal outcome. In this paper, we propose
         4846 a semi-supervised statistical approach to build a team recommendation system
         4847 for cricket by modelling players into embeddings. To build these embeddings, we
         4848 design a qualitative and quantitative rating system which considers the
         4849 strength of opposition also for evaluating player performance. The embeddings
         4850 obtained, describes the strengths and weaknesses of the players based on past
         4851 performances of the player. We also embark on a critical aspect of team
         4852 composition, which includes the number of batsmen and bowlers in the team. The
         4853 team composition changes over time, depending on different factors which are
         4854 tough to predict, so we take this input from the user and use the player
         4855 embeddings to decide the best possible team combination with the given team
         4856 composition.
         4857 &lt;/p&gt;
         4858 </description>
         4859 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chhabra_P/0/1/0/all/0/1&quot;&gt;Prazwal Chhabra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ali_R/0/1/0/all/0/1&quot;&gt;Rizwan Ali&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pudi_V/0/1/0/all/0/1&quot;&gt;Vikram Pudi&lt;/a&gt;</dc:creator>
         4860 </item>
         4861 <item rdf:about="http://fr.arxiv.org/abs/2010.15614">
         4862 <title>An Overview Of 3D Object Detection. (arXiv:2010.15614v1 [cs.CV])</title>
         4863 <link>http://fr.arxiv.org/abs/2010.15614</link>
         4864 <description rdf:parseType="Literal">&lt;p&gt;Point cloud 3D object detection has recently received major attention and
         4865 becomes an active research topic in 3D computer vision community. However,
         4866 recognizing 3D objects in LiDAR (Light Detection and Ranging) is still a
         4867 challenge due to the complexity of point clouds. Objects such as pedestrians,
         4868 cyclists, or traffic cones are usually represented by quite sparse points,
         4869 which makes the detection quite complex using only point cloud. In this
         4870 project, we propose a framework that uses both RGB and point cloud data to
         4871 perform multiclass object recognition. We use existing 2D detection models to
         4872 localize the region of interest (ROI) on the RGB image, followed by a pixel
         4873 mapping strategy in the point cloud, and finally, lift the initial 2D bounding
         4874 box to 3D space. We use the recently released nuScenes dataset---a large-scale
         4875 dataset contains many data formats---to training and evaluate our proposed
         4876 architecture.
         4877 &lt;/p&gt;
         4878 </description>
         4879 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yilin Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ye_J/0/1/0/all/0/1&quot;&gt;Jiayi Ye&lt;/a&gt;</dc:creator>
         4880 </item>
         4881 <item rdf:about="http://fr.arxiv.org/abs/2010.15618">
         4882 <title>Sampling and Reconstruction of Sparse Signals in Shift-Invariant Spaces: Generalized Shannon&apos;s Theorem Meets Compressive Sensing. (arXiv:2010.15618v1 [eess.SP])</title>
         4883 <link>http://fr.arxiv.org/abs/2010.15618</link>
         4884 <description rdf:parseType="Literal">&lt;p&gt;This paper introduces a novel framework and corresponding methods for
         4885 sampling and reconstruction of sparse signals in shift-invariant (SI) spaces.
         4886 We reinterpret the random demodulator, a system that acquires sparse
         4887 bandlimited signals, as a system for acquisition of linear combinations of the
         4888 samples in the SI setting with the box function as the sampling kernel. The
         4889 sparsity assumption is exploited by compressive sensing (CS) framework for
         4890 recovery of the SI samples from a reduced set of measurements. The samples are
         4891 subsequently filtered by a discrete-time correction filter in order to
         4892 reconstruct expansion coefficients of an observed signal. Furthermore, we offer
         4893 a generalization of the proposed framework to other sampling kernels that lie
         4894 in arbitrary SI spaces. The generalized method embeds the correction filter in
         4895 a CS optimization problem which directly reconstructs expansion coefficients of
         4896 the signal. Both approaches recast an inherently infinite-dimensional inverse
         4897 problem as a finite-dimensional CS problem in an exact way. Finally, we conduct
         4898 numerical experiments on signals in B-spline spaces whose expansion
         4899 coefficients are assumed to be sparse in a certain transform domain. The
         4900 coefficients can be regarded as parametric models of an underlying continuous
         4901 signal, obtained from a reduced set of measurements. Such continuous signal
         4902 representations are particularly suitable for signal processing without
         4903 converting them into samples.
         4904 &lt;/p&gt;
         4905 </description>
         4906 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Vlasic_T/0/1/0/all/0/1&quot;&gt;Tin Vla&amp;#x161;i&amp;#x107;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sersic_D/0/1/0/all/0/1&quot;&gt;Damir Ser&amp;#x161;i&amp;#x107;&lt;/a&gt;</dc:creator>
         4907 </item>
         4908 <item rdf:about="http://fr.arxiv.org/abs/2010.15620">
         4909 <title>CAFE: Coarse-to-Fine Neural Symbolic Reasoning for Explainable Recommendation. (arXiv:2010.15620v1 [cs.IR])</title>
         4910 <link>http://fr.arxiv.org/abs/2010.15620</link>
         4911 <description rdf:parseType="Literal">&lt;p&gt;Recent research explores incorporating knowledge graphs (KG) into e-commerce
         4912 recommender systems, not only to achieve better recommendation performance, but
         4913 more importantly to generate explanations of why particular decisions are made.
         4914 This can be achieved by explicit KG reasoning, where a model starts from a user
         4915 node, sequentially determines the next step, and walks towards an item node of
         4916 potential interest to the user. However, this is challenging due to the huge
         4917 search space, unknown destination, and sparse signals over the KG, so
         4918 informative and effective guidance is needed to achieve a satisfactory
         4919 recommendation quality. To this end, we propose a CoArse-to-FinE neural
         4920 symbolic reasoning approach (CAFE). It first generates user profiles as coarse
         4921 sketches of user behaviors, which subsequently guide a path-finding process to
         4922 derive reasoning paths for recommendations as fine-grained predictions. User
         4923 profiles can capture prominent user behaviors from the history, and provide
         4924 valuable signals about which kinds of path patterns are more likely to lead to
         4925 potential items of interest for the user. To better exploit the user profiles,
         4926 an improved path-finding algorithm called Profile-guided Path Reasoning (PPR)
         4927 is also developed, which leverages an inventory of neural symbolic reasoning
         4928 modules to effectively and efficiently find a batch of paths over a large-scale
         4929 KG. We extensively experiment on four real-world benchmarks and observe
         4930 substantial gains in the recommendation performance compared with
         4931 state-of-the-art methods.
         4932 &lt;/p&gt;
         4933 </description>
         4934 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xian_Y/0/1/0/all/0/1&quot;&gt;Yikun Xian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fu_Z/0/1/0/all/0/1&quot;&gt;Zuohui Fu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_H/0/1/0/all/0/1&quot;&gt;Handong Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ge_Y/0/1/0/all/0/1&quot;&gt;Yingqiang Ge&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_X/0/1/0/all/0/1&quot;&gt;Xu Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huang_Q/0/1/0/all/0/1&quot;&gt;Qiaoying Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Geng_S/0/1/0/all/0/1&quot;&gt;Shijie Geng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qin_Z/0/1/0/all/0/1&quot;&gt;Zhou Qin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Melo_G/0/1/0/all/0/1&quot;&gt;Gerard de Melo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Muthukrishnan_S/0/1/0/all/0/1&quot;&gt;S. Muthukrishnan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yongfeng Zhang&lt;/a&gt;</dc:creator>
         4935 </item>
         4936 <item rdf:about="http://fr.arxiv.org/abs/2010.15622">
         4937 <title>Low-Variance Policy Gradient Estimation with World Models. (arXiv:2010.15622v1 [stat.ML])</title>
         4938 <link>http://fr.arxiv.org/abs/2010.15622</link>
         4939 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we propose World Model Policy Gradient (WMPG), an approach to
         4940 reduce the variance of policy gradient estimates using learned world models
         4941 (WM&apos;s). In WMPG, a WM is trained online and used to imagine trajectories. The
         4942 imagined trajectories are used in two ways. Firstly, to calculate a
         4943 without-replacement estimator of the policy gradient. Secondly, the return of
         4944 the imagined trajectories is used as an informed baseline. We compare the
         4945 proposed approach with AC and MAC on a set of environments of increasing
         4946 complexity (CartPole, LunarLander and Pong) and find that WMPG has better
         4947 sample efficiency. Based on these results, we conclude that WMPG can yield
         4948 increased sample efficiency in cases where a robust latent representation of
         4949 the environment can be learned.
         4950 &lt;/p&gt;
         4951 </description>
         4952 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nauman_M/0/1/0/all/0/1&quot;&gt;Michal Nauman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Hengst_F/0/1/0/all/0/1&quot;&gt;Floris Den Hengst&lt;/a&gt;</dc:creator>
         4953 </item>
         4954 <item rdf:about="http://fr.arxiv.org/abs/2010.15623">
         4955 <title>Fast Minimal Presentations of Bi-graded Persistence Modules. (arXiv:2010.15623v1 [math.AT])</title>
         4956 <link>http://fr.arxiv.org/abs/2010.15623</link>
         4957 <description rdf:parseType="Literal">&lt;p&gt;Multi-parameter persistent homology is a recent branch of topological data
         4958 analysis. In this area, data sets are investigated through the lens of homology
         4959 with respect to two or more scale parameters. The high computational cost of
         4960 many algorithms calls for a preprocessing step to reduce the input size. In
         4961 general, a minimal presentation is the smallest possible representation of a
         4962 persistence module. Lesnick and Wright proposed recently an algorithm (the
         4963 LW-algorithm) for computing minimal presentations based on matrix reduction. In
         4964 this work, we propose, implement and benchmark several improvements over the
         4965 LW-algorithm. Most notably, we propose the use of priority queues to avoid
         4966 extensive scanning of the matrix columns, which constitutes the computational
         4967 bottleneck in the LW-algorithm, and we combine their algorithm with ideas from
         4968 the multi-parameter chunk algorithm by Fugacci and Kerber. Our extensive
         4969 experiments show that our algorithm outperforms the LW-algorithm and computes
         4970 the minimal presentation for data sets with millions of simplices within a few
         4971 seconds. Our software is publicly available.
         4972 &lt;/p&gt;
         4973 </description>
         4974 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Kerber_M/0/1/0/all/0/1&quot;&gt;Michael Kerber&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Rolle_A/0/1/0/all/0/1&quot;&gt;Alexander Rolle&lt;/a&gt;</dc:creator>
         4975 </item>
         4976 <item rdf:about="http://fr.arxiv.org/abs/2010.15638">
         4977 <title>Abstract Value Iteration for Hierarchical Reinforcement Learning. (arXiv:2010.15638v1 [cs.LG])</title>
         4978 <link>http://fr.arxiv.org/abs/2010.15638</link>
         4979 <description rdf:parseType="Literal">&lt;p&gt;We propose a novel hierarchical reinforcement learning framework for control
         4980 with continuous state and action spaces. In our framework, the user specifies
         4981 subgoal regions which are subsets of states; then, we (i) learn options that
         4982 serve as transitions between these subgoal regions, and (ii) construct a
         4983 high-level plan in the resulting abstract decision process (ADP). A key
         4984 challenge is that the ADP may not be Markov, which we address by proposing two
         4985 algorithms for planning in the ADP. Our first algorithm is conservative,
         4986 allowing us to prove theoretical guarantees on its performance, which help
         4987 inform the design of subgoal regions. Our second algorithm is a practical one
         4988 that interweaves planning at the abstract level and learning at the concrete
         4989 level. In our experiments, we demonstrate that our approach outperforms
         4990 state-of-the-art hierarchical reinforcement learning algorithms on several
         4991 challenging benchmarks.
         4992 &lt;/p&gt;
         4993 </description>
         4994 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jothimurugan_K/0/1/0/all/0/1&quot;&gt;Kishor Jothimurugan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bastani_O/0/1/0/all/0/1&quot;&gt;Osbert Bastani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Alur_R/0/1/0/all/0/1&quot;&gt;Rajeev Alur&lt;/a&gt;</dc:creator>
         4995 </item>
         4996 <item rdf:about="http://fr.arxiv.org/abs/2010.15639">
         4997 <title>Teaching a GAN What Not to Learn. (arXiv:2010.15639v1 [stat.ML])</title>
         4998 <link>http://fr.arxiv.org/abs/2010.15639</link>
         4999 <description rdf:parseType="Literal">&lt;p&gt;Generative adversarial networks (GANs) were originally envisioned as
         5000 unsupervised generative models that learn to follow a target distribution.
         5001 Variants such as conditional GANs, auxiliary-classifier GANs (ACGANs) project
         5002 GANs on to supervised and semi-supervised learning frameworks by providing
         5003 labelled data and using multi-class discriminators. In this paper, we approach
         5004 the supervised GAN problem from a different perspective, one that is motivated
         5005 by the philosophy of the famous Persian poet Rumi who said, &quot;The art of knowing
         5006 is knowing what to ignore.&quot; In the GAN framework, we not only provide the GAN
         5007 positive data that it must learn to model, but also present it with so-called
         5008 negative samples that it must learn to avoid - we call this &quot;The Rumi
         5009 Framework.&quot; This formulation allows the discriminator to represent the
         5010 underlying target distribution better by learning to penalize generated samples
         5011 that are undesirable - we show that this capability accelerates the learning
         5012 process of the generator. We present a reformulation of the standard GAN (SGAN)
         5013 and least-squares GAN (LSGAN) within the Rumi setting. The advantage of the
         5014 reformulation is demonstrated by means of experiments conducted on MNIST,
         5015 Fashion MNIST, CelebA, and CIFAR-10 datasets. Finally, we consider an
         5016 application of the proposed formulation to address the important problem of
         5017 learning an under-represented class in an unbalanced dataset. The Rumi approach
         5018 results in substantially lower FID scores than the standard GAN frameworks
         5019 while possessing better generalization capability.
         5020 &lt;/p&gt;
         5021 </description>
         5022 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Asokan_S/0/1/0/all/0/1&quot;&gt;Siddarth Asokan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Seelamantula_C/0/1/0/all/0/1&quot;&gt;Chandra Sekhar Seelamantula&lt;/a&gt;</dc:creator>
         5023 </item>
         5024 <item rdf:about="http://fr.arxiv.org/abs/2010.15643">
         5025 <title>Free-Form Image Inpainting via Contrastive Attention Network. (arXiv:2010.15643v1 [cs.CV])</title>
         5026 <link>http://fr.arxiv.org/abs/2010.15643</link>
         5027 <description rdf:parseType="Literal">&lt;p&gt;Most deep learning based image inpainting approaches adopt autoencoder or its
         5028 variants to fill missing regions in images. Encoders are usually utilized to
         5029 learn powerful representational spaces, which are important for dealing with
         5030 sophisticated learning tasks. Specifically, in image inpainting tasks, masks
         5031 with any shapes can appear anywhere in images (i.e., free-form masks) which
         5032 form complex patterns. It is difficult for encoders to capture such powerful
         5033 representations under this complex situation. To tackle this problem, we
         5034 propose a self-supervised Siamese inference network to improve the robustness
         5035 and generalization. It can encode contextual semantics from full resolution
         5036 images and obtain more discriminative representations. we further propose a
         5037 multi-scale decoder with a novel dual attention fusion module (DAF), which can
         5038 combine both the restored and known regions in a smooth way. This multi-scale
         5039 architecture is beneficial for decoding discriminative representations learned
         5040 by encoders into images layer by layer. In this way, unknown regions will be
         5041 filled naturally from outside to inside. Qualitative and quantitative
         5042 experiments on multiple datasets, including facial and natural datasets (i.e.,
         5043 Celeb-HQ, Pairs Street View, Places2 and ImageNet), demonstrate that our
         5044 proposed method outperforms state-of-the-art methods in generating high-quality
         5045 inpainting results.
         5046 &lt;/p&gt;
         5047 </description>
         5048 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ma_X/0/1/0/all/0/1&quot;&gt;Xin Ma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_X/0/1/0/all/0/1&quot;&gt;Xiaoqiang Zhou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huang_H/0/1/0/all/0/1&quot;&gt;Huaibo Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chai_Z/0/1/0/all/0/1&quot;&gt;Zhenhua Chai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_X/0/1/0/all/0/1&quot;&gt;Xiaolin Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_R/0/1/0/all/0/1&quot;&gt;Ran He&lt;/a&gt;</dc:creator>
         5049 </item>
         5050 <item rdf:about="http://fr.arxiv.org/abs/2010.15647">
         5051 <title>Brain Tumor Segmentation Network Using Attention-based Fusion and Spatial Relationship Constraint. (arXiv:2010.15647v1 [eess.IV])</title>
         5052 <link>http://fr.arxiv.org/abs/2010.15647</link>
         5053 <description rdf:parseType="Literal">&lt;p&gt;Delineating the brain tumor from magnetic resonance (MR) images is critical
         5054 for the treatment of gliomas. However, automatic delineation is challenging due
         5055 to the complex appearance and ambiguous outlines of tumors. Considering that
         5056 multi-modal MR images can reflect different tumor biological properties, we
         5057 develop a novel multi-modal tumor segmentation network (MMTSN) to robustly
         5058 segment brain tumors based on multi-modal MR images. The MMTSN is composed of
         5059 three sub-branches and a main branch. Specifically, the sub-branches are used
         5060 to capture different tumor features from multi-modal images, while in the main
         5061 branch, we design a spatial-channel fusion block (SCFB) to effectively
         5062 aggregate multi-modal features. Additionally, inspired by the fact that the
         5063 spatial relationship between sub-regions of tumor is relatively fixed, e.g.,
         5064 the enhancing tumor is always in the tumor core, we propose a spatial loss to
         5065 constrain the relationship between different sub-regions of tumor. We evaluate
         5066 our method on the test set of multi-modal brain tumor segmentation challenge
         5067 2020 (BraTs2020). The method achieves 0.8764, 0.8243 and 0.773 dice score for
         5068 whole tumor, tumor core and enhancing tumor, respectively.
         5069 &lt;/p&gt;
         5070 </description>
         5071 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Liu_C/0/1/0/all/0/1&quot;&gt;Chenyu Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ding_W/0/1/0/all/0/1&quot;&gt;Wangbin Ding&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_L/0/1/0/all/0/1&quot;&gt;Lei Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_Z/0/1/0/all/0/1&quot;&gt;Zhen Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pei_C/0/1/0/all/0/1&quot;&gt;Chenhao Pei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Huang_L/0/1/0/all/0/1&quot;&gt;Liqin Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhuang_X/0/1/0/all/0/1&quot;&gt;Xiahai Zhuang&lt;/a&gt;</dc:creator>
         5072 </item>
         5073 <item rdf:about="http://fr.arxiv.org/abs/2010.15651">
         5074 <title>Reliable Graph Neural Networks via Robust Aggregation. (arXiv:2010.15651v1 [cs.LG])</title>
         5075 <link>http://fr.arxiv.org/abs/2010.15651</link>
         5076 <description rdf:parseType="Literal">&lt;p&gt;Perturbations targeting the graph structure have proven to be extremely
         5077 effective in reducing the performance of Graph Neural Networks (GNNs), and
         5078 traditional defenses such as adversarial training do not seem to be able to
         5079 improve robustness. This work is motivated by the observation that
         5080 adversarially injected edges effectively can be viewed as additional samples to
         5081 a node&apos;s neighborhood aggregation function, which results in distorted
         5082 aggregations accumulating over the layers. Conventional GNN aggregation
         5083 functions, such as a sum or mean, can be distorted arbitrarily by a single
         5084 outlier. We propose a robust aggregation function motivated by the field of
         5085 robust statistics. Our approach exhibits the largest possible breakdown point
         5086 of 0.5, which means that the bias of the aggregation is bounded as long as the
         5087 fraction of adversarial edges of a node is less than 50\%. Our novel
         5088 aggregation function, Soft Medoid, is a fully differentiable generalization of
         5089 the Medoid and therefore lends itself well for end-to-end deep learning.
         5090 Equipping a GNN with our aggregation improves the robustness with respect to
         5091 structure perturbations on Cora ML by a factor of 3 (and 5.5 on Citeseer) and
         5092 by a factor of 8 for low-degree nodes.
         5093 &lt;/p&gt;
         5094 </description>
         5095 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Geisler_S/0/1/0/all/0/1&quot;&gt;Simon Geisler&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zugner_D/0/1/0/all/0/1&quot;&gt;Daniel Z&amp;#xfc;gner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gunnemann_S/0/1/0/all/0/1&quot;&gt;Stephan G&amp;#xfc;nnemann&lt;/a&gt;</dc:creator>
         5096 </item>
         5097 <item rdf:about="http://fr.arxiv.org/abs/2010.15653">
         5098 <title>Semi-Supervised Speech Recognition via Graph-based Temporal Classification. (arXiv:2010.15653v1 [cs.LG])</title>
         5099 <link>http://fr.arxiv.org/abs/2010.15653</link>
         5100 <description rdf:parseType="Literal">&lt;p&gt;Semi-supervised learning has demonstrated promising results in automatic
         5101 speech recognition (ASR) by self-training using a seed ASR model with
         5102 pseudo-labels generated for unlabeled data. The effectiveness of this approach
         5103 largely relies on the pseudo-label accuracy, for which typically only the
         5104 1-best ASR hypothesis is used. However, alternative ASR hypotheses of an N-best
         5105 list can provide more accurate labels for an unlabeled speech utterance and
         5106 also reflect uncertainties of the seed ASR model. In this paper, we propose a
         5107 generalized form of the connectionist temporal classification (CTC) objective
         5108 that accepts a graph representation of the training targets. The newly proposed
         5109 graph-based temporal classification (GTC) objective is applied for
         5110 self-training with WFST-based supervision, which is generated from an N-best
         5111 list of pseudo-labels. In this setup, GTC is used to learn not only a temporal
         5112 alignment, similarly to CTC, but also a label alignment to obtain the optimal
         5113 pseudo-label sequence from the weighted graph. Results show that this approach
         5114 can effectively exploit an N-best list of pseudo-labels with associated scores,
         5115 outperforming standard pseudo-labeling by a large margin, with ASR results
         5116 close to an oracle experiment in which the best hypotheses of the N-best lists
         5117 are selected manually.
         5118 &lt;/p&gt;
         5119 </description>
         5120 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moritz_N/0/1/0/all/0/1&quot;&gt;Niko Moritz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hori_T/0/1/0/all/0/1&quot;&gt;Takaaki Hori&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Roux_J/0/1/0/all/0/1&quot;&gt;Jonathan Le Roux&lt;/a&gt;</dc:creator>
         5121 </item>
         5122 <item rdf:about="http://fr.arxiv.org/abs/2010.15654">
         5123 <title>Identification of complex mixtures for Raman spectroscopy using a novel scheme based on a new multi-label deep neural network. (arXiv:2010.15654v1 [eess.SP])</title>
         5124 <link>http://fr.arxiv.org/abs/2010.15654</link>
         5125 <description rdf:parseType="Literal">&lt;p&gt;With noisy environment caused by fluoresence and additive white noise as well
         5126 as complicated spectrum fingerprints, the identification of complex mixture
         5127 materials remains a major challenge in Raman spectroscopy application. In this
         5128 paper, we propose a new scheme based on a constant wavelet transform (CWT) and
         5129 a deep network for classifying complex mixture. The scheme first transforms the
         5130 noisy Raman spectrum to a two-dimensional scale map using CWT. A multi-label
         5131 deep neural network model (MDNN) is then applied for classifying material. The
         5132 proposed model accelerates the feature extraction and expands the feature graph
         5133 using the global averaging pooling layer. The Sigmoid function is implemented
         5134 in the last layer of the model. The MDNN model was trained, validated and
         5135 tested with data collected from the samples prepared from substances in palm
         5136 oil. During training and validating process, data augmentation is applied to
         5137 overcome the imbalance of data and enrich the diversity of Raman spectra. From
         5138 the test results, it is found that the MDNN model outperforms previously
         5139 proposed deep neural network models in terms of Hamming loss, one error,
         5140 coverage, ranking loss, average precision, F1 macro averaging and F1 micro
         5141 averaging, respectively. The average detection time obtained from our model is
         5142 5.31 s, which is much faster than the detection time of the previously proposed
         5143 models.
         5144 &lt;/p&gt;
         5145 </description>
         5146 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pan_L/0/1/0/all/0/1&quot;&gt;Liangrui Pan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pipitsunthonsan_P/0/1/0/all/0/1&quot;&gt;Pronthep Pipitsunthonsan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Daengngam_C/0/1/0/all/0/1&quot;&gt;Chalongrat Daengngam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chongcheawchamnan_M/0/1/0/all/0/1&quot;&gt;Mitchai Chongcheawchamnan&lt;/a&gt;</dc:creator>
         5147 </item>
         5148 <item rdf:about="http://fr.arxiv.org/abs/2010.15658">
         5149 <title>Generalization bounds for deep thresholding networks. (arXiv:2010.15658v1 [math.ST])</title>
         5150 <link>http://fr.arxiv.org/abs/2010.15658</link>
         5151 <description rdf:parseType="Literal">&lt;p&gt;We consider compressive sensing in the scenario where the sparsity basis
         5152 (dictionary) is not known in advance, but needs to be learned from examples.
         5153 Motivated by the well-known iterative soft thresholding algorithm for the
         5154 reconstruction, we define deep networks parametrized by the dictionary, which
         5155 we call deep thresholding networks. Based on training samples, we aim at
         5156 learning the optimal sparsifying dictionary and thereby the optimal network
         5157 that reconstructs signals from their low-dimensional linear measurements. The
         5158 dictionary learning is performed via minimizing the empirical risk. We derive
         5159 generalization bounds by analyzing the Rademacher complexity of hypothesis
         5160 classes consisting of such deep networks. We obtain estimates of the sample
         5161 complexity that depend only linearly on the dimensions and on the depth.
         5162 &lt;/p&gt;
         5163 </description>
         5164 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Behboodi_A/0/1/0/all/0/1&quot;&gt;Arash Behboodi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Rauhut_H/0/1/0/all/0/1&quot;&gt;Holger Rauhut&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Schnoor_E/0/1/0/all/0/1&quot;&gt;Ekkehard Schnoor&lt;/a&gt;</dc:creator>
         5165 </item>
         5166 <item rdf:about="http://fr.arxiv.org/abs/2010.15662">
         5167 <title>Independence Tests Without Ground Truth for Noisy Learners. (arXiv:2010.15662v1 [stat.ML])</title>
         5168 <link>http://fr.arxiv.org/abs/2010.15662</link>
         5169 <description rdf:parseType="Literal">&lt;p&gt;Exact ground truth invariant polynomial systems can be written for
         5170 arbitrarily correlated binary classifiers. Their solutions give estimates for
         5171 sample statistics that require knowledge of the ground truth of the correct
         5172 labels in the sample. Of these polynomial systems, only a few have been solved
         5173 in closed form. Here we discuss the exact solution for independent binary
         5174 classifiers - resolving an outstanding problem that has been presented at this
         5175 conference and others. Its practical applicability is hampered by its sole
         5176 remaining assumption - the classifiers need to be independent in their sample
         5177 errors. We discuss how to use the closed form solution to create a
         5178 self-consistent test that can validate the independence assumption itself
         5179 absent the correct labels ground truth. It can be cast as an algebraic geometry
         5180 conjecture for binary classifiers that remains unsolved. A similar conjecture
         5181 for the ground truth invariant algebraic system for scalar regressors is
         5182 solvable, and we present the solution here. We also discuss experiments on the
         5183 Penn ML Benchmark classification tasks that provide further evidence that the
         5184 conjecture may be true for the polynomial system of binary classifiers.
         5185 &lt;/p&gt;
         5186 </description>
         5187 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Corrada_Emmanuel_A/0/1/0/all/0/1&quot;&gt;Andr&amp;#xe9;s Corrada-Emmanuel&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Pantridge_E/0/1/0/all/0/1&quot;&gt;Edward Pantridge&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Zahrebelski_E/0/1/0/all/0/1&quot;&gt;Eddie Zahrebelski&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Chaganti_A/0/1/0/all/0/1&quot;&gt;Aditya Chaganti&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Simeonov_S/0/1/0/all/0/1&quot;&gt;Simeon Simeonov&lt;/a&gt;</dc:creator>
         5188 </item>
         5189 <item rdf:about="http://fr.arxiv.org/abs/2010.15665">
         5190 <title>Machine Ethics and Automated Vehicles. (arXiv:2010.15665v1 [cs.CY])</title>
         5191 <link>http://fr.arxiv.org/abs/2010.15665</link>
         5192 <description rdf:parseType="Literal">&lt;p&gt;Road vehicle travel at a reasonable speed involves some risk, even when using
         5193 computer-controlled driving with failure-free hardware and perfect sensing. A
         5194 fully-automated vehicle must continuously decide how to allocate this risk
         5195 without a human driver&apos;s oversight. These are ethical decisions, particularly
         5196 in instances where an automated vehicle cannot avoid crashing. In this chapter,
         5197 I introduce the concept of moral behavior for an automated vehicle, argue the
         5198 need for research in this area through responses to anticipated critiques, and
         5199 discuss relevant applications from machine ethics and moral modeling research.
         5200 &lt;/p&gt;
         5201 </description>
         5202 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goodall_N/0/1/0/all/0/1&quot;&gt;Noah J. Goodall&lt;/a&gt;</dc:creator>
         5203 </item>
         5204 <item rdf:about="http://fr.arxiv.org/abs/2010.15668">
         5205 <title>PeopleXploit -- A hybrid tool to collect public data. (arXiv:2010.15668v1 [cs.CY])</title>
         5206 <link>http://fr.arxiv.org/abs/2010.15668</link>
         5207 <description rdf:parseType="Literal">&lt;p&gt;This paper introduces the concept of Open Source Intelligence (OSINT) as an
         5208 important application in intelligent profiling of individuals. With a variety
         5209 of tools available, significant data shall be obtained on an individual as a
         5210 consequence of analyzing his/her internet presence but all of this comes at the
         5211 cost of low relevance. To increase the relevance score in profiling,
         5212 PeopleXploit is being introduced. PeopleXploit is a hybrid tool which helps in
         5213 collecting the publicly available information that is reliable and relevant to
         5214 the given input. This tool is used to track and trace the given target with
         5215 their digital footprints like Name, Email, Phone Number, User IDs etc. and the
         5216 tool will scan &amp;amp; search other associated data from public available records
         5217 from the internet and create a summary report against the target. PeopleXploit
         5218 profiles a person using authorship analysis and finds the best matching guess.
         5219 Also, the type of analysis performed (professional/matrimonial/criminal entity)
         5220 varies with the requirement of the user.
         5221 &lt;/p&gt;
         5222 </description>
         5223 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+V_A/0/1/0/all/0/1&quot;&gt;Arjun Anand V&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+K_B/0/1/0/all/0/1&quot;&gt;Buvanasri A K&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+R_M/0/1/0/all/0/1&quot;&gt;Meenakshi R&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+S_D/0/1/0/all/0/1&quot;&gt;Dr. Karthika S&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohan_A/0/1/0/all/0/1&quot;&gt;Ashok Kumar Mohan&lt;/a&gt;</dc:creator>
         5224 </item>
         5225 <item rdf:about="http://fr.arxiv.org/abs/2010.15669">
         5226 <title>Using Twitter to Analyze Political Polarization During National Crises. (arXiv:2010.15669v1 [cs.CY])</title>
         5227 <link>http://fr.arxiv.org/abs/2010.15669</link>
         5228 <description rdf:parseType="Literal">&lt;p&gt;Democrats and Republicans have seemed to grow apart in the past three
         5229 decades. Since the United States as we know it today is undeniably bipartisan,
         5230 this phenomenon would not appear as a surprise to most. However, there are
         5231 triggers which can cause spikes in disagreements between Democrats and
         5232 Republicans at a higher rate than how the two parties have been growing apart
         5233 gradually over time. This study has analyzed the idea that national events
         5234 which generally are detrimental to all individuals can be one of those
         5235 triggers. By testing polarization before and after three events (Hurricane
         5236 Sandy [2012], N. Korea Missile Test Surge [2019], COVID-19 [2020]) using
         5237 Twitter data, we show that a measurable spike in polarization occurs between
         5238 the Democrat and Republican party. In order to measure polarization, sentiments
         5239 of Twitter users aligned to the Democrat and Republican parties are compared on
         5240 identical entities (events, people, locations, etc.). Using hundreds of
         5241 thousands of data samples, a 2.8% increase in polarization was measured during
         5242 times of crisis compared to times where no crises were occurring. Regardless of
         5243 the reasoning that the gap between political parties can increase so much
         5244 during times of suffering and stress, it is definitely alarming to see that
         5245 among other aspects of life, the partisan gap worsens during detrimental
         5246 national events.
         5247 &lt;/p&gt;
         5248 </description>
         5249 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shisode_P/0/1/0/all/0/1&quot;&gt;Parth Shisode&lt;/a&gt;</dc:creator>
         5250 </item>
         5251 <item rdf:about="http://fr.arxiv.org/abs/2010.15670">
         5252 <title>Detecting Individuals with Depressive Disorder fromPersonal Google Search and YouTube History Logs. (arXiv:2010.15670v1 [cs.CY])</title>
         5253 <link>http://fr.arxiv.org/abs/2010.15670</link>
         5254 <description rdf:parseType="Literal">&lt;p&gt;Depressive disorder is one of the most prevalent mental illnesses among the
         5255 global population. However, traditional screening methods require exacting
         5256 in-person interviews and may fail to provide immediate interventions. In this
         5257 work, we leverage ubiquitous personal longitudinal Google Search and YouTube
         5258 engagement logs to detect individuals with depressive disorder. We collected
         5259 Google Search and YouTube history data and clinical depression evaluation
         5260 results from $212$ participants ($99$ of them suffered from moderate to severe
         5261 depressions). We then propose a personalized framework for classifying
         5262 individuals with and without depression symptoms based on mutual-exciting point
         5263 process that captures both the temporal and semantic aspects of online
         5264 activities. Our best model achieved an average F1 score of $0.77 \pm 0.04$ and
         5265 an AUC ROC of $0.81 \pm 0.02$.
         5266 &lt;/p&gt;
         5267 </description>
         5268 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1&quot;&gt;Boyu Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zaman_A/0/1/0/all/0/1&quot;&gt;Anis Zaman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Acharyya_R/0/1/0/all/0/1&quot;&gt;Rupam Acharyya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hoque_E/0/1/0/all/0/1&quot;&gt;Ehsan Hoque&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Silenzio_V/0/1/0/all/0/1&quot;&gt;Vincent Silenzio&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kautz_H/0/1/0/all/0/1&quot;&gt;Henry Kautz&lt;/a&gt;</dc:creator>
         5269 </item>
         5270 <item rdf:about="http://fr.arxiv.org/abs/2010.15671">
         5271 <title>Computing Crisp Bisimulations for Fuzzy Structures. (arXiv:2010.15671v1 [cs.DS])</title>
         5272 <link>http://fr.arxiv.org/abs/2010.15671</link>
         5273 <description rdf:parseType="Literal">&lt;p&gt;Fuzzy structures such as fuzzy automata, fuzzy transition systems, weighted
         5274 social networks and fuzzy interpretations in fuzzy description logics have been
         5275 widely studied. For such structures, bisimulation is a natural notion for
         5276 characterizing indiscernibility between states or individuals. There are two
         5277 kinds of bisimulations for fuzzy structures: crisp bisimulations and fuzzy
         5278 bisimulations. While the latter fits to the fuzzy paradigm, the former has also
         5279 attracted attention due to the application of crisp equivalence relations, for
         5280 example, in minimizing structures. Bisimulations can be formulated for fuzzy
         5281 labeled graphs and then adapted to other fuzzy structures. In this article, we
         5282 present an efficient algorithm for computing the partition corresponding to the
         5283 largest crisp bisimulation of a given finite fuzzy labeled graph. Its
         5284 complexity is of order $O((m\log{l} + n)\log{n})$, where $n$, $m$ and $l$ are
         5285 the number of vertices, the number of nonzero edges and the number of different
         5286 fuzzy degrees of edges of the input graph, respectively. We also study a
         5287 similar problem for the setting with counting successors, which corresponds to
         5288 the case with qualified number restrictions in description logics and graded
         5289 modalities in modal logics. In particular, we provide an efficient algorithm
         5290 with the complexity $O((m\log{m} + n)\log{n})$ for the considered problem in
         5291 that setting.
         5292 &lt;/p&gt;
         5293 </description>
         5294 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nguyen_L/0/1/0/all/0/1&quot;&gt;Linh Anh Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tran_D/0/1/0/all/0/1&quot;&gt;Dat Xuan Tran&lt;/a&gt;</dc:creator>
         5295 </item>
         5296 <item rdf:about="http://fr.arxiv.org/abs/2010.15672">
         5297 <title>FD Cell-Free mMIMO: Analysis and Optimization. (arXiv:2010.15672v1 [eess.SP])</title>
         5298 <link>http://fr.arxiv.org/abs/2010.15672</link>
         5299 <description rdf:parseType="Literal">&lt;p&gt;We consider a full-duplex cell-free massive multiple-input-multiple-output
         5300 system with limited capacity fronthaul links. We derive its downlink/uplink
         5301 closed-form spectral efficiency (SE) lower bounds with maximum-ratio
         5302 transmission/maximum-ratio combining and optimal uniform quantization. To
         5303 reduce carbon footprint, this paper maximizes the non-convex weighted sum
         5304 energy efficiency (WSEE) via downlink and uplink power control, and successive
         5305 convex approximation framework. We show that with low fronthaul capacity, the
         5306 system requires a higher number of fronthaul quantization bits to achieve high
         5307 SE and WSEE. For high fronthaul capacity, higher number of bits, however,
         5308 achieves high SE but a reduced WSEE.
         5309 &lt;/p&gt;
         5310 </description>
         5311 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Datta_S/0/1/0/all/0/1&quot;&gt;Soumyadeep Datta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sharma_E/0/1/0/all/0/1&quot;&gt;Ekant Sharma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Amudala_D/0/1/0/all/0/1&quot;&gt;Dheeraj Naidu Amudala&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Budhiraja_R/0/1/0/all/0/1&quot;&gt;Rohit Budhiraja&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Panwar_S/0/1/0/all/0/1&quot;&gt;Shivendra S. Panwar&lt;/a&gt;</dc:creator>
         5312 </item>
         5313 <item rdf:about="http://fr.arxiv.org/abs/2010.15673">
         5314 <title>Machine Learning Based Demand Modelling for On-Demand Transit Services: A Case Study of Belleville, Ontario. (arXiv:2010.15673v1 [cs.CY])</title>
         5315 <link>http://fr.arxiv.org/abs/2010.15673</link>
         5316 <description rdf:parseType="Literal">&lt;p&gt;The use of mobile applications apps and GPS service on smartphones for
         5317 transportation management applications has enabled the new &quot;on-demand mobility&quot;
         5318 service, where the transportation supply is following the users&apos; schedule and
         5319 routes. In September 2018, the City of Belleville in Canada and Pantonium
         5320 operationalized the same idea, but for the public transit service in the city
         5321 to develop an on-demand transit (ODT) service. An existing fixed route (RT 11)
         5322 public transit service was converted into an on-demand service during the night
         5323 as a pilot project to maintain a higher demand sensitivity and highest
         5324 operation cost efficiency per trip. In this study, Random Forest (RF), Bagging,
         5325 Artificial Neural Network (ANN), and Deep Neural Network (DNN) machine learning
         5326 algorithms were adopted to develop a pickup demand model (trip generation) and
         5327 a trip demand model (trip distribution model) for Belleville ODT service based
         5328 on the dissemination areas&apos; demographic characteristics and the existing trip
         5329 characteristics. The developed models aim to explain the demand behavior,
         5330 investigate the main factors affecting the trip pattern and their relative
         5331 importance, and to predict the number of generated trips from any dissemination
         5332 area as well as between any two dissemination areas. The results indicate that
         5333 the developed models can predict 63% and 70% of the pickup and trip demand
         5334 levels, respectively. Both models are most affected by the month of the year
         5335 and the day of the week variables. In addition, the population density has a
         5336 higher impact on the ODT service pickup demand levels than the other
         5337 demographic characteristics followed by the working age percentages and median
         5338 income characteristics. Whereas, the distribution of the trips depends on the
         5339 demographic characteristics of the destination area more than the origin area.
         5340 &lt;/p&gt;
         5341 </description>
         5342 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Alsaleh_N/0/1/0/all/0/1&quot;&gt;Nael Alsaleh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Farooq_B/0/1/0/all/0/1&quot;&gt;Bilal Farooq&lt;/a&gt;</dc:creator>
         5343 </item>
         5344 <item rdf:about="http://fr.arxiv.org/abs/2010.15674">
         5345 <title>Analyzing Societal Impact of COVID-19: A Study During the Early Days of the Pandemic. (arXiv:2010.15674v1 [cs.SI])</title>
         5346 <link>http://fr.arxiv.org/abs/2010.15674</link>
         5347 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we collect and study Twitter communications to understand the
         5348 societal impact of COVID-19 in the United States during the early days of the
         5349 pandemic. With infections soaring rapidly, users took to Twitter asking people
         5350 to self isolate and quarantine themselves. Users also demanded closure of
         5351 schools, bars, and restaurants as well as lockdown of cities and states. We
         5352 methodically collect tweets by identifying and tracking trending COVID-related
         5353 hashtags. We first manually group the hashtags into six main categories,
         5354 namely, 1) General COVID, 2) Quarantine, 3) Panic Buying, 4) School Closures,
         5355 5) Lockdowns, and 6) Frustration and Hope}, and study the temporal evolution of
         5356 tweets in these hashtags. We conduct a linguistic analysis of words common to
         5357 all hashtag groups and specific to each hashtag group and identify the chief
         5358 concerns of people as the pandemic gripped the nation (e.g., exploring bidets
         5359 as an alternative to toilet paper). We conduct sentiment analysis and our
         5360 investigation reveals that people reacted positively to school closures and
         5361 negatively to the lack of availability of essential goods due to panic buying.
         5362 We adopt a state-of-the-art semantic role labeling approach to identify the
         5363 action words and then leverage a LSTM-based dependency parsing model to analyze
         5364 the context of action words (e.g., verb deal is accompanied by nouns such as
         5365 anxiety, stress, and crisis). Finally, we develop a scalable seeded topic
         5366 modeling approach to automatically categorize and isolate tweets into hashtag
         5367 groups and experimentally validate that our topic model provides a grouping
         5368 similar to our manual grouping. Our study presents a systematic way to
         5369 construct an aggregated picture of peoples&apos; response to the pandemic and lays
         5370 the groundwork for future fine-grained linguistic and behavioral analysis.
         5371 &lt;/p&gt;
         5372 </description>
         5373 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shanthakumar_S/0/1/0/all/0/1&quot;&gt;Swaroop Gowdra Shanthakumar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Seetharam_A/0/1/0/all/0/1&quot;&gt;Anand Seetharam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ramesh_A/0/1/0/all/0/1&quot;&gt;Arti Ramesh&lt;/a&gt;</dc:creator>
         5374 </item>
         5375 <item rdf:about="http://fr.arxiv.org/abs/2010.15675">
         5376 <title>Deep DA for Ordinal Regression of Pain Intensity Estimation Using Weakly-Labeled Videos. (arXiv:2010.15675v1 [cs.CV])</title>
         5377 <link>http://fr.arxiv.org/abs/2010.15675</link>
         5378 <description rdf:parseType="Literal">&lt;p&gt;Automatic estimation of pain intensity from facial expressions in videos has
         5379 an immense potential in health care applications. However, domain adaptation
         5380 (DA) is needed to alleviate the problem of domain shifts that typically occurs
         5381 between video data captured in source and target do-mains. Given the laborious
         5382 task of collecting and annotating videos, and the subjective bias due to
         5383 ambiguity among adjacent intensity levels, weakly-supervised learning (WSL)is
         5384 gaining attention in such applications. Yet, most state-of-the-art WSL models
         5385 are typically formulated as regression problems, and do not leverage the
         5386 ordinal relation between intensity levels, nor the temporal coherence of
         5387 multiple consecutive frames. This paper introduces a new deep learn-ing model
         5388 for weakly-supervised DA with ordinal regression(WSDA-OR), where videos in
         5389 target domain have coarse la-bels provided on a periodic basis. The WSDA-OR
         5390 model enforces ordinal relationships among the intensity levels as-signed to
         5391 the target sequences, and associates multiple relevant frames to sequence-level
         5392 labels (instead of a single frame). In particular, it learns discriminant and
         5393 domain-invariant feature representations by integrating multiple in-stance
         5394 learning with deep adversarial DA, where soft Gaussian labels are used to
         5395 efficiently represent the weak ordinal sequence-level labels from the target
         5396 domain. The proposed approach was validated on the RECOLA video dataset as
         5397 fully-labeled source domain, and UNBC-McMaster video data as weakly-labeled
         5398 target domain. We have also validated WSDA-OR on BIOVID and Fatigue (private)
         5399 datasets for sequence level estimation. Experimental results indicate that our
         5400 approach can provide a significant improvement over the state-of-the-art
         5401 models, allowing to achieve a greater localization accuracy.
         5402 &lt;/p&gt;
         5403 </description>
         5404 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+R_G/0/1/0/all/0/1&quot;&gt;Gnana Praveen R&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Granger_E/0/1/0/all/0/1&quot;&gt;Eric Granger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cardinal_P/0/1/0/all/0/1&quot;&gt;Patrick Cardinal&lt;/a&gt;</dc:creator>
         5405 </item>
         5406 <item rdf:about="http://fr.arxiv.org/abs/2010.15676">
         5407 <title>Optimization Fabrics for Behavioral Design. (arXiv:2010.15676v1 [cs.RO])</title>
         5408 <link>http://fr.arxiv.org/abs/2010.15676</link>
         5409 <description rdf:parseType="Literal">&lt;p&gt;Second-order differential equations define smooth system behavior. In
         5410 general, there is no guarantee that a system will behave well when forced by a
         5411 potential function, but in some cases they do and may exhibit smooth
         5412 optimization properties such as convergence to a local minimum of the
         5413 potential. Such a property is desirable in system design since it is inherently
         5414 linked to asymptotic stability. This paper presents a comprehensive theory of
         5415 optimization fabrics which are second-order differential equations that encode
         5416 nominal behaviors on a space and are guaranteed to optimize when forced away
         5417 from those nominal trajectories by a potential function. Optimization fabrics,
         5418 or fabrics for short, can encode commonalities among optimization problems that
         5419 reflect the structure of the space itself, enabling smooth optimization
         5420 processes to intelligently navigate each problem even when the potential
         5421 function is simple and relatively naive. Importantly, optimization over a
         5422 fabric is asymptotically stable, so optimization fabrics constitute a building
         5423 block for provably stable system design.
         5424 &lt;/p&gt;
         5425 </description>
         5426 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ratliff_N/0/1/0/all/0/1&quot;&gt;Nathan D. Ratliff&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wyk_K/0/1/0/all/0/1&quot;&gt;Karl Van Wyk&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xie_M/0/1/0/all/0/1&quot;&gt;Mandy Xie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_A/0/1/0/all/0/1&quot;&gt;Anqi Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rana_A/0/1/0/all/0/1&quot;&gt;Asif Muhammad Rana&lt;/a&gt;</dc:creator>
         5427 </item>
         5428 <item rdf:about="http://fr.arxiv.org/abs/2010.15678">
         5429 <title>On the Failure of the Smart Approach of the GPT Cryptosystem. (arXiv:2010.15678v1 [cs.CR])</title>
         5430 <link>http://fr.arxiv.org/abs/2010.15678</link>
         5431 <description rdf:parseType="Literal">&lt;p&gt;This paper describes a new algorithm for breaking the smart approach of the
         5432 GPT cryptosystem. We show that by puncturing the public code several times on
         5433 specific positions, we get a public code on which applying the Frobenius
         5434 operator appropriately allows to build an alternative secret key.
         5435 &lt;/p&gt;
         5436 </description>
         5437 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kalachi_H/0/1/0/all/0/1&quot;&gt;Herve Tale Kalachi&lt;/a&gt;</dc:creator>
         5438 </item>
         5439 <item rdf:about="http://fr.arxiv.org/abs/2010.15679">
         5440 <title>Lie-Trotter Splitting for the Nonlinear Stochastic Manakov System. (arXiv:2010.15679v1 [math.AP])</title>
         5441 <link>http://fr.arxiv.org/abs/2010.15679</link>
         5442 <description rdf:parseType="Literal">&lt;p&gt;This article analyses the convergence of the Lie-Trotter splitting scheme for
         5443 the stochastic Manakov equation, a system arising in the study of pulse
         5444 propagation in randomly birefringent optical fibers. First, we prove that the
         5445 strong order of the numerical approximation is 1/2 if the nonlinear term in the
         5446 system is globally Lipschitz. Then, we show that the splitting scheme has
         5447 convergence order 1/2 in probability and almost sure order 1/2- in the case of
         5448 a cubic nonlinearity. We provide several numerical experiments illustrating the
         5449 aforementioned results and the efficiency of the Lie-Trotter splitting scheme.
         5450 Finally, we numerically investigate the possible blowup of solutions for some
         5451 power-law nonlinearities.
         5452 &lt;/p&gt;
         5453 </description>
         5454 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Berg_A/0/1/0/all/0/1&quot;&gt;Andr&amp;#xe9; Berg&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Cohen_D/0/1/0/all/0/1&quot;&gt;David Cohen&lt;/a&gt; (Chalmers), &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Dujardin_G/0/1/0/all/0/1&quot;&gt;Guillaume Dujardin&lt;/a&gt; (LPP)</dc:creator>
         5455 </item>
         5456 <item rdf:about="http://fr.arxiv.org/abs/2010.15680">
         5457 <title>LSTM for Model-Based Anomaly Detection in Cyber-Physical Systems. (arXiv:2010.15680v1 [cs.LG])</title>
         5458 <link>http://fr.arxiv.org/abs/2010.15680</link>
         5459 <description rdf:parseType="Literal">&lt;p&gt;Anomaly detection is the task of detecting data which differs from the normal
         5460 behaviour of a system in a given context. In order to approach this problem,
         5461 data-driven models can be learned to predict current or future observations.
         5462 Oftentimes, anomalous behaviour depends on the internal dynamics of the system
         5463 and looks normal in a static context. To address this problem, the model should
         5464 also operate depending on state. Long Short-Term Memory (LSTM) neural networks
         5465 have been shown to be particularly useful to learn time sequences with varying
         5466 length of temporal dependencies and are therefore an interesting general
         5467 purpose approach to learn the behaviour of arbitrarily complex Cyber-Physical
         5468 Systems. In order to perform anomaly detection, we slightly modify the standard
         5469 norm 2 error to incorporate an estimate of model uncertainty. We analyse the
         5470 approach on artificial and real data.
         5471 &lt;/p&gt;
         5472 </description>
         5473 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Eiteneuer_B/0/1/0/all/0/1&quot;&gt;Benedikt Eiteneuer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Niggemann_O/0/1/0/all/0/1&quot;&gt;Oliver Niggemann&lt;/a&gt;</dc:creator>
         5474 </item>
         5475 <item rdf:about="http://fr.arxiv.org/abs/2010.15682">
         5476 <title>Maximum a posteriori signal recovery for optical coherence tomography angiography image generation and denoising. (arXiv:2010.15682v1 [eess.IV])</title>
         5477 <link>http://fr.arxiv.org/abs/2010.15682</link>
         5478 <description rdf:parseType="Literal">&lt;p&gt;Optical coherence tomography angiography (OCTA) is a novel and clinically
         5479 promising imaging modality to image retinal and sub-retinal vasculature. Based
         5480 on repeated optical coherence tomography (OCT) scans, intensity changes are
         5481 observed over time and used to compute OCTA image data. OCTA data are prone to
         5482 noise and artifacts caused by variations in flow speed and patient movement. We
         5483 propose a novel iterative maximum a posteriori signal recovery algorithm in
         5484 order to generate OCTA volumes with reduced noise and increased image quality.
         5485 This algorithm is based on previous work on probabilistic OCTA signal models
         5486 and maximum likelihood estimates. Reconstruction results using total variation
         5487 minimization and wavelet shrinkage for regularization were compared against an
         5488 OCTA ground truth volume, merged from six co-registered single OCTA volumes.
         5489 The results show a significant improvement in peak signal-to-noise ratio and
         5490 structural similarity. The presented algorithm brings together OCTA image
         5491 generation and Bayesian statistics and can be developed into new OCTA image
         5492 generation and denoising algorithms.
         5493 &lt;/p&gt;
         5494 </description>
         5495 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Husvogt_L/0/1/0/all/0/1&quot;&gt;Lennart Husvogt&lt;/a&gt; (1 and 2), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ploner_S/0/1/0/all/0/1&quot;&gt;Stefan B. Ploner&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chen_S/0/1/0/all/0/1&quot;&gt;Siyu Chen&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Stromer_D/0/1/0/all/0/1&quot;&gt;Daniel Stromer&lt;/a&gt; (1, 2), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Schottenhamml_J/0/1/0/all/0/1&quot;&gt;Julia Schottenhamml&lt;/a&gt; (1), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Alibhai_A/0/1/0/all/0/1&quot;&gt;A. Yasin Alibhai&lt;/a&gt; (3), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Moult_E/0/1/0/all/0/1&quot;&gt;Eric Moult&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Waheed_N/0/1/0/all/0/1&quot;&gt;Nadia K. Waheed&lt;/a&gt; (3), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Fujimoto_J/0/1/0/all/0/1&quot;&gt;James G. Fujimoto&lt;/a&gt; (2), &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Maier_A/0/1/0/all/0/1&quot;&gt;Andreas Maier&lt;/a&gt; (1) ((1) Friedrich-Alexander-Universit&amp;#xe4;t Erlangen-N&amp;#xfc;rnberg Germany, (2) Massachusetts Institute of Technology USA, (3) Tufts School of Medicine USA)</dc:creator>
         5496 </item>
         5497 <item rdf:about="http://fr.arxiv.org/abs/2010.15683">
         5498 <title>Resilient Energy Efficient Healthcare Monitoring Infrastructure with Server and Network Protection. (arXiv:2010.15683v1 [eess.SY])</title>
         5499 <link>http://fr.arxiv.org/abs/2010.15683</link>
         5500 <description rdf:parseType="Literal">&lt;p&gt;In this paper, a 1+1 server protection scheme is considered where two
         5501 servers, a primary and a secondary processing server are used to serve ECG
         5502 monitoring applications concurrently. The infrastructure is designed to be
         5503 resilient against server failure under two scenarios related to the geographic
         5504 location of primary and secondary servers and resilient against both server and
         5505 network failures. A Mixed Integer Linear Programming (MILP) model is used to
         5506 optimise the number and locations of both primary and secondary processing
         5507 servers so that the energy consumption of the networking equipment and
         5508 processing are minimised. The results show that considering a scenario for
         5509 server protection without geographical constraints compared to the
         5510 non-resilient scenario has resulted in both network and processing energy
         5511 penalty as the traffic is doubled. The results also reveal that increasing the
         5512 level of resilience to consider geographical constraints compared to case
         5513 without geographical constraints resulted in higher network energy penalty when
         5514 the demand is low as more nodes are utilised to place the processing servers
         5515 under the geographic constraints. Also, increasing the level of resilience to
         5516 consider network protection with link and node disjoint selection has resulted
         5517 in a low network energy penalty at high demands due to the activation of a
         5518 large part of the network in any case due to the demands. However, the results
         5519 show that the network energy penalty is reduced with the increasing number of
         5520 processing servers at each candidate node. Meanwhile, the same energy for
         5521 processing is consumed regardless of the increasing level of resilience as the
         5522 same number of processing servers are utilised. A heuristic is developed for
         5523 each resilience scenario for real-time implementation where the results show
         5524 that the performance of the heuristic is approaching the results of the MILP
         5525 model.
         5526 &lt;/p&gt;
         5527 </description>
         5528 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Isa_I/0/1/0/all/0/1&quot;&gt;Ida Syafiza M. Isa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+El_Gorashi_T/0/1/0/all/0/1&quot;&gt;Taisir E.H. El-Gorashi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Musa_M/0/1/0/all/0/1&quot;&gt;Mohamed O.I. Musa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Elmirghani_J/0/1/0/all/0/1&quot;&gt;J.M.H. Elmirghani&lt;/a&gt;</dc:creator>
         5529 </item>
         5530 <item rdf:about="http://fr.arxiv.org/abs/2010.15684">
         5531 <title>Governance &amp; Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems. (arXiv:2010.15684v1 [cs.SE])</title>
         5532 <link>http://fr.arxiv.org/abs/2010.15684</link>
         5533 <description rdf:parseType="Literal">&lt;p&gt;One of the main challenges in integrating Cyber-Physical System-of-Systems
         5534 (CPSoS) to function as a single unified system is the autonomy of its
         5535 Cyber-Physical Systems (CPSs), which may lead to a lack of coordination among
         5536 CPSs and results in various kinds of conflicts. We advocate that to efficiently
         5537 integrate CPSs within the CPSoS, we may need to adjust the autonomy of some
         5538 CPSs in a way that allows them to coordinate their activities to avoid any
         5539 potential conflict among one another. To achieve that, we need to incorporate
         5540 the notion of governance within the design of CPSoS, which defines rules that
         5541 can be used for clearly specifying who and how can adjust the autonomy of a
         5542 CPS. In this paper, we try to tackle this problem by proposing a new conceptual
         5543 model that can be used for performing a governance-based analysis of autonomy
         5544 for CPSs within CPSoS. We illustrate the utility of the model with an example
         5545 from the automotive domain.
         5546 &lt;/p&gt;
         5547 </description>
         5548 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gharib_M/0/1/0/all/0/1&quot;&gt;Mohamad Gharib&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lollini_P/0/1/0/all/0/1&quot;&gt;Paolo Lollini&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ceccarelli_A/0/1/0/all/0/1&quot;&gt;Andrea Ceccarelli&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bondavalli_A/0/1/0/all/0/1&quot;&gt;Andrea Bondavalli&lt;/a&gt;</dc:creator>
         5549 </item>
         5550 <item rdf:about="http://fr.arxiv.org/abs/2010.15687">
         5551 <title>Deep Autofocus for Synthetic Aperture Sonar. (arXiv:2010.15687v1 [eess.IV])</title>
         5552 <link>http://fr.arxiv.org/abs/2010.15687</link>
         5553 <description rdf:parseType="Literal">&lt;p&gt;Synthetic aperture sonar (SAS) requires precise positional and environmental
         5554 information to produce well-focused output during the image reconstruction
         5555 step. However, errors in these measurements are commonly present resulting in
         5556 defocused imagery. To overcome these issues, an \emph{autofocus} algorithm is
         5557 employed as a post-processing step after image reconstruction for the purpose
         5558 of improving image quality using the image content itself. These algorithms are
         5559 usually iterative and metric-based in that they seek to optimize an image
         5560 sharpness metric. In this letter, we demonstrate the potential of machine
         5561 learning, specifically deep learning, to address the autofocus problem. We
         5562 formulate the problem as a self-supervised, phase error estimation task using a
         5563 deep network we call Deep Autofocus. Our formulation has the advantages of
         5564 being non-iterative (and thus fast) and not requiring ground truth
         5565 focused-defocused images pairs as often required by other deblurring deep
         5566 learning methods. We compare our technique against a set of common sharpness
         5567 metrics optimized using gradient descent over a real-world dataset. Our results
         5568 demonstrate Deep Autofocus can produce imagery that is perceptually as good as
         5569 benchmark iterative techniques but at a substantially lower computational cost.
         5570 We conclude that our proposed Deep Autofocus can provide a more favorable
         5571 cost-quality trade-off than state-of-the-art alternatives with significant
         5572 potential of future research.
         5573 &lt;/p&gt;
         5574 </description>
         5575 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gerg_I/0/1/0/all/0/1&quot;&gt;Isaac Gerg&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Monga_V/0/1/0/all/0/1&quot;&gt;Vishal Monga&lt;/a&gt;</dc:creator>
         5576 </item>
         5577 <item rdf:about="http://fr.arxiv.org/abs/2010.15689">
         5578 <title>Learning Deep Interleaved Networks with Asymmetric Co-Attention for Image Restoration. (arXiv:2010.15689v1 [cs.CV])</title>
         5579 <link>http://fr.arxiv.org/abs/2010.15689</link>
         5580 <description rdf:parseType="Literal">&lt;p&gt;Recently, convolutional neural network (CNN) has demonstrated significant
         5581 success for image restoration (IR) tasks (e.g., image super-resolution, image
         5582 deblurring, rain streak removal, and dehazing). However, existing CNN based
         5583 models are commonly implemented as a single-path stream to enrich feature
         5584 representations from low-quality (LQ) input space for final predictions, which
         5585 fail to fully incorporate preceding low-level contexts into later high-level
         5586 features within networks, thereby producing inferior results. In this paper, we
         5587 present a deep interleaved network (DIN) that learns how information at
         5588 different states should be combined for high-quality (HQ) images
         5589 reconstruction. The proposed DIN follows a multi-path and multi-branch pattern
         5590 allowing multiple interconnected branches to interleave and fuse at different
         5591 states. In this way, the shallow information can guide deep representative
         5592 features prediction to enhance the feature expression ability. Furthermore, we
         5593 propose asymmetric co-attention (AsyCA) which is attached at each interleaved
         5594 node to model the feature dependencies. Such AsyCA can not only adaptively
         5595 emphasize the informative features from different states, but also improves the
         5596 discriminative ability of networks. Our presented DIN can be trained end-to-end
         5597 and applied to various IR tasks. Comprehensive evaluations on public benchmarks
         5598 and real-world datasets demonstrate that the proposed DIN perform favorably
         5599 against the state-of-the-art methods quantitatively and qualitatively.
         5600 &lt;/p&gt;
         5601 </description>
         5602 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_F/0/1/0/all/0/1&quot;&gt;Feng Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cong_R/0/1/0/all/0/1&quot;&gt;Runmin Cong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bai_H/0/1/0/all/0/1&quot;&gt;Huihui Bai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_Y/0/1/0/all/0/1&quot;&gt;Yifan He&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhao_Y/0/1/0/all/0/1&quot;&gt;Yao Zhao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhu_C/0/1/0/all/0/1&quot;&gt;Ce Zhu&lt;/a&gt;</dc:creator>
         5603 </item>
         5604 <item rdf:about="http://fr.arxiv.org/abs/2010.15690">
         5605 <title>Analyzing the tree-layer structure of Deep Forests. (arXiv:2010.15690v1 [cs.LG])</title>
         5606 <link>http://fr.arxiv.org/abs/2010.15690</link>
         5607 <description rdf:parseType="Literal">&lt;p&gt;Random forests on the one hand, and neural networks on the other hand, have
         5608 met great success in the machine learning community for their predictive
         5609 performance. Combinations of both have been proposed in the literature, notably
         5610 leading to the so-called deep forests (DF) [25]. In this paper, we investigate
         5611 the mechanisms at work in DF and outline that DF architecture can generally be
         5612 simplified into more simple and computationally efficient shallow forests
         5613 networks. Despite some instability, the latter may outperform standard
         5614 predictive tree-based methods. In order to precisely quantify the improvement
         5615 achieved by these light network configurations over standard tree learners, we
         5616 theoretically study the performance of a shallow tree network made of two
         5617 layers, each one composed of a single centered tree. We provide tight
         5618 theoretical lower and upper bounds on its excess risk. These theoretical
         5619 results show the interest of tree-network architectures for well-structured
         5620 data provided that the first layer, acting as a data encoder, is rich enough.
         5621 &lt;/p&gt;
         5622 </description>
         5623 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Arnould_L/0/1/0/all/0/1&quot;&gt;Ludovic Arnould&lt;/a&gt; (LPSM UMR 8001), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Boyer_C/0/1/0/all/0/1&quot;&gt;Claire Boyer&lt;/a&gt; (LPSM UMR 8001), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Scornet_E/0/1/0/all/0/1&quot;&gt;Erwan Scornet&lt;/a&gt; (CMAP)</dc:creator>
         5624 </item>
         5625 <item rdf:about="http://fr.arxiv.org/abs/2010.15692">
         5626 <title>Unveiling process insights from refactoring practices. (arXiv:2010.15692v1 [cs.SE])</title>
         5627 <link>http://fr.arxiv.org/abs/2010.15692</link>
         5628 <description rdf:parseType="Literal">&lt;p&gt;Context : Software comprehension and maintenance activities, such as
         5629 refactoring, are said to be negatively impacted by software complexity. The
         5630 methods used to measure software product and processes complexity have been
         5631 thoroughly debated in the literature. However, the discernment about the
         5632 possible links between these two dimensions, particularly on the benefits of
         5633 using the process perspective, has a long journey ahead. Objective: To improve
         5634 the understanding of the liaison of developers&apos; activities and software
         5635 complexity within a refactoring task, namely by evaluating if process metrics
         5636 gathered from the IDE, using process mining methods and tools, are suitable to
         5637 accurately classify different refactoring practices and the resulting software
         5638 complexity. Method: We mined source code metrics from a software product after
         5639 a quality improvement task was given in parallel to (117) software developers,
         5640 organized in (71) teams. Simultaneously, we collected events from their IDE
         5641 work sessions (320) and used process mining to model their processes and
         5642 extract the correspondent metrics. Results: Most teams using a plugin for
         5643 refactoring (JDeodorant) reduced software complexity more effectively and with
         5644 simpler processes than the ones that performed refactoring using only Eclipse
         5645 native features. We were able to find moderate correlations (43%) between
         5646 software cyclomatic complexity and process cyclomatic complexity. The best
         5647 models found for the refactoring method and cyclomatic complexity level
         5648 predictions, had an accuracy of 92.95% and 94.36%, respectively. Conclusions:
         5649 Our approach agnostic to programming languages, geographic location, or
         5650 development practices. Initial findings are encouraging, and lead us to suggest
         5651 practitioners may use our method in other development tasks, such as, defect
         5652 analysis and unit or integration tests.
         5653 &lt;/p&gt;
         5654 </description>
         5655 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Caldeira_J/0/1/0/all/0/1&quot;&gt;Jo&amp;#xe3;o Caldeira&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Abreu_F/0/1/0/all/0/1&quot;&gt;Fernando Brito e Abreu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cardoso_J/0/1/0/all/0/1&quot;&gt;Jorge Cardoso&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Reis_J/0/1/0/all/0/1&quot;&gt;Jos&amp;#xe9; Reis&lt;/a&gt;</dc:creator>
         5656 </item>
         5657 <item rdf:about="http://fr.arxiv.org/abs/2010.15694">
         5658 <title>Learning interaction kernels in mean-field equations of 1st-order systems of interacting particles. (arXiv:2010.15694v1 [stat.ML])</title>
         5659 <link>http://fr.arxiv.org/abs/2010.15694</link>
         5660 <description rdf:parseType="Literal">&lt;p&gt;We introduce a nonparametric algorithm to learn interaction kernels of
         5661 mean-field equations for 1st-order systems of interacting particles. The data
         5662 consist of discrete space-time observations of the solution. By least squares
         5663 with regularization, the algorithm learns the kernel on data-adaptive
         5664 hypothesis spaces efficiently. A key ingredient is a probabilistic error
         5665 functional derived from the likelihood of the mean-field equation&apos;s diffusion
         5666 process. The estimator converges, in a reproducing kernel Hilbert space and an
         5667 L2 space under an identifiability condition, at a rate optimal in the sense
         5668 that it equals the numerical integrator&apos;s order. We demonstrate our algorithm
         5669 on three typical examples: the opinion dynamics with a piecewise linear kernel,
         5670 the granular media model with a quadratic kernel, and the aggregation-diffusion
         5671 with a repulsive-attractive kernel.
         5672 &lt;/p&gt;
         5673 </description>
         5674 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Lang_Q/0/1/0/all/0/1&quot;&gt;Quanjun Lang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Lu_F/0/1/0/all/0/1&quot;&gt;Fei Lu&lt;/a&gt;</dc:creator>
         5675 </item>
         5676 <item rdf:about="http://fr.arxiv.org/abs/2010.15697">
         5677 <title>Generalized Insider Attack Detection Implementation using NetFlow Data. (arXiv:2010.15697v1 [cs.CR])</title>
         5678 <link>http://fr.arxiv.org/abs/2010.15697</link>
         5679 <description rdf:parseType="Literal">&lt;p&gt;Insider Attack Detection in commercial networks is a critical problem that
         5680 does not have any good solutions at this current time. The problem is
         5681 challenging due to the lack of visibility into live networks and a lack of a
         5682 standard feature set to distinguish between different attacks. In this paper,
         5683 we study an approach centered on using network data to identify attacks. Our
         5684 work builds on unsupervised machine learning techniques such as One-Class SVM
         5685 and bi-clustering as weak indicators of insider network attacks. We combine
         5686 these techniques to limit the number of false positives to an acceptable level
         5687 required for real-world deployments by using One-Class SVM to check for
         5688 anomalies detected by the proposed Bi-clustering algorithm. We present a
         5689 prototype implementation in Python and associated results for two different
         5690 real-world representative data sets. We show that our approach is a promising
         5691 tool for insider attack detection in realistic settings.
         5692 &lt;/p&gt;
         5693 </description>
         5694 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Samtani_Y/0/1/0/all/0/1&quot;&gt;Yash Samtani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Elwell_J/0/1/0/all/0/1&quot;&gt;Jesse Elwell&lt;/a&gt;</dc:creator>
         5695 </item>
         5696 <item rdf:about="http://fr.arxiv.org/abs/2010.15698">
         5697 <title>Constrained Online Learning to Mitigate Distortion Effects in Pulse-Agile Cognitive Radar. (arXiv:2010.15698v1 [cs.IT])</title>
         5698 <link>http://fr.arxiv.org/abs/2010.15698</link>
         5699 <description rdf:parseType="Literal">&lt;p&gt;Pulse-agile radar systems have demonstrated favorable performance in dynamic
         5700 electromagnetic scenarios. However, the use of non-identical waveforms within a
         5701 radar&apos;s coherent processing interval may lead to harmful distortion effects
         5702 when pulse-Doppler processing is used. This paper presents an online learning
         5703 framework to optimize detection performance while mitigating harmful sidelobe
         5704 levels. The radar waveform selection process is formulated as a linear
         5705 contextual bandit problem, within which waveform adaptations which exceed a
         5706 tolerable level of expected distortion are eliminated. The constrained online
         5707 learning approach is effective and computationally feasible, evidenced by
         5708 simulations in a radar-communication coexistence scenario and in the presence
         5709 of intentional adaptive jamming. This approach is applied to both stochastic
         5710 and adversarial contextual bandit learning models and the detection performance
         5711 in dynamic scenarios is evaluated.
         5712 &lt;/p&gt;
         5713 </description>
         5714 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Thornton_C/0/1/0/all/0/1&quot;&gt;Charles E. Thornton&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Buehrer_R/0/1/0/all/0/1&quot;&gt;R. Michael Buehrer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Martone_A/0/1/0/all/0/1&quot;&gt;Anthony F. Martone&lt;/a&gt;</dc:creator>
         5715 </item>
         5716 <item rdf:about="http://fr.arxiv.org/abs/2010.15703">
         5717 <title>Permute, Quantize, and Fine-tune: Efficient Compression of Neural Networks. (arXiv:2010.15703v1 [cs.CV])</title>
         5718 <link>http://fr.arxiv.org/abs/2010.15703</link>
         5719 <description rdf:parseType="Literal">&lt;p&gt;Compressing large neural networks is an important step for their deployment
         5720 in resource-constrained computational platforms. In this context, vector
         5721 quantization is an appealing framework that expresses multiple parameters using
         5722 a single code, and has recently achieved state-of-the-art network compression
         5723 on a range of core vision and natural language processing tasks. Key to the
         5724 success of vector quantization is deciding which parameter groups should be
         5725 compressed together. Previous work has relied on heuristics that group the
         5726 spatial dimension of individual convolutional filters, but a general solution
         5727 remains unaddressed. This is desirable for pointwise convolutions (which
         5728 dominate modern architectures), linear layers (which have no notion of spatial
         5729 dimension), and convolutions (when more than one filter is compressed to the
         5730 same codeword). In this paper we make the observation that the weights of two
         5731 adjacent layers can be permuted while expressing the same function. We then
         5732 establish a connection to rate-distortion theory and search for permutations
         5733 that result in networks that are easier to compress. Finally, we rely on an
         5734 annealed quantization algorithm to better compress the network and achieve
         5735 higher final accuracy. We show results on image classification, object
         5736 detection, and segmentation, reducing the gap with the uncompressed model by 40
         5737 to 70% with respect to the current state of the art.
         5738 &lt;/p&gt;
         5739 </description>
         5740 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Martinez_J/0/1/0/all/0/1&quot;&gt;Julieta Martinez&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shewakramani_J/0/1/0/all/0/1&quot;&gt;Jashan Shewakramani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1&quot;&gt;Ting Wei Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Barsan_I/0/1/0/all/0/1&quot;&gt;Ioan Andrei B&amp;#xe2;rsan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zeng_W/0/1/0/all/0/1&quot;&gt;Wenyuan Zeng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Urtasun_R/0/1/0/all/0/1&quot;&gt;Raquel Urtasun&lt;/a&gt;</dc:creator>
         5741 </item>
         5742 <item rdf:about="http://fr.arxiv.org/abs/2010.15711">
         5743 <title>5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations. (arXiv:2010.15711v1 [cs.CR])</title>
         5744 <link>http://fr.arxiv.org/abs/2010.15711</link>
         5745 <description rdf:parseType="Literal">&lt;p&gt;Digital forensic investigation is used in various areas related to digital
         5746 devices including the cyber crime. This is an investigative process using many
         5747 techniques, which have implemented as tools. The types of files covered by the
         5748 digital forensic investigation are wide and varied, however, there is no way to
         5749 express the results into a standardized format. The standardization are
         5750 different by types of device, file system, or application. Different outputs
         5751 make it time-consuming and difficult to share information and to implement
         5752 integration. In addition, it could weaken cyber security. Thus, it is important
         5753 to define normalization and to present data in the same format. In this paper,
         5754 a 5W1H-based expression for information sharing for effective digital forensic
         5755 investigation is proposed to analyze digital forensic information using six
         5756 questions--what, who, where, when, why and how. Based on the 5W1H-based
         5757 expression, digital information from different types of files is converted and
         5758 represented in the same format of outputs. As the 5W1H is the basic writing
         5759 principle, application of the 5W1H-based expression on the case studies shows
         5760 that this expression enhances clarity and correctness for information sharing.
         5761 Furthermore, in the case of security incidents, this expression has an
         5762 advantage in being compatible with STIX.
         5763 &lt;/p&gt;
         5764 </description>
         5765 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Han_J/0/1/0/all/0/1&quot;&gt;Jaehyeok Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kim_J/0/1/0/all/0/1&quot;&gt;Jieon Kim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_S/0/1/0/all/0/1&quot;&gt;Sangjin Lee&lt;/a&gt;</dc:creator>
         5766 </item>
         5767 <item rdf:about="http://fr.arxiv.org/abs/2010.15716">
         5768 <title>Playing a Part: Speaker Verification at the Movies. (arXiv:2010.15716v1 [cs.SD])</title>
         5769 <link>http://fr.arxiv.org/abs/2010.15716</link>
         5770 <description rdf:parseType="Literal">&lt;p&gt;The goal of this work is to investigate the performance of popular speaker
         5771 recognition models on speech segments from movies, where often actors
         5772 intentionally disguise their voice to play a character. We make the following
         5773 three contributions: (i) We collect a novel, challenging speaker recognition
         5774 dataset called VoxMovies, with speech for 856 identities from almost 4000 movie
         5775 clips. VoxMovies contains utterances with varying emotion, accents and
         5776 background noise, and therefore comprises an entirely different domain to the
         5777 interview-style, emotionally calm utterances in current speaker recognition
         5778 datasets such as VoxCeleb; (ii) We provide a number of domain adaptation
         5779 evaluation sets, and benchmark the performance of state-of-the-art speaker
         5780 recognition models on these evaluation pairs. We demonstrate that both speaker
         5781 verification and identification performance drops steeply on this new data,
         5782 showing the challenge in transferring models across domains; and finally (iii)
         5783 We show that simple domain adaptation paradigms improve performance, but there
         5784 is still large room for improvement.
         5785 &lt;/p&gt;
         5786 </description>
         5787 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Brown_A/0/1/0/all/0/1&quot;&gt;Andrew Brown&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huh_J/0/1/0/all/0/1&quot;&gt;Jaesung Huh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nagrani_A/0/1/0/all/0/1&quot;&gt;Arsha Nagrani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chung_J/0/1/0/all/0/1&quot;&gt;Joon Son Chung&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zisserman_A/0/1/0/all/0/1&quot;&gt;Andrew Zisserman&lt;/a&gt;</dc:creator>
         5788 </item>
         5789 <item rdf:about="http://fr.arxiv.org/abs/2010.15718">
         5790 <title>What can we learn from gradients?. (arXiv:2010.15718v1 [cs.CR])</title>
         5791 <link>http://fr.arxiv.org/abs/2010.15718</link>
         5792 <description rdf:parseType="Literal">&lt;p&gt;Recent work (\cite{zhu2019deep}) has shown that it is possible to reconstruct
         5793 the input (image) from the gradient of a neural network. In this paper, our aim
         5794 is to better understand the limits to reconstruction and to speed up image
         5795 reconstruction by imposing prior image information and improved initialization.
         5796 Firstly, we show that for the \textbf{non-linear} neural network,
         5797 gradient-based reconstruction approximates to solving a high-dimension
         5798 \textbf{linear} equations for both fully-connected neural network and
         5799 convolutional neural network. Exploring the theoretical limits of input
         5800 reconstruction, we show that a fully-connected neural network with a
         5801 \textbf{one} hidden node is enough to reconstruct a \textbf{single} input
         5802 image, regardless of the number of nodes in the output layer. Then we
         5803 generalize this result to a gradient averaged over mini-batches of size B. In
         5804 this case, the full mini-batch can be reconstructed in a fully-connected
         5805 network if the number of hidden units exceeds B. For a convolutional neural
         5806 network, the required number of filters in the first convolutional layer again
         5807 is decided by the batch size B, however, in this case, input width d and the
         5808 width after filter $d^{&apos;}$ also play the role $h=(\frac{d}{d^{&apos;}})^2BC$, where
         5809 C is channel number of input. Finally, we validate and underpin our theoretical
         5810 analysis on bio-medical data (fMRI, ECG signals, and cell images) and on
         5811 benchmark data (MNIST, CIFAR100, and face images).
         5812 &lt;/p&gt;
         5813 </description>
         5814 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qian_J/0/1/0/all/0/1&quot;&gt;Jia Qian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hansen_L/0/1/0/all/0/1&quot;&gt;Lars Kai Hansen&lt;/a&gt;</dc:creator>
         5815 </item>
         5816 <item rdf:about="http://fr.arxiv.org/abs/2010.15727">
         5817 <title>Attentive Clustering Processes. (arXiv:2010.15727v1 [stat.ML])</title>
         5818 <link>http://fr.arxiv.org/abs/2010.15727</link>
         5819 <description rdf:parseType="Literal">&lt;p&gt;Amortized approaches to clustering have recently received renewed attention
         5820 thanks to novel objective functions that exploit the expressiveness of deep
         5821 learning models. In this work we revisit a recent proposal for fast amortized
         5822 probabilistic clustering, the Clusterwise Clustering Process (CCP), which
         5823 yields samples from the posterior distribution of cluster labels for sets of
         5824 arbitrary size using only O(K) forward network evaluations, where K is an
         5825 arbitrary number of clusters. While adequate in simple datasets, we show that
         5826 the model can severely underfit complex datasets, and hypothesize that this
         5827 limitation can be traced back to the implicit assumption that the probability
         5828 of a point joining a cluster is equally sensitive to all the points available
         5829 to join the same cluster. We propose an improved model, the Attentive
         5830 Clustering Process (ACP), that selectively pays more attention to relevant
         5831 points while preserving the invariance properties of the generative model. We
         5832 illustrate the advantages of the new model in applications to spike-sorting in
         5833 multi-electrode arrays and community discovery in networks. The latter case
         5834 combines the ACP model with graph convolutional networks, and to our knowledge
         5835 is the first deep learning model that handles an arbitrary number of
         5836 communities.
         5837 &lt;/p&gt;
         5838 </description>
         5839 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Pakman_A/0/1/0/all/0/1&quot;&gt;Ari Pakman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yueqi Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Lee_Y/0/1/0/all/0/1&quot;&gt;Yoonho Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Basu_P/0/1/0/all/0/1&quot;&gt;Pallab Basu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Lee_J/0/1/0/all/0/1&quot;&gt;Juho Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Teh_Y/0/1/0/all/0/1&quot;&gt;Yee Whye Teh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Paninski_L/0/1/0/all/0/1&quot;&gt;Liam Paninski&lt;/a&gt;</dc:creator>
         5840 </item>
         5841 <item rdf:about="http://fr.arxiv.org/abs/2010.15728">
         5842 <title>Explainable Automated Coding of Clinical Notes using Hierarchical Label-wise Attention Networks and Label Embedding Initialisation. (arXiv:2010.15728v1 [cs.CL])</title>
         5843 <link>http://fr.arxiv.org/abs/2010.15728</link>
         5844 <description rdf:parseType="Literal">&lt;p&gt;Diagnostic or procedural coding of clinical notes aims to derive a coded
         5845 summary of disease-related information about patients. Such coding is usually
         5846 done manually in hospitals but could potentially be automated to improve the
         5847 efficiency and accuracy of medical coding. Recent studies on deep learning for
         5848 automated medical coding achieved promising performances. However, the
         5849 explainability of these models is usually poor, preventing them to be used
         5850 confidently in supporting clinical practice. Another limitation is that these
         5851 models mostly assume independence among labels, ignoring the complex
         5852 correlation among medical codes which can potentially be exploited to improve
         5853 the performance. We propose a Hierarchical Label-wise Attention Network (HLAN),
         5854 which aimed to interpret the model by quantifying importance (as attention
         5855 weights) of words and sentences related to each of the labels. Secondly, we
         5856 propose to enhance the major deep learning models with a label embedding (LE)
         5857 initialisation approach, which learns a dense, continuous vector representation
         5858 and then injects the representation into the final layers and the label-wise
         5859 attention layers in the models. We evaluated the methods using three settings
         5860 on the MIMIC-III discharge summaries: full codes, top-50 codes, and the UK NHS
         5861 COVID-19 shielding codes. Experiments were conducted to compare HLAN and LE
         5862 initialisation to the state-of-the-art neural network based methods. HLAN
         5863 achieved the best Micro-level AUC and $F_1$ on the top-50 code prediction and
         5864 comparable results on the NHS COVID-19 shielding code prediction to other
         5865 models. By highlighting the most salient words and sentences for each label,
         5866 HLAN showed more meaningful and comprehensive model interpretation compared to
         5867 its downgraded baselines and the CNN-based models. LE initialisation
         5868 consistently boosted most deep learning models for automated medical coding.
         5869 &lt;/p&gt;
         5870 </description>
         5871 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dong_H/0/1/0/all/0/1&quot;&gt;Hang Dong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Suarez_Paniagua_V/0/1/0/all/0/1&quot;&gt;V&amp;#xed;ctor Su&amp;#xe1;rez-Paniagua&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Whiteley_W/0/1/0/all/0/1&quot;&gt;William Whiteley&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_H/0/1/0/all/0/1&quot;&gt;Honghan Wu&lt;/a&gt;</dc:creator>
         5872 </item>
         5873 <item rdf:about="http://fr.arxiv.org/abs/2010.15729">
         5874 <title>Fundamental limitations to key distillation from Gaussian states with Gaussian operations. (arXiv:2010.15729v1 [quant-ph])</title>
         5875 <link>http://fr.arxiv.org/abs/2010.15729</link>
         5876 <description rdf:parseType="Literal">&lt;p&gt;We establish fundamental upper bounds on the amount of secret key that can be
         5877 extracted from continuous variable quantum Gaussian states by using only local
         5878 Gaussian operations, local classical processing, and public communication. For
         5879 one-way communication, we prove that the key is bounded by the R\&apos;enyi-$2$
         5880 Gaussian entanglement of formation $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$,
         5881 with the inequality being saturated for pure Gaussian states. The same is true
         5882 if two-way public communication is allowed but Alice and Bob employ protocols
         5883 that start with destructive local Gaussian measurements. In the most general
         5884 setting of two-way communication and arbitrary interactive protocols, we argue
         5885 that $2 E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ is still a bound on the
         5886 extractable key, although we conjecture that the factor of $2$ is superfluous.
         5887 Finally, for a wide class of Gaussian states that includes all two-mode states,
         5888 we prove a recently proposed conjecture on the equality between
         5889 $E_{F,2}^{\mathrm{\scriptscriptstyle G}}$ and the Gaussian intrinsic
         5890 entanglement, thus endowing both measures with a more solid operational
         5891 meaning.
         5892 &lt;/p&gt;
         5893 </description>
         5894 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Lami_L/0/1/0/all/0/1&quot;&gt;Ludovico Lami&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Mista_L/0/1/0/all/0/1&quot;&gt;Ladislav Mi&amp;#x161;ta, Jr.&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Adesso_G/0/1/0/all/0/1&quot;&gt;Gerardo Adesso&lt;/a&gt;</dc:creator>
         5895 </item>
         5896 <item rdf:about="http://fr.arxiv.org/abs/2010.15738">
         5897 <title>The Agile Coach Role: Coaching for Agile Performance Impact. (arXiv:2010.15738v1 [cs.SE])</title>
         5898 <link>http://fr.arxiv.org/abs/2010.15738</link>
         5899 <description rdf:parseType="Literal">&lt;p&gt;It is increasingly common to introduce agile coaches to help gain speed and
         5900 advantage in agile companies. Following the success of Spotify, the role of the
         5901 agile coach has branched out in terms of tasks and responsibilities, but little
         5902 research has been conducted to examine how this role is practiced. This paper
         5903 examines the role of the agile coach through 19 semistructured interviews with
         5904 agile coaches from ten different companies. We describe the role in terms of
         5905 the tasks the coach has in agile projects, valuable traits, skills, tools, and
         5906 the enablers of agile coaching. Our findings indicate that agile coaches
         5907 perform at the team and organizational levels. They affect effort, strategies,
         5908 knowledge, and skills of the agile teams. The most essential traits of an agile
         5909 coach are being emphatic, people-oriented, able to listen, diplomatic, and
         5910 persistent. We suggest empirically based advice for agile coaching, for example
         5911 companies giving their agile coaches the authority to implement the required
         5912 organizational changes within and outside the teams.
         5913 &lt;/p&gt;
         5914 </description>
         5915 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stray_V/0/1/0/all/0/1&quot;&gt;Viktoria Stray&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tkalich_A/0/1/0/all/0/1&quot;&gt;Anastasiia Tkalich&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moe_N/0/1/0/all/0/1&quot;&gt;Nils Brede Moe&lt;/a&gt;</dc:creator>
         5916 </item>
         5917 <item rdf:about="http://fr.arxiv.org/abs/2010.15740">
         5918 <title>Recurrent Neural Networks for video object detection. (arXiv:2010.15740v1 [cs.CV])</title>
         5919 <link>http://fr.arxiv.org/abs/2010.15740</link>
         5920 <description rdf:parseType="Literal">&lt;p&gt;There is lots of scientific work about object detection in images. For many
         5921 applications like for example autonomous driving the actual data on which
         5922 classification has to be done are videos. This work compares different methods,
         5923 especially those which use Recurrent Neural Networks to detect objects in
         5924 videos. We differ between feature-based methods, which feed feature maps of
         5925 different frames into the recurrent units, box-level methods, which feed
         5926 bounding boxes with class probabilities into the recurrent units and methods
         5927 which use flow networks. This study indicates common outcomes of the compared
         5928 methods like the benefit of including the temporal context into object
         5929 detection and states conclusions and guidelines for video object detection
         5930 networks.
         5931 &lt;/p&gt;
         5932 </description>
         5933 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qasim_A/0/1/0/all/0/1&quot;&gt;Ahmad B Qasim&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pettirsch_A/0/1/0/all/0/1&quot;&gt;Arnd Pettirsch&lt;/a&gt;</dc:creator>
         5934 </item>
         5935 <item rdf:about="http://fr.arxiv.org/abs/2010.15745">
         5936 <title>Causal variables from reinforcement learning using generalized Bellman equations. (arXiv:2010.15745v1 [cs.LG])</title>
         5937 <link>http://fr.arxiv.org/abs/2010.15745</link>
         5938 <description rdf:parseType="Literal">&lt;p&gt;Many open problems in machine learning are intrinsically related to
         5939 causality, however, the use of causal analysis in machine learning is still in
         5940 its early stage. Within a general reinforcement learning setting, we consider
         5941 the problem of building a general reinforcement learning agent which uses
         5942 experience to construct a causal graph of the environment, and use this graph
         5943 to inform its policy. Our approach has three characteristics: First, we learn a
         5944 simple, coarse-grained causal graph, in which the variables reflect states at
         5945 many time instances, and the interventions happen at the level of policies,
         5946 rather than individual actions. Secondly, we use mediation analysis to obtain
         5947 an optimization target. By minimizing this target, we define the causal
         5948 variables. Thirdly, our approach relies on estimating conditional expectations
         5949 rather the familiar expected return from reinforcement learning, and we
         5950 therefore apply a generalization of Bellman&apos;s equations. We show the method can
         5951 learn a plausible causal graph in a grid-world environment, and the agent
         5952 obtains an improvement in performance when using the causally informed policy.
         5953 To our knowledge, this is the first attempt to apply causal analysis in a
         5954 reinforcement learning setting without strict restrictions on the number of
         5955 states. We have observed that mediation analysis provides a promising avenue
         5956 for transforming the problem of causal acquisition into one of cost-function
         5957 minimization, but importantly one which involves estimating conditional
         5958 expectations. This is a new challenge, and we think that causal reinforcement
         5959 learning will involve development methods suited for online estimation of such
         5960 conditional expectations. Finally, a benefit of our approach is the use of very
         5961 simple causal models, which are arguably a more natural model of human causal
         5962 understanding.
         5963 &lt;/p&gt;
         5964 </description>
         5965 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Herlau_T/0/1/0/all/0/1&quot;&gt;Tue Herlau&lt;/a&gt;</dc:creator>
         5966 </item>
         5967 <item rdf:about="http://fr.arxiv.org/abs/2010.15750">
         5968 <title>Gaussian Process Bandit Optimization of theThermodynamic Variational Objective. (arXiv:2010.15750v1 [cs.LG])</title>
         5969 <link>http://fr.arxiv.org/abs/2010.15750</link>
         5970 <description rdf:parseType="Literal">&lt;p&gt;Achieving the full promise of the Thermodynamic Variational Objective (TVO),a
         5971 recently proposed variational lower bound on the log evidence involving a
         5972 one-dimensional Riemann integral approximation, requires choosing a &quot;schedule&quot;
         5973 ofsorted discretization points. This paper introduces a bespoke Gaussian
         5974 processbandit optimization method for automatically choosing these points. Our
         5975 approach not only automates their one-time selection, but also dynamically
         5976 adaptstheir positions over the course of optimization, leading to improved
         5977 model learning and inference. We provide theoretical guarantees that our bandit
         5978 optimizationconverges to the regret-minimizing choice of integration points.
         5979 Empirical validation of our algorithm is provided in terms of improved learning
         5980 and inference inVariational Autoencoders and Sigmoid Belief Networks.
         5981 &lt;/p&gt;
         5982 </description>
         5983 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nguyen_V/0/1/0/all/0/1&quot;&gt;Vu Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Masrani_V/0/1/0/all/0/1&quot;&gt;Vaden Masrani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Brekelmans_R/0/1/0/all/0/1&quot;&gt;Rob Brekelmans&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Osborne_M/0/1/0/all/0/1&quot;&gt;Michael A. Osborne&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wood_F/0/1/0/all/0/1&quot;&gt;Frank Wood&lt;/a&gt;</dc:creator>
         5984 </item>
         5985 <item rdf:about="http://fr.arxiv.org/abs/2010.15755">
         5986 <title>A more Pragmatic Implementation of the Lock-free, Ordered, Linked List. (arXiv:2010.15755v1 [cs.DS])</title>
         5987 <link>http://fr.arxiv.org/abs/2010.15755</link>
         5988 <description rdf:parseType="Literal">&lt;p&gt;The lock-free, ordered, linked list is an important, standard example of a
         5989 concurrent data structure. An obvious, practical drawback of textbook
         5990 implementations is that failed compare-and-swap (CAS) operations lead to
         5991 retraversal of the entire list (retries), which is particularly harmful for
         5992 such a linear-time data structure. We alleviate this drawback by first
         5993 observing that failed CAS operations under some conditions do not require a
         5994 full retry, and second by maintaining approximate backwards pointers that are
         5995 used to find a closer starting position in the list for operation retry.
         5996 Experiments with both a worst-case deterministic benchmark, and a standard,
         5997 randomized, mixed-operation throughput benchmark on three shared-memory systems
         5998 (Intel Xeon, AMD EPYC, SPARC-T5) show practical improvements ranging from
         5999 significant, to dramatic, several orders of magnitude.
         6000 &lt;/p&gt;
         6001 </description>
         6002 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Traff_J/0/1/0/all/0/1&quot;&gt;Jesper Larsson Tr&amp;#xe4;ff&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Poter_M/0/1/0/all/0/1&quot;&gt;Manuel P&amp;#xf6;ter&lt;/a&gt;</dc:creator>
         6003 </item>
         6004 <item rdf:about="http://fr.arxiv.org/abs/2010.15760">
         6005 <title>Identifying Transition States of Chemical Kinetic Systems using Network Embedding Techniques. (arXiv:2010.15760v1 [math.NA])</title>
         6006 <link>http://fr.arxiv.org/abs/2010.15760</link>
         6007 <description rdf:parseType="Literal">&lt;p&gt;Using random walk sampling methods for feature learning on networks, we
         6008 develop a method for generating low-dimensional node embeddings for directed
         6009 graphs and identifying transition states of stochastic chemical reacting
         6010 systems. We modified objective functions adopted in existing random walk based
         6011 network embedding methods to handle directed graphs and neighbors of different
         6012 degrees. Through optimization via gradient ascent, we embed the weighted graph
         6013 vertices into a low-dimensional vector space Rd while preserving the
         6014 neighborhood of each node. We then demonstrate the effectiveness of the method
         6015 on dimension reduction through several examples regarding identification of
         6016 transition states of chemical reactions, especially for entropic systems.
         6017 &lt;/p&gt;
         6018 </description>
         6019 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Mercurio_P/0/1/0/all/0/1&quot;&gt;Paula Mercurio&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Liu_D/0/1/0/all/0/1&quot;&gt;Di Liu&lt;/a&gt;</dc:creator>
         6020 </item>
         6021 <item rdf:about="http://fr.arxiv.org/abs/2010.15761">
         6022 <title>A Helmholtz equation solver using unsupervised learning: Application to transcranial ultrasound. (arXiv:2010.15761v1 [physics.comp-ph])</title>
         6023 <link>http://fr.arxiv.org/abs/2010.15761</link>
         6024 <description rdf:parseType="Literal">&lt;p&gt;Transcranial ultrasound therapy is increasingly used for the non-invasive
         6025 treatment of brain disorders. However, conventional numerical wave solvers are
         6026 currently too computationally expensive to be used online during treatments to
         6027 predict the acoustic field passing through the skull (e.g., to account for
         6028 subject-specific dose and targeting variations). As a step towards real-time
         6029 predictions, in the current work, a fast iterative solver for the heterogeneous
         6030 Helmholtz equation in 2D is developed using a fully-learned optimizer. The
         6031 lightweight network architecture is based on a modified UNet that includes a
         6032 learned hidden state. The network is trained using a physics-based loss
         6033 function and a set of idealized sound speed distributions with fully
         6034 unsupervised training (no knowledge of the true solution is required). The
         6035 learned optimizer shows excellent performance on the test set, and is capable
         6036 of generalization well outside the training examples, including to much larger
         6037 computational domains, and more complex source and sound speed distributions,
         6038 for example, those derived from x-ray computed tomography images of the skull.
         6039 &lt;/p&gt;
         6040 </description>
         6041 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Stanziola_A/0/1/0/all/0/1&quot;&gt;Antonio Stanziola&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Arridge_S/0/1/0/all/0/1&quot;&gt;Simon R. Arridge&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Cox_B/0/1/0/all/0/1&quot;&gt;Ben T. Cox&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Treeby_B/0/1/0/all/0/1&quot;&gt;Bradley E. Treeby&lt;/a&gt;</dc:creator>
         6042 </item>
         6043 <item rdf:about="http://fr.arxiv.org/abs/2010.15764">
         6044 <title>Domain adaptation under structural causal models. (arXiv:2010.15764v1 [stat.ML])</title>
         6045 <link>http://fr.arxiv.org/abs/2010.15764</link>
         6046 <description rdf:parseType="Literal">&lt;p&gt;Domain adaptation (DA) arises as an important problem in statistical machine
         6047 learning when the source data used to train a model is different from the
         6048 target data used to test the model. Recent advances in DA have mainly been
         6049 application-driven and have largely relied on the idea of a common subspace for
         6050 source and target data. To understand the empirical successes and failures of
         6051 DA methods, we propose a theoretical framework via structural causal models
         6052 that enables analysis and comparison of the prediction performance of DA
         6053 methods. This framework also allows us to itemize the assumptions needed for
         6054 the DA methods to have a low target error. Additionally, with insights from our
         6055 theory, we propose a new DA method called CIRM that outperforms existing DA
         6056 methods when both the covariates and label distributions are perturbed in the
         6057 target data. We complement the theoretical analysis with extensive simulations
         6058 to show the necessity of the devised assumptions. Reproducible synthetic and
         6059 real data experiments are also provided to illustrate the strengths and
         6060 weaknesses of DA methods when parts of the assumptions of our theory are
         6061 violated.
         6062 &lt;/p&gt;
         6063 </description>
         6064 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yuansi Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Buhlmann_P/0/1/0/all/0/1&quot;&gt;Peter B&amp;#xfc;hlmann&lt;/a&gt;</dc:creator>
         6065 </item>
         6066 <item rdf:about="http://fr.arxiv.org/abs/2010.15768">
         6067 <title>A Single-Loop Smoothed Gradient Descent-Ascent Algorithm for Nonconvex-Concave Min-Max Problems. (arXiv:2010.15768v1 [math.OC])</title>
         6068 <link>http://fr.arxiv.org/abs/2010.15768</link>
         6069 <description rdf:parseType="Literal">&lt;p&gt;Nonconvex-concave min-max problem arises in many machine learning
         6070 applications including minimizing a pointwise maximum of a set of nonconvex
         6071 functions and robust adversarial training of neural networks. A popular
         6072 approach to solve this problem is the gradient descent-ascent (GDA) algorithm
         6073 which unfortunately can exhibit oscillation in case of nonconvexity. In this
         6074 paper, we introduce a &quot;smoothing&quot; scheme which can be combined with GDA to
         6075 stabilize the oscillation and ensure convergence to a stationary solution. We
         6076 prove that the stabilized GDA algorithm can achieve an $O(1/\epsilon^2)$
         6077 iteration complexity for minimizing the pointwise maximum of a finite
         6078 collection of nonconvex functions. Moreover, the smoothed GDA algorithm
         6079 achieves an $O(1/\epsilon^4)$ iteration complexity for general
         6080 nonconvex-concave problems. Extensions of this stabilized GDA algorithm to
         6081 multi-block cases are presented. To the best of our knowledge, this is the
         6082 first algorithm to achieve $O(1/\epsilon^2)$ for a class of nonconvex-concave
         6083 problem. We illustrate the practical efficiency of the stabilized GDA algorithm
         6084 on robust training.
         6085 &lt;/p&gt;
         6086 </description>
         6087 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jiawei Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Xiao_P/0/1/0/all/0/1&quot;&gt;Peijun Xiao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Sun_R/0/1/0/all/0/1&quot;&gt;Ruoyu Sun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Luo_Z/0/1/0/all/0/1&quot;&gt;Zhi-Quan Luo&lt;/a&gt;</dc:creator>
         6088 </item>
         6089 <item rdf:about="http://fr.arxiv.org/abs/2010.15770">
         6090 <title>Recursive Random Contraction Revisited. (arXiv:2010.15770v1 [cs.DS])</title>
         6091 <link>http://fr.arxiv.org/abs/2010.15770</link>
         6092 <description rdf:parseType="Literal">&lt;p&gt;In this note, we revisit the recursive random contraction algorithm of Karger
         6093 and Stein for finding a minimum cut in a graph. Our revisit is occasioned by a
         6094 paper of Fox, Panigrahi, and Zhang which gives an extension of the Karger-Stein
         6095 algorithm to minimum cuts and minimum $k$-cuts in hypergraphs. When specialized
         6096 to the case of graphs, the algorithm is somewhat different than the original
         6097 Karger-Stein algorithm. We show that the analysis becomes particularly clean in
         6098 this case: we can prove that the probability that a fixed minimum cut in an $n$
         6099 node graph is returned by the algorithm is bounded below by $1/(2H_n-2)$, where
         6100 $H_n$ is the $n$th harmonic number. We also consider other similar variants of
         6101 the algorithm, and show that no such algorithm can achieve an asymptotically
         6102 better probability of finding a fixed minimum cut.
         6103 &lt;/p&gt;
         6104 </description>
         6105 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Karger_D/0/1/0/all/0/1&quot;&gt;David R. Karger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Williamson_D/0/1/0/all/0/1&quot;&gt;David P. Williamson&lt;/a&gt;</dc:creator>
         6106 </item>
         6107 <item rdf:about="http://fr.arxiv.org/abs/2010.15772">
         6108 <title>GANs &amp; Reels: Creating Irish Music using a Generative Adversarial Network. (arXiv:2010.15772v1 [cs.SD])</title>
         6109 <link>http://fr.arxiv.org/abs/2010.15772</link>
         6110 <description rdf:parseType="Literal">&lt;p&gt;In this paper we present a method for algorithmic melody generation using a
         6111 generative adversarial network without recurrent components. Music generation
         6112 has been successfully done using recurrent neural networks, where the model
         6113 learns sequence information that can help create authentic sounding melodies.
         6114 Here, we use DC-GAN architecture with dilated convolutions and towers to
         6115 capture sequential information as spatial image information, and learn
         6116 long-range dependencies in fixed-length melody forms such as Irish traditional
         6117 reel.
         6118 &lt;/p&gt;
         6119 </description>
         6120 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kolokolova_A/0/1/0/all/0/1&quot;&gt;Antonina Kolokolova&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Billard_M/0/1/0/all/0/1&quot;&gt;Mitchell Billard&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bishop_R/0/1/0/all/0/1&quot;&gt;Robert Bishop&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Elsisy_M/0/1/0/all/0/1&quot;&gt;Moustafa Elsisy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Northcott_Z/0/1/0/all/0/1&quot;&gt;Zachary Northcott&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Graves_L/0/1/0/all/0/1&quot;&gt;Laura Graves&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nagisetty_V/0/1/0/all/0/1&quot;&gt;Vineel Nagisetty&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Patey_H/0/1/0/all/0/1&quot;&gt;Heather Patey&lt;/a&gt;</dc:creator>
         6121 </item>
         6122 <item rdf:about="http://fr.arxiv.org/abs/2010.15773">
         6123 <title>WaveTransform: Crafting Adversarial Examples via Input Decomposition. (arXiv:2010.15773v1 [cs.CV])</title>
         6124 <link>http://fr.arxiv.org/abs/2010.15773</link>
         6125 <description rdf:parseType="Literal">&lt;p&gt;Frequency spectrum has played a significant role in learning unique and
         6126 discriminating features for object recognition. Both low and high frequency
         6127 information present in images have been extracted and learnt by a host of
         6128 representation learning techniques, including deep learning. Inspired by this
         6129 observation, we introduce a novel class of adversarial attacks, namely
         6130 `WaveTransform&apos;, that creates adversarial noise corresponding to low-frequency
         6131 and high-frequency subbands, separately (or in combination). The frequency
         6132 subbands are analyzed using wavelet decomposition; the subbands are corrupted
         6133 and then used to construct an adversarial example. Experiments are performed
         6134 using multiple databases and CNN models to establish the effectiveness of the
         6135 proposed WaveTransform attack and analyze the importance of a particular
         6136 frequency component. The robustness of the proposed attack is also evaluated
         6137 through its transferability and resiliency against a recent adversarial defense
         6138 algorithm. Experiments show that the proposed attack is effective against the
         6139 defense algorithm and is also transferable across CNNs.
         6140 &lt;/p&gt;
         6141 </description>
         6142 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Anshumaan_D/0/1/0/all/0/1&quot;&gt;Divyam Anshumaan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Agarwal_A/0/1/0/all/0/1&quot;&gt;Akshay Agarwal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vatsa_M/0/1/0/all/0/1&quot;&gt;Mayank Vatsa&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Singh_R/0/1/0/all/0/1&quot;&gt;Richa Singh&lt;/a&gt;</dc:creator>
         6143 </item>
         6144 <item rdf:about="http://fr.arxiv.org/abs/2010.15775">
         6145 <title>Understanding the Failure Modes of Out-of-Distribution Generalization. (arXiv:2010.15775v1 [cs.LG])</title>
         6146 <link>http://fr.arxiv.org/abs/2010.15775</link>
         6147 <description rdf:parseType="Literal">&lt;p&gt;Empirical studies suggest that machine learning models often rely on
         6148 features, such as the background, that may be spuriously correlated with the
         6149 label only during training time, resulting in poor accuracy during test-time.
         6150 In this work, we identify the fundamental factors that give rise to this
         6151 behavior, by explaining why models fail this way {\em even} in easy-to-learn
         6152 tasks where one would expect these models to succeed. In particular, through a
         6153 theoretical study of gradient-descent-trained linear classifiers on some
         6154 easy-to-learn tasks, we uncover two complementary failure modes. These modes
         6155 arise from how spurious correlations induce two kinds of skews in the data: one
         6156 geometric in nature, and another, statistical in nature. Finally, we construct
         6157 natural modifications of image classification datasets to understand when these
         6158 failure modes can arise in practice. We also design experiments to isolate the
         6159 two failure modes when training modern neural networks on these datasets.
         6160 &lt;/p&gt;
         6161 </description>
         6162 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nagarajan_V/0/1/0/all/0/1&quot;&gt;Vaishnavh Nagarajan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Andreassen_A/0/1/0/all/0/1&quot;&gt;Anders Andreassen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Neyshabur_B/0/1/0/all/0/1&quot;&gt;Behnam Neyshabur&lt;/a&gt;</dc:creator>
         6163 </item>
         6164 <item rdf:about="http://fr.arxiv.org/abs/2010.15776">
         6165 <title>Quantum advantage for differential equation analysis. (arXiv:2010.15776v1 [quant-ph])</title>
         6166 <link>http://fr.arxiv.org/abs/2010.15776</link>
         6167 <description rdf:parseType="Literal">&lt;p&gt;Quantum algorithms for both differential equation solving and for machine
         6168 learning potentially offer an exponential speedup over all known classical
         6169 algorithms. However, there also exist obstacles to obtaining this potential
         6170 speedup in useful problem instances. The essential obstacle for quantum
         6171 differential equation solving is that outputting useful information may require
         6172 difficult post-processing, and the essential obstacle for quantum machine
         6173 learning is that inputting the training set is a difficult task just by itself.
         6174 In this paper, we demonstrate, when combined, these difficulties solve one
         6175 another. We show how the output of quantum differential equation solving can
         6176 serve as the input for quantum machine learning, allowing dynamical analysis in
         6177 terms of principal components, power spectra, and wavelet decompositions. To
         6178 illustrate this, we consider continuous time Markov processes on
         6179 epidemiological and social networks. These quantum algorithms provide an
         6180 exponential advantage over existing classical Monte Carlo methods.
         6181 &lt;/p&gt;
         6182 </description>
         6183 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Kiani_B/0/1/0/all/0/1&quot;&gt;Bobak T. Kiani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Palma_G/0/1/0/all/0/1&quot;&gt;Giacomo De Palma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Englund_D/0/1/0/all/0/1&quot;&gt;Dirk Englund&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Kaminsky_W/0/1/0/all/0/1&quot;&gt;William Kaminsky&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Marvian_M/0/1/0/all/0/1&quot;&gt;Milad Marvian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Lloyd_S/0/1/0/all/0/1&quot;&gt;Seth Lloyd&lt;/a&gt;</dc:creator>
         6184 </item>
         6185 <item rdf:about="http://fr.arxiv.org/abs/2010.15778">
         6186 <title>Contextual BERT: Conditioning the Language Model Using a Global State. (arXiv:2010.15778v1 [cs.CL])</title>
         6187 <link>http://fr.arxiv.org/abs/2010.15778</link>
         6188 <description rdf:parseType="Literal">&lt;p&gt;BERT is a popular language model whose main pre-training task is to fill in
         6189 the blank, i.e., predicting a word that was masked out of a sentence, based on
         6190 the remaining words. In some applications, however, having an additional
         6191 context can help the model make the right prediction, e.g., by taking the
         6192 domain or the time of writing into account. This motivates us to advance the
         6193 BERT architecture by adding a global state for conditioning on a fixed-sized
         6194 context. We present our two novel approaches and apply them to an industry
         6195 use-case, where we complete fashion outfits with missing articles, conditioned
         6196 on a specific customer. An experimental comparison to other methods from the
         6197 literature shows that our methods improve personalization significantly.
         6198 &lt;/p&gt;
         6199 </description>
         6200 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Denk_T/0/1/0/all/0/1&quot;&gt;Timo I. Denk&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ramallo_A/0/1/0/all/0/1&quot;&gt;Ana Peleteiro Ramallo&lt;/a&gt;</dc:creator>
         6201 </item>
         6202 <item rdf:about="http://fr.arxiv.org/abs/2010.15784">
         6203 <title>Stable and efficient Petrov-Galerkin methods for a kinetic Fokker-Planck equation. (arXiv:2010.15784v1 [math.NA])</title>
         6204 <link>http://fr.arxiv.org/abs/2010.15784</link>
         6205 <description rdf:parseType="Literal">&lt;p&gt;We propose a stable Petrov-Galerkin discretization of a kinetic Fokker-Planck
         6206 equation constructed in such a way that uniform inf-sup stability can be
         6207 inferred directly from the variational formulation. Inspired by well-posedness
         6208 results for parabolic equations, we derive a lower bound for the dual inf-sup
         6209 constant of the Fokker-Planck bilinear form by means of stable pairs of trial
         6210 and test functions. The trial function of such a pair is constructed by
         6211 applying the kinetic transport operator and the inverse velocity
         6212 Laplace-Beltrami operator to a given test function. For the Petrov-Galerkin
         6213 projection we choose an arbitrary discrete test space and then define the
         6214 discrete trial space using the same application of transport and inverse
         6215 Laplace-Beltrami operator. As a result, the spaces replicate the stable pairs
         6216 of the continuous level and we obtain a well-posed numerical method with a
         6217 discrete inf-sup constant identical to the inf-sup constant of the continuous
         6218 problem independently of the mesh size. We show how the specific basis
         6219 functions can be efficiently computed by low-dimensional elliptic problems, and
         6220 confirm the practicability and performance of the method for a numerical
         6221 example.
         6222 &lt;/p&gt;
         6223 </description>
         6224 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Brunken_J/0/1/0/all/0/1&quot;&gt;Julia Brunken&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Smetana_K/0/1/0/all/0/1&quot;&gt;Kathrin Smetana&lt;/a&gt;</dc:creator>
         6225 </item>
         6226 <item rdf:about="http://fr.arxiv.org/abs/2010.15785">
         6227 <title>Quickest detection of false data injection attack in remote state estimation. (arXiv:2010.15785v1 [eess.SY])</title>
         6228 <link>http://fr.arxiv.org/abs/2010.15785</link>
         6229 <description rdf:parseType="Literal">&lt;p&gt;In this paper, quickest detection of false data injection attack on remote
         6230 state estimation is considered. A set of $N$ sensors make noisy linear
         6231 observations of a discrete-time linear process with Gaussian noise, and report
         6232 the observations to a remote estimator. The challenge is the presence of a few
         6233 potentially malicious sensors which can start strategically manipulating their
         6234 observations at a random time in order to skew the estimates. The quickest
         6235 attack detection problem for a known linear attack scheme is posed as a
         6236 constrained Markov decision process in order to minimise the expected detection
         6237 delay subject to a false alarm constraint, with the state involving the
         6238 probability belief at the estimator that the system is under attack. State
         6239 transition probabilities are derived in terms of system parameters, and the
         6240 structure of the optimal policy is derived analytically. It turns out that the
         6241 optimal policy amounts to checking whether the probability belief exceeds a
         6242 threshold. Numerical results demonstrate significant performance gain under the
         6243 proposed algorithm against competing algorithms.
         6244 &lt;/p&gt;
         6245 </description>
         6246 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gupta_A/0/1/0/all/0/1&quot;&gt;Akanshu Gupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sikdar_A/0/1/0/all/0/1&quot;&gt;Abhinava Sikdar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chattopadhyay_A/0/1/0/all/0/1&quot;&gt;Arpan Chattopadhyay&lt;/a&gt;</dc:creator>
         6247 </item>
         6248 <item rdf:about="http://fr.arxiv.org/abs/2010.15786">
         6249 <title>Light-Weight DDoS Mitigation at Network Edge with Limited Resources. (arXiv:2010.15786v1 [cs.NI])</title>
         6250 <link>http://fr.arxiv.org/abs/2010.15786</link>
         6251 <description rdf:parseType="Literal">&lt;p&gt;The Internet of Things (IoT) has been growing rapidly in recent years. With
         6252 the appearance of 5G, it is expected to become even more indispensable to
         6253 people&apos;s lives. In accordance with the increase of Distributed
         6254 Denial-of-Service (DDoS) attacks from IoT devices, DDoS defense has become a
         6255 hot research topic. DDoS detection mechanisms executed on routers and SDN
         6256 environments have been intensely studied. However, these methods have the
         6257 disadvantage of requiring the cost and performance of the devices. In addition,
         6258 there is no existing DDoS mitigation algorithm on the network edge that can be
         6259 performed with the low-cost and low performance equipments. Therefore, this
         6260 paper proposes a light-weight DDoS mitigation scheme at the network edge using
         6261 limited resources of inexpensive devices such as home gateways. The goal of the
         6262 proposed scheme is to simply detect and mitigate flooding attacks. It utilizes
         6263 unused queue resources to detect malicious flows by random shuffling of queue
         6264 allocation and discard the packets of the detected flows. The performance of
         6265 the proposed scheme was confirmed via theoretical analysis and computer
         6266 simulation. The simulation results match the theoretical results and the
         6267 proposed algorithm can efficiently detect malicious flows using limited
         6268 resources.
         6269 &lt;/p&gt;
         6270 </description>
         6271 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yaegashi_R/0/1/0/all/0/1&quot;&gt;Ryo Yaegashi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hisano_D/0/1/0/all/0/1&quot;&gt;Daisuke Hisano&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nakayama_Y/0/1/0/all/0/1&quot;&gt;Yu Nakayama&lt;/a&gt;</dc:creator>
         6272 </item>
         6273 <item rdf:about="http://fr.arxiv.org/abs/2010.15792">
         6274 <title>A Framework for Learning Predator-prey Agents from Simulation to Real World. (arXiv:2010.15792v1 [cs.RO])</title>
         6275 <link>http://fr.arxiv.org/abs/2010.15792</link>
         6276 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we propose an evolutionary predatorprey robot system which can
         6277 be generally implemented from simulation to the real world. We design the
         6278 closed-loop robot system with camera and infrared sensors as inputs of
         6279 controller. Both the predators and prey are co-evolved by NeuroEvolution of
         6280 Augmenting Topologies (NEAT) to learn the expected behaviours. We design a
         6281 framework that integrate Gym of OpenAI, Robot Operating System (ROS), Gazebo.
         6282 In such a framework, users only need to focus on algorithms without being
         6283 worried about the detail of manipulating robots in both simulation and the real
         6284 world. Combining simulations, real-world evolution, and robustness analysis, it
         6285 can be applied to develop the solutions for the predator-prey tasks. For the
         6286 convenience of users, the source code and videos of the simulated and real
         6287 world are published on Github.
         6288 &lt;/p&gt;
         6289 </description>
         6290 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_J/0/1/0/all/0/1&quot;&gt;Jiunhan Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gao_Z/0/1/0/all/0/1&quot;&gt;Zhenyu Gao&lt;/a&gt;</dc:creator>
         6291 </item>
         6292 <item rdf:about="http://fr.arxiv.org/abs/2010.15793">
         6293 <title>A computational periporomechanics model for localized failure in unsaturated porous media. (arXiv:2010.15793v1 [math.NA])</title>
         6294 <link>http://fr.arxiv.org/abs/2010.15793</link>
         6295 <description rdf:parseType="Literal">&lt;p&gt;We implement a computational periporomechanics model for simulating localized
         6296 failure in unsaturated porous media. The coupled periporomechanics model is
         6297 based on the peridynamic state concept and the effective force state concept.
         6298 The coupled governing equations are integral-differential equations without
         6299 assuming the continuity of solid displacement and fluid pressures. The fluid
         6300 flow and effective force states are determined by nonlocal fluid pressure and
         6301 deformation gradients through the recently formulated multiphase constitutive
         6302 correspondence principle. The coupled peri-poromechanics is implemented
         6303 numerically for high-performance computing by an implicit multiphase meshfree
         6304 method utilizing the message passing interface. The numerical implementation is
         6305 validated by simulating classical poromechanics problems and comparing the
         6306 numerical results with analytical solutions and experimental data. Numerical
         6307 examples are presented to demonstrate the robustness of the fully coupled
         6308 peri-poromechanics in modeling localized failures in unsaturated porous media.
         6309 &lt;/p&gt;
         6310 </description>
         6311 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Menon_S/0/1/0/all/0/1&quot;&gt;Shashank Menon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Song_X/0/1/0/all/0/1&quot;&gt;Xiaoyu Song&lt;/a&gt;</dc:creator>
         6312 </item>
         6313 <item rdf:about="http://fr.arxiv.org/abs/2010.15794">
         6314 <title>Eccentricity queries and beyond using Hub Labels. (arXiv:2010.15794v1 [cs.DS])</title>
         6315 <link>http://fr.arxiv.org/abs/2010.15794</link>
         6316 <description rdf:parseType="Literal">&lt;p&gt;Hub labeling schemes are popular methods for computing distances on road
         6317 networks and other large complex networks, often answering to a query within a
         6318 few microseconds for graphs with millions of edges. In this work, we study
         6319 their algorithmic applications beyond distance queries. We focus on
         6320 eccentricity queries and distance-sum queries, for several versions of these
         6321 problems on directed weighted graphs, that is in part motivated by their
         6322 importance in facility location problems. On the negative side, we show
         6323 conditional lower bounds for these above problems on unweighted undirected
         6324 sparse graphs, via standard constructions from &quot;Fine-grained&quot; complexity.
         6325 However, things take a different turn when the hub labels have a sublogarithmic
         6326 size. Indeed, given a hub labeling of maximum label size $\leq k$, after
         6327 pre-processing the labels in total $2^{{O}(k)} \cdot |V|^{1+o(1)}$ time, we can
         6328 compute both the eccentricity and the distance-sum of any vertex in $2^{{O}(k)}
         6329 \cdot |V|^{o(1)}$ time. It can also be applied to the fast global computation
         6330 of some topological indices. Finally, as a by-product of our approach, on any
         6331 fixed class of unweighted graphs with bounded expansion, we can decide whether
         6332 the diameter of an $n$-vertex graph in the class is at most $k$ in $f(k) \cdot
         6333 n^{1+o(1)}$ time, for some &quot;explicit&quot; function $f$.
         6334 &lt;/p&gt;
         6335 </description>
         6336 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1&quot;&gt;Guillaume Ducoffe&lt;/a&gt;</dc:creator>
         6337 </item>
         6338 <item rdf:about="http://fr.arxiv.org/abs/2010.15801">
         6339 <title>Ray-marching Thurston geometries. (arXiv:2010.15801v1 [math.GT])</title>
         6340 <link>http://fr.arxiv.org/abs/2010.15801</link>
         6341 <description rdf:parseType="Literal">&lt;p&gt;We describe algorithms that produce accurate real-time interactive in-space
         6342 views of the eight Thurston geometries using ray-marching. We give a
         6343 theoretical framework for our algorithms, independent of the geometry involved.
         6344 In addition to scenes within a geometry $X$, we also consider scenes within
         6345 quotient manifolds and orbifolds $X / \Gamma$. We adapt the Phong lighting
         6346 model to non-euclidean geometries. The most difficult part of this is the
         6347 calculation of light intensity, which relates to the area density of geodesic
         6348 spheres. We also give extensive practical details for each geometry.
         6349 &lt;/p&gt;
         6350 </description>
         6351 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Coulon_R/0/1/0/all/0/1&quot;&gt;R&amp;#xe9;mi Coulon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Matsumoto_E/0/1/0/all/0/1&quot;&gt;Elisabetta A. Matsumoto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Segerman_H/0/1/0/all/0/1&quot;&gt;Henry Segerman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Trettel_S/0/1/0/all/0/1&quot;&gt;Steve J. Trettel&lt;/a&gt;</dc:creator>
         6352 </item>
         6353 <item rdf:about="http://fr.arxiv.org/abs/2010.15803">
         6354 <title>Isometric embeddings in trees and their use in the diameter problem. (arXiv:2010.15803v1 [cs.DS])</title>
         6355 <link>http://fr.arxiv.org/abs/2010.15803</link>
         6356 <description rdf:parseType="Literal">&lt;p&gt;We prove that given a discrete space with $n$ points which is either embedded
         6357 in a system of $k$ trees, or the Cartesian product of $k$ trees, we can compute
         6358 all eccentricities in ${\cal O}(2^{{\cal O}(k\log{k})}(N+n)^{1+o(1)})$ time,
         6359 where $N$ is the cumulative total order over all these $k$ trees. This is near
         6360 optimal under the Strong Exponential-Time Hypothesis, even in the very special
         6361 case of an $n$-vertex graph embedded in a system of $\omega(\log{n})$ spanning
         6362 trees. However, given such an embedding in the strong product of $k$ trees,
         6363 there is a much faster ${\cal O}(N + kn)$-time algorithm for this problem. All
         6364 our positive results can be turned into approximation algorithms for the graphs
         6365 and finite spaces with a quasi isometric embedding in trees, if such embedding
         6366 is given as input, where the approximation factor (resp., the approximation
         6367 constant) depends on the distortion of the embedding (resp., of its stretch).
         6368 The existence of embeddings in the Cartesian product of finitely many trees has
         6369 been thoroughly investigated for cube-free median graphs. We give the
         6370 first-known quasi linear-time algorithm for computing the diameter within this
         6371 graph class. It does not require an embedding in a product of trees to be given
         6372 as part of the input. On our way, being given an $n$-node tree $T$, we propose
         6373 a data structure with ${\cal O}(n\log{n})$ pre-processing time in order to
         6374 compute in ${\cal O}(k\log^2{n})$ time the eccentricity of any subset of $k$
         6375 nodes. We combine the latter technical contribution, of independent interest,
         6376 with a recent distance-labeling scheme that was designed for cube-free median
         6377 graphs.
         6378 &lt;/p&gt;
         6379 </description>
         6380 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1&quot;&gt;Guillaume Ducoffe&lt;/a&gt;</dc:creator>
         6381 </item>
         6382 <item rdf:about="http://fr.arxiv.org/abs/2010.15805">
         6383 <title>A Local Search Framework for Experimental Design. (arXiv:2010.15805v1 [cs.DS])</title>
         6384 <link>http://fr.arxiv.org/abs/2010.15805</link>
         6385 <description rdf:parseType="Literal">&lt;p&gt;We present a local search framework to design and analyze both combinatorial
         6386 algorithms and rounding algorithms for experimental design problems. This
         6387 framework provides a unifying approach to match and improve all known results
         6388 in D/A/E-design and to obtain new results in previously unknown settings.
         6389 &lt;/p&gt;
         6390 &lt;p&gt;For combinatorial algorithms, we provide a new analysis of the classical
         6391 Fedorov&apos;s exchange method. We prove that this simple local search algorithm
         6392 works well as long as there exists an almost optimal solution with good
         6393 condition number. Moreover, we design a new combinatorial local search
         6394 algorithm for E-design using the regret minimization framework.
         6395 &lt;/p&gt;
         6396 &lt;p&gt;For rounding algorithms, we provide a unified randomized exchange algorithm
         6397 to match and improve previous results for D/A/E-design. Furthermore, the
         6398 algorithm works in the more general setting to approximately satisfy multiple
         6399 knapsack constraints, which can be used for weighted experimental design and
         6400 for incorporating fairness constraints into experimental design.
         6401 &lt;/p&gt;
         6402 </description>
         6403 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lau_L/0/1/0/all/0/1&quot;&gt;Lap Chi Lau&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_H/0/1/0/all/0/1&quot;&gt;Hong Zhou&lt;/a&gt;</dc:creator>
         6404 </item>
         6405 <item rdf:about="http://fr.arxiv.org/abs/2010.15809">
         6406 <title>The ins and outs of speaker recognition: lessons from VoxSRC 2020. (arXiv:2010.15809v1 [cs.SD])</title>
         6407 <link>http://fr.arxiv.org/abs/2010.15809</link>
         6408 <description rdf:parseType="Literal">&lt;p&gt;The VoxCeleb Speaker Recognition Challenge (VoxSRC) at Interspeech 2020
         6409 offers a challenging evaluation for speaker recognition systems, which includes
         6410 celebrities playing different parts in movies. The goal of this work is robust
         6411 speaker recognition of utterances recorded in these challenging environments.
         6412 We utilise variants of the popular ResNet architecture for speaker recognition
         6413 and perform extensive experiments using a range of loss functions and training
         6414 parameters. To this end, we optimise an efficient training framework that
         6415 allows powerful models to be trained with limited time and resources. Our
         6416 trained models demonstrate improvements over most existing works with lighter
         6417 models and a simple pipeline. The paper shares the lessons learned from our
         6418 participation in the challenge.
         6419 &lt;/p&gt;
         6420 </description>
         6421 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kwon_Y/0/1/0/all/0/1&quot;&gt;Yoohwan Kwon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heo_H/0/1/0/all/0/1&quot;&gt;Hee-Soo Heo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_B/0/1/0/all/0/1&quot;&gt;Bong-Jin Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chung_J/0/1/0/all/0/1&quot;&gt;Joon Son Chung&lt;/a&gt;</dc:creator>
         6422 </item>
         6423 <item rdf:about="http://fr.arxiv.org/abs/2010.15811">
         6424 <title>Algorithmic pure states for the negative spherical perceptron. (arXiv:2010.15811v1 [math.PR])</title>
         6425 <link>http://fr.arxiv.org/abs/2010.15811</link>
         6426 <description rdf:parseType="Literal">&lt;p&gt;We consider the spherical perceptron with Gaussian disorder. This is the set
         6427 $S$ of points $\sigma \in \mathbb{R}^N$ on the sphere of radius $\sqrt{N}$
         6428 satisfying $\langle g_a , \sigma \rangle \ge \kappa\sqrt{N}\,$ for all $1 \le a
         6429 \le M$, where $(g_a)_{a=1}^M$ are independent standard gaussian vectors and
         6430 $\kappa \in \mathbb{R}$ is fixed. Various characteristics of $S$ such as its
         6431 surface measure and the largest $M$ for which it is non-empty, were computed
         6432 heuristically in statistical physics in the asymptotic regime $N \to \infty$,
         6433 $M/N \to \alpha$. The case $\kappa&amp;lt;0$ is of special interest as $S$ is
         6434 conjectured to exhibit a hierarchical tree-like geometry known as &quot;full
         6435 replica-symmetry breaking&quot; (FRSB) close to the satisfiability threshold
         6436 $\alpha_{\text{SAT}}(\kappa)$, and whose characteristics are captured by a
         6437 Parisi variational principle akin to the one appearing in the
         6438 Sherrington-Kirkpatrick model. In this paper we design an efficient algorithm
         6439 which, given oracle access to the solution of the Parisi variational principle,
         6440 exploits this conjectured FRSB structure for $\kappa&amp;lt;0$ and outputs a vector
         6441 $\hat{\sigma}$ satisfying $\langle g_a , \hat{\sigma}\rangle \ge \kappa
         6442 \sqrt{N}$ for all $1\le a \le M$ and lying on a sphere of non-trivial radius
         6443 $\sqrt{\bar{q} N}$, where $\bar{q} \in (0,1)$ is the right-end of the support
         6444 of the associated Parisi measure. We expect $\hat{\sigma}$ to be approximately
         6445 the barycenter of a pure state of the spherical perceptron. Moreover we expect
         6446 that $\bar{q} \to 1$ as $\alpha \to \alpha_{\text{SAT}}(\kappa)$, so that
         6447 $\big\langle g_a,\hat{\sigma}/|\hat{\sigma}|\big\rangle \geq
         6448 (\kappa-o(1))\sqrt{N}$ near criticality.
         6449 &lt;/p&gt;
         6450 </description>
         6451 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Alaoui_A/0/1/0/all/0/1&quot;&gt;Ahmed El Alaoui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Sellke_M/0/1/0/all/0/1&quot;&gt;Mark Sellke&lt;/a&gt;</dc:creator>
         6452 </item>
         6453 <item rdf:about="http://fr.arxiv.org/abs/2010.15814">
         6454 <title>Around the diameter of AT-free graphs. (arXiv:2010.15814v1 [cs.DS])</title>
         6455 <link>http://fr.arxiv.org/abs/2010.15814</link>
         6456 <description rdf:parseType="Literal">&lt;p&gt;A graph algorithm is truly subquadratic if it runs in ${\cal O}(m^b)$ time on
         6457 connected $m$-edge graphs, for some positive $b &amp;lt; 2$. Roditty and Vassilevska
         6458 Williams (STOC&apos;13) proved that under plausible complexity assumptions, there is
         6459 no truly subquadratic algorithm for computing the diameter of general graphs.
         6460 In this work, we present positive and negative results on the existence of such
         6461 algorithms for computing the diameter on some special graph classes.
         6462 Specifically, three vertices in a graph form an asteroidal triple (AT) if
         6463 between any two of them there exists a path that avoids the closed
         6464 neighbourhood of the third one. We call a graph AT-free if it does not contain
         6465 an AT. We first prove that for all $m$-edge AT-free graphs, one can compute all
         6466 the eccentricities in truly subquadratic ${\cal O}(m^{3/2})$ time. Then, we
         6467 extend our study to several subclasses of chordal graphs -- all of them
         6468 generalizing interval graphs in various ways --, as an attempt to understand
         6469 which of the properties of AT-free graphs, or natural generalizations of the
         6470 latter, can help in the design of fast algorithms for the diameter problem on
         6471 broader graph classes. For instance, for all chordal graphs with a dominating
         6472 shortest path, there is a linear-time algorithm for computing a diametral pair
         6473 if the diameter is at least four. However, already for split graphs with a
         6474 dominating edge, under plausible complexity assumptions, there is no truly
         6475 subquadratic algorithm for deciding whether the diameter is either $2$ or $3$.
         6476 &lt;/p&gt;
         6477 </description>
         6478 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ducoffe_G/0/1/0/all/0/1&quot;&gt;Guillaume Ducoffe&lt;/a&gt;</dc:creator>
         6479 </item>
         6480 <item rdf:about="http://fr.arxiv.org/abs/2010.15819">
         6481 <title>Tensor Completion via Tensor Networks with a Tucker Wrapper. (arXiv:2010.15819v1 [stat.ML])</title>
         6482 <link>http://fr.arxiv.org/abs/2010.15819</link>
         6483 <description rdf:parseType="Literal">&lt;p&gt;In recent years, low-rank tensor completion (LRTC) has received considerable
         6484 attention due to its applications in image/video inpainting, hyperspectral data
         6485 recovery, etc. With different notions of tensor rank (e.g., CP, Tucker, tensor
         6486 train/ring, etc.), various optimization based numerical methods are proposed to
         6487 LRTC. However, tensor network based methods have not been proposed yet. In this
         6488 paper, we propose to solve LRTC via tensor networks with a Tucker wrapper. Here
         6489 by &quot;Tucker wrapper&quot; we mean that the outermost factor matrices of the tensor
         6490 network are all orthonormal. We formulate LRTC as a problem of solving a system
         6491 of nonlinear equations, rather than a constrained optimization problem. A
         6492 two-level alternative least square method is then employed to update the
         6493 unknown factors. The computation of the method is dominated by tensor matrix
         6494 multiplications and can be efficiently performed. Also, under proper
         6495 assumptions, it is shown that with high probability, the method converges to
         6496 the exact solution at a linear rate. Numerical simulations show that the
         6497 proposed algorithm is comparable with state-of-the-art methods.
         6498 &lt;/p&gt;
         6499 </description>
         6500 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Cai_Y/0/1/0/all/0/1&quot;&gt;Yunfeng Cai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Li_P/0/1/0/all/0/1&quot;&gt;Ping Li&lt;/a&gt;</dc:creator>
         6501 </item>
         6502 <item rdf:about="http://fr.arxiv.org/abs/2010.15820">
         6503 <title>Down the bot hole: actionable insights from a 1-year analysis of bots activity on Twitter. (arXiv:2010.15820v1 [cs.SI])</title>
         6504 <link>http://fr.arxiv.org/abs/2010.15820</link>
         6505 <description rdf:parseType="Literal">&lt;p&gt;Nowadays, social media represent persuasive tools that have been
         6506 progressively weaponized to affect people&apos;s beliefs, spread manipulative
         6507 narratives, and sow conflicts along divergent factions. Software-controlled
         6508 accounts (i.e., bots) are one of the main actors associated with manipulation
         6509 campaigns, especially in the political context. Uncovering the strategies
         6510 behind bots&apos; activities is of paramount importance to detect and curb such
         6511 campaigns. In this paper, we present a long term (one year) analysis of bots
         6512 activity on Twitter in the run-up to the 2018 U.S. Midterm Elections. We
         6513 identify different classes of accounts based on their nature (bot vs. human)
         6514 and engagement within the online discussion and we observe that hyperactive
         6515 bots played a pivotal role in the dissemination of conspiratorial narratives,
         6516 while dominating the political debate since the year before the election. Our
         6517 analysis, on the horizon of the upcoming U.S. 2020 Presidential Election,
         6518 reveals both alarming findings of humans&apos; susceptibility to bots and actionable
         6519 insights that can contribute to curbing coordinated campaigns.
         6520 &lt;/p&gt;
         6521 </description>
         6522 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Luceri_L/0/1/0/all/0/1&quot;&gt;Luca Luceri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cardoso_F/0/1/0/all/0/1&quot;&gt;Felipe Cardoso&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Giordano_S/0/1/0/all/0/1&quot;&gt;Silvia Giordano&lt;/a&gt;</dc:creator>
         6523 </item>
         6524 <item rdf:about="http://fr.arxiv.org/abs/2010.15821">
         6525 <title>Cream of the Crop: Distilling Prioritized Paths For One-Shot Neural Architecture Search. (arXiv:2010.15821v1 [cs.CV])</title>
         6526 <link>http://fr.arxiv.org/abs/2010.15821</link>
         6527 <description rdf:parseType="Literal">&lt;p&gt;One-shot weight sharing methods have recently drawn great attention in neural
         6528 architecture search due to high efficiency and competitive performance.
         6529 However, weight sharing across models has an inherent deficiency, i.e.,
         6530 insufficient training of subnetworks in the hypernetwork. To alleviate this
         6531 problem, we present a simple yet effective architecture distillation method.
         6532 The central idea is that subnetworks can learn collaboratively and teach each
         6533 other throughout the training process, aiming to boost the convergence of
         6534 individual models. We introduce the concept of prioritized path, which refers
         6535 to the architecture candidates exhibiting superior performance during training.
         6536 Distilling knowledge from the prioritized paths is able to boost the training
         6537 of subnetworks. Since the prioritized paths are changed on the fly depending on
         6538 their performance and complexity, the final obtained paths are the cream of the
         6539 crop. We directly select the most promising one from the prioritized paths as
         6540 the final architecture, without using other complex search methods, such as
         6541 reinforcement learning or evolution algorithms. The experiments on ImageNet
         6542 verify such path distillation method can improve the convergence ratio and
         6543 performance of the hypernetwork, as well as boosting the training of
         6544 subnetworks. The discovered architectures achieve superior performance compared
         6545 to the recent MobileNetV3 and EfficientNet families under aligned settings.
         6546 Moreover, the experiments on object detection and more challenging search space
         6547 show the generality and robustness of the proposed method. Code and models are
         6548 available at https://github.com/microsoft/cream.git.
         6549 &lt;/p&gt;
         6550 </description>
         6551 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Peng_H/0/1/0/all/0/1&quot;&gt;Houwen Peng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Du_H/0/1/0/all/0/1&quot;&gt;Hao Du&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yu_H/0/1/0/all/0/1&quot;&gt;Hongyuan Yu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1&quot;&gt;Qi Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liao_J/0/1/0/all/0/1&quot;&gt;Jing Liao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fu_J/0/1/0/all/0/1&quot;&gt;Jianlong Fu&lt;/a&gt;</dc:creator>
         6552 </item>
         6553 <item rdf:about="http://fr.arxiv.org/abs/2010.15823">
         6554 <title>Black-Box Optimization of Object Detector Scales. (arXiv:2010.15823v1 [cs.CV])</title>
         6555 <link>http://fr.arxiv.org/abs/2010.15823</link>
         6556 <description rdf:parseType="Literal">&lt;p&gt;Object detectors have improved considerably in the last years by using
         6557 advanced CNN architectures. However, many detector hyper-parameters are
         6558 generally manually tuned, or they are used with values set by the detector
         6559 authors. Automatic Hyper-parameter optimization has not been explored in
         6560 improving CNN-based object detectors hyper-parameters. In this work, we propose
         6561 the use of Black-box optimization methods to tune the prior/default box scales
         6562 in Faster R-CNN and SSD, using Bayesian Optimization, SMAC, and CMA-ES. We show
         6563 that by tuning the input image size and prior box anchor scale on Faster R-CNN
         6564 mAP increases by 2% on PASCAL VOC 2007, and by 3% with SSD. On the COCO dataset
         6565 with SSD there are mAP improvement in the medium and large objects, but mAP
         6566 decreases by 1% in small objects. We also perform a regression analysis to find
         6567 the significant hyper-parameters to tune.
         6568 &lt;/p&gt;
         6569 </description>
         6570 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Muthuraja_M/0/1/0/all/0/1&quot;&gt;Mohandass Muthuraja&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Arriaga_O/0/1/0/all/0/1&quot;&gt;Octavio Arriaga&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ploger_P/0/1/0/all/0/1&quot;&gt;Paul Pl&amp;#xf6;ger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kirchner_F/0/1/0/all/0/1&quot;&gt;Frank Kirchner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Valdenegro_Toro_M/0/1/0/all/0/1&quot;&gt;Matias Valdenegro-Toro&lt;/a&gt;</dc:creator>
         6571 </item>
         6572 <item rdf:about="http://fr.arxiv.org/abs/2010.15824">
         6573 <title>Passport-aware Normalization for Deep Model Protection. (arXiv:2010.15824v1 [cs.CV])</title>
         6574 <link>http://fr.arxiv.org/abs/2010.15824</link>
         6575 <description rdf:parseType="Literal">&lt;p&gt;Despite tremendous success in many application scenarios, deep learning faces
         6576 serious intellectual property (IP) infringement threats. Considering the cost
         6577 of designing and training a good model, infringements will significantly
         6578 infringe the interests of the original model owner. Recently, many impressive
         6579 works have emerged for deep model IP protection. However, they either are
         6580 vulnerable to ambiguity attacks, or require changes in the target network
         6581 structure by replacing its original normalization layers and hence cause
         6582 significant performance drops. To this end, we propose a new passport-aware
         6583 normalization formulation, which is generally applicable to most existing
         6584 normalization layers and only needs to add another passport-aware branch for IP
         6585 protection. This new branch is jointly trained with the target model but
         6586 discarded in the inference stage. Therefore it causes no structure change in
         6587 the target model. Only when the model IP is suspected to be stolen by someone,
         6588 the private passport-aware branch is added back for ownership verification.
         6589 Through extensive experiments, we verify its effectiveness in both image and 3D
         6590 point recognition models. It is demonstrated to be robust not only to common
         6591 attack techniques like fine-tuning and model compression, but also to ambiguity
         6592 attacks. By further combining it with trigger-set based methods, both black-box
         6593 and white-box verification can be achieved for enhanced security of deep
         6594 learning models deployed in real systems. Code can be found at
         6595 https://github.com/ZJZAC/Passport-aware-Normalization.
         6596 &lt;/p&gt;
         6597 </description>
         6598 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jie Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_D/0/1/0/all/0/1&quot;&gt;Dongdong Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liao_J/0/1/0/all/0/1&quot;&gt;Jing Liao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_W/0/1/0/all/0/1&quot;&gt;Weiming Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hua_G/0/1/0/all/0/1&quot;&gt;Gang Hua&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yu_N/0/1/0/all/0/1&quot;&gt;Nenghai Yu&lt;/a&gt;</dc:creator>
         6599 </item>
         6600 <item rdf:about="http://fr.arxiv.org/abs/2010.15831">
         6601 <title>RelationNet++: Bridging Visual Representations for Object Detection via Transformer Decoder. (arXiv:2010.15831v1 [cs.CV])</title>
         6602 <link>http://fr.arxiv.org/abs/2010.15831</link>
         6603 <description rdf:parseType="Literal">&lt;p&gt;Existing object detection frameworks are usually built on a single format of
         6604 object/part representation, i.e., anchor/proposal rectangle boxes in RetinaNet
         6605 and Faster R-CNN, center points in FCOS and RepPoints, and corner points in
         6606 CornerNet. While these different representations usually drive the frameworks
         6607 to perform well in different aspects, e.g., better classification or finer
         6608 localization, it is in general difficult to combine these representations in a
         6609 single framework to make good use of each strength, due to the heterogeneous or
         6610 non-grid feature extraction by different representations. This paper presents
         6611 an attention-based decoder module similar as that in
         6612 Transformer~\cite{vaswani2017attention} to bridge other representations into a
         6613 typical object detector built on a single representation format, in an
         6614 end-to-end fashion. The other representations act as a set of \emph{key}
         6615 instances to strengthen the main \emph{query} representation features in the
         6616 vanilla detectors. Novel techniques are proposed towards efficient computation
         6617 of the decoder module, including a \emph{key sampling} approach and a
         6618 \emph{shared location embedding} approach. The proposed module is named
         6619 \emph{bridging visual representations} (BVR). It can perform in-place and we
         6620 demonstrate its broad effectiveness in bridging other representations into
         6621 prevalent object detection frameworks, including RetinaNet, Faster R-CNN, FCOS
         6622 and ATSS, where about $1.5\sim3.0$ AP improvements are achieved. In particular,
         6623 we improve a state-of-the-art framework with a strong backbone by about $2.0$
         6624 AP, reaching $52.7$ AP on COCO test-dev. The resulting network is named
         6625 RelationNet++. The code will be available at
         6626 https://github.com/microsoft/RelationNet2.
         6627 &lt;/p&gt;
         6628 </description>
         6629 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chi_C/0/1/0/all/0/1&quot;&gt;Cheng Chi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_F/0/1/0/all/0/1&quot;&gt;Fangyun Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hu_H/0/1/0/all/0/1&quot;&gt;Han Hu&lt;/a&gt;</dc:creator>
         6630 </item>
         6631 <item rdf:about="http://fr.arxiv.org/abs/2010.15832">
         6632 <title>Proceedings 9th International Workshop on Theorem Proving Components for Educational Software. (arXiv:2010.15832v1 [cs.AI])</title>
         6633 <link>http://fr.arxiv.org/abs/2010.15832</link>
         6634 <description rdf:parseType="Literal">&lt;p&gt;The 9th International Workshop on Theorem-Proving Components for Educational
         6635 Software (ThEdu&apos;20) was scheduled to happen on June 29 as a satellite of the
         6636 IJCAR-FSCD 2020 joint meeting, in Paris. The COVID-19 pandemic came by
         6637 surprise, though, and the main conference was virtualised. Fearing that an
         6638 online meeting would not allow our community to fully reproduce the usual
         6639 face-to-face networking opportunities of the ThEdu initiative, the Steering
         6640 Committee of ThEdu decided to cancel our workshop. Given that many of us had
         6641 already planned and worked for that moment, we decided that ThEdu&apos;20 could
         6642 still live in the form of an EPTCS volume. The EPTCS concurred with us,
         6643 recognising this very singular situation, and accepted our proposal of
         6644 organising a special issue with papers submitted to ThEdu&apos;20. An open call for
         6645 papers was then issued, and attracted five submissions, all of which have been
         6646 accepted by our reviewers, who produced three careful reports on each of the
         6647 contributions. The resulting revised papers are collected in the present
         6648 volume. We, the volume editors, hope that this collection of papers will help
         6649 further promoting the development of theorem-proving-based software, and that
         6650 it will collaborate to improve the mutual understanding between computer
         6651 mathematicians and stakeholders in education. With some luck, we would actually
         6652 expect that the very special circumstances set up by the worst sanitary crisis
         6653 in a century will happen to reinforce the need for the application of certified
         6654 components and of verification methods for the production of educational
         6655 software that would be available even when the traditional on-site learning
         6656 experiences turn out not to be recommendable.
         6657 &lt;/p&gt;
         6658 </description>
         6659 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Quaresma_P/0/1/0/all/0/1&quot;&gt;Pedro Quaresma&lt;/a&gt; (University of Coimbra, Portugal), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Neuper_W/0/1/0/all/0/1&quot;&gt;Walther Neuper&lt;/a&gt; (JKU Johannes Kepler University, Linz, Austria), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Marcos_J/0/1/0/all/0/1&quot;&gt;Jo&amp;#xe3;o Marcos&lt;/a&gt; (UFRN, Brazil)</dc:creator>
         6660 </item>
         6661 <item rdf:about="http://fr.arxiv.org/abs/1602.05829">
         6662 <title>Property Checking Without Invariant Generation. (arXiv:1602.05829v3 [cs.LO] UPDATED)</title>
         6663 <link>http://fr.arxiv.org/abs/1602.05829</link>
         6664 <description rdf:parseType="Literal">&lt;p&gt;We introduce a procedure for proving safety properties. This procedure is
         6665 based on a technique called Partial Quantifier Elimination (PQE). In contrast
         6666 to complete quantifier elimination, in PQE, only a part of the formula is taken
         6667 out of the scope of quantifiers. So, PQE can be dramatically more efficient
         6668 than complete quantifier elimination. The appeal of our procedure is twofold.
         6669 First, it can prove a property without generating an inductive invariant.
         6670 Second, it employs depth-first search and so can be used to find deep bugs.
         6671 &lt;/p&gt;
         6672 </description>
         6673 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goldberg_E/0/1/0/all/0/1&quot;&gt;Eugene Goldberg&lt;/a&gt;</dc:creator>
         6674 </item>
         6675 <item rdf:about="http://fr.arxiv.org/abs/1605.09124">
         6676 <title>Minimax Rate-Optimal Estimation of Divergences between Discrete Distributions. (arXiv:1605.09124v4 [cs.IT] UPDATED)</title>
         6677 <link>http://fr.arxiv.org/abs/1605.09124</link>
         6678 <description rdf:parseType="Literal">&lt;p&gt;We study the minimax estimation of $\alpha$-divergences between discrete
         6679 distributions for integer $\alpha\ge 1$, which include the Kullback--Leibler
         6680 divergence and the $\chi^2$-divergences as special examples. Dropping the usual
         6681 theoretical tricks to acquire independence, we construct the first minimax
         6682 rate-optimal estimator which does not require any Poissonization, sample
         6683 splitting, or explicit construction of approximating polynomials. The estimator
         6684 uses a hybrid approach which solves a problem-independent linear program based
         6685 on moment matching in the non-smooth regime, and applies a problem-dependent
         6686 bias-corrected plug-in estimator in the smooth regime, with a soft decision
         6687 boundary between these regimes.
         6688 &lt;/p&gt;
         6689 </description>
         6690 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Han_Y/0/1/0/all/0/1&quot;&gt;Yanjun Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jiao_J/0/1/0/all/0/1&quot;&gt;Jiantao Jiao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Weissman_T/0/1/0/all/0/1&quot;&gt;Tsachy Weissman&lt;/a&gt;</dc:creator>
         6691 </item>
         6692 <item rdf:about="http://fr.arxiv.org/abs/1608.03533">
         6693 <title>Sequence Graph Transform (SGT): A Feature Embedding Function for Sequence Data Mining. (arXiv:1608.03533v13 [stat.ML] UPDATED)</title>
         6694 <link>http://fr.arxiv.org/abs/1608.03533</link>
         6695 <description rdf:parseType="Literal">&lt;p&gt;Sequence feature embedding is a challenging task due to un-structuredness of
         6696 sequences -- arbitrary strings of arbitrary length. Existing methods are
         6697 efficient in extracting short-term dependencies but typically suffer from
         6698 computation issues for the long-term. Sequence Graph Transform (SGT), a feature
         6699 embedding function, that can extract any amount of short- to long- term
         6700 dependencies without increasing the computation -- proved theoretically -- is
         6701 proposed. SGT features yield significantly superior results in sequence
         6702 clustering and classification with higher accuracy and lower computation as
         6703 compared to the existing methods, including the state-of-the-art
         6704 sequence/string Kernels and LSTM.
         6705 &lt;/p&gt;
         6706 </description>
         6707 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Ranjan_C/0/1/0/all/0/1&quot;&gt;Chitta Ranjan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Ebrahimi_S/0/1/0/all/0/1&quot;&gt;Samaneh Ebrahimi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Paynabar_K/0/1/0/all/0/1&quot;&gt;Kamran Paynabar&lt;/a&gt;</dc:creator>
         6708 </item>
         6709 <item rdf:about="http://fr.arxiv.org/abs/1712.06431">
         6710 <title>Time-Space Trade-Offs for Computing Euclidean Minimum Spanning Trees. (arXiv:1712.06431v3 [cs.CG] UPDATED)</title>
         6711 <link>http://fr.arxiv.org/abs/1712.06431</link>
         6712 <description rdf:parseType="Literal">&lt;p&gt;We present time-space trade-offs for computing the Euclidean minimum spanning
         6713 tree of a set $S$ of $n$ point-sites in the plane. More precisely, we assume
         6714 that $S$ resides in a random-access memory that can only be read. The edges of
         6715 the Euclidean minimum spanning tree $\text{EMST}(S)$ have to be reported
         6716 sequentially, and they cannot be accessed or modified afterwards. There is a
         6717 parameter $s \in \{1, \dots, n\}$ so that the algorithm may use $O(s)$ cells of
         6718 read-write memory (called the workspace) for its computations. Our goal is to
         6719 find an algorithm that has the best possible running time for any given $s$
         6720 between $1$ and $n$.
         6721 &lt;/p&gt;
         6722 &lt;p&gt;We show how to compute $\text{EMST}(S)$ in $O\big((n^3/s^2)\log s \big)$ time
         6723 with $O(s)$ cells of workspace, giving a smooth trade-off between the two best
         6724 known bounds $O(n^3)$ for $s = 1$ and $O(n \log n)$ for $s = n$. For this, we
         6725 run Kruskal&apos;s algorithm on the relative neighborhood graph (RNG) of $S$. It is
         6726 a classic fact that the minimum spanning tree of $\text{RNG}(S)$ is exactly
         6727 $\text{EMST}(S)$. To implement Kruskal&apos;s algorithm with $O(s)$ cells of
         6728 workspace, we define $s$-nets, a compact representation of planar graphs. This
         6729 allows us to efficiently maintain and update the components of the current
         6730 minimum spanning forest as the edges are being inserted.
         6731 &lt;/p&gt;
         6732 </description>
         6733 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Banyassady_B/0/1/0/all/0/1&quot;&gt;Bahareh Banyassady&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Barba_L/0/1/0/all/0/1&quot;&gt;Luis Barba&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mulzer_W/0/1/0/all/0/1&quot;&gt;Wolfgang Mulzer&lt;/a&gt;</dc:creator>
         6734 </item>
         6735 <item rdf:about="http://fr.arxiv.org/abs/1801.07485">
         6736 <title>Type-two polynomial-time and restricted lookahead. (arXiv:1801.07485v2 [cs.CC] UPDATED)</title>
         6737 <link>http://fr.arxiv.org/abs/1801.07485</link>
         6738 <description rdf:parseType="Literal">&lt;p&gt;This paper provides an alternate characterization of type-two polynomial-time
         6739 computability, with the goal of making second-order complexity theory more
         6740 approachable. We rely on the usual oracle machines to model programs with
         6741 subroutine calls. In contrast to previous results, the use of higher-order
         6742 objects as running times is avoided, either explicitly or implicitly. Instead,
         6743 regular polynomials are used. This is achieved by refining the notion of
         6744 oracle-polynomial-time introduced by Cook. We impose a further restriction on
         6745 the oracle interactions to force feasibility. Both the restriction as well as
         6746 its purpose are very simple: it is well-known that Cook&apos;s model allows
         6747 polynomial depth iteration of functional inputs with no restrictions on size,
         6748 and thus does not guarantee that polynomial-time computability is preserved. To
         6749 mend this we restrict the number of lookahead revisions, that is the number of
         6750 times a query can be asked that is bigger than any of the previous queries. We
         6751 prove that this leads to a class of feasible functionals and that all feasible
         6752 problems can be solved within this class if one is allowed to separate a task
         6753 into efficiently solvable subtasks. Formally put: the closure of our class
         6754 under lambda-abstraction and application includes all feasible operations. We
         6755 also revisit the very similar class of strongly polynomial-time computable
         6756 operators previously introduced by Kawamura and Steinberg. We prove it to be
         6757 strictly included in our class and, somewhat surprisingly, to have the same
         6758 closure property. This can be attributed to properties of the limited recursion
         6759 operator: It is not strongly polynomial-time computable but decomposes into two
         6760 such operations and lies in our class.
         6761 &lt;/p&gt;
         6762 </description>
         6763 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kapron_B/0/1/0/all/0/1&quot;&gt;Bruce M. Kapron&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Steinberg_F/0/1/0/all/0/1&quot;&gt;Florian Steinberg&lt;/a&gt;</dc:creator>
         6764 </item>
         6765 <item rdf:about="http://fr.arxiv.org/abs/1810.00635">
         6766 <title>Comparing Type Systems for Deadlock Freedom. (arXiv:1810.00635v3 [cs.LO] UPDATED)</title>
         6767 <link>http://fr.arxiv.org/abs/1810.00635</link>
         6768 <description rdf:parseType="Literal">&lt;p&gt;Message-passing software systems exhibit non-trivial forms of concurrency and
         6769 distribution; they are expected to follow intended protocols among
         6770 communicating services, but also to never &quot;get stuck&quot;. This intuitive
         6771 requirement has been expressed by liveness properties such as progress or
         6772 (dead)lock freedom and various type systems ensure these properties for
         6773 concurrent processes. Unfortunately, very little is known about the precise
         6774 relationship between these type systems and the classes of typed processes they
         6775 induce.
         6776 &lt;/p&gt;
         6777 &lt;p&gt;This paper puts forward the first comparative study of different type systems
         6778 for message-passing processes that guarantee deadlock freedom. We compare two
         6779 classes of deadlock-free typed processes, here denoted L and K. The class L
         6780 stands out for its canonicity: it results from Curry-Howard interpretations of
         6781 linear logic propositions as session types. The class K, obtained by encoding
         6782 session types into Kobayashi&apos;s linear types with usages, includes processes not
         6783 typable in other type systems. We show that L is strictly included in K, and
         6784 identify the precise conditions under which they coincide. We also provide two
         6785 type-preserving translations of processes in K into processes in L.
         6786 &lt;/p&gt;
         6787 </description>
         6788 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dardha_O/0/1/0/all/0/1&quot;&gt;Ornela Dardha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Perez_J/0/1/0/all/0/1&quot;&gt;Jorge A. P&amp;#xe9;rez&lt;/a&gt;</dc:creator>
         6789 </item>
         6790 <item rdf:about="http://fr.arxiv.org/abs/1901.07849">
         6791 <title>AADS: Augmented Autonomous Driving Simulation using Data-driven Algorithms. (arXiv:1901.07849v3 [cs.CV] UPDATED)</title>
         6792 <link>http://fr.arxiv.org/abs/1901.07849</link>
         6793 <description rdf:parseType="Literal">&lt;p&gt;Simulation systems have become an essential component in the development and
         6794 validation of autonomous driving technologies. The prevailing state-of-the-art
         6795 approach for simulation is to use game engines or high-fidelity computer
         6796 graphics (CG) models to create driving scenarios. However, creating CG models
         6797 and vehicle movements (e.g., the assets for simulation) remains a manual task
         6798 that can be costly and time-consuming. In addition, the fidelity of CG images
         6799 still lacks the richness and authenticity of real-world images and using these
         6800 images for training leads to degraded performance.
         6801 &lt;/p&gt;
         6802 &lt;p&gt;In this paper we present a novel approach to address these issues: Augmented
         6803 Autonomous Driving Simulation (AADS). Our formulation augments real-world
         6804 pictures with a simulated traffic flow to create photo-realistic simulation
         6805 images and renderings. More specifically, we use LiDAR and cameras to scan
         6806 street scenes. From the acquired trajectory data, we generate highly plausible
         6807 traffic flows for cars and pedestrians and compose them into the background.
         6808 The composite images can be re-synthesized with different viewpoints and sensor
         6809 models. The resulting images are photo-realistic, fully annotated, and ready
         6810 for end-to-end training and testing of autonomous driving systems from
         6811 perception to planning. We explain our system design and validate our
         6812 algorithms with a number of autonomous driving tasks from detection to
         6813 segmentation and predictions.
         6814 &lt;/p&gt;
         6815 &lt;p&gt;Compared to traditional approaches, our method offers unmatched scalability
         6816 and realism. Scalability is particularly important for AD simulation and we
         6817 believe the complexity and diversity of the real world cannot be realistically
         6818 captured in a virtual environment. Our augmented approach combines the
         6819 flexibility in a virtual environment (e.g., vehicle movements) with the
         6820 richness of the real world to allow effective simulation of anywhere on earth.
         6821 &lt;/p&gt;
         6822 </description>
         6823 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1&quot;&gt;Wei Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pan_C/0/1/0/all/0/1&quot;&gt;Chengwei Pan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_R/0/1/0/all/0/1&quot;&gt;Rong Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ren_J/0/1/0/all/0/1&quot;&gt;Jiaping Ren&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ma_Y/0/1/0/all/0/1&quot;&gt;Yuexin Ma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fang_J/0/1/0/all/0/1&quot;&gt;Jin Fang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yan_F/0/1/0/all/0/1&quot;&gt;Feilong Yan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Geng_Q/0/1/0/all/0/1&quot;&gt;Qichuan Geng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huang_X/0/1/0/all/0/1&quot;&gt;Xinyu Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gong_H/0/1/0/all/0/1&quot;&gt;Huajun Gong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xu_W/0/1/0/all/0/1&quot;&gt;Weiwei Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_G/0/1/0/all/0/1&quot;&gt;Guoping Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Manocha_D/0/1/0/all/0/1&quot;&gt;Dinesh Manocha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_R/0/1/0/all/0/1&quot;&gt;Ruigang Yang&lt;/a&gt;</dc:creator>
         6824 </item>
         6825 <item rdf:about="http://fr.arxiv.org/abs/1902.06626">
         6826 <title>Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces. (arXiv:1902.06626v5 [cs.CR] UPDATED)</title>
         6827 <link>http://fr.arxiv.org/abs/1902.06626</link>
         6828 <description rdf:parseType="Literal">&lt;p&gt;Website Fingerprinting (WF) is a type of traffic analysis attack that enables
         6829 a local passive eavesdropper to infer the victim&apos;s activity, even when the
         6830 traffic is protected by a VPN or an anonymity system like Tor. Leveraging a
         6831 deep-learning classifier, a WF attacker can gain over 98% accuracy on Tor
         6832 traffic. In this paper, we explore a novel defense, Mockingbird, based on the
         6833 idea of adversarial examples that have been shown to undermine machine-learning
         6834 classifiers in other domains. Since the attacker gets to design and train his
         6835 attack classifier based on the defense, we first demonstrate that at a
         6836 straightforward technique for generating adversarial-example based traces fails
         6837 to protect against an attacker using adversarial training for robust
         6838 classification. We then propose Mockingbird, a technique for generating traces
         6839 that resists adversarial training by moving randomly in the space of viable
         6840 traces and not following more predictable gradients. The technique drops the
         6841 accuracy of the state-of-the-art attack hardened with adversarial training from
         6842 98% to 42-58% while incurring only 58% bandwidth overhead. The attack accuracy
         6843 is generally lower than state-of-the-art defenses, and much lower when
         6844 considering Top-2 accuracy, while incurring lower bandwidth overheads.
         6845 &lt;/p&gt;
         6846 </description>
         6847 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rahman_M/0/1/0/all/0/1&quot;&gt;Mohammad Saidur Rahman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Imani_M/0/1/0/all/0/1&quot;&gt;Mohsen Imani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mathews_N/0/1/0/all/0/1&quot;&gt;Nate Mathews&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wright_M/0/1/0/all/0/1&quot;&gt;Matthew Wright&lt;/a&gt;</dc:creator>
         6848 </item>
         6849 <item rdf:about="http://fr.arxiv.org/abs/1906.01786">
         6850 <title>Global Optimality Guarantees For Policy Gradient Methods. (arXiv:1906.01786v2 [cs.LG] UPDATED)</title>
         6851 <link>http://fr.arxiv.org/abs/1906.01786</link>
         6852 <description rdf:parseType="Literal">&lt;p&gt;Policy gradients methods apply to complex, poorly understood, control
         6853 problems by performing stochastic gradient descent over a parameterized class
         6854 of polices. Unfortunately, even for simple control problems solvable by
         6855 standard dynamic programming techniques, policy gradient algorithms face
         6856 non-convex optimization problems and are widely understood to converge only to
         6857 a stationary point. This work identifies structural properties -- shared by
         6858 several classic control problems -- that ensure the policy gradient objective
         6859 function has no suboptimal stationary points despite being non-convex. When
         6860 these conditions are strengthened, this objective satisfies a
         6861 Polyak-lojasiewicz (gradient dominance) condition that yields convergence
         6862 rates. We also provide bounds on the optimality gap of any stationary point
         6863 when some of these conditions are relaxed.
         6864 &lt;/p&gt;
         6865 </description>
         6866 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bhandari_J/0/1/0/all/0/1&quot;&gt;Jalaj Bhandari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Russo_D/0/1/0/all/0/1&quot;&gt;Daniel Russo&lt;/a&gt;</dc:creator>
         6867 </item>
         6868 <item rdf:about="http://fr.arxiv.org/abs/1906.05586">
         6869 <title>ATRW: A Benchmark for Amur Tiger Re-identification in the Wild. (arXiv:1906.05586v4 [cs.CV] UPDATED)</title>
         6870 <link>http://fr.arxiv.org/abs/1906.05586</link>
         6871 <description rdf:parseType="Literal">&lt;p&gt;Monitoring the population and movements of endangered species is an important
         6872 task to wildlife conversation. Traditional tagging methods do not scale to
         6873 large populations, while applying computer vision methods to camera sensor data
         6874 requires re-identification (re-ID) algorithms to obtain accurate counts and
         6875 moving trajectory of wildlife. However, existing re-ID methods are largely
         6876 targeted at persons and cars, which have limited pose variations and
         6877 constrained capture environments. This paper tries to fill the gap by
         6878 introducing a novel large-scale dataset, the Amur Tiger Re-identification in
         6879 the Wild (ATRW) dataset. ATRW contains over 8,000 video clips from 92 Amur
         6880 tigers, with bounding box, pose keypoint, and tiger identity annotations. In
         6881 contrast to typical re-ID datasets, the tigers are captured in a diverse set of
         6882 unconstrained poses and lighting conditions. We demonstrate with a set of
         6883 baseline algorithms that ATRW is a challenging dataset for re-ID. Lastly, we
         6884 propose a novel method for tiger re-identification, which introduces precise
         6885 pose parts modeling in deep neural networks to handle large pose variation of
         6886 tigers, and reaches notable performance improvement over existing re-ID
         6887 methods. The dataset is public available at https://cvwc2019.github.io/ .
         6888 &lt;/p&gt;
         6889 </description>
         6890 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1&quot;&gt;Shuyuan Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_J/0/1/0/all/0/1&quot;&gt;Jianguo Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tang_H/0/1/0/all/0/1&quot;&gt;Hanlin Tang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qian_R/0/1/0/all/0/1&quot;&gt;Rui Qian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1&quot;&gt;Weiyao Lin&lt;/a&gt;</dc:creator>
         6891 </item>
         6892 <item rdf:about="http://fr.arxiv.org/abs/1906.06642">
         6893 <title>A Simple Local Minimal Intensity Prior and An Improved Algorithm for Blind Image Deblurring. (arXiv:1906.06642v5 [eess.IV] UPDATED)</title>
         6894 <link>http://fr.arxiv.org/abs/1906.06642</link>
         6895 <description rdf:parseType="Literal">&lt;p&gt;Blind image deblurring is a long standing challenging problem in image
         6896 processing and low-level vision. Recently, sophisticated priors such as dark
         6897 channel prior, extreme channel prior, and local maximum gradient prior, have
         6898 shown promising effectiveness. However, these methods are computationally
         6899 expensive. Meanwhile, since these priors involved subproblems cannot be solved
         6900 explicitly, approximate solution is commonly used, which limits the best
         6901 exploitation of their capability. To address these problems, this work firstly
         6902 proposes a simplified sparsity prior of local minimal pixels, namely patch-wise
         6903 minimal pixels (PMP). The PMP of clear images is much more sparse than that of
         6904 blurred ones, and hence is very effective in discriminating between clear and
         6905 blurred images. Then, a novel algorithm is designed to efficiently exploit the
         6906 sparsity of PMP in deblurring. The new algorithm flexibly imposes sparsity
         6907 inducing on the PMP under the MAP framework rather than directly uses the half
         6908 quadratic splitting algorithm. By this, it avoids non-rigorous approximation
         6909 solution in existing algorithms, while being much more computationally
         6910 efficient. Extensive experiments demonstrate that the proposed algorithm can
         6911 achieve better practical stability compared with state-of-the-arts. In terms of
         6912 deblurring quality, robustness and computational efficiency, the new algorithm
         6913 is superior to state-of-the-arts. Code for reproducing the results of the new
         6914 method is available at https://github.com/FWen/deblur-pmp.git.
         6915 &lt;/p&gt;
         6916 </description>
         6917 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wen_F/0/1/0/all/0/1&quot;&gt;Fei Wen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ying_R/0/1/0/all/0/1&quot;&gt;Rendong Ying&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Liu_Y/0/1/0/all/0/1&quot;&gt;Yipeng Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Liu_P/0/1/0/all/0/1&quot;&gt;Peilin Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Truong_T/0/1/0/all/0/1&quot;&gt;Trieu-Kien Truong&lt;/a&gt;</dc:creator>
         6918 </item>
         6919 <item rdf:about="http://fr.arxiv.org/abs/1906.06836">
         6920 <title>Multi-type Resource Allocation with Partial Preferences. (arXiv:1906.06836v3 [cs.AI] UPDATED)</title>
         6921 <link>http://fr.arxiv.org/abs/1906.06836</link>
         6922 <description rdf:parseType="Literal">&lt;p&gt;We propose multi-type probabilistic serial (MPS) and multi-type random
         6923 priority (MRP) as extensions of the well known PS and RP mechanisms to the
         6924 multi-type resource allocation problem (MTRA) with partial preferences. In our
         6925 setting, there are multiple types of divisible items, and a group of agents who
         6926 have partial order preferences over bundles consisting of one item of each
         6927 type. We show that for the unrestricted domain of partial order preferences, no
         6928 mechanism satisfies both sd-efficiency and sd-envy-freeness. Notwithstanding
         6929 this impossibility result, our main message is positive: When agents&apos;
         6930 preferences are represented by acyclic CP-nets, MPS satisfies sd-efficiency,
         6931 sd-envy-freeness, ordinal fairness, and upper invariance, while MRP satisfies
         6932 ex-post-efficiency, sd-strategy-proofness, and upper invariance, recovering the
         6933 properties of PS and RP.
         6934 &lt;/p&gt;
         6935 </description>
         6936 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1&quot;&gt;Haibin Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sikdar_S/0/1/0/all/0/1&quot;&gt;Sujoy Sikdar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Guo_X/0/1/0/all/0/1&quot;&gt;Xiaoxi Guo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xia_L/0/1/0/all/0/1&quot;&gt;Lirong Xia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cao_Y/0/1/0/all/0/1&quot;&gt;Yongzhi Cao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1&quot;&gt;Hanpin Wang&lt;/a&gt;</dc:creator>
         6937 </item>
         6938 <item rdf:about="http://fr.arxiv.org/abs/1907.02237">
         6939 <title>Dimensional Reweighting Graph Convolutional Networks. (arXiv:1907.02237v3 [cs.LG] UPDATED)</title>
         6940 <link>http://fr.arxiv.org/abs/1907.02237</link>
         6941 <description rdf:parseType="Literal">&lt;p&gt;Graph Convolution Networks (GCNs) are becoming more and more popular for
         6942 learning node representations on graphs. Though there exist various
         6943 developments on sampling and aggregation to accelerate the training process and
         6944 improve the performances, limited works focus on dealing with the dimensional
         6945 information imbalance of node representations. To bridge the gap, we propose a
         6946 method named Dimensional reweighting Graph Convolution Network (DrGCN). We
         6947 theoretically prove that our DrGCN can guarantee to improve the stability of
         6948 GCNs via mean field theory. Our dimensional reweighting method is very flexible
         6949 and can be easily combined with most sampling and aggregation techniques for
         6950 GCNs. Experimental results demonstrate its superior performances on several
         6951 challenging transductive and inductive node classification benchmark datasets.
         6952 Our DrGCN also outperforms existing models on an industrial-sized Alibaba
         6953 recommendation dataset.
         6954 &lt;/p&gt;
         6955 </description>
         6956 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zou_X/0/1/0/all/0/1&quot;&gt;Xu Zou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jia_Q/0/1/0/all/0/1&quot;&gt;Qiuye Jia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jianwei Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_C/0/1/0/all/0/1&quot;&gt;Chang Zhou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_H/0/1/0/all/0/1&quot;&gt;Hongxia Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tang_J/0/1/0/all/0/1&quot;&gt;Jie Tang&lt;/a&gt;</dc:creator>
         6957 </item>
         6958 <item rdf:about="http://fr.arxiv.org/abs/1907.06226">
         6959 <title>Lexical Simplification with Pretrained Encoders. (arXiv:1907.06226v5 [cs.CL] UPDATED)</title>
         6960 <link>http://fr.arxiv.org/abs/1907.06226</link>
         6961 <description rdf:parseType="Literal">&lt;p&gt;Lexical simplification (LS) aims to replace complex words in a given sentence
         6962 with their simpler alternatives of equivalent meaning. Recently unsupervised
         6963 lexical simplification approaches only rely on the complex word itself
         6964 regardless of the given sentence to generate candidate substitutions, which
         6965 will inevitably produce a large number of spurious candidates. We present a
         6966 simple LS approach that makes use of the Bidirectional Encoder Representations
         6967 from Transformers (BERT) which can consider both the given sentence and the
         6968 complex word during generating candidate substitutions for the complex word.
         6969 Specifically, we mask the complex word of the original sentence for feeding
         6970 into the BERT to predict the masked token. The predicted results will be used
         6971 as candidate substitutions. Despite being entirely unsupervised, experimental
         6972 results show that our approach obtains obvious improvement compared with these
         6973 baselines leveraging linguistic databases and parallel corpus, outperforming
         6974 the state-of-the-art by more than 12 Accuracy points on three well-known
         6975 benchmarks.
         6976 &lt;/p&gt;
         6977 </description>
         6978 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qiang_J/0/1/0/all/0/1&quot;&gt;Jipeng Qiang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Y/0/1/0/all/0/1&quot;&gt;Yun Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhu_Y/0/1/0/all/0/1&quot;&gt;Yi Zhu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yuan_Y/0/1/0/all/0/1&quot;&gt;Yunhao Yuan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_X/0/1/0/all/0/1&quot;&gt;Xindong Wu&lt;/a&gt;</dc:creator>
         6979 </item>
         6980 <item rdf:about="http://fr.arxiv.org/abs/1907.06630">
         6981 <title>Cover and variable degeneracy. (arXiv:1907.06630v3 [math.CO] UPDATED)</title>
         6982 <link>http://fr.arxiv.org/abs/1907.06630</link>
         6983 <description rdf:parseType="Literal">&lt;p&gt;Let $f$ be a nonnegative integer valued function on the vertex set of a
         6984 graph. A graph is {\bf strictly $f$-degenerate} if each nonempty subgraph
         6985 $\Gamma$ has a vertex $v$ such that $\mathrm{deg}_{\Gamma}(v) &amp;lt; f(v)$. In this
         6986 paper, we define a new concept, strictly $f$-degenerate transversal, which
         6987 generalizes list coloring, signed coloring, DP-coloring, $L$-forested-coloring,
         6988 and $(f_{1}, f_{2}, \dots, f_{s})$-partition. A {\bf cover} of a graph $G$ is a
         6989 graph $H$ with vertex set $V(H) = \bigcup_{v \in V(G)} X_{v}$, where $X_{v} =
         6990 \{(v, 1), (v, 2), \dots, (v, s)\}$; the edge set $\mathscr{M} = \bigcup_{uv \in
         6991 E(G)}\mathscr{M}_{uv}$, where $\mathscr{M}_{uv}$ is a matching between $X_{u}$
         6992 and $X_{v}$. A vertex set $R \subseteq V(H)$ is a {\bf transversal} of $H$ if
         6993 $|R \cap X_{v}| = 1$ for each $v \in V(G)$. A transversal $R$ is a {\bf
         6994 strictly $f$-degenerate transversal} if $H[R]$ is strictly $f$-degenerate. The
         6995 main result of this paper is a degree type result, which generalizes Brooks&apos;
         6996 theorem, Gallai&apos;s theorem, degree-choosable result, signed degree-colorable
         6997 result, and DP-degree-colorable result. Similar to Borodin, Kostochka and
         6998 Toft&apos;s variable degeneracy, this degree type result is also self-strengthening.
         6999 We also give some structural results on critical graphs with respect to
         7000 strictly $f$-degenerate transversal. Using these results, we can uniformly
         7001 prove many new and known results. In the final section, we pose some open
         7002 problems.
         7003 &lt;/p&gt;
         7004 </description>
         7005 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Lu_F/0/1/0/all/0/1&quot;&gt;Fangyao Lu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Wang_Q/0/1/0/all/0/1&quot;&gt;Qianqian Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Wang_T/0/1/0/all/0/1&quot;&gt;Tao Wang&lt;/a&gt;</dc:creator>
         7006 </item>
         7007 <item rdf:about="http://fr.arxiv.org/abs/1907.08813">
         7008 <title>An Iterative Vertex Enumeration Method for Objective Space Based Vector Optimization Algorithms. (arXiv:1907.08813v2 [math.OC] UPDATED)</title>
         7009 <link>http://fr.arxiv.org/abs/1907.08813</link>
         7010 <description rdf:parseType="Literal">&lt;p&gt;An application area of vertex enumeration problem (VEP) is the usage within
         7011 objective space based linear/convex {vector} optimization algorithms whose aim
         7012 is to generate (an approximation of) the Pareto frontier. In such algorithms,
         7013 VEP, which is defined in the objective space, is solved in each iteration and
         7014 it has a special structure. Namely, the recession cone of the polyhedron to be
         7015 generated is the {ordering} cone. We {consider and give a detailed description
         7016 of} a vertex enumeration procedure, which iterates by calling a modified
         7017 `double description (DD) method&apos; that works for such unbounded polyhedrons. We
         7018 employ this procedure as a function of an existing objective space based
         7019 {vector} optimization algorithm (Algorithm 1); and test the performance of it
         7020 for randomly generated linear multiobjective optimization problems. We compare
         7021 the efficiency of this procedure with another existing DD method as well as
         7022 with the current vertex enumeration subroutine of Algorithm 1. We observe that
         7023 the modified procedure excels the others especially as the dimension of the
         7024 vertex enumeration problem (the number of objectives of the corresponding
         7025 multiobjective problem) increases.
         7026 &lt;/p&gt;
         7027 </description>
         7028 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Kaya_I/0/1/0/all/0/1&quot;&gt;Irfan Caner Kaya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Ulus_F/0/1/0/all/0/1&quot;&gt;Firdevs Ulus&lt;/a&gt;</dc:creator>
         7029 </item>
         7030 <item rdf:about="http://fr.arxiv.org/abs/1908.01146">
         7031 <title>Developing an Unsupervised Real-time Anomaly Detection Scheme for Time Series with Multi-seasonality. (arXiv:1908.01146v2 [cs.LG] UPDATED)</title>
         7032 <link>http://fr.arxiv.org/abs/1908.01146</link>
         7033 <description rdf:parseType="Literal">&lt;p&gt;On-line detection of anomalies in time series is a key technique used in
         7034 various event-sensitive scenarios such as robotic system monitoring, smart
         7035 sensor networks and data center security. However, the increasing diversity of
         7036 data sources and the variety of demands make this task more challenging than
         7037 ever. Firstly, the rapid increase in unlabeled data means supervised learning
         7038 is becoming less suitable in many cases. Secondly, a large portion of time
         7039 series data have complex seasonality features. Thirdly, on-line anomaly
         7040 detection needs to be fast and reliable. In light of this, we have developed a
         7041 prediction-driven, unsupervised anomaly detection scheme, which adopts a
         7042 backbone model combining the decomposition and the inference of time series
         7043 data. Further, we propose a novel metric, Local Trend Inconsistency (LTI), and
         7044 an efficient detection algorithm that computes LTI in a real-time manner and
         7045 scores each data point robustly in terms of its probability of being anomalous.
         7046 We have conducted extensive experimentation to evaluate our algorithm with
         7047 several datasets from both public repositories and production environments. The
         7048 experimental results show that our scheme outperforms existing representative
         7049 anomaly detection algorithms in terms of the commonly used metric, Area Under
         7050 Curve (AUC), while achieving the desired efficiency.
         7051 &lt;/p&gt;
         7052 </description>
         7053 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_W/0/1/0/all/0/1&quot;&gt;Wentai Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_L/0/1/0/all/0/1&quot;&gt;Ligang He&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1&quot;&gt;Weiwei Lin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Su_Y/0/1/0/all/0/1&quot;&gt;Yi Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cui_Y/0/1/0/all/0/1&quot;&gt;Yuhua Cui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maple_C/0/1/0/all/0/1&quot;&gt;Carsten Maple&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jarvis_S/0/1/0/all/0/1&quot;&gt;Stephen Jarvis&lt;/a&gt;</dc:creator>
         7054 </item>
         7055 <item rdf:about="http://fr.arxiv.org/abs/1908.06634">
         7056 <title>Cluster-based Distributed Augmented Lagrangian Algorithm for a Class of Constrained Convex Optimization Problems. (arXiv:1908.06634v3 [cs.MA] UPDATED)</title>
         7057 <link>http://fr.arxiv.org/abs/1908.06634</link>
         7058 <description rdf:parseType="Literal">&lt;p&gt;We propose a distributed solution for a constrained convex optimization
         7059 problem over a network of clustered agents each consisted of a set of
         7060 subagents. The communication range of the clustered agents is such that they
         7061 can form a connected undirected graph topology. The total cost in this
         7062 optimization problem is the sum of the local convex costs of the subagents of
         7063 each cluster. We seek a minimizer of this cost subject to a set of affine
         7064 equality constraints, and a set of affine inequality constraints specifying the
         7065 bounds on the decision variables if such bounds exist. We design our
         7066 distributed algorithm in a cluster-based framework which results in a
         7067 significant reduction in communication and computation costs. Our proposed
         7068 distributed solution is a novel continuous-time algorithm that is linked to the
         7069 augmented Lagrangian approach. It converges asymptotically when the local cost
         7070 functions are convex and exponentially when they are strongly convex and have
         7071 Lipschitz gradients. Moreover, we use an $\epsilon$-exact penalty function to
         7072 address the inequality constraints and derive an explicit lower bound on the
         7073 penalty function weight to guarantee convergence to $\epsilon$-neighborhood of
         7074 the global minimum value of the cost. A numerical example demonstrates our
         7075 results.
         7076 &lt;/p&gt;
         7077 </description>
         7078 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Moradian_H/0/1/0/all/0/1&quot;&gt;Hossein Moradian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kia_S/0/1/0/all/0/1&quot;&gt;Solmaz S. Kia&lt;/a&gt;</dc:creator>
         7079 </item>
         7080 <item rdf:about="http://fr.arxiv.org/abs/1909.05176">
         7081 <title>Optimal Machine Intelligence at the Edge of Chaos. (arXiv:1909.05176v2 [cs.LG] UPDATED)</title>
         7082 <link>http://fr.arxiv.org/abs/1909.05176</link>
         7083 <description rdf:parseType="Literal">&lt;p&gt;It has long been suggested that the biological brain operates at some
         7084 critical point between two different phases, possibly order and chaos. Despite
         7085 many indirect empirical evidence from the brain and analytical indication on
         7086 simple neural networks, the foundation of this hypothesis on generic non-linear
         7087 systems remains unclear. Here we develop a general theory that reveals the
         7088 exact edge of chaos is the boundary between the chaotic phase and the
         7089 (pseudo)periodic phase arising from Neimark-Sacker bifurcation. This edge is
         7090 analytically determined by the asymptotic Jacobian norm values of the
         7091 non-linear operator and influenced by the dimensionality of the system. The
         7092 optimality at the edge of chaos is associated with the highest information
         7093 transfer between input and output at this point similar to that of the logistic
         7094 map. As empirical validations, our experiments on the various deep learning
         7095 models in computer vision demonstrate the optimality of the models near the
         7096 edge of chaos, and we observe that the state-of-art training algorithms push
         7097 the models towards such edge as they become more accurate. We further
         7098 establishes the theoretical understanding of deep learning model generalization
         7099 through asymptotic stability.
         7100 &lt;/p&gt;
         7101 </description>
         7102 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Feng_L/0/1/0/all/0/1&quot;&gt;Ling Feng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_L/0/1/0/all/0/1&quot;&gt;Lin Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lai_C/0/1/0/all/0/1&quot;&gt;Choy Heng Lai&lt;/a&gt;</dc:creator>
         7103 </item>
         7104 <item rdf:about="http://fr.arxiv.org/abs/1909.09318">
         7105 <title>Inverse Kinematics for Serial Kinematic Chains via Sum of Squares Optimization. (arXiv:1909.09318v3 [cs.RO] UPDATED)</title>
         7106 <link>http://fr.arxiv.org/abs/1909.09318</link>
         7107 <description rdf:parseType="Literal">&lt;p&gt;Inverse kinematics is a fundamental problem for articulated robots: fast and
         7108 accurate algorithms are needed for translating task-related workspace
         7109 constraints and goals into feasible joint configurations. In general, inverse
         7110 kinematics for serial kinematic chains is a difficult nonlinear problem, for
         7111 which closed form solutions cannot be easily obtained. Therefore,
         7112 computationally efficient numerical methods that can be adapted to a general
         7113 class of manipulators are of great importance. % to motion planning and
         7114 workspace generation tasks. In this paper, we use convex optimization
         7115 techniques to solve the inverse kinematics problem with joint limit constraints
         7116 for highly redundant serial kinematic chains with spherical joints in two and
         7117 three dimensions. This is accomplished through a novel formulation of inverse
         7118 kinematics as a nearest point problem, and with a fast sum of squares solver
         7119 that exploits the sparsity of kinematic constraints for serial manipulators.
         7120 Our method has the advantages of post-hoc certification of global optimality
         7121 and a runtime that scales polynomialy with the number of degrees of freedom.
         7122 Additionally, we prove that our convex relaxation leads to a globally optimal
         7123 solution when certain conditions are met, and demonstrate empirically that
         7124 these conditions are common and represent many practical instances. Finally, we
         7125 provide an open source implementation of our algorithm.
         7126 &lt;/p&gt;
         7127 </description>
         7128 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maric_F/0/1/0/all/0/1&quot;&gt;Filip Maric&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Giamou_M/0/1/0/all/0/1&quot;&gt;Matthew Giamou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Khoubyarian_S/0/1/0/all/0/1&quot;&gt;Soroush Khoubyarian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Petrovic_I/0/1/0/all/0/1&quot;&gt;Ivan Petrovic&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kelly_J/0/1/0/all/0/1&quot;&gt;Jonathan Kelly&lt;/a&gt;</dc:creator>
         7129 </item>
         7130 <item rdf:about="http://fr.arxiv.org/abs/1909.12473">
         7131 <title>Noisy Batch Active Learning with Deterministic Annealing. (arXiv:1909.12473v2 [cs.LG] UPDATED)</title>
         7132 <link>http://fr.arxiv.org/abs/1909.12473</link>
         7133 <description rdf:parseType="Literal">&lt;p&gt;We study the problem of training machine learning models incrementally with
         7134 batches of samples annotated with noisy oracles. We select each batch of
         7135 samples that are important and also diverse via clustering and importance
         7136 sampling. More importantly, we incorporate model uncertainty into the sampling
         7137 probability to compensate for poor estimation of the importance scores when the
         7138 training data is too small to build a meaningful model. Experiments on
         7139 benchmark image classification datasets (MNIST, SVHN, CIFAR10, and EMNIST) show
         7140 improvement over existing active learning strategies. We introduce an extra
         7141 denoising layer to deep networks to make active learning robust to label noises
         7142 and show significant improvements.
         7143 &lt;/p&gt;
         7144 </description>
         7145 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gupta_G/0/1/0/all/0/1&quot;&gt;Gaurav Gupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sahu_A/0/1/0/all/0/1&quot;&gt;Anit Kumar Sahu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lin_W/0/1/0/all/0/1&quot;&gt;Wan-Yi Lin&lt;/a&gt;</dc:creator>
         7146 </item>
         7147 <item rdf:about="http://fr.arxiv.org/abs/1910.04267">
         7148 <title>Subspace Estimation from Unbalanced and Incomplete Data Matrices: $\ell_{2,\infty}$ Statistical Guarantees. (arXiv:1910.04267v4 [math.ST] UPDATED)</title>
         7149 <link>http://fr.arxiv.org/abs/1910.04267</link>
         7150 <description rdf:parseType="Literal">&lt;p&gt;This paper is concerned with estimating the column space of an unknown
         7151 low-rank matrix $\boldsymbol{A}^{\star}\in\mathbb{R}^{d_{1}\times d_{2}}$,
         7152 given noisy and partial observations of its entries. There is no shortage of
         7153 scenarios where the observations -- while being too noisy to support faithful
         7154 recovery of the entire matrix -- still convey sufficient information to enable
         7155 reliable estimation of the column space of interest. This is particularly
         7156 evident and crucial for the highly unbalanced case where the column dimension
         7157 $d_{2}$ far exceeds the row dimension $d_{1}$, which is the focal point of the
         7158 current paper. We investigate an efficient spectral method, which operates upon
         7159 the sample Gram matrix with diagonal deletion. While this algorithmic idea has
         7160 been studied before, we establish new statistical guarantees for this method in
         7161 terms of both $\ell_{2}$ and $\ell_{2,\infty}$ estimation accuracy, which
         7162 improve upon prior results if $d_{2}$ is substantially larger than $d_{1}$. To
         7163 illustrate the effectiveness of our findings, we derive matching minimax lower
         7164 bounds with respect to the noise levels, and develop consequences of our
         7165 general theory for three applications of practical importance: (1) tensor
         7166 completion from noisy data, (2) covariance estimation / principal component
         7167 analysis with missing data, and (3) community recovery in bipartite graphs. Our
         7168 theory leads to improved performance guarantees for all three cases.
         7169 &lt;/p&gt;
         7170 </description>
         7171 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Cai_C/0/1/0/all/0/1&quot;&gt;Changxiao Cai&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Li_G/0/1/0/all/0/1&quot;&gt;Gen Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Chi_Y/0/1/0/all/0/1&quot;&gt;Yuejie Chi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Poor_H/0/1/0/all/0/1&quot;&gt;H. Vincent Poor&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yuxin Chen&lt;/a&gt;</dc:creator>
         7172 </item>
         7173 <item rdf:about="http://fr.arxiv.org/abs/1910.08845">
         7174 <title>ProxIQA: A Proxy Approach to Perceptual Optimization of Learned Image Compression. (arXiv:1910.08845v2 [eess.IV] UPDATED)</title>
         7175 <link>http://fr.arxiv.org/abs/1910.08845</link>
         7176 <description rdf:parseType="Literal">&lt;p&gt;The use of $\ell_p$ $(p=1,2)$ norms has largely dominated the measurement of
         7177 loss in neural networks due to their simplicity and analytical properties.
         7178 However, when used to assess the loss of visual information, these simple norms
         7179 are not very consistent with human perception. Here, we describe a different
         7180 &quot;proximal&quot; approach to optimize image analysis networks against quantitative
         7181 perceptual models. Specifically, we construct a proxy network, broadly termed
         7182 ProxIQA, which mimics the perceptual model while serving as a loss layer of the
         7183 network. We experimentally demonstrate how this optimization framework can be
         7184 applied to train an end-to-end optimized image compression network. By building
         7185 on top of an existing deep image compression model, we are able to demonstrate
         7186 a bitrate reduction of as much as $31\%$ over MSE optimization, given a
         7187 specified perceptual quality (VMAF) level.
         7188 &lt;/p&gt;
         7189 </description>
         7190 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chen_L/0/1/0/all/0/1&quot;&gt;Li-Heng Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Bampis_C/0/1/0/all/0/1&quot;&gt;Christos G. Bampis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_Z/0/1/0/all/0/1&quot;&gt;Zhi Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Norkin_A/0/1/0/all/0/1&quot;&gt;Andrey Norkin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Bovik_A/0/1/0/all/0/1&quot;&gt;Alan C. Bovik&lt;/a&gt;</dc:creator>
         7191 </item>
         7192 <item rdf:about="http://fr.arxiv.org/abs/1910.13067">
         7193 <title>Federated Learning over Wireless Networks: Convergence Analysis and Resource Allocation. (arXiv:1910.13067v4 [cs.LG] UPDATED)</title>
         7194 <link>http://fr.arxiv.org/abs/1910.13067</link>
         7195 <description rdf:parseType="Literal">&lt;p&gt;There is an increasing interest in a fast-growing machine learning technique
         7196 called Federated Learning, in which the model training is distributed over
         7197 mobile user equipments (UEs), exploiting UEs&apos; local computation and training
         7198 data. Despite its advantages in data privacy-preserving, Federated Learning
         7199 (FL) still has challenges in heterogeneity across UEs&apos; data and physical
         7200 resources. We first propose a FL algorithm which can handle the heterogeneous
         7201 UEs&apos; data challenge without further assumptions except strongly convex and
         7202 smooth loss functions. We provide the convergence rate characterizing the
         7203 trade-off between local computation rounds of UE to update its local model and
         7204 global communication rounds to update the FL global model. We then employ the
         7205 proposed FL algorithm in wireless networks as a resource allocation
         7206 optimization problem that captures the trade-off between the FL convergence
         7207 wall clock time and energy consumption of UEs with heterogeneous computing and
         7208 power resources. Even though the wireless resource allocation problem of FL is
         7209 non-convex, we exploit this problem&apos;s structure to decompose it into three
         7210 sub-problems and analyze their closed-form solutions as well as insights to
         7211 problem design. Finally, we illustrate the theoretical analysis for the new
         7212 algorithm with Tensorflow experiments and extensive numerical results for the
         7213 wireless resource allocation sub-problems. The experiment results not only
         7214 verify the theoretical convergence but also show that our proposed algorithm
         7215 outperforms the vanilla FedAvg algorithm in terms of convergence rate and
         7216 testing accuracy.
         7217 &lt;/p&gt;
         7218 </description>
         7219 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dinh_C/0/1/0/all/0/1&quot;&gt;Canh T. Dinh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tran_N/0/1/0/all/0/1&quot;&gt;Nguyen H. Tran&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nguyen_M/0/1/0/all/0/1&quot;&gt;Minh N. H. Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hong_C/0/1/0/all/0/1&quot;&gt;Choong Seon Hong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bao_W/0/1/0/all/0/1&quot;&gt;Wei Bao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zomaya_A/0/1/0/all/0/1&quot;&gt;Albert Y. Zomaya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gramoli_V/0/1/0/all/0/1&quot;&gt;Vincent Gramoli&lt;/a&gt;</dc:creator>
         7220 </item>
         7221 <item rdf:about="http://fr.arxiv.org/abs/1911.02711">
         7222 <title>Making the Best Use of Review Summary for Sentiment Analysis. (arXiv:1911.02711v2 [cs.CL] UPDATED)</title>
         7223 <link>http://fr.arxiv.org/abs/1911.02711</link>
         7224 <description rdf:parseType="Literal">&lt;p&gt;Sentiment analysis provides a useful overview of customer review contents.
         7225 Many review websites allow a user to enter a summary in addition to a full
         7226 review. Intuitively, summary information may give additional benefit for review
         7227 sentiment analysis. In this paper, we conduct a study to exploit methods for
         7228 better use of summary information. We start by finding out that the sentimental
         7229 signal distribution of a review and that of its corresponding summary are in
         7230 fact complementary to each other. We thus explore various architectures to
         7231 better guide the interactions between the two and propose a
         7232 hierarchically-refined review-centric attention model. Empirical results show
         7233 that our review-centric model can make better use of user-written summaries for
         7234 review sentiment analysis, and is also more effective compared to existing
         7235 methods when the user summary is replaced with summary generated by an
         7236 automatic summarization system.
         7237 &lt;/p&gt;
         7238 </description>
         7239 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_S/0/1/0/all/0/1&quot;&gt;Sen Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cui_L/0/1/0/all/0/1&quot;&gt;Leyang Cui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xie_J/0/1/0/all/0/1&quot;&gt;Jun Xie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yue Zhang&lt;/a&gt;</dc:creator>
         7240 </item>
         7241 <item rdf:about="http://fr.arxiv.org/abs/1911.03849">
         7242 <title>Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy. (arXiv:1911.03849v5 [cs.LG] UPDATED)</title>
         7243 <link>http://fr.arxiv.org/abs/1911.03849</link>
         7244 <description rdf:parseType="Literal">&lt;p&gt;Recent studies have revealed that neural network-based policies can be easily
         7245 fooled by adversarial examples. However, while most prior works analyze the
         7246 effects of perturbing every pixel of every frame assuming white-box policy
         7247 access, in this paper we take a more restrictive view towards adversary
         7248 generation - with the goal of unveiling the limits of a model&apos;s vulnerability.
         7249 In particular, we explore minimalistic attacks by defining three key settings:
         7250 (1) black-box policy access: where the attacker only has access to the input
         7251 (state) and output (action probability) of an RL policy; (2) fractional-state
         7252 adversary: where only several pixels are perturbed, with the extreme case being
         7253 a single-pixel adversary; and (3) tactically-chanced attack: where only
         7254 significant frames are tactically chosen to be attacked. We formulate the
         7255 adversarial attack by accommodating the three key settings and explore their
         7256 potency on six Atari games by examining four fully trained state-of-the-art
         7257 policies. In Breakout, for example, we surprisingly find that: (i) all policies
         7258 showcase significant performance degradation by merely modifying 0.01% of the
         7259 input state, and (ii) the policy trained by DQN is totally deceived by
         7260 perturbation to only 1% frames.
         7261 &lt;/p&gt;
         7262 </description>
         7263 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qu_X/0/1/0/all/0/1&quot;&gt;Xinghua Qu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sun_Z/0/1/0/all/0/1&quot;&gt;Zhu Sun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ong_Y/0/1/0/all/0/1&quot;&gt;Yew-Soon Ong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gupta_A/0/1/0/all/0/1&quot;&gt;Abhishek Gupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_P/0/1/0/all/0/1&quot;&gt;Pengfei Wei&lt;/a&gt;</dc:creator>
         7264 </item>
         7265 <item rdf:about="http://fr.arxiv.org/abs/1911.03875">
         7266 <title>Rethinking Self-Attention: Towards Interpretability in Neural Parsing. (arXiv:1911.03875v3 [cs.CL] UPDATED)</title>
         7267 <link>http://fr.arxiv.org/abs/1911.03875</link>
         7268 <description rdf:parseType="Literal">&lt;p&gt;Attention mechanisms have improved the performance of NLP tasks while
         7269 allowing models to remain explainable. Self-attention is currently widely used,
         7270 however interpretability is difficult due to the numerous attention
         7271 distributions. Recent work has shown that model representations can benefit
         7272 from label-specific information, while facilitating interpretation of
         7273 predictions. We introduce the Label Attention Layer: a new form of
         7274 self-attention where attention heads represent labels. We test our novel layer
         7275 by running constituency and dependency parsing experiments and show our new
         7276 model obtains new state-of-the-art results for both tasks on both the Penn
         7277 Treebank (PTB) and Chinese Treebank. Additionally, our model requires fewer
         7278 self-attention layers compared to existing work. Finally, we find that the
         7279 Label Attention heads learn relations between syntactic categories and show
         7280 pathways to analyze errors.
         7281 &lt;/p&gt;
         7282 </description>
         7283 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mrini_K/0/1/0/all/0/1&quot;&gt;Khalil Mrini&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dernoncourt_F/0/1/0/all/0/1&quot;&gt;Franck Dernoncourt&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tran_Q/0/1/0/all/0/1&quot;&gt;Quan Tran&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bui_T/0/1/0/all/0/1&quot;&gt;Trung Bui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chang_W/0/1/0/all/0/1&quot;&gt;Walter Chang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nakashole_N/0/1/0/all/0/1&quot;&gt;Ndapa Nakashole&lt;/a&gt;</dc:creator>
         7284 </item>
         7285 <item rdf:about="http://fr.arxiv.org/abs/1911.04209">
         7286 <title>Privacy-Preserving Gradient Boosting Decision Trees. (arXiv:1911.04209v3 [cs.LG] UPDATED)</title>
         7287 <link>http://fr.arxiv.org/abs/1911.04209</link>
         7288 <description rdf:parseType="Literal">&lt;p&gt;The Gradient Boosting Decision Tree (GBDT) is a popular machine learning
         7289 model for various tasks in recent years. In this paper, we study how to improve
         7290 model accuracy of GBDT while preserving the strong guarantee of differential
         7291 privacy. Sensitivity and privacy budget are two key design aspects for the
         7292 effectiveness of differential private models. Existing solutions for GBDT with
         7293 differential privacy suffer from the significant accuracy loss due to too loose
         7294 sensitivity bounds and ineffective privacy budget allocations (especially
         7295 across different trees in the GBDT model). Loose sensitivity bounds lead to
         7296 more noise to obtain a fixed privacy level. Ineffective privacy budget
         7297 allocations worsen the accuracy loss especially when the number of trees is
         7298 large. Therefore, we propose a new GBDT training algorithm that achieves
         7299 tighter sensitivity bounds and more effective noise allocations. Specifically,
         7300 by investigating the property of gradient and the contribution of each tree in
         7301 GBDTs, we propose to adaptively control the gradients of training data for each
         7302 iteration and leaf node clipping in order to tighten the sensitivity bounds.
         7303 Furthermore, we design a novel boosting framework to allocate the privacy
         7304 budget between trees so that the accuracy loss can be further reduced. Our
         7305 experiments show that our approach can achieve much better model accuracy than
         7306 other baselines.
         7307 &lt;/p&gt;
         7308 </description>
         7309 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_Q/0/1/0/all/0/1&quot;&gt;Qinbin Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_Z/0/1/0/all/0/1&quot;&gt;Zhaomin Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wen_Z/0/1/0/all/0/1&quot;&gt;Zeyi Wen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_B/0/1/0/all/0/1&quot;&gt;Bingsheng He&lt;/a&gt;</dc:creator>
         7310 </item>
         7311 <item rdf:about="http://fr.arxiv.org/abs/1911.09565">
         7312 <title>A Continuous Teleoperation Subspace with Empirical and Algorithmic Mapping Algorithms for Non-Anthropomorphic Hands. (arXiv:1911.09565v5 [cs.RO] UPDATED)</title>
         7313 <link>http://fr.arxiv.org/abs/1911.09565</link>
         7314 <description rdf:parseType="Literal">&lt;p&gt;Teleoperation is a valuable tool for robotic manipulators in highly
         7315 unstructured environments. However, finding an intuitive mapping between a
         7316 human hand and a non-anthropomorphic robot hand can be difficult, due to the
         7317 hands&apos; dissimilar kinematics. In this paper, we seek to create a mapping
         7318 between the human hand and a fully actuated, non-anthropomorphic robot hand
         7319 that is intuitive enough to enable effective real-time teleoperation, even for
         7320 novice users. To accomplish this, we propose a low-dimensional teleoperation
         7321 subspace which can be used as an intermediary for mapping between hand pose
         7322 spaces. We present two different methods to define the teleoperation subspace:
         7323 an empirical definition, which requires a person to define hand motions in an
         7324 intuitive, hand-specific way, and an algorithmic definition, which is
         7325 kinematically independent, and uses objects to define the subspace. We use each
         7326 of these definitions to create a teleoperation mapping for different hands. One
         7327 of the main contributions of this paper is the validation of both the empirical
         7328 and algorithmic mappings with teleoperation experiments controlled by ten
         7329 novices and performed on two kinematically distinct hands. The experiments show
         7330 that the proposed subspace is relevant to teleoperation, intuitive enough to
         7331 enable control by novices, and can generalize to non-anthropomorphic hands with
         7332 different kinematics.
         7333 &lt;/p&gt;
         7334 </description>
         7335 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Meeker_C/0/1/0/all/0/1&quot;&gt;Cassie Meeker&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Haas_Heger_M/0/1/0/all/0/1&quot;&gt;Maximilian Haas-Heger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ciocarlie_M/0/1/0/all/0/1&quot;&gt;Matei Ciocarlie&lt;/a&gt;</dc:creator>
         7336 </item>
         7337 <item rdf:about="http://fr.arxiv.org/abs/1912.00187">
         7338 <title>QoS-Aware Joint Power Allocation and Task Offloading in a MEC/NFV-enabled C-RAN Network. (arXiv:1912.00187v2 [cs.NI] UPDATED)</title>
         7339 <link>http://fr.arxiv.org/abs/1912.00187</link>
         7340 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we propose a novel resource management scheme that jointly
         7341 allocates the transmission power and computational resources in a centralized
         7342 radio access network architecture. The network comprises a set of computing
         7343 nodes to which the requested tasks of different users are offloaded. The
         7344 optimization problem takes the transmission, execution, and propagation delays
         7345 of each task into account, with the aim to allocate the transmission power and
         7346 computational resources such that the user&apos;s maximum tolerable latency is
         7347 satisfied. Since the optimization problem is highly non-convex, we adopt the
         7348 alternate search method (ASM) to divide it into smaller subproblems. A
         7349 heuristic algorithm is proposed to jointly manage the allocated computational
         7350 resources and placement of the tasks derived by ASM. We also propose an
         7351 admission control mechanism for finding the set of tasks that can be served by
         7352 the available resources. Furthermore, a disjoint method that separately
         7353 allocates the transmission power and the computational resources is proposed as
         7354 the baseline of comparison. The optimal solution of the optimization problem is
         7355 also derived based on exhaustive search over offloading decisions and utilizing
         7356 Karush-Kuhn-Tucker optimality conditions. The simulation results show that the
         7357 joint method outperforms the disjoint task offloading and power allocation.
         7358 Moreover, simulations show that the performance of the proposed method is
         7359 almost equal to that of the optimal solution.
         7360 &lt;/p&gt;
         7361 </description>
         7362 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tajallifar_M/0/1/0/all/0/1&quot;&gt;Mohsen Tajallifar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ebrahimi_S/0/1/0/all/0/1&quot;&gt;Sina Ebrahimi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Javan_M/0/1/0/all/0/1&quot;&gt;Mohammad Reza Javan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mokari_N/0/1/0/all/0/1&quot;&gt;Nader Mokari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chiaraviglio_L/0/1/0/all/0/1&quot;&gt;Luca Chiaraviglio&lt;/a&gt;</dc:creator>
         7363 </item>
         7364 <item rdf:about="http://fr.arxiv.org/abs/1912.02290">
         7365 <title>Hierarchical Indian Buffet Neural Networks for Bayesian Continual Learning. (arXiv:1912.02290v4 [stat.ML] UPDATED)</title>
         7366 <link>http://fr.arxiv.org/abs/1912.02290</link>
         7367 <description rdf:parseType="Literal">&lt;p&gt;We place an Indian Buffet process (IBP) prior over the structure of a
         7368 Bayesian Neural Network (BNN), thus allowing the complexity of the BNN to
         7369 increase and decrease automatically. We further extend this model such that the
         7370 prior on the structure of each hidden layer is shared globally across all
         7371 layers, using a Hierarchical-IBP (H-IBP). We apply this model to the problem of
         7372 resource allocation in Continual Learning (CL) where new tasks occur and the
         7373 network requires extra resources. Our model uses online variational inference
         7374 with reparameterisation of the Bernoulli and Beta distributions, which
         7375 constitute the IBP and H-IBP priors. As we automatically learn the number of
         7376 weights in each layer of the BNN, overfitting and underfitting problems are
         7377 largely overcome. We show empirically that our approach offers a competitive
         7378 edge over existing methods in CL.
         7379 &lt;/p&gt;
         7380 </description>
         7381 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Kessler_S/0/1/0/all/0/1&quot;&gt;Samuel Kessler&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nguyen_V/0/1/0/all/0/1&quot;&gt;Vu Nguyen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Zohren_S/0/1/0/all/0/1&quot;&gt;Stefan Zohren&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Roberts_S/0/1/0/all/0/1&quot;&gt;Stephen Roberts&lt;/a&gt;</dc:creator>
         7382 </item>
         7383 <item rdf:about="http://fr.arxiv.org/abs/1912.05320">
         7384 <title>CoSimLex: A Resource for Evaluating Graded Word Similarity in Context. (arXiv:1912.05320v3 [cs.CL] UPDATED)</title>
         7385 <link>http://fr.arxiv.org/abs/1912.05320</link>
         7386 <description rdf:parseType="Literal">&lt;p&gt;State of the art natural language processing tools are built on
         7387 context-dependent word embeddings, but no direct method for evaluating these
         7388 representations currently exists. Standard tasks and datasets for intrinsic
         7389 evaluation of embeddings are based on judgements of similarity, but ignore
         7390 context; standard tasks for word sense disambiguation take account of context
         7391 but do not provide continuous measures of meaning similarity. This paper
         7392 describes an effort to build a new dataset, CoSimLex, intended to fill this
         7393 gap. Building on the standard pairwise similarity task of SimLex-999, it
         7394 provides context-dependent similarity measures; covers not only discrete
         7395 differences in word sense but more subtle, graded changes in meaning; and
         7396 covers not only a well-resourced language (English) but a number of
         7397 less-resourced languages. We define the task and evaluation metrics, outline
         7398 the dataset collection methodology, and describe the status of the dataset so
         7399 far.
         7400 &lt;/p&gt;
         7401 </description>
         7402 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Armendariz_C/0/1/0/all/0/1&quot;&gt;Carlos Santos Armendariz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Purver_M/0/1/0/all/0/1&quot;&gt;Matthew Purver&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ulcar_M/0/1/0/all/0/1&quot;&gt;Matej Ul&amp;#x10d;ar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pollak_S/0/1/0/all/0/1&quot;&gt;Senja Pollak&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ljubesic_N/0/1/0/all/0/1&quot;&gt;Nikola Ljube&amp;#x161;i&amp;#x107;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Robnik_Sikonja_M/0/1/0/all/0/1&quot;&gt;Marko Robnik-&amp;#x160;ikonja&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Granroth_Wilding_M/0/1/0/all/0/1&quot;&gt;Mark Granroth-Wilding&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vaik_K/0/1/0/all/0/1&quot;&gt;Kristiina Vaik&lt;/a&gt;</dc:creator>
         7403 </item>
         7404 <item rdf:about="http://fr.arxiv.org/abs/1912.05699">
         7405 <title>What it Thinks is Important is Important: Robustness Transfers through Input Gradients. (arXiv:1912.05699v3 [cs.LG] UPDATED)</title>
         7406 <link>http://fr.arxiv.org/abs/1912.05699</link>
         7407 <description rdf:parseType="Literal">&lt;p&gt;Adversarial perturbations are imperceptible changes to input pixels that can
         7408 change the prediction of deep learning models. Learned weights of models robust
         7409 to such perturbations are previously found to be transferable across different
         7410 tasks but this applies only if the model architecture for the source and target
         7411 tasks is the same. Input gradients characterize how small changes at each input
         7412 pixel affect the model output. Using only natural images, we show here that
         7413 training a student model&apos;s input gradients to match those of a robust teacher
         7414 model can gain robustness close to a strong baseline that is robustly trained
         7415 from scratch. Through experiments in MNIST, CIFAR-10, CIFAR-100 and
         7416 Tiny-ImageNet, we show that our proposed method, input gradient adversarial
         7417 matching, can transfer robustness across different tasks and even across
         7418 different model architectures. This demonstrates that directly targeting the
         7419 semantics of input gradients is a feasible way towards adversarial robustness.
         7420 &lt;/p&gt;
         7421 </description>
         7422 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chan_A/0/1/0/all/0/1&quot;&gt;Alvin Chan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tay_Y/0/1/0/all/0/1&quot;&gt;Yi Tay&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ong_Y/0/1/0/all/0/1&quot;&gt;Yew-Soon Ong&lt;/a&gt;</dc:creator>
         7423 </item>
         7424 <item rdf:about="http://fr.arxiv.org/abs/1912.08026">
         7425 <title>ORCA: a Benchmark for Data Web Crawlers. (arXiv:1912.08026v2 [cs.DB] UPDATED)</title>
         7426 <link>http://fr.arxiv.org/abs/1912.08026</link>
         7427 <description rdf:parseType="Literal">&lt;p&gt;The number of RDF knowledge graphs available on the Web grows constantly.
         7428 Gathering these graphs at large scale for downstream applications hence
         7429 requires the use of crawlers. Although Data Web crawlers exist, and general Web
         7430 crawlers could be adapted to focus on the Data Web, there is currently no
         7431 benchmark to fairly evaluate their performance. Our work closes this gap by
         7432 presenting the Orca benchmark. Orca generates a synthetic Data Web, which is
         7433 decoupled from the original Web and enables a fair and repeatable comparison of
         7434 Data Web crawlers. Our evaluations show that Orca can be used to reveal the
         7435 different advantages and disadvantages of existing crawlers. The benchmark is
         7436 open-source and available at https://github.com/dice-group/orca.
         7437 &lt;/p&gt;
         7438 </description>
         7439 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Roder_M/0/1/0/all/0/1&quot;&gt;Michael R&amp;#xf6;der&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Souza_G/0/1/0/all/0/1&quot;&gt;Geraldo de Souza&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kuchelev_D/0/1/0/all/0/1&quot;&gt;Denis Kuchelev&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Desouki_A/0/1/0/all/0/1&quot;&gt;Abdelmoneim Amer Desouki&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ngomo_A/0/1/0/all/0/1&quot;&gt;Axel-Cyrille Ngonga Ngomo&lt;/a&gt;</dc:creator>
         7440 </item>
         7441 <item rdf:about="http://fr.arxiv.org/abs/1912.10321">
         7442 <title>Deep Automodulators. (arXiv:1912.10321v4 [cs.LG] UPDATED)</title>
         7443 <link>http://fr.arxiv.org/abs/1912.10321</link>
         7444 <description rdf:parseType="Literal">&lt;p&gt;We introduce a new category of generative autoencoders called automodulators.
         7445 These networks can faithfully reproduce individual real-world input images like
         7446 regular autoencoders, but also generate a fused sample from an arbitrary
         7447 combination of several such images, allowing instantaneous &apos;style-mixing&apos; and
         7448 other new applications. An automodulator decouples the data flow of decoder
         7449 operations from statistical properties thereof and uses the latent vector to
         7450 modulate the former by the latter, with a principled approach for mutual
         7451 disentanglement of decoder layers. Prior work has explored similar decoder
         7452 architecture with GANs, but their focus has been on random sampling. A
         7453 corresponding autoencoder could operate on real input images. For the first
         7454 time, we show how to train such a general-purpose model with sharp outputs in
         7455 high resolution, using novel training techniques, demonstrated on four image
         7456 data sets. Besides style-mixing, we show state-of-the-art results in
         7457 autoencoder comparison, and visual image quality nearly indistinguishable from
         7458 state-of-the-art GANs. We expect the automodulator variants to become a useful
         7459 building block for image applications and other data domains.
         7460 &lt;/p&gt;
         7461 </description>
         7462 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heljakka_A/0/1/0/all/0/1&quot;&gt;Ari Heljakka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hou_Y/0/1/0/all/0/1&quot;&gt;Yuxin Hou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kannala_J/0/1/0/all/0/1&quot;&gt;Juho Kannala&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Solin_A/0/1/0/all/0/1&quot;&gt;Arno Solin&lt;/a&gt;</dc:creator>
         7463 </item>
         7464 <item rdf:about="http://fr.arxiv.org/abs/2001.10477">
         7465 <title>Statistical Limits of Supervised Quantum Learning. (arXiv:2001.10477v3 [quant-ph] UPDATED)</title>
         7466 <link>http://fr.arxiv.org/abs/2001.10477</link>
         7467 <description rdf:parseType="Literal">&lt;p&gt;Within the framework of statistical learning theory it is possible to bound
         7468 the minimum number of samples required by a learner to reach a target accuracy.
         7469 We show that if the bound on the accuracy is taken into account, quantum
         7470 machine learning algorithms for supervised learning---for which statistical
         7471 guarantees are available---cannot achieve polylogarithmic runtimes in the input
         7472 dimension. We conclude that, when no further assumptions on the problem are
         7473 made, quantum machine learning algorithms for supervised learning can have at
         7474 most polynomial speedups over efficient classical algorithms, even in cases
         7475 where quantum access to the data is naturally available.
         7476 &lt;/p&gt;
         7477 </description>
         7478 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Ciliberto_C/0/1/0/all/0/1&quot;&gt;Carlo Ciliberto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Rocchetto_A/0/1/0/all/0/1&quot;&gt;Andrea Rocchetto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Rudi_A/0/1/0/all/0/1&quot;&gt;Alessandro Rudi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/quant-ph/1/au:+Wossnig_L/0/1/0/all/0/1&quot;&gt;Leonard Wossnig&lt;/a&gt;</dc:creator>
         7479 </item>
         7480 <item rdf:about="http://fr.arxiv.org/abs/2002.04025">
         7481 <title>Can Graph Neural Networks Count Substructures?. (arXiv:2002.04025v4 [cs.LG] UPDATED)</title>
         7482 <link>http://fr.arxiv.org/abs/2002.04025</link>
         7483 <description rdf:parseType="Literal">&lt;p&gt;The ability to detect and count certain substructures in graphs is important
         7484 for solving many tasks on graph-structured data, especially in the contexts of
         7485 computational chemistry and biology as well as social network analysis.
         7486 Inspired by this, we propose to study the expressive power of graph neural
         7487 networks (GNNs) via their ability to count attributed graph substructures,
         7488 extending recent works that examine their power in graph isomorphism testing
         7489 and function approximation. We distinguish between two types of substructure
         7490 counting: induced-subgraph-count and subgraph-count, and establish both
         7491 positive and negative answers for popular GNN architectures. Specifically, we
         7492 prove that Message Passing Neural Networks (MPNNs), 2-Weisfeiler-Lehman (2-WL)
         7493 and 2-Invariant Graph Networks (2-IGNs) cannot perform induced-subgraph-count
         7494 of substructures consisting of 3 or more nodes, while they can perform
         7495 subgraph-count of star-shaped substructures. As an intermediary step, we prove
         7496 that 2-WL and 2-IGNs are equivalent in distinguishing non-isomorphic graphs,
         7497 partly answering an open problem raised in Maron et al. (2019). We also prove
         7498 positive results for k-WL and k-IGNs as well as negative results for k-WL with
         7499 a finite number of iterations. We then conduct experiments that support the
         7500 theoretical results for MPNNs and 2-IGNs. Moreover, motivated by substructure
         7501 counting and inspired by Murphy et al. (2019), we propose the Local Relational
         7502 Pooling model and demonstrate that it is not only effective for substructure
         7503 counting but also able to achieve competitive performance on molecular
         7504 prediction tasks.
         7505 &lt;/p&gt;
         7506 </description>
         7507 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Z/0/1/0/all/0/1&quot;&gt;Zhengdao Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_L/0/1/0/all/0/1&quot;&gt;Lei Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Villar_S/0/1/0/all/0/1&quot;&gt;Soledad Villar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bruna_J/0/1/0/all/0/1&quot;&gt;Joan Bruna&lt;/a&gt;</dc:creator>
         7508 </item>
         7509 <item rdf:about="http://fr.arxiv.org/abs/2002.06195">
         7510 <title>An implicit function learning approach for parametric modal regression. (arXiv:2002.06195v2 [stat.ML] UPDATED)</title>
         7511 <link>http://fr.arxiv.org/abs/2002.06195</link>
         7512 <description rdf:parseType="Literal">&lt;p&gt;For multi-valued functions---such as when the conditional distribution on
         7513 targets given the inputs is multi-modal---standard regression approaches are
         7514 not always desirable because they provide the conditional mean. Modal
         7515 regression algorithms address this issue by instead finding the conditional
         7516 mode(s). Most, however, are nonparametric approaches and so can be difficult to
         7517 scale. Further, parametric approximators, like neural networks, facilitate
         7518 learning complex relationships between inputs and targets. In this work, we
         7519 propose a parametric modal regression algorithm. We use the implicit function
         7520 theorem to develop an objective, for learning a joint function over inputs and
         7521 targets. We empirically demonstrate on several synthetic problems that our
         7522 method (i) can learn multi-valued functions and produce the conditional modes,
         7523 (ii) scales well to high-dimensional inputs, and (iii) can even be more
         7524 effective for certain uni-modal problems, particularly for high-frequency
         7525 functions. We demonstrate that our method is competitive in a real-world modal
         7526 regression problem and two regular regression datasets.
         7527 &lt;/p&gt;
         7528 </description>
         7529 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Pan_Y/0/1/0/all/0/1&quot;&gt;Yangchen Pan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Imani_E/0/1/0/all/0/1&quot;&gt;Ehsan Imani&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+White_M/0/1/0/all/0/1&quot;&gt;Martha White&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Farahmand_A/0/1/0/all/0/1&quot;&gt;Amir-massoud Farahmand&lt;/a&gt;</dc:creator>
         7530 </item>
         7531 <item rdf:about="http://fr.arxiv.org/abs/2002.08247">
         7532 <title>Learning Global Transparent Models Consistent with Local Contrastive Explanations. (arXiv:2002.08247v4 [cs.LG] UPDATED)</title>
         7533 <link>http://fr.arxiv.org/abs/2002.08247</link>
         7534 <description rdf:parseType="Literal">&lt;p&gt;There is a rich and growing literature on producing local
         7535 contrastive/counterfactual explanations for black-box models (e.g. neural
         7536 networks).
         7537 &lt;/p&gt;
         7538 &lt;p&gt;In these methods, for an input, an explanation is in the form of a contrast
         7539 point differing in very few features from the original input and lying in a
         7540 different class. Other works try to build globally interpretable models like
         7541 decision trees and rule lists based on the data using actual labels or based on
         7542 the black-box models predictions. Although these interpretable global models
         7543 can be useful, they may not be consistent with local explanations from a
         7544 specific black-box of choice. In this work, we explore the question: Can we
         7545 produce a transparent global model that is simultaneously accurate and
         7546 consistent with the local (contrastive) explanations of the black-box model? We
         7547 introduce a natural local consistency metric that quantifies if the local
         7548 explanations and predictions of the black-box model are also consistent with
         7549 the proxy global transparent model. Based on a key insight we propose a novel
         7550 method where we create custom boolean features from sparse local contrastive
         7551 explanations of the black-box model and then train a globally transparent model
         7552 on just these, and showcase empirically that such models have higher local
         7553 consistency compared with other known strategies, while still being close in
         7554 performance to models that are trained with access to the original data.
         7555 &lt;/p&gt;
         7556 </description>
         7557 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pedapati_T/0/1/0/all/0/1&quot;&gt;Tejaswini Pedapati&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Balakrishnan_A/0/1/0/all/0/1&quot;&gt;Avinash Balakrishnan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shanmugam_K/0/1/0/all/0/1&quot;&gt;Karthikeyan Shanmugam&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dhurandhar_A/0/1/0/all/0/1&quot;&gt;Amit Dhurandhar&lt;/a&gt;</dc:creator>
         7558 </item>
         7559 <item rdf:about="http://fr.arxiv.org/abs/2002.12165">
         7560 <title>A two-stage data-analysis method for total-reflection high-energy positron diffraction (TRHEPD). (arXiv:2002.12165v2 [cond-mat.mtrl-sci] UPDATED)</title>
         7561 <link>http://fr.arxiv.org/abs/2002.12165</link>
         7562 <description rdf:parseType="Literal">&lt;p&gt;Total-reflection high-energy positron diffraction (TRHEPD) is a novel
         7563 experimental method for the determination of surface structure, which has been
         7564 extensively developed at the Slow Positron Facility, Institute of Materials
         7565 Structure Science, High Energy Accelerator Research Organization (KEK). In this
         7566 paper, a two-stage data-analysis method is proposed. The data analysis is based
         7567 on an inverse problem in which the atomic positions of a surface structure are
         7568 determined from the experimental diffraction data (rocking curves). The
         7569 relevant forward problem is solved by the numerical solution of the partial
         7570 differential equation for quantum scattering of the positron. In the present
         7571 two-stage method, the first stage is a grid-based global search and the second
         7572 stage is a local search for the unique candidate for the atomic arrangement.
         7573 The numerical problem is solved on a supercomputer
         7574 &lt;/p&gt;
         7575 </description>
         7576 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Tanaka_K/0/1/0/all/0/1&quot;&gt;Kazuyuki Tanaka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Mochizuki_I/0/1/0/all/0/1&quot;&gt;Izumi Mochizuki&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Hanada_T/0/1/0/all/0/1&quot;&gt;Takashi Hanada&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Ichimiya_A/0/1/0/all/0/1&quot;&gt;Ayahiko Ichimiya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Hyodo_T/0/1/0/all/0/1&quot;&gt;Toshio Hyodo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cond-mat/1/au:+Hoshi_T/0/1/0/all/0/1&quot;&gt;Takeo Hoshi&lt;/a&gt;</dc:creator>
         7577 </item>
         7578 <item rdf:about="http://fr.arxiv.org/abs/2003.01367">
         7579 <title>Curriculum By Smoothing. (arXiv:2003.01367v3 [cs.LG] UPDATED)</title>
         7580 <link>http://fr.arxiv.org/abs/2003.01367</link>
         7581 <description rdf:parseType="Literal">&lt;p&gt;Convolutional Neural Networks (CNNs) have shown impressive performance in
         7582 computer vision tasks such as image classification, detection, and
         7583 segmentation. Moreover, recent work in Generative Adversarial Networks (GANs)
         7584 has highlighted the importance of learning by progressively increasing the
         7585 difficulty of a learning task [26]. When learning a network from scratch, the
         7586 information propagated within the network during the earlier stages of training
         7587 can contain distortion artifacts due to noise which can be detrimental to
         7588 training. In this paper, we propose an elegant curriculum based scheme that
         7589 smoothes the feature embedding of a CNN using anti-aliasing or low-pass
         7590 filters. We propose to augment the train-ing of CNNs by controlling the amount
         7591 of high frequency information propagated within the CNNs as training
         7592 progresses, by convolving the output of a CNN feature map of each layer with a
         7593 Gaussian kernel. By decreasing the variance of the Gaussian kernel, we
         7594 gradually increase the amount of high-frequency information available within
         7595 the network for inference. As the amount of information in the feature maps
         7596 increases during training, the network is able to progressively learn better
         7597 representations of the data. Our proposed augmented training scheme
         7598 significantly improves the performance of CNNs on various vision tasks without
         7599 either adding additional trainable parameters or an auxiliary regularization
         7600 objective. The generality of our method is demonstrated through empirical
         7601 performance gains in CNN architectures across four different tasks: transfer
         7602 learning, cross-task transfer learning, and generative models.
         7603 &lt;/p&gt;
         7604 </description>
         7605 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sinha_S/0/1/0/all/0/1&quot;&gt;Samarth Sinha&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Garg_A/0/1/0/all/0/1&quot;&gt;Animesh Garg&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Larochelle_H/0/1/0/all/0/1&quot;&gt;Hugo Larochelle&lt;/a&gt;</dc:creator>
         7606 </item>
         7607 <item rdf:about="http://fr.arxiv.org/abs/2003.02960">
         7608 <title>Forgetting Outside the Box: Scrubbing Deep Networks of Information Accessible from Input-Output Observations. (arXiv:2003.02960v3 [cs.LG] UPDATED)</title>
         7609 <link>http://fr.arxiv.org/abs/2003.02960</link>
         7610 <description rdf:parseType="Literal">&lt;p&gt;We describe a procedure for removing dependency on a cohort of training data
         7611 from a trained deep network that improves upon and generalizes previous methods
         7612 to different readout functions and can be extended to ensure forgetting in the
         7613 activations of the network. We introduce a new bound on how much information
         7614 can be extracted per query about the forgotten cohort from a black-box network
         7615 for which only the input-output behavior is observed. The proposed forgetting
         7616 procedure has a deterministic part derived from the differential equations of a
         7617 linearized version of the model, and a stochastic part that ensures information
         7618 destruction by adding noise tailored to the geometry of the loss landscape. We
         7619 exploit the connections between the activation and weight dynamics of a DNN
         7620 inspired by Neural Tangent Kernels to compute the information in the
         7621 activations.
         7622 &lt;/p&gt;
         7623 </description>
         7624 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Golatkar_A/0/1/0/all/0/1&quot;&gt;Aditya Golatkar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Achille_A/0/1/0/all/0/1&quot;&gt;Alessandro Achille&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Soatto_S/0/1/0/all/0/1&quot;&gt;Stefano Soatto&lt;/a&gt;</dc:creator>
         7625 </item>
         7626 <item rdf:about="http://fr.arxiv.org/abs/2003.03824">
         7627 <title>No Surprises: Training Robust Lung Nodule Detection for Low-Dose CT Scans by Augmenting with Adversarial Attacks. (arXiv:2003.03824v2 [eess.IV] UPDATED)</title>
         7628 <link>http://fr.arxiv.org/abs/2003.03824</link>
         7629 <description rdf:parseType="Literal">&lt;p&gt;Detecting malignant pulmonary nodules at an early stage can allow medical
         7630 interventions which may increase the survival rate of lung cancer patients.
         7631 Using computer vision techniques to detect nodules can improve the sensitivity
         7632 and the speed of interpreting chest CT for lung cancer screening. Many studies
         7633 have used CNNs to detect nodule candidates. Though such approaches have been
         7634 shown to outperform the conventional image processing based methods regarding
         7635 the detection accuracy, CNNs are also known to be limited to generalize on
         7636 under-represented samples in the training set and prone to imperceptible noise
         7637 perturbations. Such limitations can not be easily addressed by scaling up the
         7638 dataset or the models. In this work, we propose to add adversarial synthetic
         7639 nodules and adversarial attack samples to the training data to improve the
         7640 generalization and the robustness of the lung nodule detection systems. To
         7641 generate hard examples of nodules from a differentiable nodule synthesizer, we
         7642 use projected gradient descent (PGD) to search the latent code within a bounded
         7643 neighbourhood that would generate nodules to decrease the detector response. To
         7644 make the network more robust to unanticipated noise perturbations, we use PGD
         7645 to search for noise patterns that can trigger the network to give
         7646 over-confident mistakes. By evaluating on two different benchmark datasets
         7647 containing consensus annotations from three radiologists, we show that the
         7648 proposed techniques can improve the detection performance on real CT data. To
         7649 understand the limitations of both the conventional networks and the proposed
         7650 augmented networks, we also perform stress-tests on the false positive
         7651 reduction networks by feeding different types of artificially produced patches.
         7652 We show that the augmented networks are more robust to both under-represented
         7653 nodules as well as resistant to noise perturbations.
         7654 &lt;/p&gt;
         7655 </description>
         7656 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Liu_S/0/1/0/all/0/1&quot;&gt;Siqi Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Setio_A/0/1/0/all/0/1&quot;&gt;Arnaud Arindra Adiyoso Setio&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ghesu_F/0/1/0/all/0/1&quot;&gt;Florin C. Ghesu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gibson_E/0/1/0/all/0/1&quot;&gt;Eli Gibson&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Grbic_S/0/1/0/all/0/1&quot;&gt;Sasa Grbic&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Georgescu_B/0/1/0/all/0/1&quot;&gt;Bogdan Georgescu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Comaniciu_D/0/1/0/all/0/1&quot;&gt;Dorin Comaniciu&lt;/a&gt;</dc:creator>
         7657 </item>
         7658 <item rdf:about="http://fr.arxiv.org/abs/2003.03977">
         7659 <title>Wide-minima Density Hypothesis and the Explore-Exploit Learning Rate Schedule. (arXiv:2003.03977v4 [cs.LG] UPDATED)</title>
         7660 <link>http://fr.arxiv.org/abs/2003.03977</link>
         7661 <description rdf:parseType="Literal">&lt;p&gt;Several papers argue that wide minima generalize better than narrow minima.
         7662 In this paper, through detailed experiments that not only corroborate the
         7663 generalization properties of wide minima, we also provide empirical evidence
         7664 for a new hypothesis that the density of wide minima is likely lower than the
         7665 density of narrow minima. Further, motivated by this hypothesis, we design a
         7666 novel explore-exploit learning rate schedule. On a variety of image and natural
         7667 language datasets, compared to their original hand-tuned learning rate
         7668 baselines, we show that our explore-exploit schedule can result in either up to
         7669 0.84% higher absolute accuracy using the original training budget or up to 57%
         7670 reduced training time while achieving the original reported accuracy. For
         7671 example, we achieve state-of-the-art (SOTA) accuracy for IWSLT&apos;14 (DE-EN) and
         7672 WMT&apos;14 (DE-EN) datasets by just modifying the learning rate schedule of a high
         7673 performing model.
         7674 &lt;/p&gt;
         7675 </description>
         7676 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Iyer_N/0/1/0/all/0/1&quot;&gt;Nikhil Iyer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Thejas_V/0/1/0/all/0/1&quot;&gt;V Thejas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kwatra_N/0/1/0/all/0/1&quot;&gt;Nipun Kwatra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ramjee_R/0/1/0/all/0/1&quot;&gt;Ramachandran Ramjee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sivathanu_M/0/1/0/all/0/1&quot;&gt;Muthian Sivathanu&lt;/a&gt;</dc:creator>
         7677 </item>
         7678 <item rdf:about="http://fr.arxiv.org/abs/2003.06475">
         7679 <title>Compressive Isogeometric Analysis. (arXiv:2003.06475v2 [math.NA] UPDATED)</title>
         7680 <link>http://fr.arxiv.org/abs/2003.06475</link>
         7681 <description rdf:parseType="Literal">&lt;p&gt;This work is motivated by the difficulty in assembling the Galerkin matrix
         7682 when solving Partial Differential Equations (PDEs) with Isogeometric Analysis
         7683 (IGA) using B-splines of moderate-to-high polynomial degree. To mitigate this
         7684 problem, we propose a novel methodology named CossIGA (COmpreSSive IsoGeometric
         7685 Analysis), which combines the IGA principle with CORSING, a recently introduced
         7686 sparse recovery approach for PDEs based on compressive sensing. CossIGA
         7687 assembles only a small portion of a suitable IGA Petrov-Galerkin discretization
         7688 and is effective whenever the PDE solution is sufficiently sparse or
         7689 compressible, i.e., when most of its coefficients are zero or negligible. The
         7690 sparsity of the solution is promoted by employing a multilevel dictionary of
         7691 B-splines as opposed to a basis. Thanks to sparsity and the fact that only a
         7692 fraction of the full discretization matrix is assembled, the proposed technique
         7693 has the potential to lead to significant computational savings. We show the
         7694 effectiveness of CossIGA for the solution of the 2D and 3D Poisson equation
         7695 over nontrivial geometries by means of an extensive numerical investigation.
         7696 &lt;/p&gt;
         7697 </description>
         7698 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Brugiapaglia_S/0/1/0/all/0/1&quot;&gt;Simone Brugiapaglia&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Tamellini_L/0/1/0/all/0/1&quot;&gt;Lorenzo Tamellini&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Tani_M/0/1/0/all/0/1&quot;&gt;Mattia Tani&lt;/a&gt;</dc:creator>
         7699 </item>
         7700 <item rdf:about="http://fr.arxiv.org/abs/2003.08196">
         7701 <title>Thermodynamic Cost of Edge Detection in Artificial Neural Network(ANN)-Based Processors. (arXiv:2003.08196v2 [eess.IV] UPDATED)</title>
         7702 <link>http://fr.arxiv.org/abs/2003.08196</link>
         7703 <description rdf:parseType="Literal">&lt;p&gt;Architecture-based heat dissipation analyses allow us to reveal fundamental
         7704 sources of inefficiency in a given processor and thereby provide us with
         7705 road-maps to design less dissipative computing schemes independent of
         7706 technology-base used to implement them. In this work, we study
         7707 architectural-level contributions to energy dissipation in an Artificial Neural
         7708 Network (ANN)-based processor that is trained to perform edge-detection task.
         7709 We compare the training and information processing cost of ANN to that of
         7710 conventional architectures and algorithms using 64-pixel binary image. Our
         7711 results reveal the inherent efficiency advantages of an ANN network trained for
         7712 specific tasks over general-purpose processors based on von Neumann
         7713 architecture. We also compare the proposed performance improvements to that of
         7714 Cellular Array Processors (CAPs) and illustrate the reduction in dissipation
         7715 for special purpose processors. Lastly, we calculate the change in dissipation
         7716 as a result of input data structure and show the effect of randomness on
         7717 energetic cost of information processing. The results we obtained provide a
         7718 basis for comparison for task-based fundamental energy efficiency analyses for
         7719 a range of processors and therefore contribute to the study of
         7720 architecture-level descriptions of processors and thermodynamic cost
         7721 calculations based on physics of computation.
         7722 &lt;/p&gt;
         7723 </description>
         7724 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Barisik_S/0/1/0/all/0/1&quot;&gt;Se&amp;#xe7;kin Bar&amp;#x131;&amp;#x15f;&amp;#x131;k&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ercan_I/0/1/0/all/0/1&quot;&gt;&amp;#x130;lke Ercan&lt;/a&gt;</dc:creator>
         7725 </item>
         7726 <item rdf:about="http://fr.arxiv.org/abs/2003.09946">
         7727 <title>On Calibration of Mixup Training for Deep Neural Networks. (arXiv:2003.09946v3 [cs.LG] UPDATED)</title>
         7728 <link>http://fr.arxiv.org/abs/2003.09946</link>
         7729 <description rdf:parseType="Literal">&lt;p&gt;Deep Neural Networks (DNN) represent the state of the art in many tasks.
         7730 However, due to their overparameterization, their generalization capabilities
         7731 are in doubt and still a field under study. Consequently, DNN can overfit and
         7732 assign overconfident predictions -- effects that have been shown to affect the
         7733 calibration of the confidences assigned to unseen data. Data Augmentation (DA)
         7734 strategies have been proposed to regularize these models, being Mixup one of
         7735 the most popular due to its ability to improve the accuracy, the uncertainty
         7736 quantification and the calibration of DNN. In this work however we argue and
         7737 provide empirical evidence that, due to its fundamentals, Mixup does not
         7738 necessarily improve calibration. Based on our observations we propose a new
         7739 loss function that improves the calibration, and also sometimes the accuracy,
         7740 of DNN trained with this DA technique. Our loss is inspired by Bayes decision
         7741 theory and introduces a new training framework for designing losses for
         7742 probabilistic modelling. We provide state-of-the-art accuracy with consistent
         7743 improvements in calibration performance. Appendix and code are provided here:
         7744 https://github.com/jmaronas/calibration_MixupDNN_ARCLoss.pytorch.git
         7745 &lt;/p&gt;
         7746 </description>
         7747 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maronas_J/0/1/0/all/0/1&quot;&gt;Juan Maro&amp;#xf1;as&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ramos_D/0/1/0/all/0/1&quot;&gt;Daniel Ramos&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Paredes_R/0/1/0/all/0/1&quot;&gt;Roberto Paredes&lt;/a&gt;</dc:creator>
         7748 </item>
         7749 <item rdf:about="http://fr.arxiv.org/abs/2004.00499">
         7750 <title>Unique Chinese Linguistic Phenomena. (arXiv:2004.00499v3 [cs.CL] UPDATED)</title>
         7751 <link>http://fr.arxiv.org/abs/2004.00499</link>
         7752 <description rdf:parseType="Literal">&lt;p&gt;Linguistics holds unique characteristics of generality, stability, and
         7753 nationality, which will affect the formulation of extraction strategies and
         7754 should be incorporated into the relation extraction. Chinese open relation
         7755 extraction is not well-established, because of the complexity of Chinese
         7756 linguistics makes it harder to operate, and the methods for English are not
         7757 compatible with that for Chinese. The diversities between Chinese and English
         7758 linguistics are mainly reflected in morphology and syntax.
         7759 &lt;/p&gt;
         7760 </description>
         7761 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jia_S/0/1/0/all/0/1&quot;&gt;Shengbin Jia&lt;/a&gt;</dc:creator>
         7762 </item>
         7763 <item rdf:about="http://fr.arxiv.org/abs/2004.03096">
         7764 <title>Is Graph Structure Necessary for Multi-hop Question Answering?. (arXiv:2004.03096v2 [cs.CL] UPDATED)</title>
         7765 <link>http://fr.arxiv.org/abs/2004.03096</link>
         7766 <description rdf:parseType="Literal">&lt;p&gt;Recently, attempting to model texts as graph structure and introducing graph
         7767 neural networks to deal with it has become a trend in many NLP research areas.
         7768 In this paper, we investigate whether the graph structure is necessary for
         7769 multi-hop question answering. Our analysis is centered on HotpotQA. We
         7770 construct a strong baseline model to establish that, with the proper use of
         7771 pre-trained models, graph structure may not be necessary for multi-hop question
         7772 answering. We point out that both graph structure and adjacency matrix are
         7773 task-related prior knowledge, and graph-attention can be considered as a
         7774 special case of self-attention. Experiments and visualized analysis demonstrate
         7775 that graph-attention or the entire graph structure can be replaced by
         7776 self-attention or Transformers.
         7777 &lt;/p&gt;
         7778 </description>
         7779 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shao_N/0/1/0/all/0/1&quot;&gt;Nan Shao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cui_Y/0/1/0/all/0/1&quot;&gt;Yiming Cui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_T/0/1/0/all/0/1&quot;&gt;Ting Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shijin Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hu_G/0/1/0/all/0/1&quot;&gt;Guoping Hu&lt;/a&gt;</dc:creator>
         7780 </item>
         7781 <item rdf:about="http://fr.arxiv.org/abs/2004.04685">
         7782 <title>Risk-Constrained Linear-Quadratic Regulators. (arXiv:2004.04685v2 [eess.SY] UPDATED)</title>
         7783 <link>http://fr.arxiv.org/abs/2004.04685</link>
         7784 <description rdf:parseType="Literal">&lt;p&gt;We propose a new risk-constrained reformulation of the standard Linear
         7785 Quadratic Regulator (LQR) problem. Our framework is motivated by the fact that
         7786 the classical (risk-neutral) LQR controller, although optimal in expectation,
         7787 might be ineffective under relatively infrequent, yet statistically significant
         7788 (risky) events. To effectively trade between average and extreme event
         7789 performance, we introduce a new risk constraint, which explicitly restricts the
         7790 total expected predictive variance of the state penalty by a user-prescribed
         7791 level. We show that, under rather minimal conditions on the process noise
         7792 (i.e., finite fourth-order moments), the optimal risk-aware controller can be
         7793 evaluated explicitly and in closed form. In fact, it is affine relative to the
         7794 state, and is always internally stable regardless of parameter tuning. Our new
         7795 risk-aware controller: i) pushes the state away from directions where the noise
         7796 exhibits heavy tails, by exploiting the third-order moment (skewness) of the
         7797 noise; ii) inflates the state penalty in riskier directions, where both the
         7798 noise covariance and the state penalty are simultaneously large. The properties
         7799 of the proposed risk-aware LQR framework are also illustrated via indicative
         7800 numerical examples.
         7801 &lt;/p&gt;
         7802 </description>
         7803 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Tsiamis_A/0/1/0/all/0/1&quot;&gt;Anastasios Tsiamis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kalogerias_D/0/1/0/all/0/1&quot;&gt;Dionysios S. Kalogerias&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chamon_L/0/1/0/all/0/1&quot;&gt;Luiz F. O. Chamon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ribeiro_A/0/1/0/all/0/1&quot;&gt;Alejandro Ribeiro&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pappas_G/0/1/0/all/0/1&quot;&gt;George J. Pappas&lt;/a&gt;</dc:creator>
         7804 </item>
         7805 <item rdf:about="http://fr.arxiv.org/abs/2004.11362">
         7806 <title>Supervised Contrastive Learning. (arXiv:2004.11362v2 [cs.LG] UPDATED)</title>
         7807 <link>http://fr.arxiv.org/abs/2004.11362</link>
         7808 <description rdf:parseType="Literal">&lt;p&gt;Contrastive learning applied to self-supervised representation learning has
         7809 seen a resurgence in recent years, leading to state of the art performance in
         7810 the unsupervised training of deep image models. Modern batch contrastive
         7811 approaches subsume or significantly outperform traditional contrastive losses
         7812 such as triplet, max-margin and the N-pairs loss. In this work, we extend the
         7813 self-supervised batch contrastive approach to the fully-supervised setting,
         7814 allowing us to effectively leverage label information. Clusters of points
         7815 belonging to the same class are pulled together in embedding space, while
         7816 simultaneously pushing apart clusters of samples from different classes. We
         7817 analyze two possible versions of the supervised contrastive (SupCon) loss,
         7818 identifying the best-performing formulation of the loss. On ResNet-200, we
         7819 achieve top-1 accuracy of 81.4% on the ImageNet dataset, which is 0.8% above
         7820 the best number reported for this architecture. We show consistent
         7821 outperformance over cross-entropy on other datasets and two ResNet variants.
         7822 The loss shows benefits for robustness to natural corruptions and is more
         7823 stable to hyperparameter settings such as optimizers and data augmentations. In
         7824 reduced data settings, it outperforms cross-entropy significantly. Our loss
         7825 function is simple to implement, and reference TensorFlow code is released at
         7826 https://t.ly/supcon.
         7827 &lt;/p&gt;
         7828 </description>
         7829 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Khosla_P/0/1/0/all/0/1&quot;&gt;Prannay Khosla&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Teterwak_P/0/1/0/all/0/1&quot;&gt;Piotr Teterwak&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_C/0/1/0/all/0/1&quot;&gt;Chen Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sarna_A/0/1/0/all/0/1&quot;&gt;Aaron Sarna&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tian_Y/0/1/0/all/0/1&quot;&gt;Yonglong Tian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Isola_P/0/1/0/all/0/1&quot;&gt;Phillip Isola&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Maschinot_A/0/1/0/all/0/1&quot;&gt;Aaron Maschinot&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_C/0/1/0/all/0/1&quot;&gt;Ce Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Krishnan_D/0/1/0/all/0/1&quot;&gt;Dilip Krishnan&lt;/a&gt;</dc:creator>
         7830 </item>
         7831 <item rdf:about="http://fr.arxiv.org/abs/2004.12130">
         7832 <title>An Epidemiological Modelling Approach for Covid19 via Data Assimilation. (arXiv:2004.12130v3 [stat.AP] UPDATED)</title>
         7833 <link>http://fr.arxiv.org/abs/2004.12130</link>
         7834 <description rdf:parseType="Literal">&lt;p&gt;The global pandemic of the 2019-nCov requires the evaluation of policy
         7835 interventions to mitigate future social and economic costs of quarantine
         7836 measures worldwide. We propose an epidemiological model for forecasting and
         7837 policy evaluation which incorporates new data in real-time through variational
         7838 data assimilation. We analyze and discuss infection rates in China, the US and
         7839 Italy. In particular, we develop a custom compartmental SIR model fit to
         7840 variables related to the epidemic in Chinese cities, named SITR model. We
         7841 compare and discuss model results which conducts updates as new observations
         7842 become available. A hybrid data assimilation approach is applied to make
         7843 results robust to initial conditions. We use the model to do inference on
         7844 infection numbers as well as parameters such as the disease transmissibility
         7845 rate or the rate of recovery. The parameterisation of the model is parsimonious
         7846 and extendable, allowing for the incorporation of additional data and
         7847 parameters of interest. This allows for scalability and the extension of the
         7848 model to other locations or the adaption of novel data sources.
         7849 &lt;/p&gt;
         7850 </description>
         7851 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nadler_P/0/1/0/all/0/1&quot;&gt;Philip Nadler&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shuo Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Arcucci_R/0/1/0/all/0/1&quot;&gt;Rossella Arcucci&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Yang_X/0/1/0/all/0/1&quot;&gt;Xian Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Guo_Y/0/1/0/all/0/1&quot;&gt;Yike Guo&lt;/a&gt;</dc:creator>
         7852 </item>
         7853 <item rdf:about="http://fr.arxiv.org/abs/2004.13363">
         7854 <title>Holistic Privacy for Electricity, Water, and Natural Gas Metering in Next Generation Smart Homes. (arXiv:2004.13363v3 [eess.SY] UPDATED)</title>
         7855 <link>http://fr.arxiv.org/abs/2004.13363</link>
         7856 <description rdf:parseType="Literal">&lt;p&gt;In smart electricity grids, high time granularity (HTG) power consumption
         7857 data can be decomposed into individual appliance load signatures via
         7858 Nonintrusive Appliance Load Monitoring techniques to expose appliance usage
         7859 profiles. Various methods ranging from load shaping to noise addition and data
         7860 aggregation have been proposed to mitigate this problem. However, with the
         7861 growing scarcity of natural resources, utilities other than electricity (such
         7862 as water and natural gas) have also begun to be subject to HTG metering, which
         7863 creates privacy issues similar to that of electricity. Therefore, employing
         7864 privacy protection countermeasures for only electricity usage is ineffective
         7865 for appliances that utilize additional/other metered resources. As such,
         7866 existing privacy countermeasures and metrics need to be reevaluated to address
         7867 not only electricity, but also any other resource that is metered. Furthermore,
         7868 a holistic privacy protection approach for all metered resources must be
         7869 adopted as the information leak from any of the resources has a potential to
         7870 render the privacy preserving countermeasures for all the other resources
         7871 futile. This paper introduces the privacy preservation problem for multiple HTG
         7872 metered resources and explores potential solutions for its mitigation.
         7873 &lt;/p&gt;
         7874 </description>
         7875 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kement_C/0/1/0/all/0/1&quot;&gt;Cihan Emre Kement&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Tavli_B/0/1/0/all/0/1&quot;&gt;Bulent Tavli&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gultekin_H/0/1/0/all/0/1&quot;&gt;Hakan Gultekin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Yanikomeroglu_H/0/1/0/all/0/1&quot;&gt;Halim Yanikomeroglu&lt;/a&gt;</dc:creator>
         7876 </item>
         7877 <item rdf:about="http://fr.arxiv.org/abs/2004.14632">
         7878 <title>Geometric group testing. (arXiv:2004.14632v3 [cs.CG] UPDATED)</title>
         7879 <link>http://fr.arxiv.org/abs/2004.14632</link>
         7880 <description rdf:parseType="Literal">&lt;p&gt;Group testing is concerned with identifying $t$ defective items in a set of
         7881 $m$ items, where each test reports whether a specific subset of items contains
         7882 at least one defective. In non-adaptive group testing, the subsets to be tested
         7883 are fixed in advance. By testing multiple items at once, the required number of
         7884 tests can be made much smaller than $m$. In fact, for $t \in \mathcal{O}(1)$,
         7885 the optimal number of (non-adaptive) tests is known to be $\Theta(\log{m})$.
         7886 &lt;/p&gt;
         7887 &lt;p&gt;In this paper, we consider the problem of non-adaptive group testing in a
         7888 geometric setting, where the items are points in $d$-dimensional Euclidean
         7889 space and the tests are axis-parallel boxes (hyperrectangles). We present upper
         7890 and lower bounds on the required number of tests under this geometric
         7891 constraint. In contrast to the general, combinatorial case, the bounds in our
         7892 geometric setting are polynomial in $m$. For instance, our results imply that
         7893 identifying a defective pair in a set of $m$ points in the plane always
         7894 requires $\Omega(m^{3/5})$ tests, and there exist configurations of $m$ points
         7895 for which $\mathcal{O}(m^{2/3})$ tests are sufficient, whereas to identify a
         7896 single defective point in the plane, $\Theta(m^{1/2})$ tests are always
         7897 necessary and sometimes sufficient.
         7898 &lt;/p&gt;
         7899 </description>
         7900 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Berendsohn_B/0/1/0/all/0/1&quot;&gt;Benjamin Aram Berendsohn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kozma_L/0/1/0/all/0/1&quot;&gt;L&amp;#xe1;szl&amp;#xf3; Kozma&lt;/a&gt;</dc:creator>
         7901 </item>
         7902 <item rdf:about="http://fr.arxiv.org/abs/2005.00858">
         7903 <title>Minimum Cuts in Geometric Intersection Graphs. (arXiv:2005.00858v2 [cs.CG] UPDATED)</title>
         7904 <link>http://fr.arxiv.org/abs/2005.00858</link>
         7905 <description rdf:parseType="Literal">&lt;p&gt;Let $\mathcal{D}$ be a set of $n$ disks in the plane. The disk graph
         7906 $G_\mathcal{D}$ for $\mathcal{D}$ is the undirected graph with vertex set
         7907 $\mathcal{D}$ in which two disks are joined by an edge if and only if they
         7908 intersect. The directed transmission graph $G^{\rightarrow}_\mathcal{D}$ for
         7909 $\mathcal{D}$ is the directed graph with vertex set $\mathcal{D}$ in which
         7910 there is an edge from a disk $D_1 \in \mathcal{D}$ to a disk $D_2 \in
         7911 \mathcal{D}$ if and only if $D_1$ contains the center of $D_2$.
         7912 &lt;/p&gt;
         7913 &lt;p&gt;Given $\mathcal{D}$ and two non-intersecting disks $s, t \in \mathcal{D}$, we
         7914 show that a minimum $s$-$t$ vertex cut in $G_\mathcal{D}$ or in
         7915 $G^{\rightarrow}_\mathcal{D}$ can be found in $O(n^{3/2}\text{polylog} n)$
         7916 expected time. To obtain our result, we combine an algorithm for the maximum
         7917 flow problem in general graphs with dynamic geometric data structures to
         7918 manipulate the disks.
         7919 &lt;/p&gt;
         7920 &lt;p&gt;As an application, we consider the barrier resilience problem in a
         7921 rectangular domain. In this problem, we have a vertical strip $S$ bounded by
         7922 two vertical lines, $L_\ell$ and $L_r$, and a collection $\mathcal{D}$ of
         7923 disks. Let $a$ be a point in $S$ above all disks of $\mathcal{D}$, and let $b$
         7924 a point in $S$ below all disks of $\mathcal{D}$. The task is to find a curve
         7925 from $a$ to $b$ that lies in $S$ and that intersects as few disks of
         7926 $\mathcal{D}$ as possible. Using our improved algorithm for minimum cuts in
         7927 disk graphs, we can solve the barrier resilience problem in
         7928 $O(n^{3/2}\text{polylog} n)$ expected time.
         7929 &lt;/p&gt;
         7930 </description>
         7931 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cabello_S/0/1/0/all/0/1&quot;&gt;Sergio Cabello&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mulzer_W/0/1/0/all/0/1&quot;&gt;Wolfgang Mulzer&lt;/a&gt;</dc:creator>
         7932 </item>
         7933 <item rdf:about="http://fr.arxiv.org/abs/2005.01192">
         7934 <title>Model Creation and Equivalence Proofs of Cellular Automata and Artificial Neural Networks. (arXiv:2005.01192v3 [cs.NE] UPDATED)</title>
         7935 <link>http://fr.arxiv.org/abs/2005.01192</link>
         7936 <description rdf:parseType="Literal">&lt;p&gt;Computational methods and mathematical models have invaded arguably every
         7937 scientific discipline forming its own field of research called computational
         7938 science. Mathematical models are the theoretical foundation of computational
         7939 science. Since Newton&apos;s time, differential equations in mathematical models
         7940 have been widely and successfully used to describe the macroscopic or global
         7941 behaviour of systems. With spatially inhomogeneous, time-varying, local
         7942 element-specific, and often non-linear interactions, the dynamics of complex
         7943 systems is in contrast more efficiently described by local rules and thus in an
         7944 algorithmic and local or microscopic manner. The theory of mathematical
         7945 modelling taking into account these characteristics of complex systems has to
         7946 be established still. We recently presented a so-called allagmatic method
         7947 including a system metamodel to provide a framework for describing, modelling,
         7948 simulating, and interpreting complex systems. Implementations of cellular
         7949 automata and artificial neural networks were described and created with that
         7950 method. Guidance from philosophy were helpful in these first studies focusing
         7951 on programming and feasibility. A rigorous mathematical formalism, however, is
         7952 still missing. This would not only more precisely describe and define the
         7953 system metamodel, it would also further generalise it and with that extend its
         7954 reach to formal treatment in applied mathematics and theoretical aspects of
         7955 computational science as well as extend its applicability to other mathematical
         7956 and computational models such as agent-based models. Here, a mathematical
         7957 definition of the system metamodel is provided. Based on the presented
         7958 formalism, model creation and equivalence of cellular automata and artificial
         7959 neural networks are proved. It thus provides a formal approach for studying the
         7960 creation of mathematical models as well as their structural and operational
         7961 comparison.
         7962 &lt;/p&gt;
         7963 </description>
         7964 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Christen_P/0/1/0/all/0/1&quot;&gt;Patrik Christen&lt;/a&gt;</dc:creator>
         7965 </item>
         7966 <item rdf:about="http://fr.arxiv.org/abs/2005.02683">
         7967 <title>Analysis of the Symmetric Join the Shortest Orbit Queue. (arXiv:2005.02683v2 [math.PR] UPDATED)</title>
         7968 <link>http://fr.arxiv.org/abs/2005.02683</link>
         7969 <description rdf:parseType="Literal">&lt;p&gt;This work introduces the join the shortest queue policy in the retrial
         7970 setting. We consider a Markovian single server retrial system with two infinite
         7971 capacity orbits. An arriving job finding the server busy, it is forwarded to
         7972 the least loaded orbit. Otherwise, it is forwarded to an orbit randomly.
         7973 Orbiting jobs of either type retry to access the server independently. We
         7974 investigate the stability condition, the stationary tail decay rate, and obtain
         7975 the equilibrium distribution by using the compensation method.
         7976 &lt;/p&gt;
         7977 </description>
         7978 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Dimitriou_I/0/1/0/all/0/1&quot;&gt;Ioannis Dimitriou&lt;/a&gt;</dc:creator>
         7979 </item>
         7980 <item rdf:about="http://fr.arxiv.org/abs/2005.03482">
         7981 <title>Anonymized GCN: A Novel Robust Graph Embedding Method via Hiding Node Position in Noise. (arXiv:2005.03482v2 [cs.LG] UPDATED)</title>
         7982 <link>http://fr.arxiv.org/abs/2005.03482</link>
         7983 <description rdf:parseType="Literal">&lt;p&gt;Graph convolution network (GCN) have achieved state-of-the-art performance in
         7984 the task of node prediction in the graph structure. However, with the gradual
         7985 various of graph attack methods, there are lack of research on the robustness
         7986 of GCN. In this paper, we prove the reason why GCN is vulnerable to attack:
         7987 only training another GCN model can find the vulnerability of the target GCN
         7988 model. To solve that, we propose a GCN model which is robust to attacks. By
         7989 hiding the node&apos;s position in the Gaussian noise, the attacker will not be able
         7990 to modify the connection information of the graph node, thus immune to the
         7991 attack. Considering attackers usually modify the connection to interfere the
         7992 prediction results of the target node, so, by hiding the connection of the
         7993 graph in the noise through adversarial training, accurate node prediction can
         7994 be completed only by the node number rather than its specific position in the
         7995 graph, thus let the nodes in the graph are no longer related to the graph
         7996 itself, that is to say, make the node anonymous. Specifically, we first
         7997 demonstrated the key to determine the embedding of a specific node: the row
         7998 corresponding to the node of the eigenmatrix of the Laplace matrix, by target
         7999 it as the output of the generator, we take the corresponding noise as input.
         8000 The generator will try to find the correct position of the node in the graph.
         8001 Then the encoder and decoder are spliced both in discriminator, so that after
         8002 adversarial training, the generator and discriminator can cooperate to complete
         8003 the node prediction. Finally, All node positions can generated by noise at the
         8004 same time, that is to say, the generator will hides all the connection
         8005 information of the graph structure. The evaluation shows that we only need to
         8006 obtain the initial features and node numbers of the nodes to complete the node
         8007 prediction, and the accuracy did not decrease, but increased by 0.0293.
         8008 &lt;/p&gt;
         8009 </description>
         8010 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_A/0/1/0/all/0/1&quot;&gt;Ao Liu&lt;/a&gt;</dc:creator>
         8011 </item>
         8012 <item rdf:about="http://fr.arxiv.org/abs/2005.09635">
         8013 <title>InterFaceGAN: Interpreting the Disentangled Face Representation Learned by GANs. (arXiv:2005.09635v2 [cs.CV] UPDATED)</title>
         8014 <link>http://fr.arxiv.org/abs/2005.09635</link>
         8015 <description rdf:parseType="Literal">&lt;p&gt;Although Generative Adversarial Networks (GANs) have made significant
         8016 progress in face synthesis, there lacks enough understanding of what GANs have
         8017 learned in the latent representation to map a random code to a photo-realistic
         8018 image. In this work, we propose a framework called InterFaceGAN to interpret
         8019 the disentangled face representation learned by the state-of-the-art GAN models
         8020 and study the properties of the facial semantics encoded in the latent space.
         8021 We first find that GANs learn various semantics in some linear subspaces of the
         8022 latent space. After identifying these subspaces, we can realistically
         8023 manipulate the corresponding facial attributes without retraining the model. We
         8024 then conduct a detailed study on the correlation between different semantics
         8025 and manage to better disentangle them via subspace projection, resulting in
         8026 more precise control of the attribute manipulation. Besides manipulating the
         8027 gender, age, expression, and presence of eyeglasses, we can even alter the face
         8028 pose and fix the artifacts accidentally made by GANs. Furthermore, we perform
         8029 an in-depth face identity analysis and a layer-wise analysis to evaluate the
         8030 editing results quantitatively. Finally, we apply our approach to real face
         8031 editing by employing GAN inversion approaches and explicitly training
         8032 feed-forward models based on the synthetic data established by InterFaceGAN.
         8033 Extensive experimental results suggest that learning to synthesize faces
         8034 spontaneously brings a disentangled and controllable face representation.
         8035 &lt;/p&gt;
         8036 </description>
         8037 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1&quot;&gt;Yujun Shen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_C/0/1/0/all/0/1&quot;&gt;Ceyuan Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tang_X/0/1/0/all/0/1&quot;&gt;Xiaoou Tang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhou_B/0/1/0/all/0/1&quot;&gt;Bolei Zhou&lt;/a&gt;</dc:creator>
         8038 </item>
         8039 <item rdf:about="http://fr.arxiv.org/abs/2005.10963">
         8040 <title>Stochastic control liasons: Richard Sinkhorn meets Gaspard Monge on a Schroedinger bridge. (arXiv:2005.10963v2 [math.OC] UPDATED)</title>
         8041 <link>http://fr.arxiv.org/abs/2005.10963</link>
         8042 <description rdf:parseType="Literal">&lt;p&gt;In 1931/32, Schroedinger studied a hot gas Gedankenexperiment, an instance of
         8043 large deviations of the empirical distribution and an early example of the
         8044 so-called maximum entropy inference method. This so-called Schroedinger bridge
         8045 problem (SBP) was recently recognized as a regularization of the
         8046 Monge-Kantorovich Optimal Mass Transport (OMT), leading to effective
         8047 computation of the latter. Specifically, OMT with quadratic cost may be viewed
         8048 as a zero-temperature limit of SBP, which amounts to minimization of the
         8049 Helmholtz&apos;s free energy over probability distributions constrained to possess
         8050 given marginals. The problem features a delicate compromise, mediated by a
         8051 temperature parameter, between minimizing the internal energy and maximizing
         8052 the entropy. These concepts are central to a rapidly expanding area of modern
         8053 science dealing with the so-called {\em Sinkhorn algorithm} which appears as a
         8054 special case of an algorithm first studied by the French analyst Robert Fortet
         8055 in 1938/40 specifically for Schroedinger bridges. Due to the constraint on
         8056 end-point distributions, dynamic programming is not a suitable tool to attack
         8057 these problems. Instead, Fortet&apos;s iterative algorithm and its discrete
         8058 counterpart, the Sinkhorn iteration, permit computation by iteratively solving
         8059 the so-called {\em Schroedinger system}. In both the continuous as well as the
         8060 discrete-time and space settings, {\em stochastic control} provides a
         8061 reformulation and dynamic versions of these problems. The formalism behind
         8062 these control problems have attracted attention as they lead to a variety of
         8063 new applications in spacecraft guidance, control of robot or biological swarms,
         8064 sensing, active cooling, network routing as well as in computer and data
         8065 science. This multifacet and versatile framework, intertwining SBP and OMT,
         8066 provides the substrate for a historical and technical overview of the field
         8067 taken up in this paper.
         8068 &lt;/p&gt;
         8069 </description>
         8070 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yongxin Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Georgiou_T/0/1/0/all/0/1&quot;&gt;Tryphon T. Georgiou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Pavon_M/0/1/0/all/0/1&quot;&gt;Michele Pavon&lt;/a&gt;</dc:creator>
         8071 </item>
         8072 <item rdf:about="http://fr.arxiv.org/abs/2005.12451">
         8073 <title>Multivariate Quasi-tight Framelets with High Balancing Orders Derived from Any Compactly Supported Refinable Vector Functions. (arXiv:2005.12451v2 [math.FA] UPDATED)</title>
         8074 <link>http://fr.arxiv.org/abs/2005.12451</link>
         8075 <description rdf:parseType="Literal">&lt;p&gt;Generalizing wavelets by adding desired redundancy and flexibility,framelets
         8076 are of interest and importance in many applications such as image processing
         8077 and numerical algorithms. Several key properties of framelets are high
         8078 vanishing moments for sparse multiscale representation, fast framelet
         8079 transforms for numerical efficiency, and redundancy for robustness. However, it
         8080 is a challenging problem to study and construct multivariate nonseparable
         8081 framelets, mainly due to their intrinsic connections to factorization and
         8082 syzygy modules of multivariate polynomial matrices. In this paper, we
         8083 circumvent the above difficulties through the approach of quasi-tight
         8084 framelets, which behave almost identically to tight framelets. Employing the
         8085 popular oblique extension principle (OEP), from an arbitrary compactly
         8086 supported $\dm$-refinable vector function $\phi$ with multiplicity greater than
         8087 one, we prove that we can always derive from $\phi$ a compactly supported
         8088 multivariate quasi-tight framelet such that (i) all the framelet generators
         8089 have the highest possible order of vanishing moments;(ii) its associated fast
         8090 framelet transform is compact with the highest balancing order.For a refinable
         8091 scalar function $\phi$, the above item (ii) often cannot be achieved
         8092 intrinsically but we show that we can always construct a compactly supported
         8093 OEP-based multivariate quasi-tight framelet derived from $\phi$ satisfying item
         8094 (i).This paper provides a comprehensive investigation on OEP-based multivariate
         8095 quasi-tight multiframelets and their associated framelet transforms with high
         8096 balancing orders. This deepens our theoretical understanding of multivariate
         8097 quasi-tight multiframelets and their associated fast multiframelet transforms.
         8098 &lt;/p&gt;
         8099 </description>
         8100 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Han_B/0/1/0/all/0/1&quot;&gt;Bin Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Lu_R/0/1/0/all/0/1&quot;&gt;Ran Lu&lt;/a&gt;</dc:creator>
         8101 </item>
         8102 <item rdf:about="http://fr.arxiv.org/abs/2005.12889">
         8103 <title>Refining Implicit Argument Annotation for UCCA. (arXiv:2005.12889v2 [cs.CL] UPDATED)</title>
         8104 <link>http://fr.arxiv.org/abs/2005.12889</link>
         8105 <description rdf:parseType="Literal">&lt;p&gt;Predicate-argument structure analysis is a central component in meaning
         8106 representations of text. The fact that some arguments are not explicitly
         8107 mentioned in a sentence gives rise to ambiguity in language understanding, and
         8108 renders it difficult for machines to interpret text correctly. However, only
         8109 few resources represent implicit roles for NLU, and existing studies in NLP
         8110 only make coarse distinctions between categories of arguments omitted from
         8111 linguistic form. This paper proposes a typology for fine-grained implicit
         8112 argument annotation on top of Universal Conceptual Cognitive Annotation&apos;s
         8113 foundational layer. The proposed implicit argument categorisation is driven by
         8114 theories of implicit role interpretation and consists of six types: Deictic,
         8115 Generic, Genre-based, Type-identifiable, Non-specific, and Iterated-set. We
         8116 exemplify our design by revisiting part of the UCCA EWT corpus, providing a new
         8117 dataset annotated with the refinement layer, and making a comparative analysis
         8118 with other schemes.
         8119 &lt;/p&gt;
         8120 </description>
         8121 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cui_R/0/1/0/all/0/1&quot;&gt;Ruixiang Cui&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hershcovich_D/0/1/0/all/0/1&quot;&gt;Daniel Hershcovich&lt;/a&gt;</dc:creator>
         8122 </item>
         8123 <item rdf:about="http://fr.arxiv.org/abs/2005.13969">
         8124 <title>An Empirical Study of Bots in Software Development -- Characteristics and Challenges from a Practitioner&apos;s Perspective. (arXiv:2005.13969v2 [cs.SE] UPDATED)</title>
         8125 <link>http://fr.arxiv.org/abs/2005.13969</link>
         8126 <description rdf:parseType="Literal">&lt;p&gt;Software engineering bots - automated tools that handle tedious tasks - are
         8127 increasingly used by industrial and open source projects to improve developer
         8128 productivity. Current research in this area is held back by a lack of consensus
         8129 of what software engineering bots (DevBots) actually are, what characteristics
         8130 distinguish them from other tools, and what benefits and challenges are
         8131 associated with DevBot usage. In this paper we report on a mixed-method
         8132 empirical study of DevBot usage in industrial practice. We report on findings
         8133 from interviewing 21 and surveying a total of 111 developers. We identify three
         8134 different personas among DevBot users (focusing on autonomy, chat interfaces,
         8135 and &quot;smartness&quot;), each with different definitions of what a DevBot is, why
         8136 developers use them, and what they struggle with. We conclude that future
         8137 DevBot research should situate their work within our framework, to clearly
         8138 identify what type of bot the work targets, and what advantages practitioners
         8139 can expect. Further, we find that there currently is a lack of general purpose
         8140 &quot;smart&quot; bots that go beyond simple automation tools or chat interfaces. This is
         8141 problematic, as we have seen that such bots, if available, can have a
         8142 transformative effect on the projects that use them.
         8143 &lt;/p&gt;
         8144 </description>
         8145 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Erlenhov_L/0/1/0/all/0/1&quot;&gt;Linda Erlenhov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Neto_F/0/1/0/all/0/1&quot;&gt;Francisco Gomes de Oliveira Neto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leitner_P/0/1/0/all/0/1&quot;&gt;Philipp Leitner&lt;/a&gt;</dc:creator>
         8146 </item>
         8147 <item rdf:about="http://fr.arxiv.org/abs/2005.14435">
         8148 <title>Sub-Band Knowledge Distillation Framework for Speech Enhancement. (arXiv:2005.14435v2 [eess.AS] UPDATED)</title>
         8149 <link>http://fr.arxiv.org/abs/2005.14435</link>
         8150 <description rdf:parseType="Literal">&lt;p&gt;In single-channel speech enhancement, methods based on full-band spectral
         8151 features have been widely studied. However, only a few methods pay attention to
         8152 non-full-band spectral features. In this paper, we explore a knowledge
         8153 distillation framework based on sub-band spectral mapping for single-channel
         8154 speech enhancement. Specifically, we divide the full frequency band into
         8155 multiple sub-bands and pre-train an elite-level sub-band enhancement model
         8156 (teacher model) for each sub-band. These teacher models are dedicated to
         8157 processing their own sub-bands. Next, under the teacher models&apos; guidance, we
         8158 train a general sub-band enhancement model (student model) that works for all
         8159 sub-bands. Without increasing the number of model parameters and computational
         8160 complexity, the student model&apos;s performance is further improved. To evaluate
         8161 our proposed method, we conducted a large number of experiments on an
         8162 open-source data set. The final experimental results show that the guidance
         8163 from the elite-level teacher models dramatically improves the student model&apos;s
         8164 performance, which exceeds the full-band model by employing fewer parameters.
         8165 &lt;/p&gt;
         8166 </description>
         8167 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1&quot;&gt;Xiang Hao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wen_S/0/1/0/all/0/1&quot;&gt;Shixue Wen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1&quot;&gt;Xiangdong Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Liu_Y/0/1/0/all/0/1&quot;&gt;Yun Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gao_G/0/1/0/all/0/1&quot;&gt;Guanglai Gao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_X/0/1/0/all/0/1&quot;&gt;Xiaofei Li&lt;/a&gt;</dc:creator>
         8168 </item>
         8169 <item rdf:about="http://fr.arxiv.org/abs/2005.14441">
         8170 <title>SNR-Based Teachers-Student Technique for Speech Enhancement. (arXiv:2005.14441v2 [eess.AS] UPDATED)</title>
         8171 <link>http://fr.arxiv.org/abs/2005.14441</link>
         8172 <description rdf:parseType="Literal">&lt;p&gt;It is very challenging for speech enhancement methods to achieves robust
         8173 performance under both high signal-to-noise ratio (SNR) and low SNR
         8174 simultaneously. In this paper, we propose a method that integrates an SNR-based
         8175 teachers-student technique and time-domain U-Net to deal with this problem.
         8176 Specifically, this method consists of multiple teacher models and a student
         8177 model. We first train the teacher models under multiple small-range SNRs that
         8178 do not coincide with each other so that they can perform speech enhancement
         8179 well within the specific SNR range. Then, we choose different teacher models to
         8180 supervise the training of the student model according to the SNR of the
         8181 training data. Eventually, the student model can perform speech enhancement
         8182 under both high SNR and low SNR. To evaluate the proposed method, we
         8183 constructed a dataset with an SNR ranging from -20dB to 20dB based on the
         8184 public dataset. We experimentally analyzed the effectiveness of the SNR-based
         8185 teachers-student technique and compared the proposed method with several
         8186 state-of-the-art methods.
         8187 &lt;/p&gt;
         8188 </description>
         8189 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hao_X/0/1/0/all/0/1&quot;&gt;Xiang Hao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Su_X/0/1/0/all/0/1&quot;&gt;Xiangdong Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zhiyu Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_Q/0/1/0/all/0/1&quot;&gt;Qiang Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Xu_H/0/1/0/all/0/1&quot;&gt;Huali Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gao_G/0/1/0/all/0/1&quot;&gt;Guanglai Gao&lt;/a&gt;</dc:creator>
         8190 </item>
         8191 <item rdf:about="http://fr.arxiv.org/abs/2006.02080">
         8192 <title>A mathematical model for automatic differentiation in machine learning. (arXiv:2006.02080v2 [cs.LG] UPDATED)</title>
         8193 <link>http://fr.arxiv.org/abs/2006.02080</link>
         8194 <description rdf:parseType="Literal">&lt;p&gt;Automatic differentiation, as implemented today, does not have a simple
         8195 mathematical model adapted to the needs of modern machine learning. In this
         8196 work we articulate the relationships between differentiation of programs as
         8197 implemented in practice and differentiation of nonsmooth functions. To this end
         8198 we provide a simple class of functions, a nonsmooth calculus, and show how they
         8199 apply to stochastic approximation methods. We also evidence the issue of
         8200 artificial critical points created by algorithmic differentiation and show how
         8201 usual methods avoid these points with probability one.
         8202 &lt;/p&gt;
         8203 </description>
         8204 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bolte_J/0/1/0/all/0/1&quot;&gt;Jerome Bolte&lt;/a&gt; (TSE), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pauwels_E/0/1/0/all/0/1&quot;&gt;Edouard Pauwels&lt;/a&gt; (IRIT-ADRIA)</dc:creator>
         8205 </item>
         8206 <item rdf:about="http://fr.arxiv.org/abs/2006.03267">
         8207 <title>Convolutional Neural Networks for Global Human Settlements Mapping from Sentinel-2 Satellite Imagery. (arXiv:2006.03267v2 [eess.IV] UPDATED)</title>
         8208 <link>http://fr.arxiv.org/abs/2006.03267</link>
         8209 <description rdf:parseType="Literal">&lt;p&gt;Spatially consistent and up-to-date maps of human settlements are crucial for
         8210 addressing policies related to urbanization and sustainability, especially in
         8211 the era of an increasingly urbanized world.The availability of open and free
         8212 Sentinel-2 data of the Copernicus Earth Observation program offers a new
         8213 opportunity for wall-to-wall mapping of human settlements at a global
         8214 scale.This paper presents a deep-learning-based framework for a fully automated
         8215 extraction of built-up areas at a spatial resolution of 10 m from a global
         8216 composite of Sentinel-2 imagery.A multi-neuro modeling methodology building on
         8217 a simple Convolution Neural Networks architecture for pixel-wise image
         8218 classification of built-up areas is developed.The core features of the proposed
         8219 model are the image patch of size 5 x 5 pixels adequate for describing built-up
         8220 areas from Sentinel-2 imagery and the lightweight topology with a total number
         8221 of 1,448,578 trainable parameters and 4 2D convolutional layers and 2 flattened
         8222 layers.The deployment of the model on the global Sentinel-2 image composite
         8223 provides the most detailed and complete map reporting about built-up areas for
         8224 reference year 2018. The validation of the results with an independent
         8225 reference data-set of building footprints covering 277 sites across the world
         8226 establishes the reliability of the built-up layer produced by the proposed
         8227 framework and the model robustness.
         8228 &lt;/p&gt;
         8229 </description>
         8230 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Corbane_C/0/1/0/all/0/1&quot;&gt;Christina Corbane&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Syrris_V/0/1/0/all/0/1&quot;&gt;Vasileios Syrris&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sabo_F/0/1/0/all/0/1&quot;&gt;Filip Sabo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Politis_P/0/1/0/all/0/1&quot;&gt;Panagiotis Politis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Melchiorri_M/0/1/0/all/0/1&quot;&gt;Michele Melchiorri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Pesaresi_M/0/1/0/all/0/1&quot;&gt;Martino Pesaresi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Soille_P/0/1/0/all/0/1&quot;&gt;Pierre Soille&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kemper_T/0/1/0/all/0/1&quot;&gt;Thomas Kemper&lt;/a&gt;</dc:creator>
         8231 </item>
         8232 <item rdf:about="http://fr.arxiv.org/abs/2006.03829">
         8233 <title>3D Self-Supervised Methods for Medical Imaging. (arXiv:2006.03829v2 [cs.CV] UPDATED)</title>
         8234 <link>http://fr.arxiv.org/abs/2006.03829</link>
         8235 <description rdf:parseType="Literal">&lt;p&gt;Self-supervised learning methods have witnessed a recent surge of interest
         8236 after proving successful in multiple application fields. In this work, we
         8237 leverage these techniques, and we propose 3D versions for five different
         8238 self-supervised methods, in the form of proxy tasks. Our methods facilitate
         8239 neural network feature learning from unlabeled 3D images, aiming to reduce the
         8240 required cost for expert annotation. The developed algorithms are 3D
         8241 Contrastive Predictive Coding, 3D Rotation prediction, 3D Jigsaw puzzles,
         8242 Relative 3D patch location, and 3D Exemplar networks. Our experiments show that
         8243 pretraining models with our 3D tasks yields more powerful semantic
         8244 representations, and enables solving downstream tasks more accurately and
         8245 efficiently, compared to training the models from scratch and to pretraining
         8246 them on 2D slices. We demonstrate the effectiveness of our methods on three
         8247 downstream tasks from the medical imaging domain: i) Brain Tumor Segmentation
         8248 from 3D MRI, ii) Pancreas Tumor Segmentation from 3D CT, and iii) Diabetic
         8249 Retinopathy Detection from 2D Fundus images. In each task, we assess the gains
         8250 in data-efficiency, performance, and speed of convergence. Interestingly, we
         8251 also find gains when transferring the learned representations, by our methods,
         8252 from a large unlabeled 3D corpus to a small downstream-specific dataset. We
         8253 achieve results competitive to state-of-the-art solutions at a fraction of the
         8254 computational expense. We publish our implementations for the developed
         8255 algorithms (both 3D and 2D versions) as an open-source library, in an effort to
         8256 allow other researchers to apply and extend our methods on their datasets.
         8257 &lt;/p&gt;
         8258 </description>
         8259 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Taleb_A/0/1/0/all/0/1&quot;&gt;Aiham Taleb&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Loetzsch_W/0/1/0/all/0/1&quot;&gt;Winfried Loetzsch&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Danz_N/0/1/0/all/0/1&quot;&gt;Noel Danz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Severin_J/0/1/0/all/0/1&quot;&gt;Julius Severin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gaertner_T/0/1/0/all/0/1&quot;&gt;Thomas Gaertner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bergner_B/0/1/0/all/0/1&quot;&gt;Benjamin Bergner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lippert_C/0/1/0/all/0/1&quot;&gt;Christoph Lippert&lt;/a&gt;</dc:creator>
         8260 </item>
         8261 <item rdf:about="http://fr.arxiv.org/abs/2006.03992">
         8262 <title>Truthful Data Acquisition via Peer Prediction. (arXiv:2006.03992v2 [cs.GT] UPDATED)</title>
         8263 <link>http://fr.arxiv.org/abs/2006.03992</link>
         8264 <description rdf:parseType="Literal">&lt;p&gt;We consider the problem of purchasing data for machine learning or
         8265 statistical estimation. The data analyst has a budget to purchase datasets from
         8266 multiple data providers. She does not have any test data that can be used to
         8267 evaluate the collected data and can assign payments to data providers solely
         8268 based on the collected datasets. We consider the problem in the standard
         8269 Bayesian paradigm and in two settings: (1) data are only collected once; (2)
         8270 data are collected repeatedly and each day&apos;s data are drawn independently from
         8271 the same distribution. For both settings, our mechanisms guarantee that
         8272 truthfully reporting one&apos;s dataset is always an equilibrium by adopting
         8273 techniques from peer prediction: pay each provider the mutual information
         8274 between his reported data and other providers&apos; reported data. Depending on the
         8275 data distribution, the mechanisms can also discourage misreports that would
         8276 lead to inaccurate predictions. Our mechanisms also guarantee individual
         8277 rationality and budget feasibility for certain underlying distributions in the
         8278 first setting and for all distributions in the second setting.
         8279 &lt;/p&gt;
         8280 </description>
         8281 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_Y/0/1/0/all/0/1&quot;&gt;Yiling Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1&quot;&gt;Yiheng Shen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zheng_S/0/1/0/all/0/1&quot;&gt;Shuran Zheng&lt;/a&gt;</dc:creator>
         8282 </item>
         8283 <item rdf:about="http://fr.arxiv.org/abs/2006.06459">
         8284 <title>Self-consumption for energy communities in Spain: a regional analysis under the new legal framework. (arXiv:2006.06459v3 [eess.SY] UPDATED)</title>
         8285 <link>http://fr.arxiv.org/abs/2006.06459</link>
         8286 <description rdf:parseType="Literal">&lt;p&gt;European climate polices acknowledge the role that energy communities can
         8287 play in the energy transition. Self-consumption installations shared among
         8288 those living in the same building are a good example of such energy
         8289 communities. In this work, we perform a regional analysis of optimal
         8290 self-consumption installations under the new legal framework recently passed in
         8291 Spain. Results show that the optimal sizing of the installation leads to
         8292 economic savings for self-consumers in all the territory, for both options with
         8293 and without remuneration for energy surplus. A sensitivity analysis on
         8294 technology costs revealed that batteries still require noticeably cost
         8295 reductions to be cost-effective in a behind the meter self-consumption
         8296 environment. In addition, solar compensation mechanisms make batteries less
         8297 attractive in a scenario of low PV costs, since feeding PV surplus into the
         8298 grid, yet less efficient, becomes more cost-effective. An improvement for the
         8299 current energy surplus remuneration policy was proposed and analysed. It
         8300 consists in the inclusion of the economic value of the avoided power losses in
         8301 the remuneration.
         8302 &lt;/p&gt;
         8303 </description>
         8304 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Gallego_Castillo_C/0/1/0/all/0/1&quot;&gt;Cristobal Gallego-Castillo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Heleno_M/0/1/0/all/0/1&quot;&gt;Miguel Heleno&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Victoria_M/0/1/0/all/0/1&quot;&gt;Marta Victoria&lt;/a&gt;</dc:creator>
         8305 </item>
         8306 <item rdf:about="http://fr.arxiv.org/abs/2006.06648">
         8307 <title>Learning to Extrapolate Knowledge: Transductive Few-shot Out-of-Graph Link Prediction. (arXiv:2006.06648v3 [cs.LG] UPDATED)</title>
         8308 <link>http://fr.arxiv.org/abs/2006.06648</link>
         8309 <description rdf:parseType="Literal">&lt;p&gt;Many practical graph problems, such as knowledge graph construction and
         8310 drug-drug interaction prediction, require to handle multi-relational graphs.
         8311 However, handling real-world multi-relational graphs with Graph Neural Networks
         8312 (GNNs) is often challenging due to their evolving nature, as new entities
         8313 (nodes) can emerge over time. Moreover, newly emerged entities often have few
         8314 links, which makes the learning even more difficult. Motivated by this
         8315 challenge, we introduce a realistic problem of few-shot out-of-graph link
         8316 prediction, where we not only predict the links between the seen and unseen
         8317 nodes as in a conventional out-of-knowledge link prediction task but also
         8318 between the unseen nodes, with only few edges per node. We tackle this problem
         8319 with a novel transductive meta-learning framework which we refer to as Graph
         8320 Extrapolation Networks (GEN). GEN meta-learns both the node embedding network
         8321 for inductive inference (seen-to-unseen) and the link prediction network for
         8322 transductive inference (unseen-to-unseen). For transductive link prediction, we
         8323 further propose a stochastic embedding layer to model uncertainty in the link
         8324 prediction between unseen entities. We validate our model on multiple benchmark
         8325 datasets for knowledge graph completion and drug-drug interaction prediction.
         8326 The results show that our model significantly outperforms relevant baselines
         8327 for out-of-graph link prediction tasks.
         8328 &lt;/p&gt;
         8329 </description>
         8330 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Baek_J/0/1/0/all/0/1&quot;&gt;Jinheon Baek&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_D/0/1/0/all/0/1&quot;&gt;Dong Bok Lee&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hwang_S/0/1/0/all/0/1&quot;&gt;Sung Ju Hwang&lt;/a&gt;</dc:creator>
         8331 </item>
         8332 <item rdf:about="http://fr.arxiv.org/abs/2006.06677">
         8333 <title>Frontiers in Mortar Methods for Isogeometric Analysis. (arXiv:2006.06677v3 [cs.CE] UPDATED)</title>
         8334 <link>http://fr.arxiv.org/abs/2006.06677</link>
         8335 <description rdf:parseType="Literal">&lt;p&gt;Complex geometries as common in industrial applications consist of multiple
         8336 patches, if spline based parametrizations are used. The requirements for the
         8337 generation of analysis-suitable models are increasing dramatically since
         8338 isogeometric analysis is directly based on the spline parametrization and
         8339 nowadays used for the calculation of higher-order partial differential
         8340 equations. The computational, or more general, the engineering analysis
         8341 necessitates suitable coupling techniques between the different patches. Mortar
         8342 methods have been successfully applied for coupling of patches and for contact
         8343 mechanics in recent years to resolve the arising issues within the interface.
         8344 We present here current achievements in the design of mortar technologies in
         8345 isogeometric analysis within the Priority Program SPP 1748, Reliable Simulation
         8346 Techniques in Solid Mechanics. Development of Non-standard Discretisation
         8347 Methods, Mechanical and Mathematical Analysis.
         8348 &lt;/p&gt;
         8349 </description>
         8350 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hesch_C/0/1/0/all/0/1&quot;&gt;Christian Hesch&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Khristenko_U/0/1/0/all/0/1&quot;&gt;Ustim Khristenko&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Krause_R/0/1/0/all/0/1&quot;&gt;Rolf Krause&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Popp_A/0/1/0/all/0/1&quot;&gt;Alexander Popp&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Seitz_A/0/1/0/all/0/1&quot;&gt;Alexander Seitz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wall_W/0/1/0/all/0/1&quot;&gt;Wolfgang Wall&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wohlmuth_B/0/1/0/all/0/1&quot;&gt;Barbara Wohlmuth&lt;/a&gt;</dc:creator>
         8351 </item>
         8352 <item rdf:about="http://fr.arxiv.org/abs/2006.07214">
         8353 <title>Sparse and Continuous Attention Mechanisms. (arXiv:2006.07214v3 [cs.LG] UPDATED)</title>
         8354 <link>http://fr.arxiv.org/abs/2006.07214</link>
         8355 <description rdf:parseType="Literal">&lt;p&gt;Exponential families are widely used in machine learning; they include many
         8356 distributions in continuous and discrete domains (e.g., Gaussian, Dirichlet,
         8357 Poisson, and categorical distributions via the softmax transformation).
         8358 Distributions in each of these families have fixed support. In contrast, for
         8359 finite domains, there has been recent work on sparse alternatives to softmax
         8360 (e.g. sparsemax and alpha-entmax), which have varying support, being able to
         8361 assign zero probability to irrelevant categories. This paper expands that work
         8362 in two directions: first, we extend alpha-entmax to continuous domains,
         8363 revealing a link with Tsallis statistics and deformed exponential families.
         8364 Second, we introduce continuous-domain attention mechanisms, deriving efficient
         8365 gradient backpropagation algorithms for alpha in {1,2}. Experiments on
         8366 attention-based text classification, machine translation, and visual question
         8367 answering illustrate the use of continuous attention in 1D and 2D, showing that
         8368 it allows attending to time intervals and compact regions.
         8369 &lt;/p&gt;
         8370 </description>
         8371 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Martins_A/0/1/0/all/0/1&quot;&gt;Andr&amp;#xe9; F. T. Martins&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Farinhas_A/0/1/0/all/0/1&quot;&gt;Ant&amp;#xf3;nio Farinhas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Treviso_M/0/1/0/all/0/1&quot;&gt;Marcos Treviso&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Niculae_V/0/1/0/all/0/1&quot;&gt;Vlad Niculae&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Aguiar_P/0/1/0/all/0/1&quot;&gt;Pedro M. Q. Aguiar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Figueiredo_M/0/1/0/all/0/1&quot;&gt;M&amp;#xe1;rio A. T. Figueiredo&lt;/a&gt;</dc:creator>
         8372 </item>
         8373 <item rdf:about="http://fr.arxiv.org/abs/2006.07225">
         8374 <title>Neural Estimators for Conditional Mutual Information Using Nearest Neighbors Sampling. (arXiv:2006.07225v2 [cs.IT] UPDATED)</title>
         8375 <link>http://fr.arxiv.org/abs/2006.07225</link>
         8376 <description rdf:parseType="Literal">&lt;p&gt;The estimation of mutual information (MI) or conditional mutual information
         8377 (CMI) from a set of samples is a long-standing problem. A recent line of work
         8378 in this area has leveraged the approximation power of artificial neural
         8379 networks and has shown improvements over conventional methods. One important
         8380 challenge in this new approach is the need to obtain, given the original
         8381 dataset, a different set where the samples are distributed according to a
         8382 specific product density function. This is particularly challenging when
         8383 estimating CMI.
         8384 &lt;/p&gt;
         8385 &lt;p&gt;In this paper, we introduce a new technique, based on k nearest neighbors
         8386 (k-NN), to perform the resampling and derive high-confidence concentration
         8387 bounds for the sample average. Then the technique is employed to train a neural
         8388 network classifier and the CMI is estimated accordingly. We propose three
         8389 estimators using this technique and prove their consistency, make a comparison
         8390 between them and similar approaches in the literature, and experimentally show
         8391 improvements in estimating the CMI in terms of accuracy and variance of the
         8392 estimators.
         8393 &lt;/p&gt;
         8394 </description>
         8395 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Molavipour_S/0/1/0/all/0/1&quot;&gt;Sina Molavipour&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bassi_G/0/1/0/all/0/1&quot;&gt;Germ&amp;#xe1;n Bassi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Skoglund_M/0/1/0/all/0/1&quot;&gt;Mikael Skoglund&lt;/a&gt;</dc:creator>
         8396 </item>
         8397 <item rdf:about="http://fr.arxiv.org/abs/2006.08205">
         8398 <title>Learning Latent Space Energy-Based Prior Model. (arXiv:2006.08205v2 [stat.ML] UPDATED)</title>
         8399 <link>http://fr.arxiv.org/abs/2006.08205</link>
         8400 <description rdf:parseType="Literal">&lt;p&gt;We propose to learn energy-based model (EBM) in the latent space of a
         8401 generator model, so that the EBM serves as a prior model that stands on the
         8402 top-down network of the generator model. Both the latent space EBM and the
         8403 top-down network can be learned jointly by maximum likelihood, which involves
         8404 short-run MCMC sampling from both the prior and posterior distributions of the
         8405 latent vector. Due to the low dimensionality of the latent space and the
         8406 expressiveness of the top-down network, a simple EBM in latent space can
         8407 capture regularities in the data effectively, and MCMC sampling in latent space
         8408 is efficient and mixes well. We show that the learned model exhibits strong
         8409 performances in terms of image and text generation and anomaly detection. The
         8410 one-page code can be found in supplementary materials.
         8411 &lt;/p&gt;
         8412 </description>
         8413 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Pang_B/0/1/0/all/0/1&quot;&gt;Bo Pang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Han_T/0/1/0/all/0/1&quot;&gt;Tian Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nijkamp_E/0/1/0/all/0/1&quot;&gt;Erik Nijkamp&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Zhu_S/0/1/0/all/0/1&quot;&gt;Song-Chun Zhu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Wu_Y/0/1/0/all/0/1&quot;&gt;Ying Nian Wu&lt;/a&gt;</dc:creator>
         8414 </item>
         8415 <item rdf:about="http://fr.arxiv.org/abs/2006.09859">
         8416 <title>Iterative regularization for convex regularizers. (arXiv:2006.09859v2 [stat.ML] UPDATED)</title>
         8417 <link>http://fr.arxiv.org/abs/2006.09859</link>
         8418 <description rdf:parseType="Literal">&lt;p&gt;We study iterative regularization for linear models, when the bias is convex
         8419 but not necessarily strongly convex. We characterize the stability properties
         8420 of a primal-dual gradient based approach, analyzing its convergence in the
         8421 presence of worst case deterministic noise. As a main example, we specialize
         8422 and illustrate the results for the problem of robust sparse recovery. Key to
         8423 our analysis is a combination of ideas from regularization theory and
         8424 optimization in the presence of errors. Theoretical results are complemented by
         8425 experiments showing that state-of-the-art performances can be achieved with
         8426 considerable computational speed-ups.
         8427 &lt;/p&gt;
         8428 </description>
         8429 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Molinari_C/0/1/0/all/0/1&quot;&gt;Cesare Molinari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Massias_M/0/1/0/all/0/1&quot;&gt;Mathurin Massias&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Rosasco_L/0/1/0/all/0/1&quot;&gt;Lorenzo Rosasco&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Villa_S/0/1/0/all/0/1&quot;&gt;Silvia Villa&lt;/a&gt;</dc:creator>
         8430 </item>
         8431 <item rdf:about="http://fr.arxiv.org/abs/2006.10085">
         8432 <title>Socially Fair k-Means Clustering. (arXiv:2006.10085v2 [cs.LG] UPDATED)</title>
         8433 <link>http://fr.arxiv.org/abs/2006.10085</link>
         8434 <description rdf:parseType="Literal">&lt;p&gt;We show that the popular k-means clustering algorithm (Lloyd&apos;s heuristic),
         8435 used for a variety of scientific data, can result in outcomes that are
         8436 unfavorable to subgroups of data (e.g., demographic groups). Such biased
         8437 clusterings can have deleterious implications for human-centric applications
         8438 such as resource allocation. We present a fair k-means objective and algorithm
         8439 to choose cluster centers that provide equitable costs for different groups.
         8440 The algorithm, Fair-Lloyd, is a modification of Lloyd&apos;s heuristic for k-means,
         8441 inheriting its simplicity, efficiency, and stability. In comparison with
         8442 standard Lloyd&apos;s, we find that on benchmark datasets, Fair-Lloyd exhibits
         8443 unbiased performance by ensuring that all groups have equal costs in the output
         8444 k-clustering, while incurring a negligible increase in running time, thus
         8445 making it a viable fair option wherever k-means is currently used.
         8446 &lt;/p&gt;
         8447 </description>
         8448 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ghadiri_M/0/1/0/all/0/1&quot;&gt;Mehrdad Ghadiri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Samadi_S/0/1/0/all/0/1&quot;&gt;Samira Samadi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vempala_S/0/1/0/all/0/1&quot;&gt;Santosh Vempala&lt;/a&gt;</dc:creator>
         8449 </item>
         8450 <item rdf:about="http://fr.arxiv.org/abs/2006.10498">
         8451 <title>Neutralizing Self-Selection Bias in Sampling for Sortition. (arXiv:2006.10498v2 [cs.GT] UPDATED)</title>
         8452 <link>http://fr.arxiv.org/abs/2006.10498</link>
         8453 <description rdf:parseType="Literal">&lt;p&gt;Sortition is a political system in which decisions are made by panels of
         8454 randomly selected citizens. The process for selecting a sortition panel is
         8455 traditionally thought of as uniform sampling without replacement, which has
         8456 strong fairness properties. In practice, however, sampling without replacement
         8457 is not possible since only a fraction of agents is willing to participate in a
         8458 panel when invited, and different demographic groups participate at different
         8459 rates. In order to still produce panels whose composition resembles that of the
         8460 population, we develop a sampling algorithm that restores close-to-equal
         8461 representation probabilities for all agents while satisfying meaningful
         8462 demographic quotas. As part of its input, our algorithm requires probabilities
         8463 indicating how likely each volunteer in the pool was to participate. Since
         8464 these participation probabilities are not directly observable, we show how to
         8465 learn them, and demonstrate our approach using data on a real sortition panel
         8466 combined with information on the general population in the form of publicly
         8467 available survey data.
         8468 &lt;/p&gt;
         8469 </description>
         8470 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Flanigan_B/0/1/0/all/0/1&quot;&gt;Bailey Flanigan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Golz_P/0/1/0/all/0/1&quot;&gt;Paul G&amp;#xf6;lz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gupta_A/0/1/0/all/0/1&quot;&gt;Anupam Gupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Procaccia_A/0/1/0/all/0/1&quot;&gt;Ariel Procaccia&lt;/a&gt;</dc:creator>
         8471 </item>
         8472 <item rdf:about="http://fr.arxiv.org/abs/2006.12681">
         8473 <title>ContraGAN: Contrastive Learning for Conditional Image Generation. (arXiv:2006.12681v2 [cs.CV] UPDATED)</title>
         8474 <link>http://fr.arxiv.org/abs/2006.12681</link>
         8475 <description rdf:parseType="Literal">&lt;p&gt;Conditional image generation is the task of generating diverse images using
         8476 class label information. Although many conditional Generative Adversarial
         8477 Networks (GAN) have shown realistic results, such methods consider pairwise
         8478 relations between the embedding of an image and the embedding of the
         8479 corresponding label (data-to-class relations) as the conditioning losses. In
         8480 this paper, we propose ContraGAN that considers relations between multiple
         8481 image embeddings in the same batch (data-to-data relations) as well as the
         8482 data-to-class relations by using a conditional contrastive loss. The
         8483 discriminator of ContraGAN discriminates the authenticity of given samples and
         8484 minimizes a contrastive objective to learn the relations between training
         8485 images. Simultaneously, the generator tries to generate realistic images that
         8486 deceive the authenticity and have a low contrastive loss. The experimental
         8487 results show that ContraGAN outperforms state-of-the-art-models by 7.3% and
         8488 7.7% on Tiny ImageNet and ImageNet datasets, respectively. Besides, we
         8489 experimentally demonstrate that ContraGAN helps to relieve the overfitting of
         8490 the discriminator. For a fair comparison, we re-implement twelve
         8491 state-of-the-art GANs using the PyTorch library. The software package is
         8492 available at https://github.com/POSTECH-CVLab/PyTorch-StudioGAN.
         8493 &lt;/p&gt;
         8494 </description>
         8495 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kang_M/0/1/0/all/0/1&quot;&gt;Minguk Kang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Park_J/0/1/0/all/0/1&quot;&gt;Jaesik Park&lt;/a&gt;</dc:creator>
         8496 </item>
         8497 <item rdf:about="http://fr.arxiv.org/abs/2006.13258">
         8498 <title>Adversarial Soft Advantage Fitting: Imitation Learning without Policy Optimization. (arXiv:2006.13258v2 [cs.LG] UPDATED)</title>
         8499 <link>http://fr.arxiv.org/abs/2006.13258</link>
         8500 <description rdf:parseType="Literal">&lt;p&gt;Adversarial Imitation Learning alternates between learning a discriminator --
         8501 which tells apart expert&apos;s demonstrations from generated ones -- and a
         8502 generator&apos;s policy to produce trajectories that can fool this discriminator.
         8503 This alternated optimization is known to be delicate in practice since it
         8504 compounds unstable adversarial training with brittle and sample-inefficient
         8505 reinforcement learning. We propose to remove the burden of the policy
         8506 optimization steps by leveraging a novel discriminator formulation.
         8507 Specifically, our discriminator is explicitly conditioned on two policies: the
         8508 one from the previous generator&apos;s iteration and a learnable policy. When
         8509 optimized, this discriminator directly learns the optimal generator&apos;s policy.
         8510 Consequently, our discriminator&apos;s update solves the generator&apos;s optimization
         8511 problem for free: learning a policy that imitates the expert does not require
         8512 an additional optimization loop. This formulation effectively cuts by half the
         8513 implementation and computational burden of Adversarial Imitation Learning
         8514 algorithms by removing the Reinforcement Learning phase altogether. We show on
         8515 a variety of tasks that our simpler approach is competitive to prevalent
         8516 Imitation Learning methods.
         8517 &lt;/p&gt;
         8518 </description>
         8519 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Barde_P/0/1/0/all/0/1&quot;&gt;Paul Barde&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Roy_J/0/1/0/all/0/1&quot;&gt;Julien Roy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jeon_W/0/1/0/all/0/1&quot;&gt;Wonseok Jeon&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pineau_J/0/1/0/all/0/1&quot;&gt;Joelle Pineau&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pal_C/0/1/0/all/0/1&quot;&gt;Christopher Pal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nowrouzezahrai_D/0/1/0/all/0/1&quot;&gt;Derek Nowrouzezahrai&lt;/a&gt;</dc:creator>
         8520 </item>
         8521 <item rdf:about="http://fr.arxiv.org/abs/2006.14950">
         8522 <title>Relative Deviation Margin Bounds. (arXiv:2006.14950v2 [cs.LG] UPDATED)</title>
         8523 <link>http://fr.arxiv.org/abs/2006.14950</link>
         8524 <description rdf:parseType="Literal">&lt;p&gt;We present a series of new and more favorable margin-based learning
         8525 guarantees that depend on the empirical margin loss of a predictor. We give two
         8526 types of learning bounds, both distribution-dependent and valid for general
         8527 families, in terms of the Rademacher complexity or the empirical $\ell_\infty$
         8528 covering number of the hypothesis set used. Furthermore, using our relative
         8529 deviation margin bounds, we derive distribution-dependent generalization bounds
         8530 for unbounded loss functions under the assumption of a finite moment. We also
         8531 briefly highlight several applications of these bounds and discuss their
         8532 connection with existing results.
         8533 &lt;/p&gt;
         8534 </description>
         8535 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cortes_C/0/1/0/all/0/1&quot;&gt;Corinna Cortes&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohri_M/0/1/0/all/0/1&quot;&gt;Mehryar Mohri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Suresh_A/0/1/0/all/0/1&quot;&gt;Ananda Theertha Suresh&lt;/a&gt;</dc:creator>
         8536 </item>
         8537 <item rdf:about="http://fr.arxiv.org/abs/2007.00124">
         8538 <title>Weighted hypersoft configuration model. (arXiv:2007.00124v2 [physics.soc-ph] UPDATED)</title>
         8539 <link>http://fr.arxiv.org/abs/2007.00124</link>
         8540 <description rdf:parseType="Literal">&lt;p&gt;Maximum entropy null models of networks come in different flavors that depend
         8541 on the type of constraints under which entropy is maximized. If the constraints
         8542 are on degree sequences or distributions, we are dealing with configuration
         8543 models. If the degree sequence is constrained exactly, the corresponding
         8544 microcanonical ensemble of random graphs with a given degree sequence is the
         8545 configuration model per se. If the degree sequence is constrained only on
         8546 average, the corresponding grand-canonical ensemble of random graphs with a
         8547 given expected degree sequence is the soft configuration model. If the degree
         8548 sequence is not fixed at all but randomly drawn from a fixed distribution, the
         8549 corresponding hypercanonical ensemble of random graphs with a given degree
         8550 distribution is the hypersoft configuration model, a more adequate description
         8551 of dynamic real-world networks in which degree sequences are never fixed but
         8552 degree distributions often stay stable. Here, we introduce the hypersoft
         8553 configuration model of weighted networks. The main contribution is a particular
         8554 version of the model with power-law degree and strength distributions, and
         8555 superlinear scaling of strengths with degrees, mimicking the properties of some
         8556 real-world networks. As a byproduct, we generalize the notions of sparse
         8557 graphons and their entropy to weighted networks.
         8558 &lt;/p&gt;
         8559 </description>
         8560 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Voitalov_I/0/1/0/all/0/1&quot;&gt;Ivan Voitalov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Hoorn_P/0/1/0/all/0/1&quot;&gt;Pim van der Hoorn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Kitsak_M/0/1/0/all/0/1&quot;&gt;Maksim Kitsak&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Papadopoulos_F/0/1/0/all/0/1&quot;&gt;Fragkiskos Papadopoulos&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/physics/1/au:+Krioukov_D/0/1/0/all/0/1&quot;&gt;Dmitri Krioukov&lt;/a&gt;</dc:creator>
         8561 </item>
         8562 <item rdf:about="http://fr.arxiv.org/abs/2007.00772">
         8563 <title>Robustness against Relational Adversary. (arXiv:2007.00772v2 [cs.LG] UPDATED)</title>
         8564 <link>http://fr.arxiv.org/abs/2007.00772</link>
         8565 <description rdf:parseType="Literal">&lt;p&gt;Test-time adversarial attacks have posed serious challenges to the robustness
         8566 of machine-learning models, and in many settings the adversarial perturbation
         8567 need not be bounded by small $\ell_p$-norms. Motivated by the
         8568 semantics-preserving attacks in vision and security domain, we investigate
         8569 $\textit{relational adversaries}$, a broad class of attackers who create
         8570 adversarial examples that are in a reflexive-transitive closure of a logical
         8571 relation. We analyze the conditions for robustness and propose
         8572 $\textit{normalize-and-predict}$ -- a learning framework with provable
         8573 robustness guarantee. We compare our approach with adversarial training and
         8574 derive an unified framework that provides benefits of both approaches. Guided
         8575 by our theoretical findings, we apply our framework to image classification and
         8576 malware detection. Results of both tasks show that attacks using relational
         8577 adversaries frequently fool existing models, but our unified framework can
         8578 significantly enhance their robustness.
         8579 &lt;/p&gt;
         8580 </description>
         8581 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yizhen Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Meng_X/0/1/0/all/0/1&quot;&gt;Xiaozhu Meng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_K/0/1/0/all/0/1&quot;&gt;Ke Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Christodorescu_M/0/1/0/all/0/1&quot;&gt;Mihai Christodorescu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jha_S/0/1/0/all/0/1&quot;&gt;Somesh Jha&lt;/a&gt;</dc:creator>
         8582 </item>
         8583 <item rdf:about="http://fr.arxiv.org/abs/2007.00796">
         8584 <title>Information Theoretic Lower Bounds for Feed-Forward Fully-Connected Deep Networks. (arXiv:2007.00796v2 [stat.ML] UPDATED)</title>
         8585 <link>http://fr.arxiv.org/abs/2007.00796</link>
         8586 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we study the sample complexity lower bounds for the exact
         8587 recovery of parameters and for a positive excess risk of a feed-forward,
         8588 fully-connected neural network for binary classification, using
         8589 information-theoretic tools. We prove these lower bounds by the existence of a
         8590 generative network characterized by a backwards data generating process, where
         8591 the input is generated based on the binary output, and the network is
         8592 parametrized by weight parameters for the hidden layers. The sample complexity
         8593 lower bound for the exact recovery of parameters is $\Omega(d r \log(r) + p )$
         8594 and for a positive excess risk is $\Omega(r \log(r) + p )$, where $p$ is the
         8595 dimension of the input, $r$ reflects the rank of the weight matrices and $d$ is
         8596 the number of hidden layers. To the best of our knowledge, our results are the
         8597 first information theoretic lower bounds.
         8598 &lt;/p&gt;
         8599 </description>
         8600 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Yang_X/0/1/0/all/0/1&quot;&gt;Xiaochen Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Honorio_J/0/1/0/all/0/1&quot;&gt;Jean Honorio&lt;/a&gt;</dc:creator>
         8601 </item>
         8602 <item rdf:about="http://fr.arxiv.org/abs/2007.01293">
         8603 <title>Not All Unlabeled Data are Equal: Learning to Weight Data in Semi-supervised Learning. (arXiv:2007.01293v2 [cs.LG] UPDATED)</title>
         8604 <link>http://fr.arxiv.org/abs/2007.01293</link>
         8605 <description rdf:parseType="Literal">&lt;p&gt;Existing semi-supervised learning (SSL) algorithms use a single weight to
         8606 balance the loss of labeled and unlabeled examples, i.e., all unlabeled
         8607 examples are equally weighted. But not all unlabeled data are equal. In this
         8608 paper we study how to use a different weight for every unlabeled example.
         8609 Manual tuning of all those weights -- as done in prior work -- is no longer
         8610 possible. Instead, we adjust those weights via an algorithm based on the
         8611 influence function, a measure of a model&apos;s dependency on one training example.
         8612 To make the approach efficient, we propose a fast and effective approximation
         8613 of the influence function. We demonstrate that this technique outperforms
         8614 state-of-the-art methods on semi-supervised image and language classification
         8615 tasks.
         8616 &lt;/p&gt;
         8617 </description>
         8618 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ren_Z/0/1/0/all/0/1&quot;&gt;Zhongzheng Ren&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yeh_R/0/1/0/all/0/1&quot;&gt;Raymond A. Yeh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schwing_A/0/1/0/all/0/1&quot;&gt;Alexander G. Schwing&lt;/a&gt;</dc:creator>
         8619 </item>
         8620 <item rdf:about="http://fr.arxiv.org/abs/2007.02261">
         8621 <title>A Framework for Modelling, Verification and Transformation of Concurrent Imperative Programs. (arXiv:2007.02261v2 [cs.LO] UPDATED)</title>
         8622 <link>http://fr.arxiv.org/abs/2007.02261</link>
         8623 <description rdf:parseType="Literal">&lt;p&gt;The paper gives a comprehensive presentation of a framework, embedded into
         8624 the simply typed higher-order logic, and aimed at providing a sound assistance
         8625 in formal reasoning about models of imperative programs with interleaved
         8626 computations. As a case study, a model of the Peterson&apos;s mutual exclusion
         8627 algorithm will be scrutinised in the course of the paper illustrating
         8628 applicability of the framework.
         8629 &lt;/p&gt;
         8630 </description>
         8631 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bortin_M/0/1/0/all/0/1&quot;&gt;Maksym Bortin&lt;/a&gt;</dc:creator>
         8632 </item>
         8633 <item rdf:about="http://fr.arxiv.org/abs/2007.02835">
         8634 <title>Self-Supervised Graph Transformer on Large-Scale Molecular Data. (arXiv:2007.02835v2 [q-bio.BM] UPDATED)</title>
         8635 <link>http://fr.arxiv.org/abs/2007.02835</link>
         8636 <description rdf:parseType="Literal">&lt;p&gt;How to obtain informative representations of molecules is a crucial
         8637 prerequisite in AI-driven drug design and discovery. Recent researches abstract
         8638 molecules as graphs and employ Graph Neural Networks (GNNs) for molecular
         8639 representation learning. Nevertheless, two issues impede the usage of GNNs in
         8640 real scenarios: (1) insufficient labeled molecules for supervised training; (2)
         8641 poor generalization capability to new-synthesized molecules. To address them
         8642 both, we propose a novel framework, GROVER, which stands for Graph
         8643 Representation frOm self-superVised mEssage passing tRansformer. With carefully
         8644 designed self-supervised tasks in node-, edge- and graph-level, GROVER can
         8645 learn rich structural and semantic information of molecules from enormous
         8646 unlabelled molecular data. Rather, to encode such complex information, GROVER
         8647 integrates Message Passing Networks into the Transformer-style architecture to
         8648 deliver a class of more expressive encoders of molecules. The flexibility of
         8649 GROVER allows it to be trained efficiently on large-scale molecular dataset
         8650 without requiring any supervision, thus being immunized to the two issues
         8651 mentioned above. We pre-train GROVER with 100 million parameters on 10 million
         8652 unlabelled molecules -- the biggest GNN and the largest training dataset in
         8653 molecular representation learning. We then leverage the pre-trained GROVER for
         8654 molecular property prediction followed by task-specific fine-tuning, where we
         8655 observe a huge improvement (more than 6% on average) from current
         8656 state-of-the-art methods on 11 challenging benchmarks. The insights we gained
         8657 are that well-designed self-supervision losses and largely-expressive
         8658 pre-trained models enjoy the significant potential on performance boosting.
         8659 &lt;/p&gt;
         8660 </description>
         8661 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Rong_Y/0/1/0/all/0/1&quot;&gt;Yu Rong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Bian_Y/0/1/0/all/0/1&quot;&gt;Yatao Bian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Xu_T/0/1/0/all/0/1&quot;&gt;Tingyang Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Xie_W/0/1/0/all/0/1&quot;&gt;Weiyang Xie&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Wei_Y/0/1/0/all/0/1&quot;&gt;Ying Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Huang_W/0/1/0/all/0/1&quot;&gt;Wenbing Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Huang_J/0/1/0/all/0/1&quot;&gt;Junzhou Huang&lt;/a&gt;</dc:creator>
         8662 </item>
         8663 <item rdf:about="http://fr.arxiv.org/abs/2007.06267">
         8664 <title>BoxE: A Box Embedding Model for Knowledge Base Completion. (arXiv:2007.06267v2 [cs.AI] UPDATED)</title>
         8665 <link>http://fr.arxiv.org/abs/2007.06267</link>
         8666 <description rdf:parseType="Literal">&lt;p&gt;Knowledge base completion (KBC) aims to automatically infer missing facts by
         8667 exploiting information already present in a knowledge base (KB). A promising
         8668 approach for KBC is to embed knowledge into latent spaces and make predictions
         8669 from learned embeddings. However, existing embedding models are subject to at
         8670 least one of the following limitations: (1) theoretical inexpressivity, (2)
         8671 lack of support for prominent inference patterns (e.g., hierarchies), (3) lack
         8672 of support for KBC over higher-arity relations, and (4) lack of support for
         8673 incorporating logical rules. Here, we propose a spatio-translational embedding
         8674 model, called BoxE, that simultaneously addresses all these limitations. BoxE
         8675 embeds entities as points, and relations as a set of hyper-rectangles (or
         8676 boxes), which spatially characterize basic logical properties. This seemingly
         8677 simple abstraction yields a fully expressive model offering a natural encoding
         8678 for many desired logical properties. BoxE can both capture and inject rules
         8679 from rich classes of rule languages, going well beyond individual inference
         8680 patterns. By design, BoxE naturally applies to higher-arity KBs. We conduct a
         8681 detailed experimental analysis, and show that BoxE achieves state-of-the-art
         8682 performance, both on benchmark knowledge graphs and on more general KBs, and we
         8683 empirically show the power of integrating logical rules.
         8684 &lt;/p&gt;
         8685 </description>
         8686 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Abboud_R/0/1/0/all/0/1&quot;&gt;Ralph Abboud&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ceylan_I/0/1/0/all/0/1&quot;&gt;&amp;#x130;smail &amp;#x130;lkan Ceylan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lukasiewicz_T/0/1/0/all/0/1&quot;&gt;Thomas Lukasiewicz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Salvatori_T/0/1/0/all/0/1&quot;&gt;Tommaso Salvatori&lt;/a&gt;</dc:creator>
         8687 </item>
         8688 <item rdf:about="http://fr.arxiv.org/abs/2007.06271">
         8689 <title>RATT: Recurrent Attention to Transient Tasks for Continual Image Captioning. (arXiv:2007.06271v2 [cs.CV] UPDATED)</title>
         8690 <link>http://fr.arxiv.org/abs/2007.06271</link>
         8691 <description rdf:parseType="Literal">&lt;p&gt;Research on continual learning has led to a variety of approaches to
         8692 mitigating catastrophic forgetting in feed-forward classification networks.
         8693 Until now surprisingly little attention has been focused on continual learning
         8694 of recurrent models applied to problems like image captioning. In this paper we
         8695 take a systematic look at continual learning of LSTM-based models for image
         8696 captioning. We propose an attention-based approach that explicitly accommodates
         8697 the transient nature of vocabularies in continual image captioning tasks --
         8698 i.e. that task vocabularies are not disjoint. We call our method Recurrent
         8699 Attention to Transient Tasks (RATT), and also show how to adapt continual
         8700 learning approaches based on weight egularization and knowledge distillation to
         8701 recurrent continual learning problems. We apply our approaches to incremental
         8702 image captioning problem on two new continual learning benchmarks we define
         8703 using the MS-COCO and Flickr30 datasets. Our results demonstrate that RATT is
         8704 able to sequentially learn five captioning tasks while incurring no forgetting
         8705 of previously learned ones.
         8706 &lt;/p&gt;
         8707 </description>
         8708 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chiaro_R/0/1/0/all/0/1&quot;&gt;Riccardo Del Chiaro&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Twardowski_B/0/1/0/all/0/1&quot;&gt;Bart&amp;#x142;omiej Twardowski&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bagdanov_A/0/1/0/all/0/1&quot;&gt;Andrew D. Bagdanov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Weijer_J/0/1/0/all/0/1&quot;&gt;Joost van de Weijer&lt;/a&gt;</dc:creator>
         8709 </item>
         8710 <item rdf:about="http://fr.arxiv.org/abs/2007.07632">
         8711 <title>Graph Neural Networks for Scalable Radio Resource Management: Architecture Design and Theoretical Analysis. (arXiv:2007.07632v2 [cs.IT] UPDATED)</title>
         8712 <link>http://fr.arxiv.org/abs/2007.07632</link>
         8713 <description rdf:parseType="Literal">&lt;p&gt;Deep learning has recently emerged as a disruptive technology to solve
         8714 challenging radio resource management problems in wireless networks. However,
         8715 the neural network architectures adopted by existing works suffer from poor
         8716 scalability, generalization, and lack of interpretability. A long-standing
         8717 approach to improve scalability and generalization is to incorporate the
         8718 structures of the target task into the neural network architecture. In this
         8719 paper, we propose to apply graph neural networks (GNNs) to solve large-scale
         8720 radio resource management problems, supported by effective neural network
         8721 architecture design and theoretical analysis. Specifically, we first
         8722 demonstrate that radio resource management problems can be formulated as graph
         8723 optimization problems that enjoy a universal permutation equivariance property.
         8724 We then identify a class of neural networks, named \emph{message passing graph
         8725 neural networks} (MPGNNs). It is demonstrated that they not only satisfy the
         8726 permutation equivariance property, but also can generalize to large-scale
         8727 problems while enjoying a high computational efficiency. For interpretablity
         8728 and theoretical guarantees, we prove the equivalence between MPGNNs and a class
         8729 of distributed optimization algorithms, which is then used to analyze the
         8730 performance and generalization of MPGNN-based methods. Extensive simulations,
         8731 with power control and beamforming as two examples, will demonstrate that the
         8732 proposed method, trained in an unsupervised manner with unlabeled samples,
         8733 matches or even outperforms classic optimization-based algorithms without
         8734 domain-specific knowledge. Remarkably, the proposed method is highly scalable
         8735 and can solve the beamforming problem in an interference channel with $1000$
         8736 transceiver pairs within $6$ milliseconds on a single GPU.
         8737 &lt;/p&gt;
         8738 </description>
         8739 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shen_Y/0/1/0/all/0/1&quot;&gt;Yifei Shen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shi_Y/0/1/0/all/0/1&quot;&gt;Yuanming Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jun Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Letaief_K/0/1/0/all/0/1&quot;&gt;Khaled B. Letaief&lt;/a&gt;</dc:creator>
         8740 </item>
         8741 <item rdf:about="http://fr.arxiv.org/abs/2007.09483">
         8742 <title>Temporal Pointwise Convolutional Networks for Length of Stay Prediction in the Intensive Care Unit. (arXiv:2007.09483v2 [cs.LG] UPDATED)</title>
         8743 <link>http://fr.arxiv.org/abs/2007.09483</link>
         8744 <description rdf:parseType="Literal">&lt;p&gt;The pressure of ever-increasing patient demand and budget restrictions make
         8745 hospital bed management a daily challenge for clinical staff. Most critical is
         8746 the efficient allocation of resource-heavy Intensive Care Unit (ICU) beds to
         8747 the patients who need life support. Central to solving this problem is knowing
         8748 for how long the current set of ICU patients are likely to stay in the unit. In
         8749 this work, we propose a new deep learning model based on the combination of
         8750 temporal convolution and pointwise (1x1) convolution, to solve the length of
         8751 stay prediction task on the eICU critical care dataset. The model - which we
         8752 refer to as Temporal Pointwise Convolution (TPC) - is specifically designed to
         8753 mitigate for common challenges with Electronic Health Records, such as
         8754 skewness, irregular sampling and missing data. In doing so, we have achieved
         8755 significant performance benefits of 18-51% (metric dependent) over the commonly
         8756 used Long-Short Term Memory (LSTM) network, and the multi-head self-attention
         8757 network known as the Transformer.
         8758 &lt;/p&gt;
         8759 </description>
         8760 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rocheteau_E/0/1/0/all/0/1&quot;&gt;Emma Rocheteau&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lio_P/0/1/0/all/0/1&quot;&gt;Pietro Li&amp;#xf2;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hyland_S/0/1/0/all/0/1&quot;&gt;Stephanie Hyland&lt;/a&gt;</dc:creator>
         8761 </item>
         8762 <item rdf:about="http://fr.arxiv.org/abs/2007.10497">
         8763 <title>CovidDeep: SARS-CoV-2/COVID-19 Test Based on Wearable Medical Sensors and Efficient Neural Networks. (arXiv:2007.10497v3 [cs.HC] UPDATED)</title>
         8764 <link>http://fr.arxiv.org/abs/2007.10497</link>
         8765 <description rdf:parseType="Literal">&lt;p&gt;The novel coronavirus (SARS-CoV-2) has led to a pandemic. The current testing
         8766 regime based on Reverse Transcription-Polymerase Chain Reaction for SARS-CoV-2
         8767 has been unable to keep up with testing demands, and also suffers from a
         8768 relatively low positive detection rate in the early stages of the resultant
         8769 COVID-19 disease. Hence, there is a need for an alternative approach for
         8770 repeated large-scale testing of SARS-CoV-2/COVID-19. We propose a framework
         8771 called CovidDeep that combines efficient DNNs with commercially available WMSs
         8772 for pervasive testing of the virus. We collected data from 87 individuals,
         8773 spanning three cohorts including healthy, asymptomatic, and symptomatic
         8774 patients. We trained DNNs on various subsets of the features automatically
         8775 extracted from six WMS and questionnaire categories to perform ablation studies
         8776 to determine which subsets are most efficacious in terms of test accuracy for a
         8777 three-way classification. The highest test accuracy obtained was 98.1%. We also
         8778 augmented the real training dataset with a synthetic training dataset drawn
         8779 from the same probability distribution to impose a prior on DNN weights and
         8780 leveraged a grow-and-prune synthesis paradigm to learn both DNN architecture
         8781 and weights. This boosted the accuracy of the various DNNs further and
         8782 simultaneously reduced their size and floating-point operations.
         8783 &lt;/p&gt;
         8784 </description>
         8785 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hassantabar_S/0/1/0/all/0/1&quot;&gt;Shayan Hassantabar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stefano_N/0/1/0/all/0/1&quot;&gt;Novati Stefano&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ghanakota_V/0/1/0/all/0/1&quot;&gt;Vishweshwar Ghanakota&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ferrari_A/0/1/0/all/0/1&quot;&gt;Alessandra Ferrari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Nicola_G/0/1/0/all/0/1&quot;&gt;Gregory N. Nicola&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bruno_R/0/1/0/all/0/1&quot;&gt;Raffaele Bruno&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Marino_I/0/1/0/all/0/1&quot;&gt;Ignazio R. Marino&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hamidouche_K/0/1/0/all/0/1&quot;&gt;Kenza Hamidouche&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jha_N/0/1/0/all/0/1&quot;&gt;Niraj K. Jha&lt;/a&gt;</dc:creator>
         8786 </item>
         8787 <item rdf:about="http://fr.arxiv.org/abs/2007.11078">
         8788 <title>The Complete Lasso Tradeoff Diagram. (arXiv:2007.11078v4 [math.ST] UPDATED)</title>
         8789 <link>http://fr.arxiv.org/abs/2007.11078</link>
         8790 <description rdf:parseType="Literal">&lt;p&gt;A fundamental problem in the high-dimensional regression is to understand the
         8791 tradeoff between type I and type II errors or, equivalently, false discovery
         8792 rate (FDR) and power in variable selection. To address this important problem,
         8793 we offer the first complete tradeoff diagram that distinguishes all pairs of
         8794 FDR and power that can be asymptotically realized by the Lasso with some choice
         8795 of its penalty parameter from the remaining pairs, in a regime of linear
         8796 sparsity under random designs. The tradeoff between the FDR and power
         8797 characterized by our diagram holds no matter how strong the signals are. In
         8798 particular, our results improve on the earlier Lasso tradeoff diagram of
         8799 &lt;a href=&quot;/abs/1511.01957&quot;&gt;arXiv:1511.01957&lt;/a&gt; by recognizing two simple but fundamental constraints on the
         8800 pairs of FDR and power. The improvement is more substantial when the regression
         8801 problem is above the Donoho--Tanner phase transition. Finally, we present
         8802 extensive simulation studies to confirm the sharpness of the complete Lasso
         8803 tradeoff diagram.
         8804 &lt;/p&gt;
         8805 </description>
         8806 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Wang_H/0/1/0/all/0/1&quot;&gt;Hua Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Yang_Y/0/1/0/all/0/1&quot;&gt;Yachong Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Bu_Z/0/1/0/all/0/1&quot;&gt;Zhiqi Bu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Su_W/0/1/0/all/0/1&quot;&gt;Weijie J. Su&lt;/a&gt;</dc:creator>
         8807 </item>
         8808 <item rdf:about="http://fr.arxiv.org/abs/2007.12153">
         8809 <title>Sifting Convolution on the Sphere. (arXiv:2007.12153v2 [cs.IT] UPDATED)</title>
         8810 <link>http://fr.arxiv.org/abs/2007.12153</link>
         8811 <description rdf:parseType="Literal">&lt;p&gt;A novel spherical convolution is defined through the sifting property of the
         8812 Dirac delta on the sphere. The so-called sifting convolution is defined by the
         8813 inner product of one function with a translated version of another, but with
         8814 the adoption of an alternative translation operator on the sphere. This
         8815 translation operator follows by analogy with the Euclidean translation when
         8816 viewed in harmonic space. The sifting convolution satisfies a variety of
         8817 desirable properties that are lacking in alternate definitions, namely: it
         8818 supports directional kernels; it has an output which remains on the sphere; and
         8819 is efficient to compute. An illustration of the sifting convolution on a
         8820 topographic map of the Earth demonstrates that it supports directional kernels
         8821 to perform anisotropic filtering, while its output remains on the sphere.
         8822 &lt;/p&gt;
         8823 </description>
         8824 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Roddy_P/0/1/0/all/0/1&quot;&gt;Patrick J. Roddy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+McEwen_J/0/1/0/all/0/1&quot;&gt;Jason D. McEwen&lt;/a&gt;</dc:creator>
         8825 </item>
         8826 <item rdf:about="http://fr.arxiv.org/abs/2007.12159">
         8827 <title>Revisiting Locality in Binary-Integer Representations. (arXiv:2007.12159v2 [cs.NE] UPDATED)</title>
         8828 <link>http://fr.arxiv.org/abs/2007.12159</link>
         8829 <description rdf:parseType="Literal">&lt;p&gt;Mutation and recombination operators play a key role in determining the speed
         8830 and quality of Genetic and Evolutionary Algorithms (GEAs). Prior work has
         8831 analyzed the effects of these operators on genotypic variation, often using
         8832 locality metrics that measure the sensitivity and stability of
         8833 genotype-phenotype representations to these operators.
         8834 &lt;/p&gt;
         8835 &lt;p&gt;In this paper, we focus on an important subset of representations, namely
         8836 nonredundant bitstring-to-integer representations, and analyze them through the
         8837 lens of Rothlauf&apos;s widely used locality metrics. We first define locality
         8838 metrics equivalent to Rothlauf&apos;s that are tailored to our domain: the
         8839 \textit{point locality} for single-bit mutation and \textit{general locality}
         8840 for recombination. With these definitions, we derive tight bounds and a closed
         8841 form expected value for point locality. For general locality we show that it is
         8842 asymptotically equivalent across all representations and operators. We also
         8843 recreate three established GEA experiments to understand the predictive power
         8844 of point locality on GEA performance, focusing on two popular and often
         8845 juxtaposed representations: standard binary and binary reflected Gray.
         8846 &lt;/p&gt;
         8847 &lt;p&gt;We show that standard binary has provably no worse locality than any Gray
         8848 encoding, including binary reflected Gray. We discuss this result in the
         8849 context of previous studies that found binary reflected Gray to outperform
         8850 standard binary, and we argue that locality cannot be the explanation for
         8851 strong performance. Finally, we provide empirical evidence that weak point
         8852 locality representations can be beneficial to performance in the exploration
         8853 phase of the GEA, while strong point locality representations are more
         8854 beneficial in the exploitation phase.
         8855 &lt;/p&gt;
         8856 </description>
         8857 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shastri_H/0/1/0/all/0/1&quot;&gt;Hrishee Shastri&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Frachtenberg_E/0/1/0/all/0/1&quot;&gt;Eitan Frachtenberg&lt;/a&gt;</dc:creator>
         8858 </item>
         8859 <item rdf:about="http://fr.arxiv.org/abs/2007.13404">
         8860 <title>YOLOpeds: Efficient Real-Time Single-Shot Pedestrian Detection for Smart Camera Applications. (arXiv:2007.13404v2 [cs.CV] UPDATED)</title>
         8861 <link>http://fr.arxiv.org/abs/2007.13404</link>
         8862 <description rdf:parseType="Literal">&lt;p&gt;Deep Learning-based object detectors can enhance the capabilities of smart
         8863 camera systems in a wide spectrum of machine vision applications including
         8864 video surveillance, autonomous driving, robots and drones, smart factory, and
         8865 health monitoring. Pedestrian detection plays a key role in all these
         8866 applications and deep learning can be used to construct accurate
         8867 state-of-the-art detectors. However, such complex paradigms do not scale easily
         8868 and are not traditionally implemented in resource-constrained smart cameras for
         8869 on-device processing which offers significant advantages in situations when
         8870 real-time monitoring and robustness are vital. Efficient neural networks can
         8871 not only enable mobile applications and on-device experiences but can also be a
         8872 key enabler of privacy and security allowing a user to gain the benefits of
         8873 neural networks without needing to send their data to the server to be
         8874 evaluated. This work addresses the challenge of achieving a good trade-off
         8875 between accuracy and speed for efficient deployment of deep-learning-based
         8876 pedestrian detection in smart camera applications. A computationally efficient
         8877 architecture is introduced based on separable convolutions and proposes
         8878 integrating dense connections across layers and multi-scale feature fusion to
         8879 improve representational capacity while decreasing the number of parameters and
         8880 operations. In particular, the contributions of this work are the following: 1)
         8881 An efficient backbone combining multi-scale feature operations, 2) a more
         8882 elaborate loss function for improved localization, 3) an anchor-less approach
         8883 for detection, The proposed approach called YOLOpeds is evaluated using the
         8884 PETS2009 surveillance dataset on 320x320 images. Overall, YOLOpeds provides
         8885 real-time sustained operation of over 30 frames per second with detection rates
         8886 in the range of 86% outperforming existing deep learning models.
         8887 &lt;/p&gt;
         8888 </description>
         8889 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kyrkou_C/0/1/0/all/0/1&quot;&gt;Christos Kyrkou&lt;/a&gt;</dc:creator>
         8890 </item>
         8891 <item rdf:about="http://fr.arxiv.org/abs/2008.00226">
         8892 <title>Regularization by Denoising via Fixed-Point Projection (RED-PRO). (arXiv:2008.00226v2 [eess.IV] UPDATED)</title>
         8893 <link>http://fr.arxiv.org/abs/2008.00226</link>
         8894 <description rdf:parseType="Literal">&lt;p&gt;Inverse problems in image processing are typically cast as optimization
         8895 tasks, consisting of data-fidelity and stabilizing regularization terms. A
         8896 recent regularization strategy of great interest utilizes the power of
         8897 denoising engines. Two such methods are the Plug-and-Play Prior (PnP) and
         8898 Regularization by Denoising (RED). While both have shown state-of-the-art
         8899 results in various recovery tasks, their theoretical justification is
         8900 incomplete. In this paper, we aim to bridge between RED and PnP, enriching the
         8901 understanding of both frameworks. Towards that end, we reformulate RED as a
         8902 convex optimization problem utilizing a projection (RED-PRO) onto the
         8903 fixed-point set of demicontractive denoisers. We offer a simple iterative
         8904 solution to this problem, by which we show that PnP proximal gradient method is
         8905 a special case of RED-PRO, while providing guarantees for the convergence of
         8906 both frameworks to globally optimal solutions. In addition, we present
         8907 relaxations of RED-PRO that allow for handling denoisers with limited
         8908 fixed-point sets. Finally, we demonstrate RED-PRO for the tasks of image
         8909 deblurring and super-resolution, showing improved results with respect to the
         8910 original RED framework.
         8911 &lt;/p&gt;
         8912 </description>
         8913 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Cohen_R/0/1/0/all/0/1&quot;&gt;Regev Cohen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Elad_M/0/1/0/all/0/1&quot;&gt;Michael Elad&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Milanfar_P/0/1/0/all/0/1&quot;&gt;Peyman Milanfar&lt;/a&gt;</dc:creator>
         8914 </item>
         8915 <item rdf:about="http://fr.arxiv.org/abs/2008.02464">
         8916 <title>A Matrix Chernoff Bound for Markov Chains and Its Application to Co-occurrence Matrices. (arXiv:2008.02464v2 [stat.ML] UPDATED)</title>
         8917 <link>http://fr.arxiv.org/abs/2008.02464</link>
         8918 <description rdf:parseType="Literal">&lt;p&gt;We prove a Chernoff-type bound for sums of matrix-valued random variables
         8919 sampled via a regular (aperiodic and irreducible) finite Markov chain.
         8920 Specially, consider a random walk on a regular Markov chain and a Hermitian
         8921 matrix-valued function on its state space. Our result gives exponentially
         8922 decreasing bounds on the tail distributions of the extreme eigenvalues of the
         8923 sample mean matrix. Our proof is based on the matrix expander (regular
         8924 undirected graph) Chernoff bound [Garg et al. STOC &apos;18] and scalar
         8925 Chernoff-Hoeffding bounds for Markov chains [Chung et al. STACS &apos;12].
         8926 &lt;/p&gt;
         8927 &lt;p&gt;Our matrix Chernoff bound for Markov chains can be applied to analyze the
         8928 behavior of co-occurrence statistics for sequential data, which have been
         8929 common and important data signals in machine learning. We show that given a
         8930 regular Markov chain with $n$ states and mixing time $\tau$, we need a
         8931 trajectory of length $O(\tau (\log{(n)}+\log{(\tau)})/\epsilon^2)$ to achieve
         8932 an estimator of the co-occurrence matrix with error bound $\epsilon$. We
         8933 conduct several experiments and the experimental results are consistent with
         8934 the exponentially fast convergence rate from theoretical analysis. Our result
         8935 gives the first bound on the convergence rate of the co-occurrence matrix and
         8936 the first sample complexity analysis in graph representation learning.
         8937 &lt;/p&gt;
         8938 </description>
         8939 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Qiu_J/0/1/0/all/0/1&quot;&gt;Jiezhong Qiu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Wang_C/0/1/0/all/0/1&quot;&gt;Chi Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Liao_B/0/1/0/all/0/1&quot;&gt;Ben Liao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Peng_R/0/1/0/all/0/1&quot;&gt;Richard Peng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Tang_J/0/1/0/all/0/1&quot;&gt;Jie Tang&lt;/a&gt;</dc:creator>
         8940 </item>
         8941 <item rdf:about="http://fr.arxiv.org/abs/2008.02834">
         8942 <title>Integration of the 3D Environment for UAV Onboard Visual Object Tracking. (arXiv:2008.02834v3 [cs.CV] UPDATED)</title>
         8943 <link>http://fr.arxiv.org/abs/2008.02834</link>
         8944 <description rdf:parseType="Literal">&lt;p&gt;Single visual object tracking from an unmanned aerial vehicle (UAV) poses
         8945 fundamental challenges such as object occlusion, small-scale objects,
         8946 background clutter, and abrupt camera motion. To tackle these difficulties, we
         8947 propose to integrate the 3D structure of the observed scene into a
         8948 detection-by-tracking algorithm. We introduce a pipeline that combines a
         8949 model-free visual object tracker, a sparse 3D reconstruction, and a state
         8950 estimator. The 3D reconstruction of the scene is computed with an image-based
         8951 Structure-from-Motion (SfM) component that enables us to leverage a state
         8952 estimator in the corresponding 3D scene during tracking. By representing the
         8953 position of the target in 3D space rather than in image space, we stabilize the
         8954 tracking during ego-motion and improve the handling of occlusions, background
         8955 clutter, and small-scale objects. We evaluated our approach on prototypical
         8956 image sequences, captured from a UAV with low-altitude oblique views. For this
         8957 purpose, we adapted an existing dataset for visual object tracking and
         8958 reconstructed the observed scene in 3D. The experimental results demonstrate
         8959 that the proposed approach outperforms methods using plain visual cues as well
         8960 as approaches leveraging image-space-based state estimations. We believe that
         8961 our approach can be beneficial for traffic monitoring, video surveillance, and
         8962 navigation.
         8963 &lt;/p&gt;
         8964 </description>
         8965 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vujasinovic_S/0/1/0/all/0/1&quot;&gt;St&amp;#xe9;phane Vujasinovi&amp;#x107;&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Becker_S/0/1/0/all/0/1&quot;&gt;Stefan Becker&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Breuer_T/0/1/0/all/0/1&quot;&gt;Timo Breuer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bullinger_S/0/1/0/all/0/1&quot;&gt;Sebastian Bullinger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Scherer_Negenborn_N/0/1/0/all/0/1&quot;&gt;Norbert Scherer-Negenborn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Arens_M/0/1/0/all/0/1&quot;&gt;Michael Arens&lt;/a&gt;</dc:creator>
         8966 </item>
         8967 <item rdf:about="http://fr.arxiv.org/abs/2008.04717">
         8968 <title>Lifted Multiplicity Codes. (arXiv:2008.04717v2 [cs.IT] UPDATED)</title>
         8969 <link>http://fr.arxiv.org/abs/2008.04717</link>
         8970 <description rdf:parseType="Literal">&lt;p&gt;Lifted Reed-Solomon codes and multiplicity codes are two classes of
         8971 evaluation codes that allow for the design of high-rate codes that can recover
         8972 every codeword or information symbol from many disjoint sets. Recently, the
         8973 underlying approaches have been combined to construct lifted bi-variate
         8974 multiplicity codes, that can further improve on the rate. We continue the study
         8975 of these codes by providing lower bounds on the rate and distance for lifted
         8976 multiplicity codes obtained from polynomials in an arbitrary number of
         8977 variables. Specifically, we investigate a subcode of a lifted multiplicity code
         8978 formed by the linear span of $m$-variate monomials whose restriction to an
         8979 arbitrary line in $\mathbb{F}_q^m$ is equivalent to a low-degree uni-variate
         8980 polynomial. We find the tight asymptotic behavior of the fraction of such
         8981 monomials when the number of variables $m$ is fixed and the alphabet size
         8982 $q=2^\ell$ is large. For some parameter regimes, lifted multiplicity codes are
         8983 then shown to have a better trade-off between redundancy and the number of
         8984 disjoint recovering sets for every codeword or information symbol than
         8985 previously known constructions. Additionally, we present a local
         8986 self-correction algorithm for lifted multiplicity codes.
         8987 &lt;/p&gt;
         8988 </description>
         8989 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Holzbaur_L/0/1/0/all/0/1&quot;&gt;Lukas Holzbaur&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Polyanskaya_R/0/1/0/all/0/1&quot;&gt;Rina Polyanskaya&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Polyanskii_N/0/1/0/all/0/1&quot;&gt;Nikita Polyanskii&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vorobyev_I/0/1/0/all/0/1&quot;&gt;Ilya Vorobyev&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yaakobi_E/0/1/0/all/0/1&quot;&gt;Eitan Yaakobi&lt;/a&gt;</dc:creator>
         8990 </item>
         8991 <item rdf:about="http://fr.arxiv.org/abs/2008.09293">
         8992 <title>A Composable Specification Language for Reinforcement Learning Tasks. (arXiv:2008.09293v2 [cs.LG] UPDATED)</title>
         8993 <link>http://fr.arxiv.org/abs/2008.09293</link>
         8994 <description rdf:parseType="Literal">&lt;p&gt;Reinforcement learning is a promising approach for learning control policies
         8995 for robot tasks. However, specifying complex tasks (e.g., with multiple
         8996 objectives and safety constraints) can be challenging, since the user must
         8997 design a reward function that encodes the entire task. Furthermore, the user
         8998 often needs to manually shape the reward to ensure convergence of the learning
         8999 algorithm. We propose a language for specifying complex control tasks, along
         9000 with an algorithm that compiles specifications in our language into a reward
         9001 function and automatically performs reward shaping. We implement our approach
         9002 in a tool called SPECTRL, and show that it outperforms several state-of-the-art
         9003 baselines.
         9004 &lt;/p&gt;
         9005 </description>
         9006 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jothimurugan_K/0/1/0/all/0/1&quot;&gt;Kishor Jothimurugan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Alur_R/0/1/0/all/0/1&quot;&gt;Rajeev Alur&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bastani_O/0/1/0/all/0/1&quot;&gt;Osbert Bastani&lt;/a&gt;</dc:creator>
         9007 </item>
         9008 <item rdf:about="http://fr.arxiv.org/abs/2008.11370">
         9009 <title>Gravilon: Applications of a New Gradient Descent Method to Machine Learning. (arXiv:2008.11370v2 [cs.LG] UPDATED)</title>
         9010 <link>http://fr.arxiv.org/abs/2008.11370</link>
         9011 <description rdf:parseType="Literal">&lt;p&gt;Gradient descent algorithms have been used in countless applications since
         9012 the inception of Newton&apos;s method. The explosion in the number of applications
         9013 of neural networks has re-energized efforts in recent years to improve the
         9014 standard gradient descent method in both efficiency and accuracy. These methods
         9015 modify the effect of the gradient in updating the values of the parameters.
         9016 These modifications often incorporate hyperparameters: additional variables
         9017 whose values must be specified at the outset of the program. We provide, below,
         9018 a novel gradient descent algorithm, called Gravilon, that uses the geometry of
         9019 the hypersurface to modify the length of the step in the direction of the
         9020 gradient. Using neural networks, we provide promising experimental results
         9021 comparing the accuracy and efficiency of the Gravilon method against commonly
         9022 used gradient descent algorithms on MNIST digit classification.
         9023 &lt;/p&gt;
         9024 </description>
         9025 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kelterborn_C/0/1/0/all/0/1&quot;&gt;Chad Kelterborn&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mazur_M/0/1/0/all/0/1&quot;&gt;Marcin Mazur&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Petrenko_B/0/1/0/all/0/1&quot;&gt;Bogdan V. Petrenko&lt;/a&gt;</dc:creator>
         9026 </item>
         9027 <item rdf:about="http://fr.arxiv.org/abs/2008.12775">
         9028 <title>On the model-based stochastic value gradient for continuous reinforcement learning. (arXiv:2008.12775v2 [cs.LG] UPDATED)</title>
         9029 <link>http://fr.arxiv.org/abs/2008.12775</link>
         9030 <description rdf:parseType="Literal">&lt;p&gt;Model-based reinforcement learning approaches add explicit domain knowledge
         9031 to agents in hopes of improving the sample-efficiency in comparison to
         9032 model-free agents. However, in practice model-based methods are unable to
         9033 achieve the same asymptotic performance on challenging continuous control tasks
         9034 due to the complexity of learning and controlling an explicit world model. In
         9035 this paper we investigate the stochastic value gradient (SVG), which is a
         9036 well-known family of methods for controlling continuous systems which includes
         9037 model-based approaches that distill a model-based value expansion into a
         9038 model-free policy. We consider a variant of the model-based SVG that scales to
         9039 larger systems and uses 1) an entropy regularization to help with exploration,
         9040 2) a learned deterministic world model to improve the short-horizon value
         9041 estimate, and 3) a learned model-free value estimate after the model&apos;s rollout.
         9042 This SVG variation captures the model-free soft actor-critic method as an
         9043 instance when the model rollout horizon is zero, and otherwise uses
         9044 short-horizon model rollouts to improve the value estimate for the policy
         9045 update. We surpass the asymptotic performance of other model-based methods on
         9046 the proprioceptive MuJoCo locomotion tasks from the OpenAI gym, including a
         9047 humanoid. We notably achieve these results with a simple deterministic world
         9048 model without requiring an ensemble.
         9049 &lt;/p&gt;
         9050 </description>
         9051 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Amos_B/0/1/0/all/0/1&quot;&gt;Brandon Amos&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Stanton_S/0/1/0/all/0/1&quot;&gt;Samuel Stanton&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yarats_D/0/1/0/all/0/1&quot;&gt;Denis Yarats&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wilson_A/0/1/0/all/0/1&quot;&gt;Andrew Gordon Wilson&lt;/a&gt;</dc:creator>
         9052 </item>
         9053 <item rdf:about="http://fr.arxiv.org/abs/2008.13567">
         9054 <title>Introduction to logistic regression. (arXiv:2008.13567v2 [stat.ME] UPDATED)</title>
         9055 <link>http://fr.arxiv.org/abs/2008.13567</link>
         9056 <description rdf:parseType="Literal">&lt;p&gt;For random field theory based multiple comparison corrections In brain
         9057 imaging, it is often necessary to compute the distribution of the supremum of a
         9058 random field. Unfortunately, computing the distribution of the supremum of the
         9059 random field is not easy and requires satisfying many distributional
         9060 assumptions that may not be true in real data. Thus, there is a need to come up
         9061 with a different framework that does not use the traditional statistical
         9062 hypothesis testing paradigm that requires to compute p-values. With this as a
         9063 motivation, we can use a different approach called the logistic regression that
         9064 does not require computing the p-value and still be able to localize the
         9065 regions of brain network differences. Unlike other discriminant and
         9066 classification techniques that tried to classify preselected feature vectors,
         9067 the method here does not require any preselected feature vectors and performs
         9068 the classification at each edge level.
         9069 &lt;/p&gt;
         9070 </description>
         9071 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Chung_M/0/1/0/all/0/1&quot;&gt;Moo K. Chung&lt;/a&gt;</dc:creator>
         9072 </item>
         9073 <item rdf:about="http://fr.arxiv.org/abs/2009.00110">
         9074 <title>Individuation and Adaptation in Complex Systems. (arXiv:2009.00110v2 [cs.NE] UPDATED)</title>
         9075 <link>http://fr.arxiv.org/abs/2009.00110</link>
         9076 <description rdf:parseType="Literal">&lt;p&gt;Complex systems have certain characteristics such as network structures of a
         9077 large number of individual elements, adaptation, and emergence. While these
         9078 characteristics have been studied and described, it is often not so clear where
         9079 they exactly come from. There is a focus on concrete system states rather than
         9080 the emergence of the computer models themselves used to study these systems. To
         9081 better understand typical characteristics of complex systems and their
         9082 emergence, we recently presented a system metamodel based on which computer
         9083 models can be created from abstract building blocks. In this study we extend
         9084 our system metamodel with the concept of adaption in order to integrate
         9085 adaptive computation in our so-called allagmatic method - a framework
         9086 consisting of the system metamodel but also a way to study the creation of the
         9087 computer model itself. Running experiments with cellular automata and
         9088 artificial neural networks, we find that the system metamodel integrates
         9089 adaptation with an additional operation called adaptation function that
         9090 operates on the update function, which encodes the system&apos;s dynamics. It allows
         9091 the creation of adaptive computations by providing an abstract template for
         9092 adaptation and guidance for implementation. Further, the object-oriented and
         9093 template meta-programming leads to a creation of computer models comparable to
         9094 the individuation of observed systems. It therefore allows to study not only
         9095 the behaviour of a running model but also its creation. The development of the
         9096 system metamodel was first inspired by concepts of the philosophy of
         9097 individuation of Gilbert Simondon. The theoretical background for the concept
         9098 of adaptation is taken from the philosophy of organism of Alfred North
         9099 Whitehead. In general, through the possibility to follow individuation, the
         9100 allagmatic method allows to better understand the emergence of typical
         9101 characteristics of complex systems.
         9102 &lt;/p&gt;
         9103 </description>
         9104 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fabbro_O/0/1/0/all/0/1&quot;&gt;Olivier Del Fabbro&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Christen_P/0/1/0/all/0/1&quot;&gt;Patrik Christen&lt;/a&gt;</dc:creator>
         9105 </item>
         9106 <item rdf:about="http://fr.arxiv.org/abs/2009.00142">
         9107 <title>Distance Encoding: Design Provably More Powerful Neural Networks for Graph Representation Learning. (arXiv:2009.00142v4 [cs.LG] UPDATED)</title>
         9108 <link>http://fr.arxiv.org/abs/2009.00142</link>
         9109 <description rdf:parseType="Literal">&lt;p&gt;Learning representations of sets of nodes in a graph is crucial for
         9110 applications ranging from node-role discovery to link prediction and molecule
         9111 classification. Graph Neural Networks (GNNs) have achieved great success in
         9112 graph representation learning. However, expressive power of GNNs is limited by
         9113 the 1-Weisfeiler-Lehman (WL) test and thus GNNs generate identical
         9114 representations for graph substructures that may in fact be very different.
         9115 More powerful GNNs, proposed recently by mimicking higher-order-WL tests, only
         9116 focus on representing entire graphs and they are computationally inefficient as
         9117 they cannot utilize sparsity of the underlying graph. Here we propose and
         9118 mathematically analyze a general class of structure-related features, termed
         9119 Distance Encoding (DE). DE assists GNNs in representing any set of nodes, while
         9120 providing strictly more expressive power than the 1-WL test. DE captures the
         9121 distance between the node set whose representation is to be learned and each
         9122 node in the graph. To capture the distance DE can apply various graph-distance
         9123 measures such as shortest path distance or generalized PageRank scores. We
         9124 propose two ways for GNNs to use DEs (1) as extra node features, and (2) as
         9125 controllers of message aggregation in GNNs. Both approaches can utilize the
         9126 sparse structure of the underlying graph, which leads to computational
         9127 efficiency and scalability. We also prove that DE can distinguish node sets
         9128 embedded in almost all regular graphs where traditional GNNs always fail. We
         9129 evaluate DE on three tasks over six real networks: structural role prediction,
         9130 link prediction, and triangle prediction. Results show that our models
         9131 outperform GNNs without DE by up-to 15\% in accuracy and AUROC. Furthermore,
         9132 our models also significantly outperform other state-of-the-art methods
         9133 especially designed for the above tasks.
         9134 &lt;/p&gt;
         9135 </description>
         9136 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_P/0/1/0/all/0/1&quot;&gt;Pan Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yanbang Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_H/0/1/0/all/0/1&quot;&gt;Hongwei Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leskovec_J/0/1/0/all/0/1&quot;&gt;Jure Leskovec&lt;/a&gt;</dc:creator>
         9137 </item>
         9138 <item rdf:about="http://fr.arxiv.org/abs/2009.01194">
         9139 <title>Accelerated reactive transport simulations in heterogeneous porous media using Reaktoro and Firedrake. (arXiv:2009.01194v2 [cs.CE] UPDATED)</title>
         9140 <link>http://fr.arxiv.org/abs/2009.01194</link>
         9141 <description rdf:parseType="Literal">&lt;p&gt;This work investigates the performance of the on-demand machine learning
         9142 (ODML) algorithm introduced in Leal et al. (2020) when applied to different
         9143 reactive transport problems in heterogeneous porous media. ODML was devised to
         9144 accelerate the computationally expensive geochemical reaction calculations in
         9145 reactive transport simulations. We demonstrate that the ODML algorithm speeds
         9146 up these calculations by one to three orders of magnitude. Such acceleration,
         9147 in turn, significantly accelerates the entire reactive transport simulation.
         9148 The numerical experiments are performed by implementing the coupling of two
         9149 open-source software packages: Reaktoro (Leal, 2015) and Firedrake (Rathgeber
         9150 et al., 2016).
         9151 &lt;/p&gt;
         9152 </description>
         9153 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kyas_S/0/1/0/all/0/1&quot;&gt;Svetlana Kyas&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Volpatto_D/0/1/0/all/0/1&quot;&gt;Diego Volpatto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Saar_M/0/1/0/all/0/1&quot;&gt;Martin O. Saar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Leal_A/0/1/0/all/0/1&quot;&gt;Allan M. M. Leal&lt;/a&gt;</dc:creator>
         9154 </item>
         9155 <item rdf:about="http://fr.arxiv.org/abs/2009.03133">
         9156 <title>Analysis of Uplink IRS-Assisted NOMA under Nakagami-m Fading via Moments Matching. (arXiv:2009.03133v2 [cs.IT] UPDATED)</title>
         9157 <link>http://fr.arxiv.org/abs/2009.03133</link>
         9158 <description rdf:parseType="Literal">&lt;p&gt;This letter investigates the uplink outage performance of intelligent
         9159 reflecting surface (IRS)-assisted non-orthogonal multiple access (NOMA). We
         9160 consider the general case where all users have both direct and reflection
         9161 links, and all links undergo Nakagami-m fading. We approximate the received
         9162 powers of the NOMA users as Gamma random variables via moments matching. This
         9163 allows for tractable expressions of the outage under interference cancellation
         9164 (IC), while being flexible in modeling various propagation environments. Our
         9165 analysis shows that under certain conditions, the presence of an IRS might
         9166 degrade the performance of users that have dominant line-of-sight (LOS) to the
         9167 base station (BS), while users dominated by non-line-of-sight (NLOS) will
         9168 always benefit from it.
         9169 &lt;/p&gt;
         9170 </description>
         9171 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tahir_B/0/1/0/all/0/1&quot;&gt;Bashar Tahir&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schwarz_S/0/1/0/all/0/1&quot;&gt;Stefan Schwarz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rupp_M/0/1/0/all/0/1&quot;&gt;Markus Rupp&lt;/a&gt;</dc:creator>
         9172 </item>
         9173 <item rdf:about="http://fr.arxiv.org/abs/2009.05524">
         9174 <title>Physically Embedded Planning Problems: New Challenges for Reinforcement Learning. (arXiv:2009.05524v2 [cs.AI] UPDATED)</title>
         9175 <link>http://fr.arxiv.org/abs/2009.05524</link>
         9176 <description rdf:parseType="Literal">&lt;p&gt;Recent work in deep reinforcement learning (RL) has produced algorithms
         9177 capable of mastering challenging games such as Go, chess, or shogi. In these
         9178 works the RL agent directly observes the natural state of the game and controls
         9179 that state directly with its actions. However, when humans play such games,
         9180 they do not just reason about the moves but also interact with their physical
         9181 environment. They understand the state of the game by looking at the physical
         9182 board in front of them and modify it by manipulating pieces using touch and
         9183 fine-grained motor control. Mastering complicated physical systems with
         9184 abstract goals is a central challenge for artificial intelligence, but it
         9185 remains out of reach for existing RL algorithms. To encourage progress towards
         9186 this goal we introduce a set of physically embedded planning problems and make
         9187 them publicly available. We embed challenging symbolic tasks (Sokoban,
         9188 tic-tac-toe, and Go) in a physics engine to produce a set of tasks that require
         9189 perception, reasoning, and motor control over long time horizons. Although
         9190 existing RL algorithms can tackle the symbolic versions of these tasks, we find
         9191 that they struggle to master even the simplest of their physically embedded
         9192 counterparts. As a first step towards characterizing the space of solution to
         9193 these tasks, we introduce a strong baseline that uses a pre-trained expert game
         9194 player to provide hints in the abstract space to an RL agent&apos;s policy while
         9195 training it on the full sensorimotor control task. The resulting agent solves
         9196 many of the tasks, underlining the need for methods that bridge the gap between
         9197 abstract planning and embodied control. See illustrating video at
         9198 https://youtu.be/RwHiHlym_1k.
         9199 &lt;/p&gt;
         9200 </description>
         9201 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mirza_M/0/1/0/all/0/1&quot;&gt;Mehdi Mirza&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jaegle_A/0/1/0/all/0/1&quot;&gt;Andrew Jaegle&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hunt_J/0/1/0/all/0/1&quot;&gt;Jonathan J. Hunt&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Guez_A/0/1/0/all/0/1&quot;&gt;Arthur Guez&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tunyasuvunakool_S/0/1/0/all/0/1&quot;&gt;Saran Tunyasuvunakool&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Muldal_A/0/1/0/all/0/1&quot;&gt;Alistair Muldal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Weber_T/0/1/0/all/0/1&quot;&gt;Th&amp;#xe9;ophane Weber&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Karkus_P/0/1/0/all/0/1&quot;&gt;Peter Karkus&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Racaniere_S/0/1/0/all/0/1&quot;&gt;S&amp;#xe9;bastien Racani&amp;#xe8;re&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Buesing_L/0/1/0/all/0/1&quot;&gt;Lars Buesing&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lillicrap_T/0/1/0/all/0/1&quot;&gt;Timothy Lillicrap&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Heess_N/0/1/0/all/0/1&quot;&gt;Nicolas Heess&lt;/a&gt;</dc:creator>
         9202 </item>
         9203 <item rdf:about="http://fr.arxiv.org/abs/2009.07165">
         9204 <title>Beyond Individualized Recourse: Interpretable and Interactive Summaries of Actionable Recourses. (arXiv:2009.07165v3 [cs.LG] UPDATED)</title>
         9205 <link>http://fr.arxiv.org/abs/2009.07165</link>
         9206 <description rdf:parseType="Literal">&lt;p&gt;As predictive models are increasingly being deployed in high-stakes
         9207 decision-making, there has been a lot of interest in developing algorithms
         9208 which can provide recourses to affected individuals. While developing such
         9209 tools is important, it is even more critical to analyse and interpret a
         9210 predictive model, and vet it thoroughly to ensure that the recourses it offers
         9211 are meaningful and non-discriminatory before it is deployed in the real world.
         9212 To this end, we propose a novel model agnostic framework called Actionable
         9213 Recourse Summaries (AReS) to construct global counterfactual explanations which
         9214 provide an interpretable and accurate summary of recourses for the entire
         9215 population. We formulate a novel objective which simultaneously optimizes for
         9216 correctness of the recourses and interpretability of the explanations, while
         9217 minimizing overall recourse costs across the entire population. More
         9218 specifically, our objective enables us to learn, with optimality guarantees on
         9219 recourse correctness, a small number of compact rule sets each of which capture
         9220 recourses for well defined subpopulations within the data. We also demonstrate
         9221 theoretically that several of the prior approaches proposed to generate
         9222 recourses for individuals are special cases of our framework. Experimental
         9223 evaluation with real world datasets and user studies demonstrate that our
         9224 framework can provide decision makers with a comprehensive overview of
         9225 recourses corresponding to any black box model, and consequently help detect
         9226 undesirable model biases and discrimination.
         9227 &lt;/p&gt;
         9228 </description>
         9229 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rawal_K/0/1/0/all/0/1&quot;&gt;Kaivalya Rawal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lakkaraju_H/0/1/0/all/0/1&quot;&gt;Himabindu Lakkaraju&lt;/a&gt;</dc:creator>
         9230 </item>
         9231 <item rdf:about="http://fr.arxiv.org/abs/2009.07203">
         9232 <title>CorDEL: A Contrastive Deep Learning Approach for Entity Linkage. (arXiv:2009.07203v2 [cs.DB] UPDATED)</title>
         9233 <link>http://fr.arxiv.org/abs/2009.07203</link>
         9234 <description rdf:parseType="Literal">&lt;p&gt;Entity linkage (EL) is a critical problem in data cleaning and integration.
         9235 In the past several decades, EL has typically been done by rule-based systems
         9236 or traditional machine learning models with hand-curated features, both of
         9237 which heavily depend on manual human inputs. With the ever-increasing growth of
         9238 new data, deep learning (DL) based approaches have been proposed to alleviate
         9239 the high cost of EL associated with the traditional models. Existing
         9240 exploration of DL models for EL strictly follows the well-known twin-network
         9241 architecture. However, we argue that the twin-network architecture is
         9242 sub-optimal to EL, leading to inherent drawbacks of existing models. In order
         9243 to address the drawbacks, we propose a novel and generic contrastive DL
         9244 framework for EL. The proposed framework is able to capture both syntactic and
         9245 semantic matching signals and pays attention to subtle but critical
         9246 differences. Based on the framework, we develop a contrastive DL approach for
         9247 EL, called CorDEL, with three powerful variants. We evaluate CorDEL with
         9248 extensive experiments conducted on both public benchmark datasets and a
         9249 real-world dataset. CorDEL outperforms previous state-of-the-art models by 5.2%
         9250 on public benchmark datasets. Moreover, CorDEL yields a 2.4% improvement over
         9251 the current best DL model on the real-world dataset, while reducing the number
         9252 of training parameters by 97.6%.
         9253 &lt;/p&gt;
         9254 </description>
         9255 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Z/0/1/0/all/0/1&quot;&gt;Zhengyang Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sisman_B/0/1/0/all/0/1&quot;&gt;Bunyamin Sisman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wei_H/0/1/0/all/0/1&quot;&gt;Hao Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dong_X/0/1/0/all/0/1&quot;&gt;Xin Luna Dong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ji_S/0/1/0/all/0/1&quot;&gt;Shuiwang Ji&lt;/a&gt;</dc:creator>
         9256 </item>
         9257 <item rdf:about="http://fr.arxiv.org/abs/2009.07253">
         9258 <title>Autoregressive Knowledge Distillation through Imitation Learning. (arXiv:2009.07253v2 [cs.CL] UPDATED)</title>
         9259 <link>http://fr.arxiv.org/abs/2009.07253</link>
         9260 <description rdf:parseType="Literal">&lt;p&gt;The performance of autoregressive models on natural language generation tasks
         9261 has dramatically improved due to the adoption of deep, self-attentive
         9262 architectures. However, these gains have come at the cost of hindering
         9263 inference speed, making state-of-the-art models cumbersome to deploy in
         9264 real-world, time-sensitive settings. We develop a compression technique for
         9265 autoregressive models that is driven by an imitation learning perspective on
         9266 knowledge distillation. The algorithm is designed to address the exposure bias
         9267 problem. On prototypical language generation tasks such as translation and
         9268 summarization, our method consistently outperforms other distillation
         9269 algorithms, such as sequence-level knowledge distillation. Student models
         9270 trained with our method attain 1.4 to 4.8 BLEU/ROUGE points higher than those
         9271 trained from scratch, while increasing inference speed by up to 14 times in
         9272 comparison to the teacher model.
         9273 &lt;/p&gt;
         9274 </description>
         9275 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lin_A/0/1/0/all/0/1&quot;&gt;Alexander Lin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wohlwend_J/0/1/0/all/0/1&quot;&gt;Jeremy Wohlwend&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_H/0/1/0/all/0/1&quot;&gt;Howard Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lei_T/0/1/0/all/0/1&quot;&gt;Tao Lei&lt;/a&gt;</dc:creator>
         9276 </item>
         9277 <item rdf:about="http://fr.arxiv.org/abs/2009.08276">
         9278 <title>Video based real-time positional tracker. (arXiv:2009.08276v3 [cs.CV] UPDATED)</title>
         9279 <link>http://fr.arxiv.org/abs/2009.08276</link>
         9280 <description rdf:parseType="Literal">&lt;p&gt;We propose a system that uses video as the input to track the position of
         9281 objects relative to their surrounding environment in real-time. The neural
         9282 network employed is trained on a 100% synthetic dataset coming from our own
         9283 automated generator. The positional tracker relies on a range of 1 to n video
         9284 cameras placed around an arena of choice.
         9285 &lt;/p&gt;
         9286 &lt;p&gt;The system returns the positions of the tracked objects relative to the
         9287 broader world by understanding the overlapping matrices formed by the cameras
         9288 and therefore these can be extrapolated into real world coordinates.
         9289 &lt;/p&gt;
         9290 &lt;p&gt;In most cases, we achieve a higher update rate and positioning precision than
         9291 any of the existing GPS-based systems, in particular for indoor objects or
         9292 those occluded from clear sky.
         9293 &lt;/p&gt;
         9294 </description>
         9295 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Albarracin_D/0/1/0/all/0/1&quot;&gt;David Albarrac&amp;#xed;n&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hormigo_J/0/1/0/all/0/1&quot;&gt;Jes&amp;#xfa;s Hormigo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fernandez_J/0/1/0/all/0/1&quot;&gt;Jos&amp;#xe9; David Fern&amp;#xe1;ndez&lt;/a&gt;</dc:creator>
         9296 </item>
         9297 <item rdf:about="http://fr.arxiv.org/abs/2009.11329">
         9298 <title>An Embedded Index Code Construction Using Sub-packetization. (arXiv:2009.11329v2 [cs.IT] UPDATED)</title>
         9299 <link>http://fr.arxiv.org/abs/2009.11329</link>
         9300 <description rdf:parseType="Literal">&lt;p&gt;A variant of the index coding problem (ICP), the embedded index coding
         9301 problem (EICP) was introduced in [A. Porter and M. Wootters, &quot;Embedded index
         9302 coding,&quot; ITW, Sweden, 2019] which was motivated by its application in
         9303 distributed computing where every user can act as sender for other users and an
         9304 algorithm for code construction was reported. The constructions depends on the
         9305 computation of minrank of a matrix, which is computationally intensive. In [A.
         9306 Mahesh, N. Sageer Karat and B. S. Rajan, &quot;Min-rank of Embedded Index Coding
         9307 Problems,&quot; ISIT, 2020], for EICP, a notion of side-information matrix was
         9308 introduced and it was proved that the length of an optimal scalar linear index
         9309 code is equal to the min-rank of the side-information matrix. The authors have
         9310 provided an explicit code construction for a class of EICP -
         9311 \textit{Consecutive and Symmetric Embedded Index Coding Problem (CS-EICP)}. We
         9312 introduce the idea of sub-packetization of the messages in index coding
         9313 problems to provide a novel code construction for CS-EICP in contrast to the
         9314 scalar linear solutions provided in the prior works. For CS-EICP, the
         9315 normalized rate, which is defined as the number of bits transmitted by all the
         9316 users together normalized by the total number of bits of all the messages, for
         9317 our construction is lesser than the normalized rate achieved by Mahesh et
         9318 al.,for scalar linear codes.
         9319 &lt;/p&gt;
         9320 </description>
         9321 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sasi_S/0/1/0/all/0/1&quot;&gt;Shanuja Sasi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Aggarwal_V/0/1/0/all/0/1&quot;&gt;Vaneet Aggarwal&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rajan_B/0/1/0/all/0/1&quot;&gt;B. Sundar Rajan&lt;/a&gt;</dc:creator>
         9322 </item>
         9323 <item rdf:about="http://fr.arxiv.org/abs/2009.12729">
         9324 <title>Multi-scale Deep Neural Network (MscaleDNN) Methods for Oscillatory Stokes Flows in Complex Domains. (arXiv:2009.12729v2 [math.NA] UPDATED)</title>
         9325 <link>http://fr.arxiv.org/abs/2009.12729</link>
         9326 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we study a multi-scale deep neural network (MscaleDNN) as a
         9327 meshless numerical method for computing oscillatory Stokes flows in complex
         9328 domains. The MscaleDNN employs a multi-scale structure in the design of its DNN
         9329 using radial scalings to convert the approximation of high frequency components
         9330 of the highly oscillatory Stokes solution to one of lower frequencies. The
         9331 MscaleDNN solution to the Stokes problem is obtained by minimizing a loss
         9332 function in terms of L2 normof the residual of the Stokes equation. Three forms
         9333 of loss functions are investigated based on vorticity-velocity-pressure,
         9334 velocity-stress-pressure, and velocity-gradient of velocity-pressure
         9335 formulations of the Stokes equation. We first conduct a systematic study of the
         9336 MscaleDNN methods with various loss functions on the Kovasznay flow in
         9337 comparison with normal fully connected DNNs. Then, Stokes flows with highly
         9338 oscillatory solutions in a 2-D domain with six randomly placed holes are
         9339 simulated by the MscaleDNN. The results show that MscaleDNN has faster
         9340 convergence and consistent error decays in the simulation of Kovasznay flow for
         9341 all four tested loss functions. More importantly, the MscaleDNN is capable of
         9342 learning highly oscillatory solutions when the normal DNNs fail to converge.
         9343 &lt;/p&gt;
         9344 </description>
         9345 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Wang_B/0/1/0/all/0/1&quot;&gt;Bo Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Zhang_W/0/1/0/all/0/1&quot;&gt;Wenzhong Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Cai_W/0/1/0/all/0/1&quot;&gt;Wei Cai&lt;/a&gt;</dc:creator>
         9346 </item>
         9347 <item rdf:about="http://fr.arxiv.org/abs/2009.12829">
         9348 <title>Domain Generalization for Medical Imaging Classification with Linear-Dependency Regularization. (arXiv:2009.12829v3 [cs.CV] UPDATED)</title>
         9349 <link>http://fr.arxiv.org/abs/2009.12829</link>
         9350 <description rdf:parseType="Literal">&lt;p&gt;Recently, we have witnessed great progress in the field of medical imaging
         9351 classification by adopting deep neural networks. However, the recent advanced
         9352 models still require accessing sufficiently large and representative datasets
         9353 for training, which is often unfeasible in clinically realistic environments.
         9354 When trained on limited datasets, the deep neural network is lack of
         9355 generalization capability, as the trained deep neural network on data within a
         9356 certain distribution (e.g. the data captured by a certain device vendor or
         9357 patient population) may not be able to generalize to the data with another
         9358 distribution.
         9359 &lt;/p&gt;
         9360 &lt;p&gt;In this paper, we introduce a simple but effective approach to improve the
         9361 generalization capability of deep neural networks in the field of medical
         9362 imaging classification. Motivated by the observation that the domain
         9363 variability of the medical images is to some extent compact, we propose to
         9364 learn a representative feature space through variational encoding with a novel
         9365 linear-dependency regularization term to capture the shareable information
         9366 among medical data collected from different domains. As a result, the trained
         9367 neural network is expected to equip with better generalization capability to
         9368 the &quot;unseen&quot; medical data. Experimental results on two challenging medical
         9369 imaging classification tasks indicate that our method can achieve better
         9370 cross-domain generalization capability compared with state-of-the-art
         9371 baselines.
         9372 &lt;/p&gt;
         9373 </description>
         9374 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_H/0/1/0/all/0/1&quot;&gt;Haoliang Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;YuFei Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wan_R/0/1/0/all/0/1&quot;&gt;Renjie Wan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_S/0/1/0/all/0/1&quot;&gt;Shiqi Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_T/0/1/0/all/0/1&quot;&gt;Tie-Qiang Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kot_A/0/1/0/all/0/1&quot;&gt;Alex C. Kot&lt;/a&gt;</dc:creator>
         9375 </item>
         9376 <item rdf:about="http://fr.arxiv.org/abs/2010.00182">
         9377 <title>Dual Attention Model for Citation Recommendation. (arXiv:2010.00182v4 [cs.IR] UPDATED)</title>
         9378 <link>http://fr.arxiv.org/abs/2010.00182</link>
         9379 <description rdf:parseType="Literal">&lt;p&gt;Based on an exponentially increasing number of academic articles, discovering
         9380 and citing comprehensive and appropriate resources has become a non-trivial
         9381 task. Conventional citation recommender methods suffer from severe information
         9382 loss. For example, they do not consider the section of the paper that the user
         9383 is writing and for which they need to find a citation, the relatedness between
         9384 the words in the local context (the text span that describes a citation), or
         9385 the importance on each word from the local context. These shortcomings make
         9386 such methods insufficient for recommending adequate citations to academic
         9387 manuscripts. In this study, we propose a novel embedding-based neural network
         9388 called &quot;dual attention model for citation recommendation (DACR)&quot; to recommend
         9389 citations during manuscript preparation. Our method adapts embedding of three
         9390 dimensions of semantic information: words in the local context, structural
         9391 contexts, and the section on which a user is working. A neural network is
         9392 designed to maximize the similarity between the embedding of the three input
         9393 (local context words, section and structural contexts) and the target citation
         9394 appearing in the context. The core of the neural network is composed of
         9395 self-attention and additive attention, where the former aims to capture the
         9396 relatedness between the contextual words and structural context, and the latter
         9397 aims to learn the importance of them. The experiments on real-world datasets
         9398 demonstrate the effectiveness of the proposed approach.
         9399 &lt;/p&gt;
         9400 </description>
         9401 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yang Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ma_Q/0/1/0/all/0/1&quot;&gt;Qiang Ma&lt;/a&gt;</dc:creator>
         9402 </item>
         9403 <item rdf:about="http://fr.arxiv.org/abs/2010.02480">
         9404 <title>Pretrained Language Model Embryology: The Birth of ALBERT. (arXiv:2010.02480v2 [cs.CL] UPDATED)</title>
         9405 <link>http://fr.arxiv.org/abs/2010.02480</link>
         9406 <description rdf:parseType="Literal">&lt;p&gt;While behaviors of pretrained language models (LMs) have been thoroughly
         9407 examined, what happened during pretraining is rarely studied. We thus
         9408 investigate the developmental process from a set of randomly initialized
         9409 parameters to a totipotent language model, which we refer to as the embryology
         9410 of a pretrained language model. Our results show that ALBERT learns to
         9411 reconstruct and predict tokens of different parts of speech (POS) in different
         9412 learning speeds during pretraining. We also find that linguistic knowledge and
         9413 world knowledge do not generally improve as pretraining proceeds, nor do
         9414 downstream tasks&apos; performance. These findings suggest that knowledge of a
         9415 pretrained model varies during pretraining, and having more pretrain steps does
         9416 not necessarily provide a model with more comprehensive knowledge. We will
         9417 provide source codes and pretrained models to reproduce our results at
         9418 https://github.com/d223302/albert-embryology.
         9419 &lt;/p&gt;
         9420 </description>
         9421 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chiang_C/0/1/0/all/0/1&quot;&gt;Cheng-Han Chiang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Huang_S/0/1/0/all/0/1&quot;&gt;Sung-Feng Huang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lee_H/0/1/0/all/0/1&quot;&gt;Hung-yi Lee&lt;/a&gt;</dc:creator>
         9422 </item>
         9423 <item rdf:about="http://fr.arxiv.org/abs/2010.02510">
         9424 <title>Investigating African-American Vernacular English in Transformer-Based Text Generation. (arXiv:2010.02510v2 [cs.CL] UPDATED)</title>
         9425 <link>http://fr.arxiv.org/abs/2010.02510</link>
         9426 <description rdf:parseType="Literal">&lt;p&gt;The growth of social media has encouraged the written use of African American
         9427 Vernacular English (AAVE), which has traditionally been used only in oral
         9428 contexts. However, NLP models have historically been developed using dominant
         9429 English varieties, such as Standard American English (SAE), due to text corpora
         9430 availability. We investigate the performance of GPT-2 on AAVE text by creating
         9431 a dataset of intent-equivalent parallel AAVE/SAE tweet pairs, thereby isolating
         9432 syntactic structure and AAVE- or SAE-specific language for each pair. We
         9433 evaluate each sample and its GPT-2 generated text with pretrained sentiment
         9434 classifiers and find that while AAVE text results in more classifications of
         9435 negative sentiment than SAE, the use of GPT-2 generally increases occurrences
         9436 of positive sentiment for both. Additionally, we conduct human evaluation of
         9437 AAVE and SAE text generated with GPT-2 to compare contextual rigor and overall
         9438 quality.
         9439 &lt;/p&gt;
         9440 </description>
         9441 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Groenwold_S/0/1/0/all/0/1&quot;&gt;Sophie Groenwold&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ou_L/0/1/0/all/0/1&quot;&gt;Lily Ou&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Parekh_A/0/1/0/all/0/1&quot;&gt;Aesha Parekh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Honnavalli_S/0/1/0/all/0/1&quot;&gt;Samhita Honnavalli&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Levy_S/0/1/0/all/0/1&quot;&gt;Sharon Levy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mirza_D/0/1/0/all/0/1&quot;&gt;Diba Mirza&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_W/0/1/0/all/0/1&quot;&gt;William Yang Wang&lt;/a&gt;</dc:creator>
         9442 </item>
         9443 <item rdf:about="http://fr.arxiv.org/abs/2010.02519">
         9444 <title>Improved Analysis of Clipping Algorithms for Non-convex Optimization. (arXiv:2010.02519v2 [cs.LG] UPDATED)</title>
         9445 <link>http://fr.arxiv.org/abs/2010.02519</link>
         9446 <description rdf:parseType="Literal">&lt;p&gt;Gradient clipping is commonly used in training deep neural networks partly
         9447 due to its practicability in relieving the exploding gradient problem.
         9448 Recently, \citet{zhang2019gradient} show that clipped (stochastic) Gradient
         9449 Descent (GD) converges faster than vanilla GD/SGD via introducing a new
         9450 assumption called $(L_0, L_1)$-smoothness, which characterizes the violent
         9451 fluctuation of gradients typically encountered in deep neural networks.
         9452 However, their iteration complexities on the problem-dependent parameters are
         9453 rather pessimistic, and theoretical justification of clipping combined with
         9454 other crucial techniques, e.g. momentum acceleration, are still lacking. In
         9455 this paper, we bridge the gap by presenting a general framework to study the
         9456 clipping algorithms, which also takes momentum methods into consideration. We
         9457 provide convergence analysis of the framework in both deterministic and
         9458 stochastic setting, and demonstrate the tightness of our results by comparing
         9459 them with existing lower bounds. Our results imply that the efficiency of
         9460 clipping methods will not degenerate even in highly non-smooth regions of the
         9461 landscape. Experiments confirm the superiority of clipping-based methods in
         9462 deep learning tasks.
         9463 &lt;/p&gt;
         9464 </description>
         9465 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1&quot;&gt;Bohang Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jin_J/0/1/0/all/0/1&quot;&gt;Jikai Jin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fang_C/0/1/0/all/0/1&quot;&gt;Cong Fang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_L/0/1/0/all/0/1&quot;&gt;Liwei Wang&lt;/a&gt;</dc:creator>
         9466 </item>
         9467 <item rdf:about="http://fr.arxiv.org/abs/2010.04831">
         9468 <title>Improving Local Identifiability in Probabilistic Box Embeddings. (arXiv:2010.04831v2 [cs.LG] UPDATED)</title>
         9469 <link>http://fr.arxiv.org/abs/2010.04831</link>
         9470 <description rdf:parseType="Literal">&lt;p&gt;Geometric embeddings have recently received attention for their natural
         9471 ability to represent transitive asymmetric relations via containment. Box
         9472 embeddings, where objects are represented by n-dimensional hyperrectangles, are
         9473 a particularly promising example of such an embedding as they are closed under
         9474 intersection and their volume can be calculated easily, allowing them to
         9475 naturally represent calibrated probability distributions. The benefits of
         9476 geometric embeddings also introduce a problem of local identifiability,
         9477 however, where whole neighborhoods of parameters result in equivalent loss
         9478 which impedes learning. Prior work addressed some of these issues by using an
         9479 approximation to Gaussian convolution over the box parameters, however, this
         9480 intersection operation also increases the sparsity of the gradient. In this
         9481 work, we model the box parameters with min and max Gumbel distributions, which
         9482 were chosen such that space is still closed under the operation of the
         9483 intersection. The calculation of the expected intersection volume involves all
         9484 parameters, and we demonstrate experimentally that this drastically improves
         9485 the ability of such models to learn.
         9486 &lt;/p&gt;
         9487 </description>
         9488 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dasgupta_S/0/1/0/all/0/1&quot;&gt;Shib Sankar Dasgupta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Boratko_M/0/1/0/all/0/1&quot;&gt;Michael Boratko&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_D/0/1/0/all/0/1&quot;&gt;Dongxu Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vilnis_L/0/1/0/all/0/1&quot;&gt;Luke Vilnis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_X/0/1/0/all/0/1&quot;&gt;Xiang Lorraine Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+McCallum_A/0/1/0/all/0/1&quot;&gt;Andrew McCallum&lt;/a&gt;</dc:creator>
         9489 </item>
         9490 <item rdf:about="http://fr.arxiv.org/abs/2010.05446">
         9491 <title>Neural-Symbolic Reasoning on Knowledge Graphs. (arXiv:2010.05446v3 [cs.AI] UPDATED)</title>
         9492 <link>http://fr.arxiv.org/abs/2010.05446</link>
         9493 <description rdf:parseType="Literal">&lt;p&gt;Knowledge graph reasoning is the fundamental component to support machine
         9494 learning applications such as information extraction, information retrieval and
         9495 recommendation. Since knowledge graph can be viewed as the discrete symbolic
         9496 representations of knowledge, reasoning on knowledge graphs can naturally
         9497 leverage the symbolic techniques. However, symbolic reasoning is intolerant of
         9498 the ambiguous and noisy data. On the contrary, the recent advances of deep
         9499 learning promote neural reasoning on knowledge graphs, which is robust to the
         9500 ambiguous and noisy data, but lacks interpretability compared to symbolic
         9501 reasoning. Considering the advantages and disadvantages of both methodologies,
         9502 recent efforts have been made on combining the two reasoning methods. In this
         9503 survey, we take a thorough look at the development of the symbolic reasoning,
         9504 neural reasoning and the neural-symbolic reasoning on knowledge graphs. We
         9505 survey two specific reasoning tasks, knowledge graph completion and question
         9506 answering on knowledge graphs, and explain them in a unified reasoning
         9507 framework. We also briefly discuss the future directions for knowledge graph
         9508 reasoning.
         9509 &lt;/p&gt;
         9510 </description>
         9511 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jing Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_B/0/1/0/all/0/1&quot;&gt;Bo Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_L/0/1/0/all/0/1&quot;&gt;Lingxi Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ke_X/0/1/0/all/0/1&quot;&gt;Xirui Ke&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ding_H/0/1/0/all/0/1&quot;&gt;Haipeng Ding&lt;/a&gt;</dc:creator>
         9512 </item>
         9513 <item rdf:about="http://fr.arxiv.org/abs/2010.05768">
         9514 <title>On lattice point counting in $\Delta$-modular polyhedra. (arXiv:2010.05768v2 [cs.CC] UPDATED)</title>
         9515 <link>http://fr.arxiv.org/abs/2010.05768</link>
         9516 <description rdf:parseType="Literal">&lt;p&gt;Let a polyhedron $P$ be defined by one of the following ways:
         9517 &lt;/p&gt;
         9518 &lt;p&gt;(i) $P = \{x \in R^n \colon A x \leq b\}$, where $A \in Z^{(n+k) \times n}$,
         9519 $b \in Z^{(n+k)}$ and $rank\, A = n$;
         9520 &lt;/p&gt;
         9521 &lt;p&gt;(ii) $P = \{x \in R_+^n \colon A x = b\}$, where $A \in Z^{k \times n}$, $b
         9522 \in Z^{k}$ and $rank\, A = k$.
         9523 &lt;/p&gt;
         9524 &lt;p&gt;And let all rank order minors of $A$ be bounded by $\Delta$ in absolute
         9525 values. We show that the short rational generating function for the power
         9526 series $$ \sum\limits_{m \in P \cap Z^n} x^m $$ can be computed with the
         9527 arithmetic complexity $ O\left(T_{SNF}(d) \cdot d^{k} \cdot d^{\log_2
         9528 \Delta}\right), $ where $k$ and $\Delta$ are fixed, $d = \dim P$, and
         9529 $T_{SNF}(m)$ is the complexity to compute the Smith Normal Form for $m \times
         9530 m$ integer matrix. In particular, $d = n$ for the case (i) and $d = n-k$ for
         9531 the case (ii).
         9532 &lt;/p&gt;
         9533 &lt;p&gt;The simplest examples of polyhedra that meet conditions (i) or (ii) are the
         9534 simplicies, the subset sum polytope and the knapsack or multidimensional
         9535 knapsack polytopes.
         9536 &lt;/p&gt;
         9537 &lt;p&gt;We apply these results to parametric polytopes, and show that the step
         9538 polynomial representation of the function $c_P(y) = |P_{y} \cap Z^n|$, where
         9539 $P_{y}$ is parametric polytope, can be computed by a polynomial time even in
         9540 varying dimension if $P_{y}$ has a close structure to the cases (i) or (ii). As
         9541 another consequence, we show that the coefficients $e_i(P,m)$ of the Ehrhart
         9542 quasi-polynomial $$ \left| mP \cap Z^n\right| = \sum\limits_{j = 0}^n
         9543 e_i(P,m)m^j $$ can be computed by a polynomial time algorithm for fixed $k$ and
         9544 $\Delta$.
         9545 &lt;/p&gt;
         9546 </description>
         9547 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gribanov_D/0/1/0/all/0/1&quot;&gt;D.V. Gribanov&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zolotykh_N/0/1/0/all/0/1&quot;&gt;N.Yu. Zolotykh&lt;/a&gt;</dc:creator>
         9548 </item>
         9549 <item rdf:about="http://fr.arxiv.org/abs/2010.06351">
         9550 <title>CAPT: Contrastive Pre-Training for Learning Denoised Sequence Representations. (arXiv:2010.06351v3 [cs.CL] UPDATED)</title>
         9551 <link>http://fr.arxiv.org/abs/2010.06351</link>
         9552 <description rdf:parseType="Literal">&lt;p&gt;Pre-trained self-supervised models such as BERT have achieved striking
         9553 success in learning sequence representations, especially for natural language
         9554 processing. These models typically corrupt the given sequences with certain
         9555 types of noise, such as masking, shuffling, or substitution, and then try to
         9556 recover the original input. However, such pre-training approaches are prone to
         9557 learning representations that are covariant with the noise, leading to the
         9558 discrepancy between the pre-training and fine-tuning stage. To remedy this, we
         9559 present ContrAstive Pre-Training (CAPT) to learn noise invariant sequence
         9560 representations. The proposed CAPT encourages the consistency between
         9561 representations of the original sequence and its corrupted version via
         9562 unsupervised instance-wise training signals. In this way, it not only
         9563 alleviates the pretrain-finetune discrepancy induced by the noise of
         9564 pre-training, but also aids the pre-trained model in better capturing global
         9565 semantics of the input via more effective sentence-level supervision. Different
         9566 from most prior work that focuses on a particular modality, comprehensive
         9567 empirical evidence on 11 natural language understanding and cross-modal tasks
         9568 illustrates that CAPT is applicable for both language and vision-language
         9569 tasks, and obtains surprisingly consistent improvement, including 0.6% absolute
         9570 gain on GLUE benchmarks and 0.8% absolute increment on NLVR.
         9571 &lt;/p&gt;
         9572 </description>
         9573 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Luo_F/0/1/0/all/0/1&quot;&gt;Fuli Luo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yang_P/0/1/0/all/0/1&quot;&gt;Pengcheng Yang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1&quot;&gt;Shicheng Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ren_X/0/1/0/all/0/1&quot;&gt;Xuancheng Ren&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Sun_X/0/1/0/all/0/1&quot;&gt;Xu Sun&lt;/a&gt;</dc:creator>
         9574 </item>
         9575 <item rdf:about="http://fr.arxiv.org/abs/2010.07485">
         9576 <title>Spherical Knowledge Distillation. (arXiv:2010.07485v2 [cs.LG] UPDATED)</title>
         9577 <link>http://fr.arxiv.org/abs/2010.07485</link>
         9578 <description rdf:parseType="Literal">&lt;p&gt;Knowledge distillation aims at obtaining a small but effective deep model by
         9579 transferring knowledge from a much larger one. The previous approaches try to
         9580 reach this goal by simply &quot;logit-supervised&quot; information transferring between
         9581 the teacher and student, which somehow can be subsequently decomposed as the
         9582 transfer of normalized logits and $l^2$ norm. We argue that the norm of logits
         9583 is actually interference, which damages the efficiency in the transfer process.
         9584 To address this problem, we propose Spherical Knowledge Distillation (SKD).
         9585 Specifically, we project the teacher and the student&apos;s logits into a unit
         9586 sphere, and then we can efficiently perform knowledge distillation on the
         9587 sphere. We verify our argument via theoretical analysis and ablation study.
         9588 Extensive experiments have demonstrated the superiority and scalability of our
         9589 method over the SOTAs.
         9590 &lt;/p&gt;
         9591 </description>
         9592 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Guo_J/0/1/0/all/0/1&quot;&gt;Jia Guo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_M/0/1/0/all/0/1&quot;&gt;Minghao Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hu_Y/0/1/0/all/0/1&quot;&gt;Yao Hu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhu_C/0/1/0/all/0/1&quot;&gt;Chen Zhu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_X/0/1/0/all/0/1&quot;&gt;Xiaofei He&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cai_D/0/1/0/all/0/1&quot;&gt;Deng Cai&lt;/a&gt;</dc:creator>
         9593 </item>
         9594 <item rdf:about="http://fr.arxiv.org/abs/2010.08182">
         9595 <title>Measuring the Dynamic Impact of High-Speed Railways on Urban Interactions in China. (arXiv:2010.08182v3 [cs.SI] UPDATED)</title>
         9596 <link>http://fr.arxiv.org/abs/2010.08182</link>
         9597 <description rdf:parseType="Literal">&lt;p&gt;High-speed rail (HSR) has become an important mode of inter-city
         9598 transportation between large cities. Inter-city interaction facilitated by HSR
         9599 tends to play a more prominent role in promoting urban and regional economic
         9600 integration and development. Quantifying the impact of HSR&apos;s interaction on
         9601 cities and people is therefore crucial for long-term urban and regional
         9602 development planning and policy making. We develop an evaluation framework
         9603 using toponym information from social media as a proxy to estimate the dynamics
         9604 of such interactions. This paper adopts two types of spatial information:
         9605 toponyms from social media posts, and the geographical location information
         9606 embedded in social media posts. The framework highlights the asymmetric nature
         9607 of social interaction among cities, and proposes a series of metrics to
         9608 quantify such impact from multiple perspectives, including interaction
         9609 strength, spatial decay, and channel effect. The results show that HSRs not
         9610 only greatly expand the uneven distribution of inter-city connections, but also
         9611 significantly reshape the interactions that occur along HSR routes through the
         9612 channel effect.
         9613 &lt;/p&gt;
         9614 </description>
         9615 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gong_J/0/1/0/all/0/1&quot;&gt;Junfang Gong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_S/0/1/0/all/0/1&quot;&gt;Shengwen Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ye_X/0/1/0/all/0/1&quot;&gt;Xinyue Ye&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Peng_Q/0/1/0/all/0/1&quot;&gt;Qiong Peng&lt;/a&gt;</dc:creator>
         9616 </item>
         9617 <item rdf:about="http://fr.arxiv.org/abs/2010.08321">
         9618 <title>Learning Accurate Entropy Model with Global Reference for Image Compression. (arXiv:2010.08321v2 [eess.IV] UPDATED)</title>
         9619 <link>http://fr.arxiv.org/abs/2010.08321</link>
         9620 <description rdf:parseType="Literal">&lt;p&gt;In recent deep image compression neural networks, the entropy model plays a
         9621 critical role in estimating the prior distribution of deep image encodings.
         9622 Existing methods combine hyperprior with local context in the entropy
         9623 estimation function. This greatly limits their performance due to the absence
         9624 of a global vision. In this work, we propose a novel Global Reference Model for
         9625 image compression to effectively leverage both the local and the global context
         9626 information, leading to an enhanced compression rate. The proposed method scans
         9627 decoded latents and then finds the most relevant latent to assist the
         9628 distribution estimating of the current latent. A by-product of this work is the
         9629 innovation of a mean-shifting GDN module that further improves the performance.
         9630 Experimental results demonstrate that the proposed model outperforms the
         9631 rate-distortion performance of most of the state-of-the-art methods in the
         9632 industry.
         9633 &lt;/p&gt;
         9634 </description>
         9635 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Qian_Y/0/1/0/all/0/1&quot;&gt;Yichen Qian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Tan_Z/0/1/0/all/0/1&quot;&gt;Zhiyu Tan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sun_X/0/1/0/all/0/1&quot;&gt;Xiuyu Sun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Lin_M/0/1/0/all/0/1&quot;&gt;Ming Lin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_D/0/1/0/all/0/1&quot;&gt;Dongyang Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Sun_Z/0/1/0/all/0/1&quot;&gt;Zhenhong Sun&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_H/0/1/0/all/0/1&quot;&gt;Hao Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Jin_R/0/1/0/all/0/1&quot;&gt;Rong Jin&lt;/a&gt;</dc:creator>
         9636 </item>
         9637 <item rdf:about="http://fr.arxiv.org/abs/2010.08841">
         9638 <title>A Grid-based Representation for Human Action Recognition. (arXiv:2010.08841v2 [cs.CV] UPDATED)</title>
         9639 <link>http://fr.arxiv.org/abs/2010.08841</link>
         9640 <description rdf:parseType="Literal">&lt;p&gt;Human action recognition (HAR) in videos is a fundamental research topic in
         9641 computer vision. It consists mainly in understanding actions performed by
         9642 humans based on a sequence of visual observations. In recent years, HAR have
         9643 witnessed significant progress, especially with the emergence of deep learning
         9644 models. However, most of existing approaches for action recognition rely on
         9645 information that is not always relevant for this task, and are limited in the
         9646 way they fuse the temporal information. In this paper, we propose a novel
         9647 method for human action recognition that encodes efficiently the most
         9648 discriminative appearance information of an action with explicit attention on
         9649 representative pose features, into a new compact grid representation. Our GRAR
         9650 (Grid-based Representation for Action Recognition) method is tested on several
         9651 benchmark datasets demonstrating that our model can accurately recognize human
         9652 actions, despite intra-class appearance variations and occlusion challenges.
         9653 &lt;/p&gt;
         9654 </description>
         9655 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Lamghari_S/0/1/0/all/0/1&quot;&gt;Soufiane Lamghari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bilodeau_G/0/1/0/all/0/1&quot;&gt;Guillaume-Alexandre Bilodeau&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Saunier_N/0/1/0/all/0/1&quot;&gt;Nicolas Saunier&lt;/a&gt;</dc:creator>
         9656 </item>
         9657 <item rdf:about="http://fr.arxiv.org/abs/2010.09843">
         9658 <title>What breach? Measuring online awareness of security incidents by studying real-world browsing behavior. (arXiv:2010.09843v2 [cs.CR] UPDATED)</title>
         9659 <link>http://fr.arxiv.org/abs/2010.09843</link>
         9660 <description rdf:parseType="Literal">&lt;p&gt;Awareness about security and privacy risks is important for developing good
         9661 security habits. Learning about real-world security incidents and data breaches
         9662 can alert people to the ways in which their information is vulnerable online,
         9663 thus playing a significant role in encouraging safe security behavior. This
         9664 paper examines 1) how often people read about security incidents online, 2) of
         9665 those people, whether and to what extent they follow up with an action, e.g.,
         9666 by trying to read more about the incident, and 3) what influences the
         9667 likelihood that they will read about an incident and take some action. We study
         9668 this by quantitatively examining real-world internet-browsing data from 303
         9669 participants.
         9670 &lt;/p&gt;
         9671 &lt;p&gt;Our findings present a bleak view of awareness of security incidents. Only
         9672 17% of participants visited any web pages related to six widely publicized
         9673 large-scale security incidents; few read about one even when an incident was
         9674 likely to have affected them (e.g., the Equifax breach almost universally
         9675 affected people with Equifax credit reports). We further found that more severe
         9676 incidents as well as articles that constructively spoke about the incident
         9677 inspired more action. We conclude with recommendations for specific future
         9678 research and for enabling useful security incident information to reach more
         9679 people.
         9680 &lt;/p&gt;
         9681 </description>
         9682 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bhagavatula_S/0/1/0/all/0/1&quot;&gt;Sruti Bhagavatula&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bauer_L/0/1/0/all/0/1&quot;&gt;Lujo Bauer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kapadia_A/0/1/0/all/0/1&quot;&gt;Apu Kapadia&lt;/a&gt;</dc:creator>
         9683 </item>
         9684 <item rdf:about="http://fr.arxiv.org/abs/2010.10436">
         9685 <title>VarGrad: A Low-Variance Gradient Estimator for Variational Inference. (arXiv:2010.10436v2 [stat.ML] UPDATED)</title>
         9686 <link>http://fr.arxiv.org/abs/2010.10436</link>
         9687 <description rdf:parseType="Literal">&lt;p&gt;We analyse the properties of an unbiased gradient estimator of the ELBO for
         9688 variational inference, based on the score function method with leave-one-out
         9689 control variates. We show that this gradient estimator can be obtained using a
         9690 new loss, defined as the variance of the log-ratio between the exact posterior
         9691 and the variational approximation, which we call the $\textit{log-variance
         9692 loss}$. Under certain conditions, the gradient of the log-variance loss equals
         9693 the gradient of the (negative) ELBO. We show theoretically that this gradient
         9694 estimator, which we call $\textit{VarGrad}$ due to its connection to the
         9695 log-variance loss, exhibits lower variance than the score function method in
         9696 certain settings, and that the leave-one-out control variate coefficients are
         9697 close to the optimal ones. We empirically demonstrate that VarGrad offers a
         9698 favourable variance versus computation trade-off compared to other
         9699 state-of-the-art estimators on a discrete VAE.
         9700 &lt;/p&gt;
         9701 </description>
         9702 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Richter_L/0/1/0/all/0/1&quot;&gt;Lorenz Richter&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Boustati_A/0/1/0/all/0/1&quot;&gt;Ayman Boustati&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Nusken_N/0/1/0/all/0/1&quot;&gt;Nikolas N&amp;#xfc;sken&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Ruiz_F/0/1/0/all/0/1&quot;&gt;Francisco J. R. Ruiz&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/stat/1/au:+Akyildiz_O/0/1/0/all/0/1&quot;&gt;&amp;#xd6;mer Deniz Akyildiz&lt;/a&gt;</dc:creator>
         9703 </item>
         9704 <item rdf:about="http://fr.arxiv.org/abs/2010.10695">
         9705 <title>A Coarse-To-Fine (C2F) Representation for End-To-End 6-DoF Grasp Detection. (arXiv:2010.10695v2 [cs.RO] UPDATED)</title>
         9706 <link>http://fr.arxiv.org/abs/2010.10695</link>
         9707 <description rdf:parseType="Literal">&lt;p&gt;We proposed an end-to-end grasp detection network, Grasp Detection Network
         9708 (GDN), cooperated with a novel coarse-to-fine (C2F) grasp representation design
         9709 to detect diverse and accurate 6-DoF grasps based on point clouds. Compared to
         9710 previous two-stage approaches which sample and evaluate multiple grasp
         9711 candidates, our architecture is at least 20 times faster. It is also 8% and 40%
         9712 more accurate in terms of the success rate in single object scenes and the
         9713 complete rate in clutter scenes, respectively. Our method shows superior
         9714 results among settings with different number of views and input points.
         9715 Moreover, we propose a new AP-based metric which considers both rotation and
         9716 transition errors, making it a more comprehensive evaluation tool for grasp
         9717 detection models.
         9718 &lt;/p&gt;
         9719 </description>
         9720 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Jeng_K/0/1/0/all/0/1&quot;&gt;Kuang-Yu Jeng&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Y/0/1/0/all/0/1&quot;&gt;Yueh-Cheng Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Liu_Z/0/1/0/all/0/1&quot;&gt;Zhe Yu Liu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_J/0/1/0/all/0/1&quot;&gt;Jen-Wei Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chang_Y/0/1/0/all/0/1&quot;&gt;Ya-Liang Chang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Su_H/0/1/0/all/0/1&quot;&gt;Hung-Ting Su&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hsu_W/0/1/0/all/0/1&quot;&gt;Winston Hsu&lt;/a&gt;</dc:creator>
         9721 </item>
         9722 <item rdf:about="http://fr.arxiv.org/abs/2010.10742">
         9723 <title>Model selection in reconciling hierarchical time series. (arXiv:2010.10742v2 [cs.LG] UPDATED)</title>
         9724 <link>http://fr.arxiv.org/abs/2010.10742</link>
         9725 <description rdf:parseType="Literal">&lt;p&gt;Model selection has been proven an effective strategy for improving accuracy
         9726 in time series forecasting applications. However, when dealing with
         9727 hierarchical time series, apart from selecting the most appropriate forecasting
         9728 model, forecasters have also to select a suitable method for reconciling the
         9729 base forecasts produced for each series to make sure they are coherent.
         9730 Although some hierarchical forecasting methods like minimum trace are strongly
         9731 supported both theoretically and empirically for reconciling the base
         9732 forecasts, there are still circumstances under which they might not produce the
         9733 most accurate results, being outperformed by other methods. In this paper we
         9734 propose an approach for dynamically selecting the most appropriate hierarchical
         9735 forecasting method and succeeding better forecasting accuracy along with
         9736 coherence. The approach, to be called conditional hierarchical forecasting, is
         9737 based on Machine Learning classification methods and uses time series features
         9738 as leading indicators for performing the selection for each hierarchy examined
         9739 considering a variety of alternatives. Our results suggest that conditional
         9740 hierarchical forecasting leads to significantly more accurate forecasts than
         9741 standard approaches, especially at lower hierarchical levels.
         9742 &lt;/p&gt;
         9743 </description>
         9744 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Abolghasemi_M/0/1/0/all/0/1&quot;&gt;Mahdi Abolghasemi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hyndman_R/0/1/0/all/0/1&quot;&gt;Rob J Hyndman&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Spiliotis_E/0/1/0/all/0/1&quot;&gt;Evangelos Spiliotis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bergmeir_C/0/1/0/all/0/1&quot;&gt;Christoph Bergmeir&lt;/a&gt;</dc:creator>
         9745 </item>
         9746 <item rdf:about="http://fr.arxiv.org/abs/2010.10759">
         9747 <title>Emformer: Efficient Memory Transformer Based Acoustic Model For Low Latency Streaming Speech Recognition. (arXiv:2010.10759v3 [cs.SD] UPDATED)</title>
         9748 <link>http://fr.arxiv.org/abs/2010.10759</link>
         9749 <description rdf:parseType="Literal">&lt;p&gt;This paper proposes an efficient memory transformer Emformer for low latency
         9750 streaming speech recognition. In Emformer, the long-range history context is
         9751 distilled into an augmented memory bank to reduce self-attention&apos;s computation
         9752 complexity. A cache mechanism saves the computation for the key and value in
         9753 self-attention for the left context. Emformer applies a parallelized block
         9754 processing in training to support low latency models. We carry out experiments
         9755 on benchmark LibriSpeech data. Under average latency of 960 ms, Emformer gets
         9756 WER $2.50\%$ on test-clean and $5.62\%$ on test-other. Comparing with a strong
         9757 baseline augmented memory transformer (AM-TRF), Emformer gets $4.6$ folds
         9758 training speedup and $18\%$ relative real-time factor (RTF) reduction in
         9759 decoding with relative WER reduction $17\%$ on test-clean and $9\%$ on
         9760 test-other. For a low latency scenario with an average latency of 80 ms,
         9761 Emformer achieves WER $3.01\%$ on test-clean and $7.09\%$ on test-other.
         9762 Comparing with the LSTM baseline with the same latency and model size, Emformer
         9763 gets relative WER reduction $9\%$ and $16\%$ on test-clean and test-other,
         9764 respectively.
         9765 &lt;/p&gt;
         9766 </description>
         9767 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shi_Y/0/1/0/all/0/1&quot;&gt;Yangyang Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wang_Y/0/1/0/all/0/1&quot;&gt;Yongqiang Wang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_C/0/1/0/all/0/1&quot;&gt;Chunyang Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Yeh_C/0/1/0/all/0/1&quot;&gt;Ching-Feng Yeh&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chan_J/0/1/0/all/0/1&quot;&gt;Julian Chan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_F/0/1/0/all/0/1&quot;&gt;Frank Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Le_D/0/1/0/all/0/1&quot;&gt;Duc Le&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Seltzer_M/0/1/0/all/0/1&quot;&gt;Mike Seltzer&lt;/a&gt;</dc:creator>
         9768 </item>
         9769 <item rdf:about="http://fr.arxiv.org/abs/2010.11150">
         9770 <title>Large-Scale High PV Power Grid Dynamic Model Development -- A Case Study on the U.S. Eastern Interconnection. (arXiv:2010.11150v2 [eess.SY] UPDATED)</title>
         9771 <link>http://fr.arxiv.org/abs/2010.11150</link>
         9772 <description rdf:parseType="Literal">&lt;p&gt;Power systems are undergoing a transformation toward a low-carbon
         9773 non-synchronous generation portfolio. A major concern for system planners and
         9774 operators is the system dynamics in the high renewable penetration future.
         9775 Because of the scale of the system and numerous components involved, it is
         9776 extremely difficult to develop high PV dynamic models based upon actual power
         9777 system models. The main contribution of this paper is providing an example of
         9778 developing high PV penetration models based on the validated dynamic model of
         9779 an actual large-scale power grid - the U.S. Eastern Interconnection system. The
         9780 displacement of conventional generators by PV is realized by optimization.
         9781 Combining the PV distribution optimization and the validated dynamic model
         9782 information, this approach avoids the uncertainties brought about by
         9783 transmission planning. As the existing dynamic models can be validated by
         9784 measurements, this approach improves the credibility of the high PV models in
         9785 representing future power grids. This generic approach can be applied to
         9786 develop high PV dynamic models for other actual large-scale systems.
         9787 &lt;/p&gt;
         9788 </description>
         9789 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+You_S/0/1/0/all/0/1&quot;&gt;Shutang You&lt;/a&gt;</dc:creator>
         9790 </item>
         9791 <item rdf:about="http://fr.arxiv.org/abs/2010.11175">
         9792 <title>Build Smart Grids on Artificial Intelligence -- A Real-world Example. (arXiv:2010.11175v2 [eess.SY] UPDATED)</title>
         9793 <link>http://fr.arxiv.org/abs/2010.11175</link>
         9794 <description rdf:parseType="Literal">&lt;p&gt;Power grid data are going big with the deployment of various sensors. The big
         9795 data in power grids creates huge opportunities for applying artificial
         9796 intelligence technologies to improve resilience and reliability. This paper
         9797 introduces multiple real-world applications based on artificial intelligence to
         9798 improve power grid situational awareness and resilience. These applications
         9799 include event identification, inertia estimation, event location and magnitude
         9800 estimation, data authentication, control, and stability assessment. These
         9801 applications are operating on a real-world system called FNET-GridEye, which is
         9802 a wide-area measurement network and arguably the world-largest cyber-physical
         9803 system that collects power grid big data. These applications showed much better
         9804 performance compared with conventional approaches and accomplished new tasks
         9805 that are impossible to realized using conventional technologies. These
         9806 encouraging results demonstrate that combining power grid big data and
         9807 artificial intelligence can uncover and capture the non-linear correlation
         9808 between power grid data and its stabilities indices and will potentially enable
         9809 many advanced applications that can significantly improve power grid
         9810 resilience.
         9811 &lt;/p&gt;
         9812 </description>
         9813 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+You_S/0/1/0/all/0/1&quot;&gt;Shutang You&lt;/a&gt;</dc:creator>
         9814 </item>
         9815 <item rdf:about="http://fr.arxiv.org/abs/2010.11505">
         9816 <title>NightOwl: Robotic Platform for Wheeled Service Robot. (arXiv:2010.11505v2 [cs.RO] UPDATED)</title>
         9817 <link>http://fr.arxiv.org/abs/2010.11505</link>
         9818 <description rdf:parseType="Literal">&lt;p&gt;NightOwl is a robotic platform designed exclusively for a wheeled service
         9819 robot. The robot navigates autonomously in omnidirectional fashion movement and
         9820 equipped with LIDAR to sense the surrounding area. The platform itself was
         9821 built using the Robot Operating System (ROS) and written in two different
         9822 programming languages (C++ and Python). NightOwl is composed of several modular
         9823 programs, namely hardware controller, light detection and ranging (LIDAR),
         9824 simultaneous localization and mapping (SLAM), world model, path planning, robot
         9825 control, communication, and behaviour. The programs run in parallel and
         9826 communicate reciprocally to share various information. This paper explains the
         9827 role of modular programs in the term of input, process, and output. In
         9828 addition, NightOwl provides simulation visualized in both Gazebo and RViz. The
         9829 robot in its environment is visualized by Gazebo. Sensor data from LIDAR and
         9830 results from SLAM will be visualized by RViz.
         9831 &lt;/p&gt;
         9832 </description>
         9833 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Al_Fahsi_R/0/1/0/all/0/1&quot;&gt;Resha Dwika Hefni Al-Fahsi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Winanta_K/0/1/0/all/0/1&quot;&gt;Kevin Aldian Winanta&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pradana_F/0/1/0/all/0/1&quot;&gt;Fauzan Pradana&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ardiyanto_I/0/1/0/all/0/1&quot;&gt;Igi Ardiyanto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Cahyadi_A/0/1/0/all/0/1&quot;&gt;Adha Imam Cahyadi&lt;/a&gt;</dc:creator>
         9834 </item>
         9835 <item rdf:about="http://fr.arxiv.org/abs/2010.11775">
         9836 <title>Label-Aware Neural Tangent Kernel: Toward Better Generalization and Local Elasticity. (arXiv:2010.11775v2 [cs.LG] UPDATED)</title>
         9837 <link>http://fr.arxiv.org/abs/2010.11775</link>
         9838 <description rdf:parseType="Literal">&lt;p&gt;As a popular approach to modeling the dynamics of training overparametrized
         9839 neural networks (NNs), the neural tangent kernels (NTK) are known to fall
         9840 behind real-world NNs in generalization ability. This performance gap is in
         9841 part due to the \textit{label agnostic} nature of the NTK, which renders the
         9842 resulting kernel not as \textit{locally elastic} as NNs~\citep{he2019local}. In
         9843 this paper, we introduce a novel approach from the perspective of
         9844 \emph{label-awareness} to reduce this gap for the NTK. Specifically, we propose
         9845 two label-aware kernels that are each a superimposition of a label-agnostic
         9846 part and a hierarchy of label-aware parts with increasing complexity of label
         9847 dependence, using the Hoeffding decomposition. Through both theoretical and
         9848 empirical evidence, we show that the models trained with the proposed kernels
         9849 better simulate NNs in terms of generalization ability and local elasticity.
         9850 &lt;/p&gt;
         9851 </description>
         9852 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chen_S/0/1/0/all/0/1&quot;&gt;Shuxiao Chen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+He_H/0/1/0/all/0/1&quot;&gt;Hangfeng He&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Su_W/0/1/0/all/0/1&quot;&gt;Weijie J. Su&lt;/a&gt;</dc:creator>
         9853 </item>
         9854 <item rdf:about="http://fr.arxiv.org/abs/2010.11925">
         9855 <title>The Polynomial Method is Universal for Distribution-Free Correlational SQ Learning. (arXiv:2010.11925v2 [cs.DS] UPDATED)</title>
         9856 <link>http://fr.arxiv.org/abs/2010.11925</link>
         9857 <description rdf:parseType="Literal">&lt;p&gt;We consider the problem of distribution-free learning for Boolean function
         9858 classes in the PAC and agnostic models. Generalizing a recent beautiful work of
         9859 Malach and Shalev-Shwartz (2020) who gave the first tight correlational SQ
         9860 (CSQ) lower bounds for learning DNF formulas, we show that lower bounds on the
         9861 threshold or approximate degree of any function class directly imply CSQ lower
         9862 bounds for PAC or agnostic learning respectively. These match corresponding
         9863 positive results using upper bounds on the threshold or approximate degree in
         9864 the SQ model for PAC or agnostic learning. Many of these results were implicit
         9865 in earlier works of Feldman and Sherstov.
         9866 &lt;/p&gt;
         9867 </description>
         9868 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Gollakota_A/0/1/0/all/0/1&quot;&gt;Aravind Gollakota&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Karmalkar_S/0/1/0/all/0/1&quot;&gt;Sushrut Karmalkar&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Klivans_A/0/1/0/all/0/1&quot;&gt;Adam Klivans&lt;/a&gt;</dc:creator>
         9869 </item>
         9870 <item rdf:about="http://fr.arxiv.org/abs/2010.12191">
         9871 <title>Escape saddle points faster on manifolds via perturbed Riemannian stochastic recursive gradient. (arXiv:2010.12191v2 [math.OC] UPDATED)</title>
         9872 <link>http://fr.arxiv.org/abs/2010.12191</link>
         9873 <description rdf:parseType="Literal">&lt;p&gt;In this paper, we propose a variant of Riemannian stochastic recursive
         9874 gradient method that can achieve second-order convergence guarantee and escape
         9875 saddle points using simple perturbation. The idea is to perturb the iterates
         9876 when gradient is small and carry out stochastic recursive gradient updates over
         9877 tangent space. This avoids the complication of exploiting Riemannian geometry.
         9878 We show that under finite-sum setting, our algorithm requires
         9879 $\widetilde{\mathcal{O}}\big( \frac{ \sqrt{n}}{\epsilon^2} + \frac{\sqrt{n}
         9880 }{\delta^4} + \frac{n}{\delta^3}\big)$ stochastic gradient queries to find a
         9881 $(\epsilon, \delta)$-second-order critical point. This strictly improves the
         9882 complexity of perturbed Riemannian gradient descent and is superior to
         9883 perturbed Riemannian accelerated gradient descent under large-sample settings.
         9884 We also provide a complexity of $\widetilde{\mathcal{O}} \big(
         9885 \frac{1}{\epsilon^3} + \frac{1}{\delta^3 \epsilon^2} + \frac{1}{\delta^4
         9886 \epsilon} \big)$ for online optimization, which is novel on Riemannian manifold
         9887 in terms of second-order convergence using only first-order information.
         9888 &lt;/p&gt;
         9889 </description>
         9890 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Han_A/0/1/0/all/0/1&quot;&gt;Andi Han&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/math/1/au:+Gao_J/0/1/0/all/0/1&quot;&gt;Junbin Gao&lt;/a&gt;</dc:creator>
         9891 </item>
         9892 <item rdf:about="http://fr.arxiv.org/abs/2010.12234">
         9893 <title>On the mechanical contribution of head stabilization to passive dynamics of anthropometric walkers. (arXiv:2010.12234v2 [cs.RO] UPDATED)</title>
         9894 <link>http://fr.arxiv.org/abs/2010.12234</link>
         9895 <description rdf:parseType="Literal">&lt;p&gt;During the steady gait, humans stabilize their head around the vertical
         9896 orientation. While there are sensori-cognitive explanations for this
         9897 phenomenon, its mechanical e fect on the body dynamics remains un-explored. In
         9898 this study, we take profit from the similarities that human steady gait share
         9899 with the locomotion of passive dynamics robots. We introduce a simplified
         9900 anthropometric D model to reproduce a broad walking dynamics. In a previous
         9901 study, we showed heuristically that the presence of a stabilized head-neck
         9902 system significantly influences the dynamics of walking. This paper gives new
         9903 insights that lead to understanding this mechanical e fect. In particular, we
         9904 introduce an original cart upper-body model that allows to better understand
         9905 the mechanical interest of head stabilization when walking, and we study how
         9906 this e fect is sensitive to the choice of control parameters.
         9907 &lt;/p&gt;
         9908 </description>
         9909 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Benallegue_M/0/1/0/all/0/1&quot;&gt;Mehdi Benallegue&lt;/a&gt; (AIST), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Laumond_J/0/1/0/all/0/1&quot;&gt;Jean-Paul Laumond&lt;/a&gt; (DI-ENS), &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Berthoz_A/0/1/0/all/0/1&quot;&gt;Alain Berthoz&lt;/a&gt; (CdF (institution))</dc:creator>
         9910 </item>
         9911 <item rdf:about="http://fr.arxiv.org/abs/2010.12674">
         9912 <title>Exploring task-based query expansion at the TREC-COVID track. (arXiv:2010.12674v2 [cs.IR] UPDATED)</title>
         9913 <link>http://fr.arxiv.org/abs/2010.12674</link>
         9914 <description rdf:parseType="Literal">&lt;p&gt;We explore how to generate effective queries based on search tasks. Our
         9915 approach has three main steps: 1) identify search tasks based on research
         9916 goals, 2) manually classify search queries according to those tasks, and 3)
         9917 compare three methods to improve search rankings based on the task context. The
         9918 most promising approach is based on expanding the user&apos;s query terms using task
         9919 terms, which slightly improved the NDCG@20 scores over a BM25 baseline. Further
         9920 improvements might be gained if we can identify more specific search tasks.
         9921 &lt;/p&gt;
         9922 </description>
         9923 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Schoegje_T/0/1/0/all/0/1&quot;&gt;Thomas Schoegje&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kamphuis_C/0/1/0/all/0/1&quot;&gt;Chris Kamphuis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dercksen_K/0/1/0/all/0/1&quot;&gt;Koen Dercksen&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hiemstra_D/0/1/0/all/0/1&quot;&gt;Djoerd Hiemstra&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Pieters_T/0/1/0/all/0/1&quot;&gt;Toine Pieters&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Vries_A/0/1/0/all/0/1&quot;&gt;Arjen de Vries&lt;/a&gt;</dc:creator>
         9924 </item>
         9925 <item rdf:about="http://fr.arxiv.org/abs/2010.12899">
         9926 <title>Adaptive In-network Collaborative Caching for Enhanced Ensemble Deep Learning at Edge. (arXiv:2010.12899v3 [cs.NI] UPDATED)</title>
         9927 <link>http://fr.arxiv.org/abs/2010.12899</link>
         9928 <description rdf:parseType="Literal">&lt;p&gt;To enhance the quality and speed of data processing and protect the privacy
         9929 and security of the data, edge computing has been extensively applied to
         9930 support data-intensive intelligent processing services at edge. Among these
         9931 data-intensive services, ensemble learning-based services can in natural
         9932 leverage the distributed computation and storage resources at edge devices to
         9933 achieve efficient data collection, processing, analysis.
         9934 &lt;/p&gt;
         9935 &lt;p&gt;Collaborative caching has been applied in edge computing to support services
         9936 close to the data source, in order to take the limited resources at edge
         9937 devices to support high-performance ensemble learning solutions. To achieve
         9938 this goal, we propose an adaptive in-network collaborative caching scheme for
         9939 ensemble learning at edge. First, an efficient data representation structure is
         9940 proposed to record cached data among different nodes. In addition, we design a
         9941 collaboration scheme to facilitate edge nodes to cache valuable data for local
         9942 ensemble learning, by scheduling local caching according to a summarization of
         9943 data representations from different edge nodes. Our extensive simulations
         9944 demonstrate the high performance of the proposed collaborative caching scheme,
         9945 which significantly reduces the learning latency and the transmission overhead.
         9946 &lt;/p&gt;
         9947 </description>
         9948 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Qin_Y/0/1/0/all/0/1&quot;&gt;Yana Qin&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_D/0/1/0/all/0/1&quot;&gt;Danye Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xu_Z/0/1/0/all/0/1&quot;&gt;Zhiwei Xu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tian_J/0/1/0/all/0/1&quot;&gt;Jie Tian&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yujun Zhang&lt;/a&gt;</dc:creator>
         9949 </item>
         9950 <item rdf:about="http://fr.arxiv.org/abs/2010.12931">
         9951 <title>Lightning-Fast Gravitational Wave Parameter Inference through Neural Amortization. (arXiv:2010.12931v2 [astro-ph.IM] UPDATED)</title>
         9952 <link>http://fr.arxiv.org/abs/2010.12931</link>
         9953 <description rdf:parseType="Literal">&lt;p&gt;Gravitational waves from compact binaries measured by the LIGO and Virgo
         9954 detectors are routinely analyzed using Markov Chain Monte Carlo sampling
         9955 algorithms. Because the evaluation of the likelihood function requires
         9956 evaluating millions of waveform models that link between signal shapes and the
         9957 source parameters, running Markov chains until convergence is typically
         9958 expensive and requires days of computation. In this extended abstract, we
         9959 provide a proof of concept that demonstrates how the latest advances in neural
         9960 simulation-based inference can speed up the inference time by up to three
         9961 orders of magnitude -- from days to minutes -- without impairing the
         9962 performance. Our approach is based on a convolutional neural network modeling
         9963 the likelihood-to-evidence ratio and entirely amortizes the computation of the
         9964 posterior. We find that our model correctly estimates credible intervals for
         9965 the parameters of simulated gravitational waves.
         9966 &lt;/p&gt;
         9967 </description>
         9968 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Delaunoy_A/0/1/0/all/0/1&quot;&gt;Arnaud Delaunoy&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Wehenkel_A/0/1/0/all/0/1&quot;&gt;Antoine Wehenkel&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Hinderer_T/0/1/0/all/0/1&quot;&gt;Tanja Hinderer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Nissanke_S/0/1/0/all/0/1&quot;&gt;Samaya Nissanke&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Weniger_C/0/1/0/all/0/1&quot;&gt;Christoph Weniger&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Williamson_A/0/1/0/all/0/1&quot;&gt;Andrew R. Williamson&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/astro-ph/1/au:+Louppe_G/0/1/0/all/0/1&quot;&gt;Gilles Louppe&lt;/a&gt;</dc:creator>
         9969 </item>
         9970 <item rdf:about="http://fr.arxiv.org/abs/2010.13119">
         9971 <title>A Survey on Churn Analysis. (arXiv:2010.13119v2 [cs.LG] UPDATED)</title>
         9972 <link>http://fr.arxiv.org/abs/2010.13119</link>
         9973 <description rdf:parseType="Literal">&lt;p&gt;In this paper, I present churn prediction techniques that have been released
         9974 so far. Churn prediction is used in the fields of Internet services, games,
         9975 insurance, and management. However, since it has been used intensively to
         9976 increase the predictability of various industry/academic fields, there is a big
         9977 difference in its definition and utilization. In this paper, I collected the
         9978 definitions of churn used in the fields of business administration, marketing,
         9979 IT, telecommunications, newspapers, insurance and psychology, and described
         9980 their differences. Based on this, I classified and explained churn loss,
         9981 feature engineering, and prediction models. Our study can be used to select the
         9982 definition of churn and its associated models suitable for the service field
         9983 that researchers are most interested in by integrating fragmented churn studies
         9984 in industry/academic fields.
         9985 &lt;/p&gt;
         9986 </description>
         9987 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ahn_J/0/1/0/all/0/1&quot;&gt;Jaehuyn Ahn&lt;/a&gt;</dc:creator>
         9988 </item>
         9989 <item rdf:about="http://fr.arxiv.org/abs/2010.13178">
         9990 <title>Geometric Exploration for Online Control. (arXiv:2010.13178v2 [cs.LG] UPDATED)</title>
         9991 <link>http://fr.arxiv.org/abs/2010.13178</link>
         9992 <description rdf:parseType="Literal">&lt;p&gt;We study the control of an \emph{unknown} linear dynamical system under
         9993 general convex costs. The objective is minimizing regret vs. the class of
         9994 disturbance-feedback-controllers, which encompasses all stabilizing
         9995 linear-dynamical-controllers. In this work, we first consider the case of known
         9996 cost functions, for which we design the first polynomial-time algorithm with
         9997 $n^3\sqrt{T}$-regret, where $n$ is the dimension of the state plus the
         9998 dimension of control input. The $\sqrt{T}$-horizon dependence is optimal, and
         9999 improves upon the previous best known bound of $T^{2/3}$. The main component of
        10000 our algorithm is a novel geometric exploration strategy: we adaptively
        10001 construct a sequence of barycentric spanners in the policy space. Second, we
        10002 consider the case of bandit feedback, for which we give the first
        10003 polynomial-time algorithm with $poly(n)\sqrt{T}$-regret, building on Stochastic
        10004 Bandit Convex Optimization.
        10005 &lt;/p&gt;
        10006 </description>
        10007 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Plevrakis_O/0/1/0/all/0/1&quot;&gt;Orestis Plevrakis&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hazan_E/0/1/0/all/0/1&quot;&gt;Elad Hazan&lt;/a&gt;</dc:creator>
        10008 </item>
        10009 <item rdf:about="http://fr.arxiv.org/abs/2010.13273">
        10010 <title>Efficient Joinable Table Discovery in Data Lakes: A High-Dimensional Similarity-Based Approach. (arXiv:2010.13273v2 [cs.IR] UPDATED)</title>
        10011 <link>http://fr.arxiv.org/abs/2010.13273</link>
        10012 <description rdf:parseType="Literal">&lt;p&gt;Finding joinable tables in data lakes is key procedure in many applications
        10013 such as data integration, data augmentation, data analysis, and data market.
        10014 Traditional approaches that find equi-joinable tables are unable to deal with
        10015 misspellings and different formats, nor do they capture any semantic joins. In
        10016 this paper, we propose PEXESO, a framework for joinable table discovery in data
        10017 lakes. We embed textual values as high-dimensional vectors and join columns
        10018 under similarity predicates on high-dimensional vectors, hence to address the
        10019 limitations of equi-join approaches and identify more meaningful results. To
        10020 efficiently find joinable tables with similarity, we propose a block-and-verify
        10021 method that utilizes pivot-based filtering. A partitioning technique is
        10022 developed to cope with the case when the data lake is large and the index
        10023 cannot fit in main memory. An experimental evaluation on real datasets shows
        10024 that our solution identifies substantially more tables than equi-joins and
        10025 outperforms other similarity-based options, and the join results are useful in
        10026 data enrichment for machine learning tasks. The experiments also demonstrate
        10027 the efficiency of the proposed method.
        10028 &lt;/p&gt;
        10029 </description>
        10030 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Dong_Y/0/1/0/all/0/1&quot;&gt;Yuyang Dong&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Takeoka_K/0/1/0/all/0/1&quot;&gt;Kunihiro Takeoka&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Xiao_C/0/1/0/all/0/1&quot;&gt;Chuan Xiao&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Oyamada_M/0/1/0/all/0/1&quot;&gt;Masafumi Oyamada&lt;/a&gt;</dc:creator>
        10031 </item>
        10032 <item rdf:about="http://fr.arxiv.org/abs/2010.13285">
        10033 <title>Malicious Requests Detection with Improved Bidirectional Long Short-term Memory Neural Networks. (arXiv:2010.13285v2 [cs.LG] UPDATED)</title>
        10034 <link>http://fr.arxiv.org/abs/2010.13285</link>
        10035 <description rdf:parseType="Literal">&lt;p&gt;Detecting and intercepting malicious requests are one of the most widely used
        10036 ways against attacks in the network security. Most existing detecting
        10037 approaches, including matching blacklist characters and machine learning
        10038 algorithms have all shown to be vulnerable to sophisticated attacks. To address
        10039 the above issues, a more general and rigorous detection method is required. In
        10040 this paper, we formulate the problem of detecting malicious requests as a
        10041 temporal sequence classification problem, and propose a novel deep learning
        10042 model namely Convolutional Neural Network-Bidirectional Long Short-term
        10043 Memory-Convolutional Neural Network (CNN-BiLSTM-CNN). By connecting the shadow
        10044 and deep feature maps of the convolutional layers, the malicious feature
        10045 extracting ability is improved on more detailed functionality. Experimental
        10046 results on HTTP dataset CSIC 2010 have demonstrated the effectiveness of the
        10047 proposed method when compared with the state-of-the-arts.
        10048 &lt;/p&gt;
        10049 </description>
        10050 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Li_W/0/1/0/all/0/1&quot;&gt;Wenhao Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_B/0/1/0/all/0/1&quot;&gt;Bincheng Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zhang_J/0/1/0/all/0/1&quot;&gt;Jiajie Zhang&lt;/a&gt;</dc:creator>
        10051 </item>
        10052 <item rdf:about="http://fr.arxiv.org/abs/2010.13956">
        10053 <title>Recent Developments on ESPnet Toolkit Boosted by Conformer. (arXiv:2010.13956v2 [eess.AS] UPDATED)</title>
        10054 <link>http://fr.arxiv.org/abs/2010.13956</link>
        10055 <description rdf:parseType="Literal">&lt;p&gt;In this study, we present recent developments on ESPnet: End-to-End Speech
        10056 Processing toolkit, which mainly involves a recently proposed architecture
        10057 called Conformer, Convolution-augmented Transformer. This paper shows the
        10058 results for a wide range of end-to-end speech processing applications, such as
        10059 automatic speech recognition (ASR), speech translations (ST), speech separation
        10060 (SS) and text-to-speech (TTS). Our experiments reveal various training tips and
        10061 significant performance benefits obtained with the Conformer on different
        10062 tasks. These results are competitive or even outperform the current
        10063 state-of-art Transformer models. We are preparing to release all-in-one recipes
        10064 using open source and publicly available corpora for all the above tasks with
        10065 pre-trained models. Our aim for this work is to contribute to our research
        10066 community by reducing the burden of preparing state-of-the-art research
        10067 environments usually requiring high resources.
        10068 &lt;/p&gt;
        10069 </description>
        10070 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Guo_P/0/1/0/all/0/1&quot;&gt;Pengcheng Guo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Boyer_F/0/1/0/all/0/1&quot;&gt;Florian Boyer&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Chang_X/0/1/0/all/0/1&quot;&gt;Xuankai Chang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Hayashi_T/0/1/0/all/0/1&quot;&gt;Tomoki Hayashi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Higuchi_Y/0/1/0/all/0/1&quot;&gt;Yosuke Higuchi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Inaguma_H/0/1/0/all/0/1&quot;&gt;Hirofumi Inaguma&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Kamo_N/0/1/0/all/0/1&quot;&gt;Naoyuki Kamo&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Li_C/0/1/0/all/0/1&quot;&gt;Chenda Li&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Garcia_Romero_D/0/1/0/all/0/1&quot;&gt;Daniel Garcia-Romero&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1&quot;&gt;Jiatong Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Shi_J/0/1/0/all/0/1&quot;&gt;Jing Shi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Watanabe_S/0/1/0/all/0/1&quot;&gt;Shinji Watanabe&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Wei_K/0/1/0/all/0/1&quot;&gt;Kun Wei&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_W/0/1/0/all/0/1&quot;&gt;Wangyou Zhang&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zhang_Y/0/1/0/all/0/1&quot;&gt;Yuekai Zhang&lt;/a&gt;</dc:creator>
        10071 </item>
        10072 <item rdf:about="http://fr.arxiv.org/abs/2010.14367">
        10073 <title>Simultaenous Sieves: A Deterministic Streaming Algorithm for Non-Monotone Submodular Maximization. (arXiv:2010.14367v2 [cs.DS] UPDATED)</title>
        10074 <link>http://fr.arxiv.org/abs/2010.14367</link>
        10075 <description rdf:parseType="Literal">&lt;p&gt;In this work, we present a combinatorial, deterministic single-pass streaming
        10076 algorithm for the problem of maximizing a submodular function, not necessarily
        10077 monotone, with respect to a cardinality constraint (SMCC). In the case the
        10078 function is monotone, our algorithm reduces to the optimal streaming algorithm
        10079 of Badanidiyuru et al. (2014). In general, our algorithm achieves ratio $\alpha
        10080 / (1 + \alpha) - \varepsilon$, for any $\varepsilon &amp;gt; 0$, where $\alpha$ is the
        10081 ratio of an offline (deterministic) algorithm for SMCC used for
        10082 post-processing. Thus, if exponential computation time is allowed, our
        10083 algorithm deterministically achieves nearly the optimal $1/2$ ratio. These
        10084 results nearly match those of a recently proposed, randomized streaming
        10085 algorithm that achieves the same ratios in expectation. For a deterministic,
        10086 single-pass streaming algorithm, our algorithm achieves in polynomial time an
        10087 improvement of the best approximation factor from $1/9$ of previous literature
        10088 to $\approx 0.2689$.
        10089 &lt;/p&gt;
        10090 </description>
        10091 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Kuhnle_A/0/1/0/all/0/1&quot;&gt;Alan Kuhnle&lt;/a&gt;</dc:creator>
        10092 </item>
        10093 <item rdf:about="http://fr.arxiv.org/abs/2010.14501">
        10094 <title>Memory Optimization for Deep Networks. (arXiv:2010.14501v2 [cs.LG] UPDATED)</title>
        10095 <link>http://fr.arxiv.org/abs/2010.14501</link>
        10096 <description rdf:parseType="Literal">&lt;p&gt;Deep learning is slowly, but steadily, hitting a memory bottleneck. While the
        10097 tensor computation in top-of-the-line GPUs increased by 32x over the last five
        10098 years, the total available memory only grew by 2.5x. This prevents researchers
        10099 from exploring larger architectures, as training large networks requires more
        10100 memory for storing intermediate outputs. In this paper, we present MONeT, an
        10101 automatic framework that minimizes both the memory footprint and computational
        10102 overhead of deep networks. MONeT jointly optimizes the checkpointing schedule
        10103 and the implementation of various operators. MONeT is able to outperform all
        10104 prior hand-tuned operations as well as automated checkpointing. MONeT reduces
        10105 the overall memory requirement by 3x for various PyTorch models, with a 9-16%
        10106 overhead in computation. For the same computation cost, MONeT requires 1.2-1.8x
        10107 less memory than current state-of-the-art automated checkpointing frameworks.
        10108 Our code is available at https://github.com/utsaslab/MONeT.
        10109 &lt;/p&gt;
        10110 </description>
        10111 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Shah_A/0/1/0/all/0/1&quot;&gt;Aashaka Shah&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Wu_C/0/1/0/all/0/1&quot;&gt;Chao-Yuan Wu&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mohan_J/0/1/0/all/0/1&quot;&gt;Jayashree Mohan&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Chidambaram_V/0/1/0/all/0/1&quot;&gt;Vijay Chidambaram&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Krahenbuhl_P/0/1/0/all/0/1&quot;&gt;Philipp Kr&amp;#xe4;henb&amp;#xfc;hl&lt;/a&gt;</dc:creator>
        10112 </item>
        10113 <item rdf:about="http://fr.arxiv.org/abs/2010.14571">
        10114 <title>Language ID in the Wild: Unexpected Challenges on the Path to a Thousand-Language Web Text Corpus. (arXiv:2010.14571v2 [cs.CL] UPDATED)</title>
        10115 <link>http://fr.arxiv.org/abs/2010.14571</link>
        10116 <description rdf:parseType="Literal">&lt;p&gt;Large text corpora are increasingly important for a wide variety of Natural
        10117 Language Processing (NLP) tasks, and automatic language identification (LangID)
        10118 is a core technology needed to collect such datasets in a multilingual context.
        10119 LangID is largely treated as solved in the literature, with models reported
        10120 that achieve over 90% average F1 on as many as 1,366 languages. We train LangID
        10121 models on up to 1,629 languages with comparable quality on held-out test sets,
        10122 but find that human-judged LangID accuracy for web-crawl text corpora created
        10123 using these models is only around 5% for many lower-resource languages,
        10124 suggesting a need for more robust evaluation. Further analysis revealed a
        10125 variety of error modes, arising from domain mismatch, class imbalance, language
        10126 similarity, and insufficiently expressive models. We propose two classes of
        10127 techniques to mitigate these errors: wordlist-based tunable-precision filters
        10128 (for which we release curated lists in about 500 languages) and
        10129 transformer-based semi-supervised LangID models, which increase median dataset
        10130 precision from 5.5% to 71.2%. These techniques enable us to create an initial
        10131 data set covering 100K or more relatively clean sentences in each of 500+
        10132 languages, paving the way towards a 1,000-language web text corpus.
        10133 &lt;/p&gt;
        10134 </description>
        10135 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Caswell_I/0/1/0/all/0/1&quot;&gt;Isaac Caswell&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Breiner_T/0/1/0/all/0/1&quot;&gt;Theresa Breiner&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Esch_D/0/1/0/all/0/1&quot;&gt;Daan van Esch&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bapna_A/0/1/0/all/0/1&quot;&gt;Ankur Bapna&lt;/a&gt;</dc:creator>
        10136 </item>
        10137 <item rdf:about="http://fr.arxiv.org/abs/2010.14584">
        10138 <title>Predicting Themes within Complex Unstructured Texts: A Case Study on Safeguarding Reports. (arXiv:2010.14584v2 [cs.CL] UPDATED)</title>
        10139 <link>http://fr.arxiv.org/abs/2010.14584</link>
        10140 <description rdf:parseType="Literal">&lt;p&gt;The task of text and sentence classification is associated with the need for
        10141 large amounts of labelled training data. The acquisition of high volumes of
        10142 labelled datasets can be expensive or unfeasible, especially for
        10143 highly-specialised domains for which documents are hard to obtain. Research on
        10144 the application of supervised classification based on small amounts of training
        10145 data is limited. In this paper, we address the combination of state-of-the-art
        10146 deep learning and classification methods and provide an insight into what
        10147 combination of methods fit the needs of small, domain-specific, and
        10148 terminologically-rich corpora. We focus on a real-world scenario related to a
        10149 collection of safeguarding reports comprising learning experiences and
        10150 reflections on tackling serious incidents involving children and vulnerable
        10151 adults. The relatively small volume of available reports and their use of
        10152 highly domain-specific terminology makes the application of automated
        10153 approaches difficult. We focus on the problem of automatically identifying the
        10154 main themes in a safeguarding report using supervised classification
        10155 approaches. Our results show the potential of deep learning models to simulate
        10156 subject-expert behaviour even for complex tasks with limited labelled data.
        10157 &lt;/p&gt;
        10158 </description>
        10159 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Edwards_A/0/1/0/all/0/1&quot;&gt;Aleksandra Edwards&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Rogers_D/0/1/0/all/0/1&quot;&gt;David Rogers&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Camacho_Collados_J/0/1/0/all/0/1&quot;&gt;Jose Camacho-Collados&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Ribaupierre_H/0/1/0/all/0/1&quot;&gt;H&amp;#xe9;l&amp;#xe8;ne de Ribaupierre&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Preece_A/0/1/0/all/0/1&quot;&gt;Alun Preece&lt;/a&gt;</dc:creator>
        10160 </item>
        10161 <item rdf:about="http://fr.arxiv.org/abs/2010.14771">
        10162 <title>Batch Reinforcement Learning with a Nonparametric Off-Policy Policy Gradient. (arXiv:2010.14771v2 [cs.LG] UPDATED)</title>
        10163 <link>http://fr.arxiv.org/abs/2010.14771</link>
        10164 <description rdf:parseType="Literal">&lt;p&gt;Off-policy Reinforcement Learning (RL) holds the promise of better data
        10165 efficiency as it allows sample reuse and potentially enables safe interaction
        10166 with the environment. Current off-policy policy gradient methods either suffer
        10167 from high bias or high variance, delivering often unreliable estimates. The
        10168 price of inefficiency becomes evident in real-world scenarios such as
        10169 interaction-driven robot learning, where the success of RL has been rather
        10170 limited, and a very high sample cost hinders straightforward application. In
        10171 this paper, we propose a nonparametric Bellman equation, which can be solved in
        10172 closed form. The solution is differentiable w.r.t the policy parameters and
        10173 gives access to an estimation of the policy gradient. In this way, we avoid the
        10174 high variance of importance sampling approaches, and the high bias of
        10175 semi-gradient methods. We empirically analyze the quality of our gradient
        10176 estimate against state-of-the-art methods, and show that it outperforms the
        10177 baselines in terms of sample efficiency on classical control tasks.
        10178 &lt;/p&gt;
        10179 </description>
        10180 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Tosatto_S/0/1/0/all/0/1&quot;&gt;Samuele Tosatto&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Carvalho_J/0/1/0/all/0/1&quot;&gt;Jo&amp;#xe3;o Carvalho&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Peters_J/0/1/0/all/0/1&quot;&gt;Jan Peters&lt;/a&gt;</dc:creator>
        10181 </item>
        10182 <item rdf:about="http://fr.arxiv.org/abs/2010.14919">
        10183 <title>Transferable Universal Adversarial Perturbations Using Generative Models. (arXiv:2010.14919v2 [cs.CV] UPDATED)</title>
        10184 <link>http://fr.arxiv.org/abs/2010.14919</link>
        10185 <description rdf:parseType="Literal">&lt;p&gt;Deep neural networks tend to be vulnerable to adversarial perturbations,
        10186 which by adding to a natural image can fool a respective model with high
        10187 confidence. Recently, the existence of image-agnostic perturbations, also known
        10188 as universal adversarial perturbations (UAPs), were discovered. However,
        10189 existing UAPs still lack a sufficiently high fooling rate, when being applied
        10190 to an unknown target model. In this paper, we propose a novel deep learning
        10191 technique for generating more transferable UAPs. We utilize a perturbation
        10192 generator and some given pretrained networks so-called source models to
        10193 generate UAPs using the ImageNet dataset. Due to the similar feature
        10194 representation of various model architectures in the first layer, we propose a
        10195 loss formulation that focuses on the adversarial energy only in the respective
        10196 first layer of the source models. This supports the transferability of our
        10197 generated UAPs to any other target model. We further empirically analyze our
        10198 generated UAPs and demonstrate that these perturbations generalize very well
        10199 towards different target models. Surpassing the current state of the art in
        10200 both, fooling rate and model-transferability, we can show the superiority of
        10201 our proposed approach. Using our generated non-targeted UAPs, we obtain an
        10202 average fooling rate of 93.36% on the source models (state of the art: 82.16%).
        10203 Generating our UAPs on the deep ResNet-152, we obtain about a 12% absolute
        10204 fooling rate advantage vs. cutting-edge methods on VGG-16 and VGG-19 target
        10205 models.
        10206 &lt;/p&gt;
        10207 </description>
        10208 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Hashemi_A/0/1/0/all/0/1&quot;&gt;Atiye Sadat Hashemi&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Bar_A/0/1/0/all/0/1&quot;&gt;Andreas B&amp;#xe4;r&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Mozaffari_S/0/1/0/all/0/1&quot;&gt;Saeed Mozaffari&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Fingscheidt_T/0/1/0/all/0/1&quot;&gt;Tim Fingscheidt&lt;/a&gt;</dc:creator>
        10209 </item>
        10210 <item rdf:about="http://fr.arxiv.org/abs/2010.15003">
        10211 <title>Estimating Multiplicative Relations in Neural Networks. (arXiv:2010.15003v2 [cs.LG] UPDATED)</title>
        10212 <link>http://fr.arxiv.org/abs/2010.15003</link>
        10213 <description rdf:parseType="Literal">&lt;p&gt;Universal approximation theorem suggests that a shallow neural network can
        10214 approximate any function. The input to neurons at each layer is a weighted sum
        10215 of previous layer neurons and then an activation is applied. These activation
        10216 functions perform very well when the output is a linear combination of input
        10217 data. When trying to learn a function which involves product of input data, the
        10218 neural networks tend to overfit the data to approximate the function. In this
        10219 paper we will use properties of logarithmic functions to propose a pair of
        10220 activation functions which can translate products into linear expression and
        10221 learn using backpropagation. We will try to generalize this approach for some
        10222 complex arithmetic functions and test the accuracy on a disjoint distribution
        10223 with the training set.
        10224 &lt;/p&gt;
        10225 </description>
        10226 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Goel_B/0/1/0/all/0/1&quot;&gt;Bhaavan Goel&lt;/a&gt;</dc:creator>
        10227 </item>
        10228 <item rdf:about="http://fr.arxiv.org/abs/2010.15032">
        10229 <title>Benchmarking Parallelism in FaaS Platforms. (arXiv:2010.15032v2 [cs.DC] UPDATED)</title>
        10230 <link>http://fr.arxiv.org/abs/2010.15032</link>
        10231 <description rdf:parseType="Literal">&lt;p&gt;Serverless computing has seen a myriad of work exploring its potential. Some
        10232 systems tackle Function-as-a-Service (FaaS) properties on automatic elasticity
        10233 and scale to run highly-parallel computing jobs. However, they focus on
        10234 specific platforms and convey that their ideas can be extrapolated to any FaaS
        10235 runtime.
        10236 &lt;/p&gt;
        10237 &lt;p&gt;An important question arises: do all FaaS platforms fit parallel
        10238 computations? In this paper, we argue that not all of them provide the
        10239 necessary means to host highly-parallel applications. To validate our
        10240 hypothesis, we create a comparative framework and categorize the architectures
        10241 of four cloud FaaS offerings, with emphasis on parallel performance. We attest
        10242 and extend this description with an empirical experiment that consists in
        10243 plotting in deep detail the evolution of a parallel computing job on each
        10244 service.
        10245 &lt;/p&gt;
        10246 &lt;p&gt;The analysis of our results evinces that FaaS is not inherently good for
        10247 parallel computations and architectural differences across platforms are
        10248 decisive to categorize their performance. A key insight is the importance of
        10249 virtualization technologies and the scheduling approach of FaaS platforms.
        10250 Parallelism improves with lighter virtualization and proactive scheduling due
        10251 to finer resource allocation and faster elasticity. This causes some platforms
        10252 like AWS and IBM to perform well for highly-parallel computations, while others
        10253 such as Azure present difficulties to achieve the required parallelism degree.
        10254 Consequently, the information in this paper becomes of special interest to help
        10255 users choose the most adequate infrastructure for their parallel applications.
        10256 &lt;/p&gt;
        10257 </description>
        10258 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Barcelona_Pons_D/0/1/0/all/0/1&quot;&gt;Daniel Barcelona-Pons&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Garcia_Lopez_P/0/1/0/all/0/1&quot;&gt;Pedro Garc&amp;#xed;a-L&amp;#xf3;pez&lt;/a&gt;</dc:creator>
        10259 </item>
        10260 <item rdf:about="http://fr.arxiv.org/abs/2010.15058">
        10261 <title>Measuring non-trivial compositionality in emergent communication. (arXiv:2010.15058v2 [cs.NE] UPDATED)</title>
        10262 <link>http://fr.arxiv.org/abs/2010.15058</link>
        10263 <description rdf:parseType="Literal">&lt;p&gt;Compositionality is an important explanatory target in emergent communication
        10264 and language evolution. The vast majority of computational models of
        10265 communication account for the emergence of only a very basic form of
        10266 compositionality: trivial compositionality. A compositional protocol is
        10267 trivially compositional if the meaning of a complex signal (e.g. blue circle)
        10268 boils down to the intersection of meanings of its constituents (e.g. the
        10269 intersection of the set of blue objects and the set of circles). A protocol is
        10270 non-trivially compositional (NTC) if the meaning of a complex signal (e.g.
        10271 biggest apple) is a more complex function of the meanings of their
        10272 constituents. In this paper, we review several metrics of compositionality used
        10273 in emergent communication and experimentally show that most of them fail to
        10274 detect NTC - i.e. they treat non-trivial compositionality as a failure of
        10275 compositionality. The one exception is tree reconstruction error, a metric
        10276 motivated by formal accounts of compositionality. These results emphasise
        10277 important limitations of emergent communication research that could hamper
        10278 progress on modelling the emergence of NTC.
        10279 &lt;/p&gt;
        10280 </description>
        10281 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Korbak_T/0/1/0/all/0/1&quot;&gt;Tomasz Korbak&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Zubek_J/0/1/0/all/0/1&quot;&gt;Julian Zubek&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Raczaszek_Leonardi_J/0/1/0/all/0/1&quot;&gt;Joanna R&amp;#x105;czaszek-Leonardi&lt;/a&gt;</dc:creator>
        10282 </item>
        10283 <item rdf:about="http://fr.arxiv.org/abs/2010.14544">
        10284 <title>The fundamental equations of change in statistical ensembles and biological populations. (arXiv:2010.14544v1 [q-bio.PE] CROSS LISTED)</title>
        10285 <link>http://fr.arxiv.org/abs/2010.14544</link>
        10286 <description rdf:parseType="Literal">&lt;p&gt;A recent article in Nature Physics unified key results from thermodynamics,
        10287 statistics, and information theory. The unification arose from a general
        10288 equation for the rate of change in the information content of a system. The
        10289 general equation describes the change in the moments of an observable quantity
        10290 over a probability distribution. One term in the equation describes the change
        10291 in the probability distribution. The other term describes the change in the
        10292 observable values for a given state. We show the equivalence of this general
        10293 equation for moment dynamics with the widely known Price equation from
        10294 evolutionary theory, named after George Price. We introduce the Price equation
        10295 from its biological roots, review a mathematically abstract form of the
        10296 equation, and discuss the potential for this equation to unify diverse
        10297 mathematical theories from different disciplines. The new work in Nature
        10298 Physics and many applications in biology show that this equation also provides
        10299 the basis for deriving many novel theoretical results within each discipline.
        10300 &lt;/p&gt;
        10301 </description>
        10302 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Frank_S/0/1/0/all/0/1&quot;&gt;Steven A. Frank&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/q-bio/1/au:+Bruggeman_F/0/1/0/all/0/1&quot;&gt;Frank J. Bruggeman&lt;/a&gt;</dc:creator>
        10303 </item>
        10304 <item rdf:about="http://fr.arxiv.org/abs/2010.14734">
        10305 <title>Generalized eigen, singular value, and partial least squares decompositions: The GSVD package. (arXiv:2010.14734v2 [cs.MS] CROSS LISTED)</title>
        10306 <link>http://fr.arxiv.org/abs/2010.14734</link>
        10307 <description rdf:parseType="Literal">&lt;p&gt;The generalized singular value decomposition (GSVD, a.k.a. &quot;SVD triplet&quot;,
        10308 &quot;duality diagram&quot; approach) provides a unified strategy and basis to perform
        10309 nearly all of the most common multivariate analyses (e.g., principal
        10310 components, correspondence analysis, multidimensional scaling, canonical
        10311 correlation, partial least squares). Though the GSVD is ubiquitous, powerful,
        10312 and flexible, it has very few implementations. Here I introduce the GSVD
        10313 package for R. The general goal of GSVD is to provide a small set of accessible
        10314 functions to perform the GSVD and two other related decompositions (generalized
        10315 eigenvalue decomposition, generalized partial least squares-singular value
        10316 decomposition). Furthermore, GSVD helps provide a more unified conceptual
        10317 approach and nomenclature to many techniques. I first introduce the concept of
        10318 the GSVD, followed by a formal definition of the generalized decompositions.
        10319 Next I provide some key decisions made during development, and then a number of
        10320 examples of how to use GSVD to implement various statistical techniques. These
        10321 examples also illustrate one of the goals of GSVD: how others can (or should)
        10322 build analysis packages that depend on GSVD. Finally, I discuss the possible
        10323 future of GSVD.
        10324 &lt;/p&gt;
        10325 </description>
        10326 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/cs/1/au:+Beaton_D/0/1/0/all/0/1&quot;&gt;Derek Beaton&lt;/a&gt; (1) ((1) Rotman Research Institute, Baycrest Health Sciences)</dc:creator>
        10327 </item>
        10328 <item rdf:about="http://fr.arxiv.org/abs/2010.14746">
        10329 <title>Continuous Chaotic Nonlinear System and Lyapunov controller Optimization using Deep Learning. (arXiv:2010.14746v1 [eess.SY] CROSS LISTED)</title>
        10330 <link>http://fr.arxiv.org/abs/2010.14746</link>
        10331 <description rdf:parseType="Literal">&lt;p&gt;The introduction of unexpected system disturbances and new system dynamics
        10332 does not allow initially selected static system and controller parameters to
        10333 guarantee continued system stability and performance. In this research we
        10334 present a novel approach for detecting early failure indicators of non-linear
        10335 highly chaotic system and accordingly predict the best parameter calibrations
        10336 to offset such instability using deep machine learning regression model. The
        10337 approach proposed continuously monitors the system and controller signals. The
        10338 Re-calibration of the system and controller parameters is triggered according
        10339 to a set of conditions designed to maintain system stability without compromise
        10340 to the system speed, intended outcome or required processing power. The deep
        10341 neural model predicts the parameter values that would best counteract the
        10342 expected system in-stability. To demonstrate the effectiveness of the proposed
        10343 approach, it is applied to the non-linear complex combination of Duffing Van
        10344 der pol oscillators. The approach is also tested under different scenarios the
        10345 system and controller parameters are initially chosen incorrectly or the system
        10346 parameters are changed while running or new system dynamics are introduced
        10347 while running to measure effectiveness and reaction time.
        10348 &lt;/p&gt;
        10349 </description>
        10350 <dc:creator> &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Mahmoud_A/0/1/0/all/0/1&quot;&gt;Amr Mahmoud&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Ismaeil_Y/0/1/0/all/0/1&quot;&gt;Youmna Ismaeil&lt;/a&gt;, &lt;a href=&quot;http://fr.arxiv.org/find/eess/1/au:+Zohdy_M/0/1/0/all/0/1&quot;&gt;Mohamed Zohdy&lt;/a&gt;</dc:creator>
        10351 </item>
        10352