Moving Objects Analytics: Survey on Future Location & Trajectory Prediction Methods

The tremendous growth of positioning technologies and GPS enabled devices has produced huge volumes of tracking data during the recent years. This source of information constitutes a rich input for data analytics processes, either offline (e.g. cluster analysis, hot motion discovery) or online (e.g. short-term forecasting of forthcoming positions). This paper focuses on predictive analytics for moving objects (could be pedestrians, cars, vessels, planes, animals, etc.) and surveys the state-of-the-art in the context of future location and trajectory prediction. We provide an extensive review of over 50 works, also proposing a novel taxonomy of predictive algorithms over moving objects. We also list the properties of several real datasets used in the past for validation purposes of those works and, motivated by this, we discuss challenges that arise in the transition from conventional to Big Data applications. CCS Concepts: Information systems > Spatial-temporal systems; Information systems > Data analytics; Information systems > Data mining; Computing methodologies > Machine learning Additional Key Words and Phrases: mobility data, moving object trajectories, trajectory prediction, future location prediction.

Automated Vulnerability Detection in Source Code Using Deep Representation Learning

Increasing numbers of software vulnerabilities are discovered every year whether they are reported publicly or discovered internally in proprietary code. These vulnerabilities can pose serious risk of exploit and result in system compromise, information leaks, or denial of service. We leveraged the wealth of C and C++ open-source code available to develop a large-scale function-level vulnerability detection system using machine learning. To supplement existing labeled vulnerability datasets, we compiled a vast dataset of millions of open-source functions and labeled it with carefully-selected findings from three different static analyzers that indicate potential exploits. Using these datasets, we developed a fast and scalable vulnerability detection tool based on deep feature representation learning that directly interprets lexed source code. We evaluated our tool on code from both real software packages and the NIST SATE IV benchmark dataset. Our results demonstrate that deep feature representation learning on source code is a promising approach for automated software vulnerability detection.

Data-Parallel Hashing Techniques for GPU Architectures

Hash tables are one of the most fundamental data structures for effectively storing and accessing sparse data, with widespread usage in domains ranging from computer graphics to machine learning. This study surveys the state-of-the-art research on data-parallel hashing techniques for emerging massively-parallel, many-core GPU architectures. Key factors affecting the performance of different hashing schemes are discovered and used to suggest best practices and pinpoint areas for further research.

Differentially-Private ‘Draw and Discard’ Machine Learning

In this work, we propose a novel framework for privacy-preserving client-distributed machine learning. It is motivated by the desire to achieve differential privacy guarantees in the local model of privacy in a way that satisfies all systems constraints using asynchronous client-server communication and provides attractive model learning properties. We call it ‘Draw and Discard’ because it relies on random sampling of models for load distribution (scalability), which also provides additional server-side privacy protections and improved model quality through averaging. We present the mechanics of client and server components of ‘Draw and Discard’ and demonstrate how the framework can be applied to learning Generalized Linear models. We then analyze the privacy guarantees provided by our approach against several types of adversaries and showcase experimental results that provide evidence for the framework’s viability in practical deployments.

Topic Diffusion Discovery based on Sparseness-constrained Non-negative Matrix Factorization

Due to recent explosion of text data, researchers have been overwhelmed by ever-increasing volume of articles produced by different research communities. Various scholarly search websites, citation recommendation engines, and research databases have been created to simplify the text search tasks. However, it is still difficult for researchers to be able to identify potential research topics without doing intensive reviews on a tremendous number of articles published by journals, conferences, meetings, and workshops. In this paper, we consider a novel topic diffusion discovery technique that incorporates sparseness-constrained Non-negative Matrix Factorization with generalized Jensen-Shannon divergence to help understand term-topic evolutions and identify topic diffusions. Our experimental result shows that this approach can extract more prominent topics from large article databases, visualize relationships between terms of interest and abstract topics, and further help researchers understand whether given terms/topics have been widely explored or whether new topics are emerging from literature.

Subsampled Turbulence Removal Network

We present a deep-learning approach to restore a sequence of turbulence-distorted video frames from turbulent deformations and space-time varying blurs. Instead of requiring a massive training sample size in deep networks, we purpose a training strategy that is based on a new data augmentation method to model turbulence from a relatively small dataset. Then we introduce a subsampled method to enhance the restoration performance of the presented GAN model. The contributions of the paper is threefold: first, we introduce a simple but effective data augmentation algorithm to model the turbulence in real life for training in the deep network; Second, we firstly purpose the Wasserstein GAN combined with \ell_1 cost for successful restoration of turbulence-corrupted video sequence; Third, we combine the subsampling algorithm to filter out strongly corrupted frames to generate a video sequence with better quality.

Statistical Inference with Local Optima

We study the statistical properties of an estimator derived by applying a gradient ascent method with multiple initializations to a multi-modal likelihood function. We derive the population quantity that is the target of this estimator and study the properties of confidence intervals (CIs) constructed from asymptotic normality and the bootstrap approach. In particular, we analyze the coverage deficiency due to finite number of random initializations. We also investigate the CIs by inverting the likelihood ratio test, the score test, and the Wald test, and we show that the resulting CIs may be very different. We provide a summary of the uncertainties that we need to consider while making inference about the population. Note that we do not provide a solution to the problem of multiple local maxima; instead, our goal is to investigate the effect from local maxima on the behavior of our estimator. In addition, we analyze the performance of the EM algorithm under random initializations and derive the coverage of a CI with a finite number of initializations. Finally, we extend our analysis to a nonparametric mode hunting problem.

Will it Blend Composing Value Functions in Reinforcement Learning

An important property for lifelong-learning agents is the ability to combine existing skills to solve unseen tasks. In general, however, it is unclear how to compose skills in a principled way. We provide a ‘recipe’ for optimal value function composition in entropy-regularised reinforcement learning (RL) and then extend this to the standard RL setting. Composition is demonstrated in a video game environment, where an agent with an existing library of policies is able to solve new tasks without the need for further learning.

Tracking the Evolution of Words with Time-reflective Text Representations

More than 80% of today’s data is unstructured in nature, and these unstructured datasets evolving over time. A large part of the evolving unstructured data are text documents generated by media outlets, scholarly articles in digital libraries, and social media. Vector space models have been developed to analyze text documents using data mining and machine learning algorithms. While ample vector space models exist for text data, the evolution aspect of evolving text corpora is still missing in vector-based representations. The advent of word embeddings has given a way to create a contextual vector space, but the embeddings do not consider the temporal aspects of the feature space successfully yet. The inclusion of the time aspect in the feature space will provide vectors for every natural language element, such as words or entities, at every timestamp. Such temporal word vectors will provide the ability to track how the meaning of a word changes over time, in terms of the changes in its neighborhood. Moreover, a time-reflective text representation will pave the way to a new set of text analytic abilities involving time series for text collections. In this paper, we present the potential benefits of a time-reflective vector space model for temporal text data that is able to capture short and long-term changes in the meaning of words. We compare our approach with the limited literature on dynamic embeddings. We present qualitative and quantitative evaluations using semantic evolution tracking as the target application.

Adding Attentiveness to the Neurons in Recurrent Neural Networks

Recurrent neural networks (RNNs) are capable of modeling the temporal dynamics of complex sequential information. However, the structures of existing RNN neurons mainly focus on controlling the contributions of current and historical information but do not explore the different importance levels of different elements in an input vector of a time slot. We propose adding a simple yet effective Element-wiseAttention Gate (EleAttG) to an RNN block (e.g., all RNN neurons in a network layer) that empowers the RNN neurons to have the attentiveness capability. For an RNN block, an EleAttG is added to adaptively modulate the input by assigning different levels of importance, i.e., attention, to each element/dimension of the input. We refer to an RNN block equipped with an EleAttG as an EleAtt-RNN block. Specifically, the modulation of the input is content adaptive and is performed at fine granularity, being element-wise rather than input-wise. The proposed EleAttG, as an additional fundamental unit, is general and can be applied to any RNN structures, e.g., standard RNN, Long Short-Term Memory (LSTM), or Gated Recurrent Unit (GRU). We demonstrate the effectiveness of the proposed EleAtt-RNN by applying it to the action recognition tasks on both 3D human skeleton data and RGB videos. Experiments show that adding attentiveness through EleAttGs to RNN blocks significantly boosts the power of RNNs.

On the Cat-and-Mouse Markov chain and its generalisations

We revisit the so-called Cat-and-Mouse Markov chain, studied earlier by Litvak and Robert (2012). This is a 2-dimensional Markov chain on the lattice \mathbb{Z}^2, where the first component is a simple random walk and the second component changes when the components meet. We obtain new results for two generalisations of the model. Firstly, we consider a general jump distribution of the second component (the mouse) and obtain its scaling limit. Secondly, we consider chains of three and more dimensions, where we again find a limiting law of the last component.

Training Neural Networks Using Features Replay

Training a neural network using backpropagation algorithm requires passing error gradients sequentially through the network. The backward locking prevents us from updating network layers in parallel and fully leveraging the computing resources. Recently, there are several works trying to decouple and parallelize the backpropagation algorithm. However, all of them suffer from severe accuracy loss or memory explosion when the neural network is deep. To address these challenging issues, we propose a novel parallel-objective formulation for the objective function of the neural network. After that, we introduce features replay algorithm and prove that it is guaranteed to converge to critical points for the non-convex problem under certain conditions. Finally, we apply our method to training deep convolutional neural networks, and the experimental results show that the proposed method achieves {faster} convergence, {lower} memory consumption, and {better} generalization error than compared methods.

Turning Big data into tiny data: Constant-size coresets for k-means, PCA and projective clustering

We develop and analyze a method to reduce the size of a very large set of data points in a high dimensional Euclidean space R d to a small set of weighted points such that the result of a predetermined data analysis task on the reduced set is approximately the same as that for the original point set. For example, computing the first k principal components of the reduced set will return approximately the first k principal components of the original set or computing the centers of a k-means clustering on the reduced set will return an approximation for the original set. Such a reduced set is also known as a coreset. The main new feature of our construction is that the cardinality of the reduced set is independent of the dimension d of the input space and that the sets are mergable. The latter property means that the union of two reduced sets is a reduced set for the union of the two original sets (this property has recently also been called composability, see Indyk et. al., PODS 2014). It allows us to turn our methods into streaming or distributed algorithms using standard approaches. For problems such as k-means and subspace approximation the coreset sizes are also independent of the number of input points. Our method is based on projecting the points on a low dimensional subspace and reducing the cardinality of the points inside this subspace using known methods. The proposed approach works for a wide range of data analysis techniques including k-means clustering, principal component analysis and subspace clustering. The main conceptual contribution is a new coreset definition that allows to charge costs that appear for every solution to an additive constant.

Fast Estimation of Causal Interactions using Wold Processes

We here focus on the task of learning Granger causality matrices for multivariate point processes. In order to accomplish this task, our work is the first to explore the use of Wold processes. By doing so, we are able to develop asymptotically fast MCMC learning algorithms. With N being the total number of events and K the number of processes, our learning algorithm has a O(N(\,\log(N)\,+\,\log(K))) cost per iteration. This is much faster than the O(N^3\,K^2) or O(K^3) for the state of the art. Our approach, called GrangerBusca, is validated on nine datasets from the Snap repository. This is an advance in relation to most prior efforts which focus mostly on subsets of the Memetracker dataset. Regarding accuracy, GrangerBusca is three times more accurate (in Precision@10) than the state of the art for the commonly explored subsets of the Memetracker data. Due to GrangerBusca’s much lower training complexity, our approach is the only one able to train models for larger, full, sets of data.

Automatically Composing Representation Transformations as a Means for Generalization

How can we build a learner that can capture the essence of what makes a hard problem more complex than a simple one, break the hard problem along characteristic lines into smaller problems it knows how to solve, and sequentially solve the smaller problems until the larger one is solved To work towards this goal, we focus on learning to generalize in a particular family of problems that exhibit compositional and recursive structure: their solutions can be found by composing in sequence a set of reusable partial solutions. Our key idea is to recast the problem of generalization as a problem of learning algorithmic procedures: we can formulate a solution to this family as a sequential decision-making process over transformations between representations. Our formulation enables the learner to learn the structure and parameters of its own computation graph with sparse supervision, make analogies between problems by transforming one problem representation to another, and exploit modularity and reuse to scale to problems of varying complexity. Experiments on solving a variety of multilingual arithmetic problems demonstrate that our method discovers the hierarchical decomposition of a problem into its subproblems, generalizes out of distribution to unseen problem classes, and extrapolates to harder versions of the same problem, yielding a 10-fold reduction in sample complexity compared to a monolithic recurrent neural network.

Algorithms that Remember: Model Inversion Attacks and Data Protection Law

Many individuals are concerned about the governance of machine learning systems and the prevention of algorithmic harms. The EU’s recent General Data Protection Regulation (GDPR) has been seen as a core tool for achieving better governance of this area. While the GDPR does apply to the use of models in some limited situations, most of its provisions relate to the governance of personal data, while models have traditionally been seen as intellectual property. We present recent work from the information security literature around `model inversion’ and `membership inference’ attacks, which indicate that the process of turning training data into machine learned systems is not one-way, and demonstrate how this could lead some models to be legally classified as personal data. Taking this as a probing experiment, we explore the different rights and obligations this would trigger and their utility, and posit future directions for algorithmic governance and regulation.

Scikit-Multiflow: A Multi-output Streaming Framework

Scikit-multiflow is a multi-output/multi-label and stream data mining framework for the Python programming language. Conceived to serve as a platform to encourage democratization of stream learning research, it provides multiple state of the art methods for stream learning, stream generators and evaluators. scikit-multiflow builds upon popular open source frameworks including scikit-learn, MOA and MEKA. Development follows the FOSS principles and quality is enforced by complying with PEP8 guidelines and using continuous integration and automatic testing. The source code is publicly available at https://…/scikit-multiflow.

A Library for Constraint Consistent Learning

This paper introduces the first, open source software library for Constraint Consistent Learning (CCL). It implements a family of data-driven methods that are capable of (i) learning state-independent and -dependent constraints, (ii) decomposing the behaviour of redundant systems into task and null-space parts, and (iii) uncovering the underlying null space control policy. It is a powerful tool to analyse and decompose many everyday tasks, such as wiping, reaching and drawing. The library also includes several tutorials that demonstrate its use in a systematic way. This paper documents the implementation of the library, tutorials and associated helper methods. The software is made freely available to the community, to enable code reuse and allow users to gain indepth experience in learning constraints and underlying control policies in the context of redundant robotic systems.

Orthogonal Matching Pursuit for Text Classification

In text classification, the problem of overfitting arises due to the high dimensionality, making regularization essential. Although classic regularizers provide sparsity, they fail to return highly accurate models. On the contrary, state-of-the-art group-lasso regularizers provide better results at the expense of low sparsity. In this paper, we apply a greedy variable selection algorithm, called Orthogonal Matching Pursuit, for the text classification task. We also extend standard group OMP by introducing overlapping group OMP to handle overlapping groups of features. Empirical analysis verifies that both OMP and overlapping GOMP constitute powerful regularizers, able to produce effective and super-sparse models. Code and data are available at: https://…tring_G0\string_0DlcGkq6tQb2zqAaca\string dl\string=0 .

The GAN Landscape: Losses, Architectures, Regularization, and Normalization

Generative Adversarial Networks (GANs) are a class of deep generative models which aim to learn a target distribution in an unsupervised fashion. While they were successfully applied to many problems, training a GAN is a notoriously challenging task and requires a significant amount of hyperparameter tuning, neural architecture engineering, and a non-trivial amount of ‘tricks’. The success in many practical applications coupled with the lack of a measure to quantify the failure modes of GANs resulted in a plethora of proposed losses, regularization and normalization schemes, and neural architectures. In this work we take a sober view of the current state of GANs from a practical perspective. We reproduce the current state of the art and go beyond fairly exploring the GAN landscape. We discuss common pitfalls and reproducibility issues, open-source our code on Github, and provide pre-trained models on TensorFlow Hub.

The Bottleneck Simulator: A Model-based Deep Reinforcement Learning Approach

Deep reinforcement learning has recently shown many impressive successes. However, one major obstacle towards applying such methods to real-world problems is their lack of data-efficiency. To this end, we propose the Bottleneck Simulator: a model-based reinforcement learning method which combines a learned, factorized transition model of the environment with rollout simulations to learn an effective policy from few examples. The learned transition model employs an abstract, discrete (bottleneck) state, which increases sample efficiency by reducing the number of model parameters and by exploiting structural properties of the environment. We provide a mathematical analysis of the Bottleneck Simulator in terms of fixed points of the learned policy, which reveals how performance is affected by four distinct sources of error: an error related to the abstract space structure, an error related to the transition model estimation variance, an error related to the transition model estimation bias, and an error related to the transition model class bias. Finally, we evaluate the Bottleneck Simulator on two natural language processing tasks: a text adventure game and a real-world, complex dialogue response selection task. On both tasks, the Bottleneck Simulator yields excellent performance beating competing approaches.

SciTokens: Capability-Based Secure Access to Remote Scientific Data

The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the problems, re-run their computations, and wait longer for their results. In this paper, we introduce SciTokens, open source software to help scientists manage their security credentials more reliably and securely. We describe the SciTokens system architecture, design, and implementation addressing use cases from the Laser Interferometer Gravitational-Wave Observatory (LIGO) Scientific Collaboration and the Large Synoptic Survey Telescope (LSST) projects. We also present our integration with widely-used software that supports distributed scientific computing, including HTCondor, CVMFS, and XrootD. SciTokens uses IETF-standard OAuth tokens for capability-based secure access to remote scientific data. The access tokens convey the specific authorizations needed by the workflows, rather than general-purpose authentication impersonation credentials, to address the risks of scientific workflows running on distributed infrastructure including NSF resources (e.g., LIGO Data Grid, Open Science Grid, XSEDE) and public clouds (e.g., Amazon Web Services, Google Cloud, Microsoft Azure). By improving the interoperability and security of scientific workflows, SciTokens 1) enables use of distributed computing for scientific domains that require greater data protection and 2) enables use of more widely distributed computing resources by reducing the risk of credential abuse on remote systems.

Scalable Convolutional Dictionary Learning with Constrained Recurrent Sparse Auto-encoders

Given a convolutional dictionary underlying a set of observed signals, can a carefully designed auto-encoder recover the dictionary in the presence of noise We introduce an auto-encoder architecture, termed constrained recurrent sparse auto-encoder (CRsAE), that answers this question in the affirmative. Given an input signal and an approximate dictionary, the encoder finds a sparse approximation using FISTA. The decoder reconstructs the signal by applying the dictionary to the output of the encoder. The encoder and decoder in CRsAE parallel the sparse-coding and dictionary update steps in optimization-based alternating-minimization schemes for dictionary learning. As such, the parameters of the encoder and decoder are not independent, a constraint which we enforce for the first time. We derive the back-propagation algorithm for CRsAE. CRsAE is a framework for blind source separation that, only knowing the number of sources (dictionary elements), and assuming sparsely-many can overlap, is able to separate them. We demonstrate its utility in the context of spike sorting, a source separation problem in computational neuroscience. We demonstrate the ability of CRsAE to recover the underlying dictionary and characterize its sensitivity as a function of SNR.

When deep learning meets security

Deep learning is an emerging research field that has proven its effectiveness towards deploying more efficient intelligent systems. Security, on the other hand, is one of the most essential issues in modern communication systems. Recently many papers have shown that using deep learning models can achieve promising results when applied to the security domain. In this work, we provide an overview for the recent studies that apply deep learning techniques to the field of security.

Optimal Network Topology for Effective Collective Response
A $q$-Queens Problem. IV. Attacking Configurations and Their Denominators
Monotonous betting strategies in warped casinos
Stable Throughput Region of the Two-User Interference Channel
A quantum-inspired classical algorithm for recommendation systems
A Sharp Condition for Exact Support Recovery of Sparse Signals With Orthogonal Matching Pursuit
On the Decomposition of Forces
A Bayesian Nonparametric Approach to Geographic Regression Discontinuity Designs: Do School Districts Affect NYC House Prices
General sum-connectivity index of trees and unicyclic graphs with fixed maximum degree
Towards a Complete Picture of Covariance Functions on Spheres Cross Time
PDE-constrained LDDMM via geodesic shooting and inexact Gauss-Newton-Krylov optimization using the incremental adjoint Jacobi equations
Analytically solvable renormalization group for the many-body localization transition
Structured Bayesian Gaussian process latent variable model: applications to data-driven dimensionality reduction and high-dimensional inversion
Manifold regularization with GANs for semi-supervised learning
A PTAS for Minimum Makespan Vehicle Routing in Trees
A Formal Account of Effectiveness Evaluation and Ranking Fusion
On the Discrepancy of Random Matrices with Many Columns
Enhancement of chemotherapy using oncolytic virotherapy: Mathematical and optimal control analysis
Uniform LSI for the canonical ensemble on the 1d-lattice with strong, attractive, finite-range interaction
A Generic Approach to Lung Field Segmentation from Chest Radiographs using Deep Space and Shape Learning
A Reflectance Based Method For Shadow Detection and Removal
Deepwound: Automated Postoperative Wound Assessment and Surgical Site Surveillance through Convolutional Neural Networks
Joint Status Sampling and Updating for Minimizing Age of Information in the Internet of Things
Comparison of moments of Rademacher chaoses
A Trilateral Weighted Sparse Coding Scheme for Real-World Image Denoising
Fixing Numbers of Graphs and Groups
AtDelfi: Automatically Designing Legible, Full Instructions For Games
Verification and Calibration of Antenna Cross-Polarization Discrimination and Penetration Loss for Millimeter Wave Communications
Exactly Decoupled Kalman Filtering for Multi-Process State Estimation with Unknown Parameters
Can Millimeter Wave Cellular Systems provide High Reliability and Low Latency An analysis of the impact of Mobile Blockers
Simulating Motion – Incorporating Spatial Consistency into the NYUSIM Channel Model
Secrecy Energy Efficiency Maximization for UAV-Enabled Mobile Relaying
Millimeter Wave Line-of-Sight Blockage Analysis
Sliding window order statistics in sublinear space
Global well-posedness for the mass-critical stochastic nonlinear Schrödinger equation on $\mathbb{R}$: general $L^2$ data
Metrical task systems on trees via mirror descent and unfair gluing
Cooperative opinion dynamics on multiple interdependent topics: Modeling and some observations
Sem-GAN: Semantically-Consistent Image-to-Image Translation
Maximizing Road Capacity Using Cars that Influence People
Process Discovery using Classification Tree Hidden Semi-Markov Model
On the Approximation Resistance of Balanced Linear Threshold Functions
A likelihood-ratio type test for stochastic block models with bounded degrees
Amplifying state dissimilarity leads to robust and interpretable clustering of scientific data
Convergence Rate of Block-Coordinate Maximization Burer-Monteiro Method for Solving Large SDPs
Bootstrapping Max Statistics in High Dimensions: Near-Parametric Rates Under Weak Variance Decay and Application to Functional Data Analysis
Direction of Arrival Estimation for Nanoscale Sensor Networks
Finite-State Classical Mechanics
A note on regular subgroups of the automorphism group of the linear Hadamard code
Interactive Discovery System for Direct Democracy
Cross-Sender Bit-Mixing Coding
Jackknife empirical likelihood based inference for Probability weighted moments
Universal quantum criticality at finite temperature for two-dimensional disordered and clean dimerized spin-$\frac{1}{2}$ antiferromagnets
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach
Monte Carlo Methods for the Game Kingdomino
W-net: Bridged U-net for 2D Medical Image Segmentation
Competitive Analysis System for Theatrical Movie Releases Based on Movie Trailer Deep Video Representation
An Augmented Lagrangian Method for Optimization Problems in Banach Spaces
Uplink Massive MIMO for Channels with Spatial Correlation
Augmented Lagrangian Methods for the Solution of Generalized Nash Equilibrium Problems
On a Problem of Wang Concerning the Hamiltonicity of Bipartite Digraphs
A note on approximating the nearest stable discrete-time descriptor system with fixed rank
Fast yet Simple Natural-Gradient Descent for Variational Inference in Complex Models
Mixed partition functions and exponentially bounded edge-connection rank
Fast Exact Algorithms Using Hadamard Product of Polynomials
Achieving Connectivity Between Wide Areas Through Self-Organising Robot Swarm Using Embodied Evolution
Video Saliency Detection by 3D Convolutional Neural Networks
A new graph modelisation for molecule similarity
Extraction and identification of noise patterns for ultracold atoms in an optical lattice
Linear System with Hidden $Z$-Matrix and Complementary Condition
A Constrained Randomized Shortest-Paths Framework for Optimal Exploration
Shannon and Rényi entropy rates of stationary vector valued Gaussian random processes
Situation Calculus for Synthesis of Manufacturing Controllers
Robustness Analysis of Pedestrian Detectors for Surveillance
Decentralized Clustering on Compressed Data without Prior Knowledge of the Number of Clusters
Algorithmic Meta-Theorems for Monotone Submodular Maximization
Derivation of the closed-form BER expressions for DL-NOMA over Nakagami-m fading channels
Effect of the Error Propagation on the Error Performance of Cooperative Communications with the Best Relay Selection Schemes
Deep Learning for Imbalance Data Classification using Class Expert Generative Adversarial Network
Assessing the Scalability of Biologically-Motivated Deep Learning Algorithms and Architectures
On the conditional joint probability distributions of phase-type under the mixture of finite-state absorbing Markov jump processes
The Incremental Proximal Method: A Probabilistic Perspective
Benchmarking treewidth as a practical component of tensor-network–based quantum simulation
Rule Induction Partitioning Estimator
Push-Down Trees: Optimal Self-Adjusting Complete Trees
Virtualizing the Stampede2 Supercomputer with Applications to HPC in the Cloud
Analysis of a Dynamic Voluntary Contribution Mechanism Public Good Game
Nonassociativity measurements of some binary operations
Fractional Brownian motions ruled by nonlinear equations
Deep semi-supervised segmentation with weight-averaged consistency targets
Learning Product Codebooks using Vector Quantized Autoencoders for Image Retrieval
Disentangling co-occurrence patterns in n-partite ecosystems
Learning to Segment Medical Images with Scribble-Supervision Alone
Stochastic Telegraph Equation Limit for the Stochastic Six Vertex Model
Unseeded low-rank graph matching by transform-based unsupervised point registration
Know When to Fold ‘Em: Self-Assembly of Shapes by Folding in Oritatami
On $r$-uniform hypergraphs with circumference less than $r$
Toward Convolutional Blind Denoising of Real Photographs
Making Efficient Use of a Domain Expert’s Time in Relation Extraction
Explorations in Homeomorphic Variational Auto-Encoding
The Importance of Song Context and Song Order in Automated Music Playlist Generation
On the controllability of some equations of Sobolev-Galpern type
Social Networks and Construction of Culture: A Socio-Semantic Analysis of Art Groups
Technical Report: Infinite Horizon Discrete-Time Linear Quadratic Gaussian Tracking Control Derivation
LandmarkBoost: Efficient Visual Context Classifiers for Robust Localization
Finitary Process Evolution I: Information Geometry of Configuration Space and the Process-Replicator Dynamics
Inferring Multi-Dimensional Rates of Aging from Cross-Sectional Data
On efficient prediction and predictive density estimation for spherically symmetric models
A network-based citation indicator of scientific performance
Cutoff for Random Walk on Dynamical Erdös-Rényi Graph
Computational Complexity of Games and Puzzles
Non-kissing and non-crossing complexes for locally gentle algebras
Probabilistic verification of all languages
Negative Momentum for Improved Game Dynamics
Visual Reinforcement Learning with Imagined Goals