Next Page: 10000

Scientists trained an AI to write poetry, and now it’s standing toe-to-toe with Shakespeare Cache Translate Page Web Page Cache |

If science fiction has taught us anything it's that artificial intelligence will one day lead to the downfall of the entirety of mankind. That day is (probably) still a long way away, if it ever actually happens, but for now we get to enjoy some of the nicer aspects of AI, such as its ability to write poetic masterpieces.
Researchers in Australia in partnership with the University of Toronto have developed an algorithm capable of writing poetry. Far from your generic rhymes, this AI actually follows the rules, taking metre into account as it weaves its words. The AI is good. Really good. And it's even capable of tricking humans into thinking that its poems were penned by a man instead of a machine.
According to the researchers, the AI was trained extensively on the rules it needed to follow to craft an acceptable poem. It was fed nearly 3,000 sonnets as training, and the algorithm tore them apart to teach itself how the words worked with each other. Once the bot was brought up to speed it was tasked with crafting some poems of its own. Here's a sample:
With joyous gambols gay and still array No longer when he twas, while in his day At first to pass in all delightful ways Around him, charming and of all his daysNot bad, huh? Of course, knowing that an AI made it might make it feel more stilted and dry than if you had read it without any preconceptions, but there's no denying that it's a fine poem. In fact, the poems written by the AI follow the rules of poetry even more closely than human poets like Shakespeare. I guess that's the cold machine precision kicking in. When the bot's verses were mixed with human-written poems, and then scoured by volunteers, the readers were split 50-50 over who wrote them. That's a pretty solid vote of confidence in the AI's favor, but there were still some things that gave the bot away, including errors in wording and grammar. Still, it's a mighty impressive achievement. Perhaps when our robot overlords enslave humanity we'll at least be treated to some nice poetry. |

Randomized box-ball systems, limit shape of rigged configurations and Thermodynamic Bethe ansatz. (arXiv:1808.02626v1 [math-ph]) Cache Translate Page Web Page Cache |

Authors: Atsuo Kuniba, Hanbaek Lyu, Masato Okado We introduce a probability distribution on the set of states in a generalized box-ball system associated with Kirillov-Reshetikhin (KR) crystals of type $A^{(1)}_n$. Their conserved quantities induce $n$-tuple of random Young diagrams in the rigged configurations. We determine their limit shape as the system gets large by analyzing the Fermionic formula by thermodynamic Bethe ansatz. The result is expressed as a logarithmic derivative of a deformed character of the KR modules and agrees with the stationary local energy of the associated Markov process of carriers. |

On restriction of unitarizable representations of general linear groups and the non-generic local Gan-Gross-Prasad conjecture. (arXiv:1808.02640v1 [math.RT]) Cache Translate Page Web Page Cache |

Authors: Maxim Gurevich We prove one direction of a recently posed conjecture by Gan-Gross-Prasad, which predicts the branching laws that govern restriction from p-adic $GL_n$ to $GL_{n-1}$ of irreducible smooth representations within the Arthur-type class. We extend this prediction to the full class of unitarizable representations, by exhibiting a combinatorial relation that must be satisfied for any pair of irreducible representations, in which one appears as a quotient of the restriction of the other. We settle the full conjecture for the cases in which either one of the representations in the pair is generic. The method of proof involves a transfer of the problem, using the Bernstein decomposition and the quantum affine Schur-Weyl duality, into the realm of quantum affine algebras. This restatement of the problem allows for an application of the combined power of a result of Hernandez on cyclic modules together with the Lapid-Minguez criterion from the p-adic setting. |

Whats new on arXiv Cache Translate Page Web Page Cache |

MCRM: Mother Compact Recurrent Memory A Biologically Inspired Recurrent Neural Network Architecture LSTMs and GRUs are the most common recurrent … |

Rosey Cross added a discussion to the group Climate Chaos Cache Translate Page Web Page Cache |

Rosey Cross added a discussion to the group Climate Chaos## SOLAR MINIMUM CONDITIONS ARE IN EFFECTSOLAR MINIMUM CONDITIONS ARE IN EFFECT: The sun has been without sunspots for 39 of the past 42 days. To find a similar stretch of blank suns, you have to go back to 2009 when the sun was experiencing the deepest solar minimum in a century. Solar minimum has returned, bringing extra cosmic rays, long-lasting holes in the sun's atmosphere, and strangely pink auroras. Free: Aurora alerts.'COMMON' RED SPRITES: In the Czech Republic, photographer Daniel Ščerba has spent much of the summer training his cameras on passing thunderstorms, hoping to catch strange forms of upward-directed lightning. On August 7th he recorded a huge cluster of red sprites:"They sprang up from a mesoscale convective system (MCS) that was passing through southern Austria," says Ščerba. "I observed 7 groups like these over a 35 minute period."The instigating thunderstorm was located about 380 km from Ščerba's camera, denoted by a white star in this regional lightning map:380 km may sound like a great distance, but a bit of separation helps when it comes to observing sprites over the tops of towering thunderheads. Here's why.As spectacular as the display was, Ščerba says he has seen many like it this summer. "This is a common occurrence," he remarks. "I have taken many pictures of sprites like these."Solar minimum (happening now) may be boosting sprites. During this phase of the solar cycle, cosmic rays from deep space penetrate the sun's weakening magnetic defenses and enter Earth's atmosphere in greater numbers than usual. Some researchers believe that cosmic rays may provide the ionizing "spark" that triggers many sprites. If so, stay tuned for more as solar minimum deepens.LINK: http://spaceweather.com/See More |

Mark Jason Dominus: A fake keyword example Cache Translate Page Web Page Cache |

In the previous article I described a rather odd abuse of the Haskell type system to use a singleton type as a sort of pseudo-keyword, and asked if anyone had seen this done elsewhere. Joachim Breitner reported having seen this before. Most recently in
LiquidHaskell, which defines a
so that they can end every proof with
This example is from Bazou et al., Functional Pearl: Theorem Proving
for All, p. 3. The authors
explain: “The Or see the examples from the bottom of the LH splash
page, proving the
associative law for I looked in the rest of the LiquidHaskell distribution but did not find any other uses of the singleton-type trick. I would still be interested to see more examples. [ Addendum: Another example. ] |

A hand gesture could be your next password Cache Translate Page Web Page Cache |

ByJackie Snow 2 minuteRead A new system can look at a person’s finger making a motion in the air―like a signature or drawing a shape―to authenticate their identity. The framework,called FMCode, employs algorithms fed by a wearable sensor or camera, and can correctly identify users between 94.3% to 96.7% of the time on two different gesture devices after only seeing the passcode a few times, researchers say. advertisement advertisement The method, described in a new paper by computer scientists Duo Lu and Dijiang Huang at Arizona State University, gets around some of the tricky privacy concerns surrounding biometrics like face recognition. It also overcomes the issue of remembering long strings of characters needed for most secure logins. Gesture interactions could be useful when a keyboard is impractical, like using a VR headset, or in a situation where minimizing contact with the surroundings is necessary for cleanliness, like an operating room. In the paper, which was published on the Arxiv.org preprint server this month, the researchers spell out some of the hurdles they had to overcome to develop FMCode. Unlike passwords, finger motions in the air won’t be exactly the same each time, so a system has to be robust enough to recognize slightly different speeds and shapes while still catching fraudulent attempts. The system has to be able to do that with only a few examples since most users would be unwilling to write their passcode hundreds or thousands of times. To tackle those issues, the researchers turned to machine learning. The team designed classifiers that can spot spoofs while tolerating minor variations from the real user, and built a convolutional neural network (CNN) to index finger motion signals with data augmentation methods that limits the amount of training needed at setup. User login through gesture interface using inertial sensor or 3D depth camera under two different scenarios: (left) VR applications with user mobility, (right) operating theater with touchless interface for doctors to maintain high cleanliness. [Images: courtesy of Duo Lu] Giving a finger FMCode is pretty secure against most guessing attempts and spoofing, or when an attacker knows the gesture, the researchers say. But no system is foolproof. FMCode can be tricked if the system isn’t first set up to verify the user with an account ID. The researchers also say they are planning future work to study attacks where a person’s gesture passcode is recorded and then replayed later in an attempt to fool the system. Whether many people will be interested in gesture control, at least anytime soon, remains to be seen. The interest in and development of the technology has waxed and waned over the years, with movies like Minority Report and Iron Man causing spikes in attention around the futuristic interactions. Nintendo released a wired glove that could control some gaming aspects to lackluster sales in 1989 to Leap Motion, which was released to good reviews at its launch in 2013 but is still not mainstream. Companies like Sony are trying to make gesture interfaces happen, while Facebook, Microsoft, Magic Leap, and others are betting that we’ll need gesture control in their VR and AR environments. Related: The future of security? A good old-fashioned key advertisement The researchers queried the participants in the study on their thoughts on using FMCode versus other login methods, like traditional passwords and face recognition on mobile devices. While FMCode scored high for security, the users found it generally less easy to use and worse for speed. Of course, with improved hardware and a future with more security breaches, those concerns could disappear with a wave of the hand. advertisement advertisement advertisement |

Cache Translate Page Web Page Cache |

Если вам нечего делать и только выискивать, что у соседа, а на свою страну наплевать, рекомендую на каждый день:
https://www.youtube.com/user/Arxivnn |

Deep context: end-to-end contextual speech recognition. (arXiv:1808.02480v1 [eess.AS]) Cache Translate Page Web Page Cache |

Authors: Golan Pundak, Tara N. Sainath, Rohit Prabhavalkar, Anjuli Kannan, Ding Zhao In automatic speech recognition (ASR) what a user says depends on the particular context she is in. Typically, this context is represented as a set of word n-grams. In this work, we present a novel, all-neural, end-to-end (E2E) ASR sys- tem that utilizes such context. Our approach, which we re- fer to as Contextual Listen, Attend and Spell (CLAS) jointly- optimizes the ASR components along with embeddings of the context n-grams. During inference, the CLAS system can be presented with context phrases which might contain out-of- vocabulary (OOV) terms not seen during training. We com- pare our proposed system to a more traditional contextualiza- tion approach, which performs shallow-fusion between inde- pendently trained LAS and contextual n-gram models during beam search. Across a number of tasks, we find that the pro- posed CLAS system outperforms the baseline method by as much as 68% relative WER, indicating the advantage of joint optimization over individually trained components. Index Terms: speech recognition, sequence-to-sequence models, listen attend and spell, LAS, attention, embedded speech recognition. |

A Framework for Creative-Visualization Opportunities Workshops. (arXiv:1808.02502v1 [cs.HC]) Cache Translate Page Web Page Cache |

Authors: Ethan Kerzner, Sarah Goodwin, Jason Dykes, Sara Jones, Miriah Meyer Applied visualization researchers often work closely with domain collaborators to explore new and useful applications of visualization. The early stages of collaborations are typically time consuming for all stakeholders as researchers piece together an understanding of domain challenges from disparate discussions and meetings. A number of recent projects, however, report on the use of creative visualization-opportunities (CVO) workshops to accelerate the early stages of applied work, eliciting a wealth of requirements in a few days of focused work. Yet, there is no established guidance for how to use such workshops effectively. In this paper, we present the results of a 2-year collaboration in which we analyzed the use of 17 workshops in 10 visualization contexts. Its primary contribution is a framework for CVO workshops that: 1) identifies a process model for using workshops; 2) describes a structure of what happens within effective workshops; 3) recommends 25 actionable guidelines for future workshops; and 4) presents an example workshop and workshop methods. The creation of this framework exemplifies the use of critical reflection to learn about visualization in practice from diverse studies and experience. |

Device-directed Utterance Detection. (arXiv:1808.02504v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Sri Harish Mallidi, Roland Maas, Kyle Goehner, Ariya Rastrow, Spyros Matsoukas, Björn Hoffmeister In this work, we propose a classifier for distinguishing device-directed queries from background speech in the context of interactions with voice assistants. Applications include rejection of false wake-ups or unintended interactions as well as enabling wake-word free follow-up queries. Consider the example interaction: $"Computer,~play~music", "Computer,~reduce~the~volume"$. In this interaction, the user needs to repeat the wake-word ($Computer$) for the second query. To allow for more natural interactions, the device could immediately re-enter listening state after the first query (without wake-word repetition) and accept or reject a potential follow-up as device-directed or background speech. The proposed model consists of two long short-term memory (LSTM) neural networks trained on acoustic features and automatic speech recognition (ASR) 1-best hypotheses, respectively. A feed-forward deep neural network (DNN) is then trained to combine the acoustic and 1-best embeddings, derived from the LSTMs, with features from the ASR decoder. Experimental results show that ASR decoder, acoustic embeddings, and 1-best embeddings yield an equal-error-rate (EER) of $9.3~\%$, $10.9~\%$ and $20.1~\%$, respectively. Combination of the features resulted in a $44~\%$ relative improvement and a final EER of $5.2~\%$. |

Message Passing Graph Kernels. (arXiv:1808.02510v1 [stat.ML]) Cache Translate Page Web Page Cache |

Authors: Giannis Nikolentzos, Michalis Vazirgiannis Graph kernels have recently emerged as a promising approach for tackling the graph similarity and learning tasks at the same time. In this paper, we propose a general framework for designing graph kernels. The proposed framework capitalizes on the well-known message passing scheme on graphs. The kernels derived from the framework consist of two components. The first component is a kernel between vertices, while the second component is a kernel between graphs. The main idea behind the proposed framework is that the representations of the vertices are implicitly updated using an iterative procedure. Then, these representations serve as the building blocks of a kernel that compares pairs of graphs. We derive four instances of the proposed framework, and show through extensive experiments that these instances are competitive with state-of-the-art methods in various tasks. |

Bipartite induced density in triangle-free graphs. (arXiv:1808.02512v1 [math.CO]) Cache Translate Page Web Page Cache |

Authors: Wouter Cames van Batenburg, Rémi de Joannis de Verclos, Ross J. Kang, François Pirot Any triangle-free graph on $n$ vertices with minimum degree at least $d$ contains a bipartite induced subgraph of minimum degree at least $d^2/(2n)$. This is sharp up to a logarithmic factor in $n$. We also provide a related extremal result for the fractional chromatic number. |

Rethinking Numerical Representations for Deep Neural Networks. (arXiv:1808.02513v1 [cs.LG]) Cache Translate Page Web Page Cache |

Authors: Parker Hill, Babak Zamirai, Shengshuo Lu, Yu-Wei Chao, Michael Laurenzano, Mehrzad Samadi, Marios Papaefthymiou, Scott Mahlke, Thomas Wenisch, Jia Deng, Lingjia Tang, Jason Mars With ever-increasing computational demand for deep learning, it is critical to investigate the implications of the numeric representation and precision of DNN model weights and activations on computational efficiency. In this work, we explore unconventional narrow-precision floating-point representations as it relates to inference accuracy and efficiency to steer the improved design of future DNN platforms. We show that inference using these custom numeric representations on production-grade DNNs, including GoogLeNet and VGG, achieves an average speedup of 7.6x with less than 1% degradation in inference accuracy relative to a state-of-the-art baseline platform representing the most sophisticated hardware using single-precision floating point. To facilitate the use of such customized precision, we also present a novel technique that drastically reduces the time required to derive the optimal precision configuration. |

Sprintz: Time Series Compression for the Internet of Things. (arXiv:1808.02515v1 [cs.PF]) Cache Translate Page Web Page Cache |

Authors: Davis Blalock, Samuel Madden, John Guttag Thanks to the rapid proliferation of connected devices, sensor-generated time series constitute a large and growing portion of the world's data. Often, this data is collected from distributed, resource-constrained devices and centralized at one or more servers. A key challenge in this setup is reducing the size of the transmitted data without sacrificing its quality. Lower quality reduces the data's utility, but smaller size enables both reduced network and storage costs at the servers and reduced power consumption in sensing devices. A natural solution is to compress the data at the sensing devices. Unfortunately, existing compression algorithms either violate the memory and latency constraints common for these devices or, as we show experimentally, perform poorly on sensor-generated time series. We introduce a time series compression algorithm that achieves state-of-the-art compression ratios while requiring less than 1KB of memory and adding virtually no latency. This method is suitable not only for low-power devices collecting data, but also for servers storing and querying data; in the latter context, it can decompress at over 3GB/s in a single thread, even faster than many algorithms with much lower compression ratios. A key component of our method is a high-speed forecasting algorithm that can be trained online and significantly outperforms alternatives such as delta coding. Extensive experiments on datasets from many domains show that these results hold not only for sensor data but also across a wide array of other time series. |

Width-Independence Beyond Linear Objectives: Distributed Fair Packing and Covering Algorithms. (arXiv:1808.02517v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Jelena Diakonikolas, Maryam Fazel, Lorenzo Orecchia In network routing and resource allocation, $\alpha$-fair utility functions are concave objective functions used to model different notions of fairness in a single, generic framework. Different choices of the parameter $\alpha$ give rise to different notions of fairness, including max-min fairness ($\alpha = \infty$), proportional fairness ($\alpha=1$), and the unfair linear optimization ($\alpha = 0)$. In this work, we consider $\alpha$-fair resource allocation problems, defined as the maximization of $\alpha$-fair utility functions under packing constraints. We give improved distributed algorithms for constructing $\epsilon$-approximate solutions to such problems. Our algorithms are width-independent, i.e., their running time depends only poly-logarithmically on the largest entry of the constraint matrix, and closely matches the state-of-the-art guarantees for distributed algorithms for packing linear programs, i.e., for the case $\alpha = 0.$ The only previously known width-independent algorithms for $\alpha$-fair resource allocation, by Marasevic, Stein, and Zussman, obtained convergence times that exhibited much worse dependence on $\epsilon$ and $\alpha$ and relied on a less principled analysis. By contrast, our analysis leverages the Approximate Duality Gap framework of Diakonikolas and Orecchia to obtain better algorithms with a (slightly) simpler analysis. Finally, we introduce a natural counterpart of $\alpha$-fairness for minimization problems and motivate its usage in the context of fair task allocation. This generalization yields $\alpha$-fair covering problems, for which we provide the first width-independent nearly-linear-time approximate solvers by reducing their analysis to the $\alpha < 1$ case of the $\alpha$-fair packing problem. |

Detection and Segmentation of Manufacturing Defects with Convolutional Neural Networks and Transfer Learning. (arXiv:1808.02518v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Max Ferguson, Ronay Ak, Yung-Tsun Tina Lee, Kincho H. Law Automatic detection of defects in metal castings is a challenging task, owing to the rare occurrence and variation in appearance of defects. However, automatic defect detection systems can lead to significant increases in final product quality. Convolutional neural networks (CNNs) have shown outstanding performance in both image classification and localization tasks. In this work, a system is proposed for the identification of casting defects in X-ray images, based on the mask region-based CNN architecture. The proposed defect detection system simultaneously performs defect detection and segmentation on input images, making it suitable for a range of defect detection tasks. It is shown that training the network to simultaneously perform defect detection and defect instance segmentation, results in a higher defect detection accuracy than training on defect detection alone. Transfer learning is leveraged to reduce the training data demands and increase the prediction accuracy of the trained model. More specifically, the model is first trained with two large openly-available image datasets before fine-tuning on a relatively small metal casting X-ray dataset. The accuracy of the trained model exceeds state-of-the art performance on the GDXray Castings dataset and is fast enough to be used in a production setting. The system also performs well on the GDXray Welds dataset. A number of in-depth studies are conducted to explore how transfer learning, multi-task learning, and multi-class learning influence the performance of the trained system. |

Circular critical exponents for Thue-Morse factors. (arXiv:1808.02529v1 [cs.FL]) Cache Translate Page Web Page Cache |

Authors: Jeffrey Shallit, Ramin Zarifi We prove various results about the largest exponent of a repetition in a factor of the Thue-Morse word, when that factor is considered as a circular word. Our results confirm and generalize previous results of Fitzpatrick and Aberkane & Currie. |

SchiNet: Automatic Estimation of Symptoms of Schizophrenia from Facial Behaviour Analysis. (arXiv:1808.02531v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Mina Bishay, Petar Palasek, Stefan Priebe, Ioannis Patras Patients with schizophrenia often display impairments in the expression of emotion and speech and those are observed in their facial behaviour. Automatic analysis of patients' facial expressions that is aimed at estimating symptoms of schizophrenia has received attention recently. However, the datasets that are typically used for training and evaluating the developed methods, contain only a small number of patients (4-34) and are recorded while the subjects were performing controlled tasks such as listening to life vignettes, or answering emotional questions. In this paper, we use videos of professional-patient interviews, in which symptoms were assessed in a standardised way as they should/may be assessed in practice, and which were recorded in realistic conditions (i.e. varying illumination levels and camera viewpoints) at the patients' homes or at mental health services. We automatically analyse the facial behaviour of 91 out-patients - this is almost 3 times the number of patients in other studies - and propose SchiNet, a novel neural network architecture that estimates expression-related symptoms in two different assessment interviews. We evaluate the proposed SchiNet for patient-independent prediction of symptoms of schizophrenia. Experimental results show that some automatically detected facial expressions are significantly correlated to symptoms of schizophrenia, and that the proposed network for estimating symptom severity delivers promising results. |

Dynamic Temporal Pyramid Network: A Closer Look at Multi-Scale Modeling for Activity Detection. (arXiv:1808.02536v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Da Zhang, Xiyang Dai, Yuan-Fang Wang Recognizing instances at different scales simultaneously is a fundamental challenge in visual detection problems. While spatial multi-scale modeling has been well studied in object detection, how to effectively apply a multi-scale architecture to temporal models for activity detection is still under-explored. In this paper, we identify three unique challenges that need to be specifically handled for temporal activity detection compared to its spatial counterpart. To address all these issues, we propose Dynamic Temporal Pyramid Network (DTPN), a new activity detection framework with a multi-scale pyramidal architecture featuring three novel designs: (1) We sample input video frames dynamically with varying frame per seconds (FPS) to construct a natural pyramidal input for video of an arbitrary length. (2) We design a two-branch multi-scale temporal feature hierarchy to deal with the inherent temporal scale variation of activity instances. (3) We further exploit the temporal context of activities by appropriately fusing multi-scale feature maps, and demonstrate that both local and global temporal contexts are important. By combining all these components into a uniform network, we end up with a single-shot activity detector involving single-pass inferencing and end-to-end training. Extensive experiments show that the proposed DTPN achieves state-of-the-art performance on the challenging ActvityNet dataset. |

Light-stimulable molecules/nanoparticles networks for switchable logical functions and reservoir computing. (arXiv:1808.02537v1 [physics.app-ph]) Cache Translate Page Web Page Cache |

Authors: Y. Viero, D. Guerin, A. Vladyka, F. Alibart, S. Lenfant, M. Calame, D. Vuillaume We report the fabrication and electron transport properties of nanoparticles self-assembled networks (NPSAN) of molecular switches (azobenzene derivatives) interconnected by Au nanoparticles, and we demonstrate optically-driven switchable logical operations associated to the light controlled switching of the molecules. The switching yield is up to 74%. We also demonstrate that these NPSANs are prone for light-stimulable reservoir computing. The complex non-linearity of electron transport and dynamics in these highly connected and recurrent networks of molecular junctions exhibit rich high harmonics generation (HHG) required for reservoir computing (RC) approaches. Logical functions and HHG are controlled by the isomerization of the molecules upon light illumination. These results, without direct analogs in semiconductor devices, open new perspectives to molecular electronics in unconventional computing. |

Statistics of the Distance Traveled until Connectivity for Unmanned Vehicles. (arXiv:1808.02538v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Arjun Muralidharan, Yasamin Mostofi In this paper, we consider a scenario where a robot needs to establish connectivity with a remote operator or another robot, as it moves along a path. We are interested in answering the following question: what is the distance traveled by the robot along the path before it finds a connected spot? More specifically, we are interested in characterizing the statistics of the distance traveled along the path before it gets connected, in realistic channel environments experiencing path loss, shadowing and multipath effects. We develop an exact mathematical analysis of these statistics for straight-line paths and also mathematically characterize a more general space of paths (beyond straight paths) for which the analysis holds, based on the properties of the path such as its curvature. Finally, we confirm our theoretical analysis using extensive numerical results with real channel parameters from downtown San Francisco. |

Efficient Multi-Robot Coverage of a Known Environment. (arXiv:1808.02541v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Nare Karapetyan, Kelly Benson, Chris McKinney, Perouz Taslakian, Ioannis Rekleitis This paper addresses the complete area coverage problem of a known environment by multiple-robots. Complete area coverage is the problem of moving an end-effector over all available space while avoiding existing obstacles. In such tasks, using multiple robots can increase the efficiency of the area coverage in terms of minimizing the operational time and increase the robustness in the face of robot attrition. Unfortunately, the problem of finding an optimal solution for such an area coverage problem with multiple robots is known to be NP-complete. In this paper we present two approximation heuristics for solving the multi-robot coverage problem. The first solution presented is a direct extension of an efficient single robot area coverage algorithm, based on an exact cellular decomposition. The second algorithm is a greedy approach that divides the area into equal regions and applies an efficient single-robot coverage algorithm to each region. We present experimental results for two algorithms. Results indicate that our approaches provide good coverage distribution between robots and minimize the workload per robot, meanwhile ensuring complete coverage of the area. |

Persistent Monitoring of Dynamically Changing Environments Using an Unmanned Vehicle. (arXiv:1808.02545v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Sai Krishna Kanth Hari, Sivakumar Rathinam, Swaroop Darbha, Krishnamoorthy Kalyanam, Satyanarayana Gupta Manyam, David Casbeer We consider the problem of planning a closed walk $\mathcal W$ for a UAV to persistently monitor a finite number of stationary targets with equal priorities and dynamically changing properties. A UAV must physically visit the targets in order to monitor them and collect information therein. The frequency of monitoring any given target is specified by a target revisit time, $i.e.$, the maximum allowable time between any two successive visits to the target. The problem considered in this paper is the following: Given $n$ targets and $k \geq n$ allowed visits to them, find an optimal closed walk $\mathcal W^*(k)$ so that every target is visited at least once and the maximum revisit time over all the targets, $\mathcal R(\mathcal W(k))$, is minimized. We prove the following: If $k \geq n^2-n$, $\mathcal R(\mathcal W^*(k))$ (or simply, $\mathcal R^*(k)$) takes only two values: $\mathcal R^*(n)$ when $k$ is an integral multiple of $n$, and $\mathcal R^*(n+1)$ otherwise. This result suggests significant computational savings - one only needs to determine $\mathcal W^*(n)$ and $\mathcal W^*(n+1)$ to construct an optimal solution $\mathcal W^*(k)$. We provide MILP formulations for computing $\mathcal W^*(n)$ and $\mathcal W^*(n+1)$. Furthermore, for {\it any} given $k$, we prove that $\mathcal R^*(k) \geq \mathcal R^*(k+n)$. |

Parallel and Streaming Algorithms for K-Core Decomposition. (arXiv:1808.02546v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Hossein Esfandiari, Silvio Lattanzi, Vahab Mirrokni The $k$-core decomposition is a fundamental primitive in many machine learning and data mining applications. We present the first distributed and the first streaming algorithms to compute and maintain an approximate $k$-core decomposition with provable guarantees. Our algorithms achieve rigorous bounds on space complexity while bounding the number of passes or number of rounds of computation. We do so by presenting a new powerful sketching technique for $k$-core decomposition, and then by showing it can be computed efficiently in both streaming and MapReduce models. Finally, we confirm the effectiveness of our sketching technique empirically on a number of publicly available graphs. |

The economic value of neighborhoods: Predicting real estate prices from the urban environment. (arXiv:1808.02547v1 [cs.CY]) Cache Translate Page Web Page Cache |

Authors: Marco De Nadai, Bruno Lepri Housing costs have a significant impact on individuals, families, businesses, and governments. Recently, online companies such as Zillow have developed proprietary systems that provide automated estimates of housing prices without the immediate need of professional appraisers. Yet, our understanding of what drives the value of houses is very limited. In this paper, we use multiple sources of data to entangle the economic contribution of the neighborhood's characteristics such as walkability and security perception. We also develop and release a framework able to now-cast housing prices from Open data, without the need for historical transactions. Experiments involving 70,000 houses in 8 Italian cities highlight that the neighborhood's vitality and walkability seem to drive more than 20% of the housing value. Moreover, the use of this information improves the nowcast by 60%. Hence, the use of property's surroundings' characteristics can be an invaluable resource to appraise the economic and social value of houses after neighborhood changes and, potentially, anticipate gentrification. |

Collaborative Planning for Mixed-Autonomy Lane Merging. (arXiv:1808.02550v1 [cs.AI]) Cache Translate Page Web Page Cache |

Authors: Shray Bansal, Akansel Cosgun, Alireza Nakhaei, Kikuo Fujimura Driving is a social activity: drivers often indicate their intent to change lanes via motion cues. We consider mixed-autonomy traffic where a Human-driven Vehicle (HV) and an Autonomous Vehicle (AV) drive together. We propose a planning framework where the degree to which the AV considers the other agent's reward is controlled by a selfishness factor. We test our approach on a simulated two-lane highway where the AV and HV merge into each other's lanes. In a user study with 21 subjects and 6 different selfishness factors, we found that our planning approach was sound and that both agents had less merging times when a factor that balances the rewards for the two agents was chosen. Our results on double lane merging suggest it to be a non-zero-sum game and encourage further investigation on collaborative decision making algorithms for mixed-autonomy traffic. |

Multi-robot Dubins Coverage with Autonomous Surface Vehicles. (arXiv:1808.02552v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Nare Karapetyan, Jason Moulton, Jeremy S. Lewis, Alberto Quattrini Li, Jason M. O'Kane, Ioannis Rekleitis In large scale coverage operations, such as marine exploration or aerial monitoring, single robot approaches are not ideal, as they may take too long to cover a large area. In such scenarios, multi-robot approaches are preferable. Furthermore, several real world vehicles are non-holonomic, but can be modeled using Dubins vehicle kinematics. This paper focuses on environmental monitoring of aquatic environments using Autonomous Surface Vehicles (ASVs). In particular, we propose a novel approach for solving the problem of complete coverage of a known environment by a multi-robot team consisting of Dubins vehicles. It is worth noting that both multi-robot coverage and Dubins vehicle coverage are NP-complete problems. As such, we present two heuristics methods based on a variant of the traveling salesman problem -- k-TSP -- formulation and clustering algorithms that efficiently solve the problem. The proposed methods are tested both in simulations to assess their scalability and with a team of ASVs operating on a lake to ensure their applicability in real world. |

A Joint Sequence Fusion Model for Video Question Answering and Retrieval. (arXiv:1808.02559v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Youngjae Yu, Jongseok Kim, Gunhee Kim We present an approach named JSFusion (Joint Sequence Fusion) that can measure semantic similarity between any pairs of multimodal sequence data (e.g. a video clip and a language sentence). Our multimodal matching network consists of two key components. First, the Joint Semantic Tensor composes a dense pairwise representation of two sequence data into a 3D tensor. Then, the Convolutional Hierarchical Decoder computes their similarity score by discovering hidden hierarchical matches between the two sequence modalities. Both modules leverage hierarchical attention mechanisms that learn to promote well-matched representation patterns while prune out misaligned ones in a bottom-up manner. Although the JSFusion is a universal model to be applicable to any multimodal sequence data, this work focuses on video-language tasks including multimodal retrieval and video QA. We evaluate the JSFusion model in three retrieval and VQA tasks in LSMDC, for which our model achieves the best performance reported so far. We also perform multiple-choice and movie retrieval tasks for the MSR-VTT dataset, on which our approach outperforms many state-of-the-art methods. |

Belief likelihood function for generalised logistic regression. (arXiv:1808.02560v1 [math.ST]) Cache Translate Page Web Page Cache |

Authors: Fabio Cuzzolin The notion of belief likelihood function of repeated trials is introduced, whenever the uncertainty for individual trials is encoded by a belief measure (a finite random set). This generalises the traditional likelihood function, and provides a natural setting for belief inference from statistical data. Factorisation results are proven for the case in which conjunctive or disjunctive combination are employed, leading to analytical expressions for the lower and upper likelihoods of `sharp' samples in the case of Bernoulli trials, and to the formulation of a generalised logistic regression framework. |

Design Challenges in Named Entity Transliteration. (arXiv:1808.02563v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Yuval Merhav, Stephen Ash We analyze some of the fundamental design challenges that impact the development of a multilingual state-of-the-art named entity transliteration system, including curating bilingual named entity datasets and evaluation of multiple transliteration methods. We empirically evaluate the transliteration task using traditional weighted finite state transducer (WFST) approach against two neural approaches: the encoder-decoder recurrent neural network method and the recent, non-sequential Transformer method. In order to improve availability of bilingual named entity transliteration datasets, we release personal name bilingual dictionaries minded from Wikidata for English to Russian, Hebrew, Arabic and Japanese Katakana. Our code and dictionaries are publicly available. |

Image Anomalies: a Review and Synthesis of Detection Methods. (arXiv:1808.02564v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Thibaud Ehret, Axel Davy, Jean-Michel Morel, Mauricio Delbracio We review the broad variety of methods that have been proposed for anomaly detection in images. Most methods found in the literature have in mind a particular application. Yet we show that the methods can be classified mainly by the structural assumption they make on the "normal" image. Five different structural assumptions emerge. Our analysis leads us to reformulate the best representative algorithms by attaching to them an a contrario detection that controls the number of false positives and thus derive universal detection thresholds. By combining the most general structural assumptions expressing the background's normality with the best proposed statistical detection tools, we end up proposing generic algorithms that seem to generalize or reconcile most methods. We compare the six best representatives of our proposed classes of algorithms on anomalous images taken from classic papers on the subject, and on a synthetic database. Our conclusion is that it is possible to perform automatic anomaly detection on a single image. |

Good $r$-divisions Imply Optimal Amortised Decremental Biconnectivity. (arXiv:1808.02568v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Jacob Holm, Eva Rotenberg We present a data structure that given a graph $G$ of $n$ vertices and $m$ edges, and a suitable pair of $r$-divisions of $G$, preprocesses $G$ in $O(m+n)$ time and handles any series of edge-deletions in $O(m)$ total time while answering queries to pairwise biconnectivity in $O(1)$ time. In case the vertices are not biconnected, the data structure can return a cut-vertex separating them in $O(1)$ time. As an immediate consequence, this gives optimal amortised decremental biconnectivity, 2-edge connectivity, and connectivity for large classes of graphs, such as planar graphs, minor free graphs, and more. |

Minimal solutions of the rational interpolation problem. (arXiv:1808.02575v1 [math.AC]) Cache Translate Page Web Page Cache |

Authors: Teresa Cortadellas Benitez, Carlos D'Andrea, Eulalia Montoro We compute minimal solutions of the rational interpolation problem in terms of different notions of degrees associated to these functions. In all the cases, the rational interpolating functions with smallest degree can be computed via the Extended Euclidean Algorithm and syzygies of polynomials. As a by-product, we describe the minimal degree in a mu-basis of a polynomial planar parametrization in terms of a "critical" degree arising in the EEA. |

A Centralized Metropolitan-Scale Radio Resource Management Scheme. (arXiv:1808.02582v1 [cs.IT]) Cache Translate Page Web Page Cache |

Authors: Zhiyi Zhou, Dongning Guo This work studies centralized radio resource management in metropolitan area networks with a very large number of access points and user devices. A central controller collects time-averaged traffic and channel conditions from all access points and coordinates spectrum allocation, user association, and power control throughout the network on an appropriate timescale. The timescale is conceived to be seconds in today's networks, and it is likely to become faster in the future. The coordination problem in each time epoch is formulated as a network utility maximization problem, where any subset of access points may use any parts of the spectrum to serve any subsets of devices. It is proved that the network utility can be maximized by an extremely sparse spectrum allocation. By exploiting this sparsity, an efficient iterative algorithm with guaranteed convergence is developed, each iteration of which is performed in closed form. The proposed centralized optimization framework can incorporate a broad class of utility functions that account for weighted sum rates, average packet delay, and/or energy consumption, along with very general constraints on transmission powers. Numerical results demonstrate the feasibility of the algorithm for networks with up to 1,000 access points and several thousand devices. Moreover, the proposed scheme yields significantly improved throughput region and average packet delay comparing with several well-known competing schemes. |

LDPUF: Exploiting DRAM Latency Variations to Generate Robust Device Signatures. (arXiv:1808.02584v1 [cs.CR]) Cache Translate Page Web Page Cache |

Authors: B. M. S. Bahar Talukder, Biswajit Ray, Mark Tehranipoor, Domenic Forte, Md Tauhidur Rahman Physically Unclonable Functions (PUFs) are potential security blocks to generate unique and more secure keys in low-cost cryptographic applications. Memories have been popular candidates for PUFs because of their prevalence in the modern electronic systems. However, the existing techniques of generating device signatures from DRAM is very slow, destructive (destroy the current data), and disruptive to system operation. In this paper, we propose latency-based (precharge) PUF which exploits DRAM precharge latency to generate signatures. Our proposed methodology for key generation is fast, robust, least disruptive, and non-destructive. The silicon results from DDR3 chips show that the proposed key generation technique is at least ~4,300X faster than the existing approaches, while reliably reproducing the key in extreme operating conditions. |

Reachability Analysis Using Dissipation Inequalities For Nonlinear Dynamical Systems. (arXiv:1808.02585v1 [cs.SY]) Cache Translate Page Web Page Cache |

Authors: He Yin, Andrew Packard, Murat Arcak, Peter Seiler We propose a method to overbound reachable sets on finite time horizons for continuous-time nonlinear systems with polynomial dynamics. The analysis considers uncertain initial conditions, parameters, L2 disturbances, and perturbations characterized by time-domain, integral quadratic constraints (IQCs). This method makes use of time-dependent polynomial storage functions that satisfy certain dissipation inequalities on local regions of the state space, intervals of time and bounded sets of uncertain parameters. The S-procedure and sum-of-square techniques are used to derive the computation algorithms, and an objective function is introduced to find an over-approximation with a desired shape. Both pedagogical and practically motivated examples are presented, including a 7-state F-18 aircraft model. |

Adversarial Domain Adaptation for Variational Neural Language Generation in Dialogue Systems. (arXiv:1808.02586v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Van-Khanh Tran, Le-Minh Nguyen Domain Adaptation arises when we aim at learning from source domain a model that can per- form acceptably well on a different target domain. It is especially crucial for Natural Language Generation (NLG) in Spoken Dialogue Systems when there are sufficient annotated data in the source domain, but there is a limited labeled data in the target domain. How to effectively utilize as much of existing abilities from source domains is a crucial issue in domain adaptation. In this paper, we propose an adversarial training procedure to train a Variational encoder-decoder based language generator via multiple adaptation steps. In this procedure, a model is first trained on a source domain data and then fine-tuned on a small set of target domain utterances under the guidance of two proposed critics. Experimental results show that the proposed method can effec- tively leverage the existing knowledge in the source domain to adapt to another related domain by using only a small amount of in-domain data. |

A Tutorial on Network Embeddings. (arXiv:1808.02590v1 [cs.SI]) Cache Translate Page Web Page Cache |

Authors: Haochen Chen, Bryan Perozzi, Rami Al-Rfou, Steven Skiena Network embedding methods aim at learning low-dimensional latent representation of nodes in a network. These representations can be used as features for a wide range of tasks on graphs such as classification, clustering, link prediction, and visualization. In this survey, we give an overview of network embeddings by summarizing and categorizing recent advancements in this research field. We first discuss the desirable properties of network embeddings and briefly introduce the history of network embedding algorithms. Then, we discuss network embedding methods under different scenarios, such as supervised versus unsupervised learning, learning embeddings for homogeneous networks versus for heterogeneous networks, etc. We further demonstrate the applications of network embeddings, and conclude the survey with future work in this area. |

A practical Single Source Shortest Path algorithm for random directed graphs with arbitrary weight in expecting linear time. (arXiv:1808.02591v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Dexin Li In this paper we present a new algorithm called Raffica algorithm for Single Source Shortest Path. In random graph, this algorithm has $\Theta(M)$ time complexity. And for random grid graphs with $\Theta(N)$ hop-diameter, it is also linear. This algorithm can solve SSSP with arbitrary weights; when a negative cycle exists, this algorithm can find it out costing $O(M)$. It means we can use it to solve random System of Difference Constraints fast as $\Theta(M)$ in expect. Using the idea, we can prove the expecting time complexity of queue optimized Bellman-Ford Algorithm, which is usually called SPFA, is $\Theta(MD)$ time complexity in expect, where $D = O(\dfrac{\log N}{\log M/N})$ is the expecting hop-diameter, unlike the claim $O(M)$ of Duan's. |

A Semi-Supervised Data Augmentation Approach using 3D Graphical Engines. (arXiv:1808.02595v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Shuangjun Liu, Sarah Ostadabbas Deep learning approaches have been rapidly adopted across a wide range of fields because of their accuracy and flexibility, but require large labeled training datasets. This presents a fundamental problem for applications with limited, expensive, or private data (i.e. small data), such as human pose and behavior estimation/tracking which could be highly personalized. In this paper, we present a semi-supervised data augmentation approach that can synthesize large scale labeled training datasets using 3D graphical engines based on a physically-valid low dimensional pose descriptor. To evaluate the performance of our synthesized datasets in training deep learning-based models, we generated a large synthetic human pose dataset, called ScanAva using 3D scans of only 7 individuals based on our proposed augmentation approach. A state-of-the-art human pose estimation deep learning model then was trained from scratch using our ScanAva dataset and could achieve the pose estimation accuracy of 91.2% at PCK0.5 criteria after applying an efficient domain adaptation on the synthetic images, in which its pose estimation accuracy was comparable to the same model trained on large scale pose data from real humans such as MPII dataset and much higher than the model trained on other synthetic human dataset such as SURREAL. |

PIVETed-Granite: Computational Phenotypes through Constrained Tensor Factorization. (arXiv:1808.02602v1 [cs.LG]) Cache Translate Page Web Page Cache |

Authors: Jette Henderson, Bradley A. Malin, Joyce C. Ho, Joydeep Ghosh It has been recently shown that sparse, nonnegative tensor factorization of multi-modal electronic health record data is a promising approach to high-throughput computational phenotyping. However, such approaches typically do not leverage available domain knowledge while extracting the phenotypes; hence, some of the suggested phenotypes may not map well to clinical concepts or may be very similar to other suggested phenotypes. To address these issues, we present a novel, automatic approach called PIVETed-Granite that mines existing biomedical literature (PubMed) to obtain cannot-link constraints that are then used as side-information during a tensor-factorization based computational phenotyping process. The resulting improvements are clearly observed in experiments using a large dataset from VUMC to identify phenotypes for hypertensive patients. |

Unsupervised/Semi-supervised Deep Learning for Low-dose CT Enhancement. (arXiv:1808.02603v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Mingrui Geng, Yun Deng, Qian Zhao, Qi Xie, Dong Zeng, Dong Zeng, Wangmeng Zuo, Deyu Meng Recently, deep learning(DL) methods have been proposed for the low-dose computed tomography(LdCT) enhancement, and obtain good trade-off between computational efficiency and image quality. Most of them need large number of pre-collected ground-truth/high-dose sinograms with less noise, and train the network in a supervised end-to-end manner. This may bring major limitations on these methods because the number of such low-dose/high-dose training sinogram pairs would affect the network's capability and sometimes the ground-truth sinograms are hard to be obtained in large scale. Since large number of low-dose ones are relatively easy to obtain, it should be critical to make these sources play roles in network training in an unsupervised learning manner. To address this issue, we propose an unsupervised DL method for LdCT enhancement that incorporates unlabeled LdCT sinograms directly into the network training. The proposed method effectively considers the structure characteristics and noise distribution in the measured LdCT sinogram, and then learns the proper gradient of the LdCT sinogram in a pure unsupervised manner. Similar to the labeled ground-truth, the gradient information in an unlabeled LdCT sinogram can be used for sufficient network training. The experiments on the patient data show effectiveness of the proposed method. |

End-to-end Speech Recognition with Word-based RNN Language Models. (arXiv:1808.02608v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Takaaki Hori, Jaejin Cho, Shinji Watanabe This paper investigates the impact of word-based RNN language models (RNN-LMs) on the performance of end-to-end automatic speech recognition (ASR). In our prior work, we have proposed a multi-level LM, in which character-based and word-based RNN-LMs are combined in hybrid CTC/attention-based ASR. Although this multi-level approach achieves significant error reduction in the Wall Street Journal (WSJ) task, two different LMs need to be trained and used for decoding, which increase the computational cost and memory usage. In this paper, we further propose a novel word-based RNN-LM, which allows us to decode with only the word-based LM, where it provides look-ahead word probabilities to predict next characters instead of the character-based LM, leading competitive accuracy with less computation compared to the multi-level LM. We demonstrate the efficacy of the word-based RNN-LMs using a larger corpus, LibriSpeech, in addition to WSJ we used in the prior work. Furthermore, we show that the proposed model achieves 5.1 %WER for WSJ Eval'92 test set when the vocabulary size is increased, which is the best WER reported for end-to-end ASR systems on this benchmark. |

L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data. (arXiv:1808.02610v1 [cs.LG]) Cache Translate Page Web Page Cache |

Authors: Jianbo Chen, Le Song, Martin J. Wainwright, Michael I. Jordan We study instancewise feature importance scoring as a method for model interpretation. Any such method yields, for each predicted instance, a vector of importance scores associated with the feature vector. Methods based on the Shapley score have been proposed as a fair way of computing feature attributions of this kind, but incur an exponential complexity in the number of features. This combinatorial explosion arises from the definition of the Shapley value and prevents these methods from being scalable to large data sets and complex models. We focus on settings in which the data have a graph structure, and the contribution of features to the target variable is well-approximated by a graph-structured factorization. In such settings, we develop two algorithms with linear complexity for instancewise feature importance scoring. We establish the relationship of our methods to the Shapley value and another closely related concept known as the Myerson value from cooperative game theory. We demonstrate on both language and image data that our algorithms compare favorably with other methods for model interpretation. |

Parallax: Automatic Data-Parallel Training of Deep Neural Networks. (arXiv:1808.02621v1 [cs.DC]) Cache Translate Page Web Page Cache |

Authors: Soojeong Kim, Gyeong-In Yu, Hojin Park, Sungwoo Cho, Eunji Jeong, Hyeonmin Ha, Sanha Lee, Joo Seong Jeong, Byung-Gon Chun The employment of high-performance servers and GPU accelerators for training deep neural network models have greatly accelerated recent advances in machine learning (ML). ML frameworks, such as TensorFlow, MXNet, and Caffe2, have emerged to assist ML researchers to train their models in a distributed fashion. However, correctly and efficiently utilizing multiple machines and GPUs is still not a straightforward task for framework users due to the non-trivial correctness and performance challenges that arise in the distribution process. This paper introduces Parallax, a tool for automatic parallelization of deep learning training in distributed environments. Parallax not only handles the subtle correctness issues, but also leverages various optimizations to minimize the communication overhead caused by scaling out. Experiments show that Parallax built atop TensorFlow achieves scalable training throughput on multiple CNN and RNN models, while requiring little effort from its users. |

Learning to Write Notes in Electronic Health Records. (arXiv:1808.02622v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Peter J. Liu Clinicians spend a significant amount of time inputting free-form textual notes into Electronic Health Records (EHR) systems. Much of this documentation work is seen as a burden, reducing time spent with patients and contributing to clinician burnout. With the aspiration of AI-assisted note-writing, we propose a new language modeling task predicting the content of notes conditioned on past data from a patient's medical record, including patient demographics, labs, medications, and past notes. We train generative models using the public, de-identified MIMIC-III dataset and compare generated notes with those in the dataset on multiple measures. We find that much of the content can be predicted, and that many common templates found in notes can be learned. We discuss how such models can be useful in supporting assistive note-writing features such as error-detection and auto-complete. |

Training Compact Neural Networks with Binary Weights and Low Precision Activations. (arXiv:1808.02631v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Bohan Zhuang, Chunhua Shen, Ian Reid In this paper, we propose to train a network with binary weights and low-bitwidth activations, designed especially for mobile devices with limited power consumption. Most previous works on quantizing CNNs uncritically assume the same architecture, though with reduced precision. However, we take the view that for best performance it is possible (and even likely) that a different architecture may be better suited to dealing with low precision weights and activations. Specifically, we propose a "network expansion" strategy in which we aggregate a set of homogeneous low-precision branches to implicitly reconstruct the full-precision intermediate feature maps. Moreover, we also propose a group-wise feature approximation strategy which is very flexible and highly accurate. Experiments on ImageNet classification tasks demonstrate the superior performance of the proposed model, named Group-Net, over various popular architectures. In particular, with binary weights and activations, we outperform the previous best binary neural network in terms of accuracy as well as saving more than 5 times computational complexity on ImageNet with ResNet-18 and ResNet-50. |

Question-Guided Hybrid Convolution for Visual Question Answering. (arXiv:1808.02632v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Peng Gao, Pan Lu, Hongsheng Li, Shuang Li, Yikang Li, Steven Hoi, Xiaogang Wang In this paper, we propose a novel Question-Guided Hybrid Convolution (QGHC) network for Visual Question Answering (VQA). Most state-of-the-art VQA methods fuse the high-level textual and visual features from the neural network and abandon the visual spatial information when learning multi-modal features.To address these problems, question-guided kernels generated from the input question are designed to convolute with visual features for capturing the textual and visual relationship in the early stage. The question-guided convolution can tightly couple the textual and visual information but also introduce more parameters when learning kernels. We apply the group convolution, which consists of question-independent kernels and question-dependent kernels, to reduce the parameter size and alleviate over-fitting. The hybrid convolution can generate discriminative multi-modal features with fewer parameters. The proposed approach is also complementary to existing bilinear pooling fusion and attention based VQA methods. By integrating with them, our method could further boost the performance. Extensive experiments on public VQA datasets validate the effectiveness of QGHC. |

Courteous Autonomous Cars. (arXiv:1808.02633v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Liting Sun, Wei Zhan, Masayoshi Tomizuka, Anca D. Dragan Typically, autonomous cars optimize for a combination of safety, efficiency, and driving quality. But as we get better at this optimization, we start seeing behavior go from too conservative to too aggressive. The car's behavior exposes the incentives we provide in its cost function. In this work, we argue for cars that are not optimizing a purely selfish cost, but also try to be courteous to other interactive drivers. We formalize courtesy as a term in the objective that measures the increase in another driver's cost induced by the autonomous car's behavior. Such a courtesy term enables the robot car to be aware of possible irrationality of the human behavior, and plan accordingly. We analyze the effect of courtesy in a variety of scenarios. We find, for example, that courteous robot cars leave more space when merging in front of a human driver. Moreover, we find that such a courtesy term can help explain real human driver behavior on the NGSIM dataset. |

Cognitive system to achieve human-level accuracy in automated assignment of helpdesk email tickets. (arXiv:1808.02636v1 [cs.AI]) Cache Translate Page Web Page Cache |

Authors: Atri Mandal, Nikhil Malhotra, Shivali Agarwal, Anupama Ray, Giriprasad Sridhara Ticket assignment/dispatch is a crucial part of service delivery business with lot of scope for automation and optimization. In this paper, we present an end-to-end automated helpdesk email ticket assignment system, which is also offered as a service. The objective of the system is to determine the nature of the problem mentioned in an incoming email ticket and then automatically dispatch it to an appropriate resolver group (or team) for resolution. The proposed system uses an ensemble classifier augmented with a configurable rule engine. While design of classifier that is accurate is one of the main challenges, we also need to address the need of designing a system that is robust and adaptive to changing business needs. We discuss some of the main design challenges associated with email ticket assignment automation and how we solve them. The design decisions for our system are driven by high accuracy, coverage, business continuity, scalability and optimal usage of computational resources. Our system has been deployed in production of three major service providers and currently assigning over 40,000 emails per month, on an average, with an accuracy close to 90% and covering at least 90% of email tickets. This translates to achieving human-level accuracy and results in a net saving of about 23000 man-hours of effort per annum. |

Social Community-Aware Content Placement in Wireless Device-to-Device Communication Networks. (arXiv:1808.02637v1 [cs.GT]) Cache Translate Page Web Page Cache |

Authors: Mehdi Naderi Soorki, Walid Saad, Mohammad Hossein Manshaei, Hossein Saidi In this paper, a novel framework for optimizing the caching of popular user content at the level of wireless user equipments (UEs) is proposed. The goal is to improve content offloading over wireless device-to-device (D2D) communication links. In the considered network, users belong to different social communities while their UEs form a single multi-hop D2D network. The proposed framework allows to exploit the multi-community social context of users for improving the local offloading of cached content in a multihop D2D network. To model the collaborative effect of a set of UEs on content offloading, a cooperative game between the UEs is formulated. For this game, it is shown that the Shapley value (SV) of each UE effectively captures the impact of this UE on the overall content offloading process. To capture the presence of multiple social communities that connect the UEs, a hypergraph model is proposed. Two line graphs, an influence-weighted graph, and a connectivity-weighted graph, are developed for analyzing the proposed hypergaph model. Using the developed line graphs along with the SV of the cooperative game, a precise offloading power metric is derived for each UE within a multi-community, multi-hop D2D network. Then, UEs with high offloading power are chosen as the optimal locations for caching the popular content. Simulation results show that, on the average, the proposed cache placement framework achieves 12%, 19%, and 21% improvements in terms of the number of UEs that received offloaded popular content compared to the schemes based on betweenness, degree, and closeness centrality, respectively. |

Accelerating wave-propagation algorithms with adaptive mesh refinement using the Graphics Processing Unit (GPU). (arXiv:1808.02638v1 [cs.MS]) Cache Translate Page Web Page Cache |

Authors: Xinsheng Qin, Randall J. LeVeque, Michael R. Motley Clawpack is a library for solving nonlinear hyperbolic partial differential equations using high-resolution finite volume methods based on Riemann solvers and limiters. It supports Adaptive Mesh Refinement (AMR), which is essential in solving multi-scale problems. Recently, we added capabilities to accelerate the code by using the Graphics Process Unit (GPU). Routines that manage CPU and GPU AMR data and facilitate the execution of GPU kernels are added. Customized and CPU thread-safe memory managers are designed to manage GPU and CPU memory pools, which is essential in eliminating the overhead of memory allocation and de-allocation. A global reduction is conducted every time step for dynamically adjusting the time step based on Courant number restrictions. Some small GPU kernels are merged into bigger kernels, which greatly reduces kernel launching overhead. A speed-up between $2$ and $3$ for the total running time is observed in an acoustics benchmark problem. |

Adversarial Geometry and Lighting using a Differentiable Renderer. (arXiv:1808.02651v1 [cs.LG]) Cache Translate Page Web Page Cache |

Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson Many machine learning classifiers are vulnerable to adversarial attacks, inputs with perturbations designed to intentionally trigger misclassification. Modern adversarial methods either directly alter pixel colors, or "paint" colors onto a 3D shapes. We propose novel adversarial attacks that directly alter the geometry of 3D objects and/or manipulate the lighting in a virtual scene. We leverage a novel differentiable renderer that is efficient to evaluate and analytically differentiate. Our renderer generates images realistic enough for correct classification by common pre-trained models, and we use it to design physical adversarial examples that consistently fool these models. We conduct qualitative and quantitate experiments to validate our adversarial geometry and adversarial lighting attack capabilities. |

Permutation patterns in genome rearrangement problems. (arXiv:1808.02653v1 [math.CO]) Cache Translate Page Web Page Cache |

Authors: Giulio Cerbai, Luca Ferrari In the context of the genome rearrangement problem, we analyze two well known models, namely the block transposition and the prefix block transposition models, by exploiting the connection with the notion of permutation pattern. More specifically, for any $k$, we provide a characterization of the set of permutations having distance $\leq k$ from the identity (which is known to be a permutation class) in terms of what we call generating permutations and we describe some properties of its basis, which allow to compute such a basis for small values of $k$. |

Appearance-Based Landmark Selection for Efficient Long-Term Visual Localization. (arXiv:1808.02656v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Mathias Bürki, Igor Gilitschenski, Elena Stumm, Roland Siegwart, Juan Nieto We present an online landmark selection method for distributed long-term visual localization systems in bandwidth-constrained environments. Sharing a common map for online localization provides a fleet of au- tonomous vehicles with the possibility to maintain and access a consistent map source, and therefore reduce redundancy while increasing efficiency. However, connectivity over a mobile network imposes strict bandwidth constraints and thus the need to minimize the amount of exchanged data. The wide range of varying appearance conditions encountered during long-term visual localization offers the potential to reduce data usage by extracting only those visual cues which are relevant at the given time. Motivated by this, we propose an unsupervised method of adaptively selecting landmarks according to how likely these landmarks are to be observable under the prevailing appear- ance condition. The ranking function this selection is based upon exploits landmark co-observability statistics collected in past traversals through the mapped area. Evaluation is per- formed over different outdoor environments, large time-scales and varying appearance conditions, including the extreme tran- sition from day-time to night-time, demonstrating that with our appearance-dependent selection method, we can significantly reduce the amount of landmarks used for localization while maintaining or even improving the localization performance. |

Map Management for Efficient Long-Term Visual Localization in Outdoor Environments. (arXiv:1808.02658v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Mathias Bürki, Marcin Dymczyk, Igor Gilitschenski, Cesar Cadena, Roland Siegwart, Juan Nieto We present a complete map management process for a visual localization system designed for multi-vehicle long- term operations in resource constrained outdoor environments. Outdoor visual localization generates large amounts of data that need to be incorporated into a lifelong visual map in order to allow localization at all times and under all appearance conditions. Processing these large quantities of data is non- trivial, as it is subject to limited computational and storage capabilities both on the vehicle and on the mapping backend. We address this problem with a two-fold map update paradigm capable of, either, adding new visual cues to the map, or updating co-observation statistics. The former, in combination with offline map summarization techniques, allows enhancing the appearance coverage of the lifelong map while keeping the map size limited. On the other hand, the latter is able to significantly boost the appearance-based landmark selection for efficient online localization without incurring any additional computational or storage burden. Our evaluation in challenging outdoor conditions shows that our proposed map management process allows building and maintaining maps for precise visual localization over long time spans in a tractable and scalable fashion. |

An Occam's Razor View on Learning Audiovisual Emotion Recognition with Small Training Sets. (arXiv:1808.02668v1 [cs.AI]) Cache Translate Page Web Page Cache |

Authors: Valentin Vielzeuf, Corentin Kervadec, Stéphane Pateux, Alexis Lechervy, Frédéric Jurie This paper presents a light-weight and accurate deep neural model for audiovisual emotion recognition. To design this model, the authors followed a philosophy of simplicity, drastically limiting the number of parameters to learn from the target datasets, always choosing the simplest earning methods: i) transfer learning and low-dimensional space embedding allows to reduce the dimensionality of the representations. ii) The isual temporal information is handled by a simple score-per-frame selection process, averaged across time. iii) A simple frame selection echanism is also proposed to weight the images of a sequence. iv) The fusion of the different modalities is performed at prediction level (late usion). We also highlight the inherent challenges of the AFEW dataset and the difficulty of model selection with as few as 383 validation equences. The proposed real-time emotion classifier achieved a state-of-the-art accuracy of 60.64 % on the test set of AFEW, and ranked 4th at he Emotion in the Wild 2018 challenge. |

Modified box dimension of trees and hierarchical scale-free graphs. (arXiv:1808.02674v1 [math.CO]) Cache Translate Page Web Page Cache |

Authors: Júlia Komjáthy, Roland Molontay, Károly Simon In this paper, we introduce a new concept: the modified box dimension of graph sequences motivated by the notion of fractality of complex networks proposed by Song et al. We show that the definition of fractality cannot be applied to networks with 'tree-like' structure and exponential growth rate of neighborhoods. However, we show that the definition of fractal dimension could be modified in a way that takes into account the exponential growth, and with the modified definition, the fractal dimension becomes a proper parameter. We find that this parameter is related to the growth rate of trees. We also generalize the concept of box dimension further and introduce the modified Cesaro box dimension. Using rigorous proofs we determine the optimal box covering and modified box dimension of various models: the hierarchical graph sequence model introduced by Komj\'athy and Simon, Song-Havlin-Makse model, spherically symmetric trees, and supercritical Galton-Watson trees. |

Packing colouring of some classes of cubic graphs. (arXiv:1808.02675v1 [cs.DM]) Cache Translate Page Web Page Cache |

Authors: Eric Sopena (LaBRI), Daouya Laïche (L'IFORCE) The packing chromatic number $\chi$ $\rho$ (G) of a graph G is the smallest integer k such that its set of vertices V (G) can be partitioned into k disjoint subsets V 1 ,. .. , V k , in such a way that every two distinct vertices in V i are at distance greater than i in G for every i, 1 $\le$ i $\le$ k. Recently, Balogh, Kostochka and Liu proved that $\chi$ $\rho$ is not bounded in the class of subcubic graphs [Packing chromatic number of subcubic graphs, Discrete Math. 341 (2018), 474483], thus answering a question previously addressed in several papers. However, several subclasses of cubic or subcubic graphs have bounded packing chromatic number. In this paper, we determine the exact value of, or upper and lower bounds on, the packing chromatic number of some classes of cubic graphs, namely circular ladders, and so-called H-graphs and generalised H-graphs. |

Age of Information Upon Decisions. (arXiv:1808.02679v1 [cs.IT]) Cache Translate Page Web Page Cache |

Authors: Yunquan Dong, Zhengchuan Chen, Shanyun Liu, Pingyi Fan We consider an M/M/1 update-and-decide system where Poisson distributed decisions are made based on the received updates. We propose to characterize the freshness of the received updates at decision epochs with Age upon Decisions (AuD). Under the first-come-first-served policy (FCFS), the closed form average AuD is derived. We show that the average AuD of the system is determined by the arrival rate and the service rate, and is independent of the decision rate. Thus, merely increasing the decision rate does not improve the timeliness of decisions. Nevertheless, increasing the arrival rate and the service rate can decrease the average AuD efficiently. |

Characterization of infinite LSP words and endomorphisms preserving the LSP property. (arXiv:1808.02680v1 [cs.DM]) Cache Translate Page Web Page Cache |

Authors: Gwenaël Richomme (ESCAPE, UM3) Answering a question of G. Fici, we give an $S$-adic characterization of thefamily of infinite LSP words, that is, the family of infinite words having all their left special factors as prefixes.More precisely we provide a finite set of morphisms $S$ and an automaton ${\cal A}$ such that an infinite word is LSP if and only if it is $S$-adic and one of its directive words is recognizable by ${\cal A}$.Then we characterize the endomorphisms that preserve the property of being LSP for infinite words.This allows us to prove that there exists no set $S'$ of endomorphisms for which the set of infinite LSP words corresponds to the set of $S'$-adic words. This implies that an automaton is required no matter which set of morphisms is used. |

An Improved Bound for Weak Epsilon-Nets in the Plane. (arXiv:1808.02686v1 [math.CO]) Cache Translate Page Web Page Cache |

Authors: Natan Rubin We show that for any finite set $P$ of points in the plane and $\epsilon>0$ there exist $\displaystyle O\left(\frac{1}{\epsilon^{3/2+\gamma}}\right)$ points in ${\mathbb{R}}^2$, for arbitrary small $\gamma>0$, that pierce every convex set $K$ with $|K\cap P|\geq \epsilon |P|$. This is the first improvement of the bound of $\displaystyle O\left(\frac{1}{\epsilon^2}\right)$ that was obtained in 1992 by Alon, B\'{a}r\'{a}ny, F\"{u}redi and Kleitman for general point sets in the plane. |

On the Monitoring of Decentralized Specifications Semantics, Properties, Analysis, and Simulation. (arXiv:1808.02692v1 [cs.SE]) Cache Translate Page Web Page Cache |

Authors: Antoine El-Hokayem, Yliès Falcone We define two complementary approaches to monitor decentralized systems. The first relies on those with a centralized specification, i.e, when the specification is written for the behavior of the entire system. To do so, our approach introduces a data-structure that i) keeps track of the execution of an automaton, ii) has predictable parameters and size, and iii) guarantees strong eventual consistency. The second approach defines decentralized specifications wherein multiple specifications are provided for separate parts of the system. We study two properties of decentralized specifications pertaining to monitorability and compatibility between specification and architecture. We also present a general algorithm for monitoring decentralized specifications. We map three existing algorithms to our approaches and provide a framework for analyzing their behavior. Furthermore, we introduce THEMIS, a framework for designing such decentralized algorithms and simulating their behavior. We show the usage of THEMIS to compare multiple algorithms and verify the trends predicted by the analysis by studying two scenarios: a synthetic benchmark and a real example. |

The roll call interpretation of the Shapley value. (arXiv:1808.02696v1 [cs.GT]) Cache Translate Page Web Page Cache |

Authors: Sascha Kurz, Stefan Napel The Shapley value is commonly illustrated by roll call votes in which players support or reject a proposal in sequence. If all sequences are equiprobable, a voter's Shapley value can be interpreted as the probability of being pivotal, i.e., to bring about the required majority or to make this impossible for others. We characterize the joint probability distributions over cooperation patterns that permit this roll call interpretation: individual votes may be interdependent but must be exchangeable. |

A Method for Estimating the Probability of Extremely Rare Accidents in Complex Systems. (arXiv:1808.02707v1 [stat.AP]) Cache Translate Page Web Page Cache |

Authors: Ítalo Romani de Oliveira, Jeffery Musiak Estimating the probability of failures or accidents with aerospace systems is often necessary when new concepts or designs are introduced, as it is being done for Autonomous Aircraft. If the design is safe, as it is supposed to be, accident cases are hard to find. Such analysis needs some variance reduction technique and several algorithms exist for that, however specific model features may cause difficulties in practice, such as the case of system models where independent agents have to autonomously accomplish missions within finite time, and likely with the presence of human agents. For handling these scenarios, this paper presents a novel estimation approach, based on the combination of the well-established variation reduction technique of Interacting Particles System (IPS) with the long-standing optimization algorithm denominated DIviding RECTangles (DIRECT). When combined, these two techniques yield statistically significant results for extremely low probabilities. In addition, this novel approach allows the identification of intermediate events and simplifies the evaluation of sensitivity of the estimated probabilities to certain system parameters. |

It Takes Two to #MeToo - Using Enclaves to Build Autonomous Trusted Systems. (arXiv:1808.02708v1 [cs.CR]) Cache Translate Page Web Page Cache |

Authors: Danny Harnik, Paula Ta-Shma, Eliad Tsfadia We provide enhanced security against insider attacks in services that manage extremely sensitive data. One example is a #MeToo use case where sexual harassment complaints are reported but only revealed when another complaint is filed against the same perpetrator. Such a service places tremendous trust on service operators which our work aims to relieve. To this end we introduce a new autonomous data management concept which transfers responsibility for the sensitive data from administrators to secure and verifiable hardware. The main idea is to manage all data access via a cluster of autonomous computation agents running inside Intel SGX enclaves. These EConfidante agents share a secret data key which is unknown to any external entity, including the data service administrators, thus eliminating many opportunities for data exposure. In this paper we describe a detailed design of the EConfidante system, its flow and how it is managed and implemented. Our #MeToo design also uses an immutable distributed ledger which is built using components from a Blockchain framework. We implemented a proof of concept of our system for the #MeToo use case and analyze its security properties and implementation details. |

Incrementally and inductively constructing basis of multiplicative dependence lattice of non-zero algebraic numbers. (arXiv:1808.02712v1 [cs.SC]) Cache Translate Page Web Page Cache |

Authors: Tao Zheng Let $x=(x_1,x_2,\cdots,x_n)^T$ be a vector of non-zero algebraic numbers, the set $\mathcal{R}_x:=\{(k_1,k_2,\cdots,k_n)^T\in\mathbb{Z}^n\;|\;x_1^{k_1}x_2^{k_2}\cdots x_n^{k_n}=1\}$ is called \emph{the multiplicative dependence lattice} of $x$. This paper develops an efficient incremental algorithm to compute a basis of $\mathcal{R}_x$. This algorithm constructs inductively a basis of the lattice as the dimension increases. This is the very first algorithm for computing the basis of the lattice, although a lot of efforts have been made to understand this lattice. In this paper we propose the conception of the \emph{rank} of a finite sequence of non-zero algebraic numbers, which turns out to be closely related to the rank of the lattice, and as well as to the complexity. The complexity of the algorithm depends not mainly on the dimension $n$ but on the rank of the sequence $x_1,x_2,\cdots,x_n$, which can be much smaller than $n$. |

Memetic Algorithm-Based Path Generation for Multiple Dubins Vehicles Performing Remote Tasks. (arXiv:1808.02720v1 [cs.MA]) Cache Translate Page Web Page Cache |

Authors: Doo-Hyun Cho, Han-Lim Choi This paper formalizes path planning problem for a group of heterogeneous Dubins vehicles performing tasks in a remote fashion and develops a memetic algorithm-based method to effectively produce the paths. In the setting, the vehicles are initially located at multiple depots in a two-dimensional space and the objective of planning is to minimize a weighted sum of the total tour cost of the group and the largest individual tour cost amongst the vehicles. While the presented formulation takes the form of a mixed-integer linear program (MILP) for which off-the-shelf solvers are available, the MILP solver easily loses the tractability as the number of tasks and agents grow. Therefore, a memetic algorithm tailored to the presented formulation is proposed. The algorithm features a sophisticated encoding scheme to efficiently. In addition, a path refinement technique that optimizes on the detailed tours with the sequence of visits fixed is proposed to finally obtain further optimized trajectories. Comparative numerical experiments show the validity and efficiency of the proposed methods compared with the previous methods in the literature. |

Essencery - A Tool for Essentializing Software Engineering Practices. (arXiv:1808.02723v1 [cs.SE]) Cache Translate Page Web Page Cache |

Authors: Arthur Evensen, Kai-Kristian Kemell, Xiaofeng Wang, Juhani Risku, Pekka Abrahamsson Software Engineering practitioners work using highly diverse methods and practices, and general theories in software engineering are lacking. One attempt at creating a common ground in the area of software engineering methodologies has been the Essence Theory of Software Engineering, which can be considered a method-agnostic project management tool for software engineering. Essence supports the use of any development practices and provides a framework for building a suitable method for any software engineering context. However, Essence presently suffers from low practitioner adoption that is partially considered to be caused by a lack of proper tooling. In this paper, we present Essencery, a tool for essentializing software engineering methods and practices using the Essence graphical syntax. Essencery aims to facilitate adoption of Essence among potential future users. We present an empirical evaluation of the tool by means of a qualitative, quasi-formal experiment and, based on the experiment, confirm that the tool is easy to use and useful for its intended purpose. |

Learning to Focus when Ranking Answers. (arXiv:1808.02724v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Dana Sagi, Tzoof Avny, Kira Radinsky, Eugene Agichtein One of the main challenges in ranking is embedding the query and document pairs into a joint feature space, which can then be fed to a learning-to-rank algorithm. To achieve this representation, the conventional state of the art approaches perform extensive feature engineering that encode the similarity of the query-answer pair. Recently, deep-learning solutions have shown that it is possible to achieve comparable performance, in some settings, by learning the similarity representation directly from data. Unfortunately, previous models perform poorly on longer texts, or on texts with significant portion of irrelevant information, or which are grammatically incorrect. To overcome these limitations, we propose a novel ranking algorithm for question answering, QARAT, which uses an attention mechanism to learn on which words and phrases to focus when building the mutual representation. We demonstrate superior ranking performance on several real-world question-answer ranking datasets, and provide visualization of the attention mechanism to otter more insights into how our models of attention could benefit ranking for difficult question answering challenges. |

pySDC - Prototyping spectral deferred corrections. (arXiv:1808.02731v1 [cs.MS]) Cache Translate Page Web Page Cache |

Authors: Robert Speck In this paper we present the Python framework pySDC for solving collocation problems with spectral deferred correction methods (SDC) and their time-parallel variant PFASST, the parallel full approximation scheme in space and time. pySDC features many implementations of SDC and PFASST, from simple implicit time-stepping to high-order implicit-explicit or multi-implicit splitting and multi-level spectral deferred corrections. It comes with many different, pre-implemented examples and has seven tutorials to help new users with their first steps. Time-parallelism is implemented either in an emulated way for debugging and prototyping as well as using MPI for benchmarking. The code is fully documented and tested using continuous integration, including most results of previous publications. Here, we describe the structure of the code by taking two different perspectives: the user's and the developer's perspective. While the first sheds light on the front-end, the examples and the tutorials, the second is used to describe the underlying implementation and the data structures. We show three different examples to highlight various aspects of the implementation, the capabilities and the usage of pySDC. Also, couplings to the FEniCS framework and PETSc, the latter including spatial parallelism with MPI, are described. |

Debugging Neural Machine Translations. (arXiv:1808.02733v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Matīss Rikters In this paper, we describe a tool for debugging the output and attention weights of neural machine translation (NMT) systems and for improved estimations of confidence about the output based on the attention. The purpose of the tool is to help researchers and developers find weak and faulty example translations that their NMT systems produce without the need for reference translations. Our tool also includes an option to directly compare translation outputs from two different NMT engines or experiments. In addition, we present a demo website of our tool with examples of good and bad translations: this http URL |

Strong Subgraph Connectivity of Digraphs: A Survey. (arXiv:1808.02740v1 [cs.DM]) Cache Translate Page Web Page Cache |

Authors: Yuefang Sun, Gregory Gutin In this survey we overview known results on the strong subgraph $k$-connectivity and strong subgraph $k$-arc-connectivity of digraphs. After an introductory section, the paper is divided into four sections: basic results, algorithms and complexity, sharp bounds for strong subgraph $k$-(arc-)connectivity, minimally strong subgraph $(k, \ell)$-(arc-) connected digraphs. This survey contains several conjectures and open problems for further study. |

Peek-a-Boo: I see your smart home activities, even encrypted!. (arXiv:1808.02741v1 [cs.CR]) Cache Translate Page Web Page Cache |

Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, A. Selcuk Uluagac A myriad of IoT devices such as bulbs, switches, speakers in a smart home environment allow users to easily control the physical world around them and facilitate their living styles. However, an attacker inside or near a smart home environment can potentially exploit the innate wireless medium used by these devices to exfiltrate sensitive information about the users and their activities, invading user privacy. With this in mind, in this work, we introduce a novel multi-stage privacy attack against user privacy in a smart environment. It is realized utilizing state-of-the-art machine-learning approaches for detecting and identifying particular types of IoT devices, their actions, states, and ongoing user activities in a cascading style by only observing passively the wireless traffic from smart home devices. The attack effectively works on both encrypted and unencrypted communications. We evaluate the efficiency of the attack with real measurements from an extensive set of popular off-the-shelf smart home IoT devices utilizing a set of diverse network protocols like WiFi, ZigBee, and BLE. Our results show that an adversary passively sniffing the network traffic can achieve very high accuracy (above 90%) in identifying the state and actions of targeted smart home devices and their users. In contrast to earlier straightforward approaches, our multi-stage privacy attack can perform activity detection and identification automatically without extensive background knowledge or specifications of the analyzed protocols. This allows an adversary to efficiently aggregate extensive behavior profiles of targeted users. To protect against this privacy leakage, we also propose a countermeasure based on generating spoofed network traffic to hide the real activities of the devices. We also demonstrate that the provided solution provides better protection than existing solutions. |

Computing Unit Groups of Curves. (arXiv:1808.02742v1 [math.AG]) Cache Translate Page Web Page Cache |

Authors: Justin Chen, Sameera Vemulapalli, Leon Zhang The group of units modulo constants of an affine variety over an algebraically closed field is free abelian of finite rank. Computing this group is difficult but of fundamental importance in tropical geometry, where it is desirable to realize intrinsic tropicalizations. We present practical algorithms for computing unit groups of smooth curves of low genus. Our approach is rooted in divisor theory, based on interpolation in the case of rational curves and on methods from algebraic number theory in the case of elliptic curves. |

Natural Language Generation by Hierarchical Decoding with Linguistic Patterns. (arXiv:1808.02747v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Shang-Yu Su, Kai-Ling Lo, Yi-Ting Yeh, Yun-Nung Chen Natural language generation (NLG) is a critical component in spoken dialogue systems. Classic NLG can be divided into two phases: (1) sentence planning: deciding on the overall sentence structure, (2) surface realization: determining specific word forms and flattening the sentence structure into a string. Many simple NLG models are based on recurrent neural networks (RNN) and sequence-to-sequence (seq2seq) model, which basically contains an encoder-decoder structure; these NLG models generate sentences from scratch by jointly optimizing sentence planning and surface realization using a simple cross entropy loss training criterion. However, the simple encoder-decoder architecture usually suffers from generating complex and long sentences, because the decoder has to learn all grammar and diction knowledge. This paper introduces a hierarchical decoding NLG model based on linguistic patterns in different levels, and shows that the proposed method outperforms the traditional one with a smaller model size. Furthermore, the design of the hierarchical decoding is flexible and easily-extensible in various NLG systems. |

A simple analysis of flying capacitor converter. (arXiv:1808.02758v1 [cs.CE]) Cache Translate Page Web Page Cache |

Authors: S. Kadyrov, P.S. Skrzypacz, Y.L. Familiant The paper aims to emphasise how switched systems can be analysed with elementary techniques which require only undergraduate-level linear algebra and differential equations. It is also emphasised how math software can become useful for simplifying analytic complications. The time domain voltage balance methodology is used for stability analysis. As for deriving formulas for the asymptotic average of both capacitor voltage and inductor current, a new simple analytic method is introduced. It was shown analytically that the time average of capacitor voltage converges to half of the source voltage. A formula for the time average of the current of the inductor is also computed. As a by-product it was discovered that the period of the current is half of the switching period. Numerical simulations are obtained to illustrate the accuracy of the results. Higher dimensional generalisations could become a bit complicated as stability analysis of higher dimensional exponential matrices are not so easy to handle. On the other hand, the new discovery on the period of the current is more likely to give new insights in handling higher dimensional systems. Analytical formulas are exact and it helps in accurately modelling flying capacitor converts in practice. FCC is well studied in engineering society. However, not much is done in obtaining exact formulas using analysis. Also, math software is much used in computation of numerical results and obtaining simulations. In this paper, one more important aspect of math software is emphasised, namely, use symbolic computations in analysis. |

A Class of Multirate Infinitesimal GARK Methods. (arXiv:1808.02759v1 [cs.NA]) Cache Translate Page Web Page Cache |

Authors: Adrian Sandu Differential equations arising in many practical applications are characterized by multiple time scales. Multirate time integration seeks to solve them efficiently by discretizing each scale with a different, appropriate time step, while ensuring the overall accuracy and stability of the numerical solution. In a seminal paper Knoth and Wolke (APNUM, 1998) proposed a hybrid solution approach: discretize the slow component with an explicit Runge-Kutta method, and advance the fast component via a modified fast differential equation. The idea led to the development of multirate infinitesimal step (MIS) methods by Wensch et al. (BIT, 2009.)G\"{u}nther and Sandu (BIT, 2016) explained MIS schemes as a particular case of multirate General-structure Additive Runge-Kutta (MR-GARK) methods. The hybrid approach offers extreme flexibility in the choice of the numerical solution process for the fast component. This work constructs a family of multirate infinitesimal GARK schemes (MRI-GARK) that extends the hybrid dynamics approachin multiple ways. Order conditions theory and stability analyses are developed, and practical explicit and implicit methods of up to order four are constructed. Numerical results confirm the theoretical findings. We expect the new MRI-GARK family to be most useful for systems of equations with widely disparate time scales, where the fast process is dispersive, and where the influence of the fast component on the slow dynamics is weak. |

BayesReef: A Bayesian inference framework for modelling reef growth in response to environmental change and biological dynamics. (arXiv:1808.02763v1 [stat.AP]) Cache Translate Page Web Page Cache |

Authors: Jodie Pall, Rohitash Chandra, Danial Azam, Tristan Salles, Jody M. Webster, Sally Cripps Estimating the impact of environmental processes on vertical reef development in geological timescales due to complex models and data with missing information is a very challenging task. This paper provides a Bayesian framework called BayesReef, based on PyReef-Core, for the estimation and uncertainty quantification of environmental processes and factors which impact the depth distribution of communities of corals and coralline algae (coralgal assemblages) found in fossil reef drill cores. PyReef-Core is a deterministic, carbonate stratigraphic forward model designed to simulate the key biological and physical processes that determine vertical accretion and assemblage changes in reef drill cores. The results show that explicitly accounting for the temporal structure of the reef core, as opposed to only the depth structure, increases accuracy in parameter estimation. BayesReef provides insights into the complex posterior distributions of parameters in PyReef-Core and provides the groundwork for future research in this area. |

Effective Character-augmented Word Embedding for Machine Reading Comprehension. (arXiv:1808.02772v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Zhuosheng Zhang, Yafang Huang, Pengfei Zhu, Hai Zhao Machine reading comprehension is a task to model relationship between passage and query. In terms of deep learning framework, most of state-of-the-art models simply concatenate word and character level representations, which has been shown suboptimal for the concerned task. In this paper, we empirically explore different integration strategies of word and character embeddings and propose a character-augmented reader which attends character-level representation to augment word embedding with a short list to improve word representations, especially for rare words. Experimental results show that the proposed approach helps the baseline model significantly outperform state-of-the-art baselines on various public benchmarks. |

Omnidirectional DSO: Direct Sparse Odometry with Fisheye Cameras. (arXiv:1808.02775v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Hidenobu Matsuki, Lukas von Stumberg, Vladyslav Usenko, Jörg Stückler, Daniel Cremers We propose a novel real-time direct monocular visual odometry for omnidirectional cameras. Our method extends direct sparse odometry (DSO) by using the unified omnidirectional model as a projection function, which can be applied to fisheye cameras with a field-of-view (FoV) well above 180 degrees. This formulation allows for using the full area of the input image even with strong distortion, while most existing visual odometry methods can only use a rectified and cropped part of it. Model parameters within an active keyframe window are jointly optimized, including the intrinsic/extrinsic camera parameters, 3D position of points, and affine brightness parameters. Thanks to the wide FoV, image overlap between frames becomes bigger and points are more spatially distributed. Our results demonstrate that our method provides increased accuracy and robustness over state-of-the-art visual odometry algorithms. |

Can Network Analysis Techniques help to Predict Design Dependencies? An Initial Study. (arXiv:1808.02776v1 [cs.SE]) Cache Translate Page Web Page Cache |

Authors: J. Andrés Díaz-Pace, Antonela Tommasel, Daniela Godoy The degree of dependencies among the modules of a software system is a key attribute to characterize its design structure and its ability to evolve over time. Several design problems are often correlated with undesired dependencies among modules. Being able to anticipate those problems is important for developers, so they can plan early for maintenance and refactoring efforts. However, existing tools are limited to detecting undesired dependencies once they appeared in the system. In this work, we investigate whether module dependencies can be predicted (before they actually appear). Since the module structure can be regarded as a network, i.e, a dependency graph, we leverage on network features to analyze the dynamics of such a structure. In particular, we apply link prediction techniques for this task. We conducted an evaluation on two Java projects across several versions, using link prediction and machine learning techniques, and assessed their performance for identifying new dependencies from a project version to the next one. The results, although preliminary, show that the link prediction approach is feasible for package dependencies. Also, this work opens opportunities for further development of software-specific strategies for dependency prediction. |

Input/Output Stochastic Automata with Urgency: Confluence and weak determinism. (arXiv:1808.02777v1 [cs.LO]) Cache Translate Page Web Page Cache |

Authors: Pedro R. D'Argenio, Raúl E. Monti In a previous work, we introduced an input/output variant of stochastic automata (IOSA) that, once the model is closed (i.e., all synchronizations are resolved), the resulting automaton is fully stochastic, that is, it does not contain non-deterministic choices. However, such variant is not sufficiently versatile for compositional modelling. In this article, we extend IOSA with urgent actions. This extension greatly increases the modularization of the models, allowing to take better advantage on compositionality than its predecessor. However, this extension introduces non-determinism even in closed models. We first show that confluent models are weakly deterministic in the sense that, regardless the resolution of the non-determinism, the stochastic behaviour is the same. In addition, we provide sufficient conditions to ensure that a network of interacting IOSAs is confluent without the need to obtain the composed IOSA. |

Using Applied Behavior Analysis in Software to help Tutor Individuals with Autism Spectrum Disorder. (arXiv:1808.02778v1 [cs.CY]) Cache Translate Page Web Page Cache |

Authors: Antonio Ugando There are currently many tutoring software systems which have been designed for neurotypical children. These systems cover academic topics such as reading and math, and are made available through various technological mediums. The majority of these systems were not designed for use by children with special needs, in particular those who are diagnosed with Autism Spectrum Disorder. Since the 1970's, studies have been conducted on the use of Applied Behavior Analysis to help autistic children learn [1]. This teaching methodology is proven to be very effective, with many patients having their diagnosis of autism dropped after a few years of treatment. With the advent of ubiquitous technologies such as mobile devices, it has become apparent that these devices could also be used to help tutor autistic children on academic subjects such as reading and math. Though the delivery of tutoring material must be made using Applied Behavior Analysis techniques, given that ABA therapy is currently the only form of treatment for Autism Spectrum Disorder endorsed by the US Surgeon General [2], which further makes the case for incorporating it into an academics tutoring system tailored for autistic children. In this paper, we present a mobile software system which can be utilized to tutor children who are diagnosed with Autism Spectrum Disorder in the subjects of reading and math. The software makes use of Applied Behavior Analysis techniques such as a Token Economy system, visual and audible reinforcers, and generalization. Furthermore, we explore how combining Applied Behavior Analysis and technology, could help extend the reach of tutoring systems to these children. |

Cache Aided Communications with Multiple Antennas at Finite SNR. (arXiv:1808.02780v1 [cs.IT]) Cache Translate Page Web Page Cache |

Authors: Itsik Bergel, Soheil Mohajer We study the problem of cache-aided communication for cellular networks with multi-user and multiple antennas at finite signal-to-noise ratio. Users are assumed to have non-symmetric links, modeled by wideband fading channels. We show that the problem can be formulated as a linear program, whose solution provides a joint cache allocation along with pre-fetching and fetching schemes that minimize the duration of the communication in the delivery phase. The suggested scheme uses zero-forcing and cached interference subtraction and hence allow each user to be served at the rate of its own channel. Thus, this scheme is better than the previously published schemes that are compromised by the poorest user in the communication group. We also consider a special case of the parameters for which we can derive a closed form solution and formulate the optimal power, rate and cache optimization. This special case shows that the gain of MIMO coded caching goes beyond the throughput. In particular, it is shown that in this case, the cache is used to balance the users such that fairness and throughput are no longer contradicting. More specifically, in this case, strict fairness is achieved jointly with maximizing the network throughput. |

Schools are segregated by educational outcomes in the digital space. (arXiv:1808.02784v1 [cs.SI]) Cache Translate Page Web Page Cache |

Authors: Ivan Smirnov The Internet provides students with a unique opportunity to connect and maintain social ties with peers from other schools, irrespective of how far they are from each other. However, little is known about the real structure of such online relationships. In this paper, we investigate the structure of interschool friendship on a popular social networking site. We use data from 36,951 students from 590 schools of a large European city. We find that the probability of a friendship tie between students from neighboring schools is high and that it decreases with the distance between schools following the power law. We also find that students are more likely to be connected if the educational outcomes of their schools are similar. We show that this fact is not a consequence of residential segregation. While high- and low-performing schools are evenly distributed across the city, this is not the case for the digital space, where schools turn out to be segregated by educational outcomes. There is no significant correlation between the educational outcomes of a school and its geographical neighbors; however, there is a strong correlation between the educational outcomes of a school and its digital neighbors. These results challenge the common assumption that the Internet is a borderless space, and may have important implications for the understanding of educational inequality in the digital age. |

Against Marrying a Stranger Marital Matchmaking Technologies in Saudi Arabia. (arXiv:1808.02785v1 [cs.HC]) Cache Translate Page Web Page Cache |

Authors: Adel Al-Dawood, Norah Abokhodair, Houda El Mimouni, Svetlana Yarosh Websites and applications that match and connect individuals for romantic purposes are commonly used in the Western world. However, there have not been many previous investigations focusing on cultural factors that affect the adoption of similar technologies in religiously conservative non-Western cultures. In this study, we examine the socio-technical and cultural factors that influence the perceptions and use of matchmaking technologies in Saudi Arabia. We report the methods and findings of interviews with 18 Saudi nationals (nine males and nine females) with diverse demographics and backgrounds. We provide qualitatively generated insights into the major themes reported by our participants related to the common approaches to matchmaking, the current role of technology, and concerns regarding matchmaking technologies in this cultural con-text. We relate these themes to specific implications for designing marital matchmaking technologies in Saudi Arabia and we outline opportunities for future investigations. |

Multiband SAS Imagery. (arXiv:1808.02792v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Isaac D Gerg Advances in unmanned synthetic aperture sonar (SAS) imaging platforms allow for the simultaneous collection of multiband SAS imagery. The imagery is collected over several octaves and the phenomenology's interactions with the sea floor vary greatly over this range -- higher frequencies resolve proud and fine structure of the seafloor while lower frequencies resolve subsurface features and often induce internal resonance in man-made objects. Currently, analysts examine multiband imagery by viewing a single band at a time. This method makes it difficult to ascertain correlations between any pair of bands collected over the same location. To mitigate this issue, we propose methods which ingest high frequency (HF) and low frequency (LF) SAS imagery and generates a color composite creating what we call a multiband SAS (MSAS) image. The MSAS image contains the relevant portions of the HF and LF images required by an analyst to interpret the scene and are defined using a spatial saliency metric computed for each image. We then combine the saliency and acoustic backscatter measures to form the final MSAS image. |

Efficient Continuous Top-$k$ Geo-Image Search on Road Network. (arXiv:1808.02793v1 [cs.MM]) Cache Translate Page Web Page Cache |

Authors: Chengyuan Zhang, Kesheng Cheng, Lei Zhu, Ruipeng Chen, Zuping Zhang, Fang Huang With the rapid development of mobile Internet and cloud computing technology, large-scale multimedia data, e.g., texts, images, audio and videos have been generated, collected, stored and shared. In this paper, we propose a novel query problem named continuous top-$k$ geo-image query on road network which aims to search out a set of geo-visual objects based on road network distance proximity and visual content similarity. Existing approaches for spatial textual query and geo-image query cannot address this problem effectively because they do not consider both of visual content similarity and road network distance proximity on road network. In order to address this challenge effectively and efficiently, firstly we propose the definition of geo-visual objects and continuous top-$k$ geo-visual objects query on road network, then develop a score function for search. To improve the query efficiency in a large-scale road network, we propose the search algorithm named geo-visual search on road network based on a novel hybrid indexing framework called VIG-Tree, which combines G-Tree and visual inverted index technique. In addition, an important notion named safe interval and results updating rule are proposed, and based on them we develop an efficient algorithm named moving monitor algorithm to solve continuous query. Experimental evaluation on real multimedia dataset and road network dataset illustrates that our solution outperforms state-of-the-art method. |

Steiner Point Removal with distortion $O(\log k)$, using the Noisy-Voronoi algorithm. (arXiv:1808.02800v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Arnold Filtser In the Steiner Point Removal (SPR) problem, we are given a weighted graph $G=(V,E)$ and a set of terminals $K\subset V$ of size $k$. The objective is to find a minor $M$ of $G$ with only the terminals as its vertex set, such that distances between the terminals will be preserved up to a small multiplicative distortion. Kamma, Krauthgamer and Nguyen [SICOMP2015] devised a ball-growing algorithm with exponential distributions to show that the distortion is at most $O(\log^5 k)$. Cheung [SODA2018] improved the analysis of the same algorithm, bounding the distortion by $O(\log^2 k)$. We devise a novel and simpler algorithm (called the Noisy Voronoi algorithm) which incurs distortion $O(\log k)$. This algorithm can be implemented in almost linear time ($O(|E|\log |V|)$). |

Highly Accelerated Multishot EPI through Synergistic Combination of Machine Learning and Joint Reconstruction. (arXiv:1808.02814v1 [eess.IV]) Cache Translate Page Web Page Cache |

Authors: Berkin Bilgic, Itthi Chatnuntawech, Mary Kate Manhard, Qiyuan Tian, Congyu Liao, Stephen F. Cauley, Susie Y. Huang, Jonathan R. Polimeni, Lawrence L. Wald, Kawin Setsompop Purpose: To introduce a combined machine learning (ML) and physics-based image reconstruction framework that enables navigator-free, highly accelerated multishot echo planar imaging (msEPI), and demonstrate its application in high-resolution structural imaging. Methods: Singleshot EPI is an efficient encoding technique, but does not lend itself well to high-resolution imaging due to severe distortion artifacts and blurring. While msEPI can mitigate these artifacts, high-quality msEPI has been elusive because of phase mismatch arising from shot-to-shot physiological variations which disrupt the combination of the multiple-shot data into a single image. We employ Deep Learning to obtain an interim magnitude-valued image with minimal artifacts, which permits estimation of image phase variations due to shot-to-shot physiological changes. These variations are then included in a Joint Virtual Coil Sensitivity Encoding (JVC-SENSE) reconstruction to utilize data from all shots and improve upon the ML solution. Results: Our combined ML + physics approach enabled R=8-fold acceleration from 2 EPI-shots while providing 1.8-fold error reduction compared to the MUSSELS, a state-of-the-art reconstruction technique, which is also used as an input to our ML network. Using 3 shots allowed us to push the acceleration to R=10-fold, where we obtained a 1.7-fold error reduction over MUSSELS. Conclusion: Combination of ML and JVC-SENSE enabled navigator-free msEPI at higher accelerations than previously possible while using fewer shots, with reduced vulnerability to poor generalizability and poor acceptance of end-to-end ML approaches. |

Separators for Planar Graphs that are Almost Trees. (arXiv:1808.02815v1 [cs.DS]) Cache Translate Page Web Page Cache |

Authors: Linda Cai, Sariel Har-Peled, Simiao Ye We prove that a connected planar graph with $n$ vertices and $n+\mu$ edges has a vertex separator of size $O( \sqrt{\mu} + 1)$, and this separator can be computed in linear time. |

A Kernel Method for Positive 1-in-3-SAT. (arXiv:1808.02821v1 [cs.CC]) Cache Translate Page Web Page Cache |

Authors: Valentin Bura This paper illustrates the power of Gaussian Elimination by adapting it to Positive 1-in-3-SAT. We derive a general kernelization method for this problem and thus obtain an upper bound for the complexity of its counting version of O(2kR 2^{(1-k)R}) for number of variables R and clauses-to-variables ratio k. Combining this method with previous results gives a time and space complexity for the counting problem of O(4/3|V|2^{3|V|/8}) and O(4/3|V|2^{3|V|/16}). |

Backprop Evolution. (arXiv:1808.02822v1 [cs.LG]) Cache Translate Page Web Page Cache |

Authors: Maximilian Alber, Irwan Bello, Barret Zoph, Pieter-Jan Kindermans, Prajit Ramachandran, Quoc Le The back-propagation algorithm is the cornerstone of deep learning. Despite its importance, few variations of the algorithm have been attempted. This work presents an approach to discover new variations of the back-propagation equation. We use a domain specific lan- guage to describe update equations as a list of primitive functions. An evolution-based method is used to discover new propagation rules that maximize the generalization per- formance after a few epochs of training. We find several update equations that can train faster with short training times than standard back-propagation, and perform similar as standard back-propagation at convergence. |

FLUX: Progressive State Estimation Based on Zakai-type Distributed Ordinary Differential Equations. (arXiv:1808.02825v1 [cs.SY]) Cache Translate Page Web Page Cache |

Authors: Uwe D. Hanebeck We propose a homotopy continuation method called FLUX for approximating complicated probability density functions. It is based on progressive processing for smoothly morphing a given density into the desired one. Distributed ordinary differential equations (DODEs) with an artificial time $\gamma \in [0,1]$ are derived for describing the evolution from the initial density to the desired final density. For a finite-dimensional parametrization, the DODEs are converted to a system of ordinary differential equations (SODEs), which are solved for $\gamma \in [0,1]$ and return the desired result for $\gamma=1$. This includes parametric representations such as Gaussians or Gaussian mixtures and nonparametric setups such as sample sets. In the latter case, we obtain a particle flow between the two densities along the artificial time. FLUX is applied to state estimation in stochastic nonlinear dynamic systems by gradual inclusion of measurement information. The proposed approximation method (1) is fast, (2) can be applied to arbitrary nonlinear systems and is not limited to additive noise, (3) allows for target densities that are only known at certain points, (4) does not require optimization, (5) does not require the solution of partial differential equations, and (6) works with standard procedures for solving SODEs. This manuscript is limited to the one-dimensional case and a fixed number of parameters during the progression. Future extensions will include consideration of higher dimensions and on the fly adaption of the number of parameters. |

Lattice Studies of Gerrymandering Strategies. (arXiv:1808.02826v1 [physics.soc-ph]) Cache Translate Page Web Page Cache |

Authors: Kyle Gatesman, James Unwin We propose three novel gerrymandering algorithms which incorporate the spatial distribution of voters with the aim of constructing gerrymandered, equal-population, connected districts. Moreover, we develop lattice models of voter distributions, based on analogies to electrostatic potentials, in order to compare different gerrymandering strategies. Due to the probabilistic population fluctuations inherent to our voter models, Monte Carlo methods can be applied to the districts constructed via our gerrymandering algorithms. Through Monte Carlo studies we quantify the effectiveness of each of our gerrymandering algorithms and we also argue that gerrymandering strategies which do not include spatial data lead to (legally prohibited) highly disconnected districts. Of the three algorithms we propose, two are based on different strategies for packing opposition voters, and the third is a new approach to algorithmic gerrymandering based on genetic algorithms, which automatically guarantees that all districts are connected. Furthermore, we use our lattice voter model to examine the effectiveness of isoperimetric quotient tests and our results provide further quantitative support for implementing compactness tests in real-world political redistricting. |

Debunking Fake News One Feature at a Time. (arXiv:1808.02831v1 [cs.CL]) Cache Translate Page Web Page Cache |

Authors: Melanie Tosik, Antonio Mallia, Kedar Gangopadhyay Identifying the stance of a news article body with respect to a certain headline is the first step to automated fake news detection. In this paper, we introduce a 2-stage ensemble model to solve the stance detection task. By using only hand-crafted features as input to a gradient boosting classifier, we are able to achieve a score of 9161.5 out of 11651.25 (78.63%) on the official Fake News Challenge (Stage 1) dataset. We identify the most useful features for detecting fake news and discuss how sampling techniques can be used to improve recall accuracy on a highly imbalanced dataset. |

A Novel Disparity Transformation Algorithm for Road Segmentation. (arXiv:1808.02837v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Rui Fan, Mohammud Junaid Bocus, Naim Dahnoun The disparity information provided by stereo cameras has enabled advanced driver assistance systems to estimate road area more accurately and effectively. In this paper, a novel disparity transformation algorithm is proposed to extract road areas from dense disparity maps by making the disparity value of the road pixels become similar. The transformation is achieved using two parameters: roll angle and fitted disparity value with respect to each row. To achieve a better processing efficiency, golden section search and dynamic programming are utilised to estimate the roll angle and the fitted disparity value, respectively. By performing a rotation around the estimated roll angle, the disparity distribution of each row becomes very compact. This further improves the accuracy of the road model estimation, as demonstrated by the various experimental results in this paper. Finally, the Otsu's thresholding method is applied to the transformed disparity map and the roads can be accurately segmented at pixel level. |

On the Effect of Task-to-Worker Assignment in Distributed Computing Systems with Stragglers. (arXiv:1808.02838v1 [cs.DC]) Cache Translate Page Web Page Cache |

Authors: Amir Behrouzi-Far, Emina Soljanin We study the expected completion time of some recently proposed algorithms for distributed computing which redundantly assign computing tasks to multiple machines in order to tolerate a certain number of machine failures. We analytically show that not only the amount of redundancy but also the task-to-machine assignments affect the latency in a distributed system. We study systems with a fixed number of computing tasks that are split in possibly overlapping batches, and independent exponentially distributed machine service times. We show that, for such systems, the uniform replication of non- overlapping (disjoint) batches of computing tasks achieves the minimum expected computing time. |

Pattern Recognition Approach to Violin Shapes of MIMO database. (arXiv:1808.02848v1 [stat.AP]) Cache Translate Page Web Page Cache |

Authors: Thomas Peron, Francisco A. Rodrigues, Luciano da F. Costa Since the landmarks established by the Cremonese school in the 16th century, the history of violin design has been marked by experimentation. While great effort has been invested since the early 19th century by the scientific community on researching violin acoustics, substantially less attention has been given to the statistical characterization of how the violin shape evolved over time. In this paper we study the morphology of violins retrieved from the Musical Instrument Museums Online (MIMO) database -- the largest freely accessible platform providing information about instruments held in public museums. From the violin images, we derive a set of measurements that reflect relevant geometrical features of the instruments. The application of Principal Component Analysis (PCA) uncovered similarities between violin makers and their respective copyists, as well as among luthiers belonging to the same family lineage, in the context of historical narrative. Combined with a time-windowed approach, thin plate splines visualizations revealed that the average violin outline has remained mostly stable over time, not adhering to any particular trends of design across different periods in music history. |

Relaxing and Restraining Queries for OBDA. (arXiv:1808.02850v1 [cs.LO]) Cache Translate Page Web Page Cache |

Authors: Medina Andreşel, Yazmin Ibáñez-García, Magdalena Ortiz, Mantas Šimkus In ontology-based data access (OBDA), ontologies have been successfully employed for querying possibly unstructured and incomplete data. In this paper, we advocate using ontologies not only to formulate queries and compute their answers, but also for modifying queries by relaxing or restraining them, so that they can retrieve either more or less answers over a given dataset. Towards this goal, we first illustrate that some domain knowledge that could be naturally leveraged in OBDA can be expressed using complex role inclusions (CRI). Queries over ontologies with CRI are not first-order (FO) rewritable in general. We propose an extension of DL-Lite with CRI, and show that conjunctive queries over ontologies in this extension are FO rewritable. Our main contribution is a set of rules to relax and restrain conjunctive queries (CQs). Firstly, we define rules that use the ontology to produce CQs that are relaxations/restrictions over any dataset. Secondly, we introduce a set of data-driven rules, that leverage patterns in the current dataset, to obtain more fine-grained relaxations and restrictions. |

On the Solvability of Viewing Graphs. (arXiv:1808.02856v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Matthew Trager, Brian Osserman, Jean Ponce A set of fundamental matrices relating pairs of cameras in some configuration can be represented as edges of a "viewing graph". Whether or not these fundamental matrices are generically sufficient to recover the global camera configuration depends on the structure of this graph. We study characterizations of "solvable" viewing graphs and present several new results that can be applied to determine which pairs of views may be used to recover all camera parameters. We also discuss strategies for verifying the solvability of a graph computationally. |

Hard to Solve Instances of the Euclidean Traveling Salesman Problem. (arXiv:1808.02859v1 [cs.DM]) Cache Translate Page Web Page Cache |

Authors: Stefan Hougardy, Xianghui Zhong The well known $4/3$ conjecture states that the integrality ratio of the subtour LP is at most $4/3$ for metric Traveling Salesman instances. We present a family of Euclidean Traveling Salesman instances for which we prove that the integrality ratio of the subtour LP converges to $4/3$. These instances (using the rounded Euclidean norm) turn out to be hard to solve exactly with Concorde, the fastest existing exact TSP solver. For a 200 vertex instance from our family of Euclidean Traveling Salesman instances Concorde needs about 1,000,000 times more runtime than for a TSPLIB instance of similar size. From our runtime results we deduce that a 1000 vertex instance of our family would take Concorde about $10^{27}$ times longer to solve than a TSPLIB instance of similar size. Thus our new family of Euclidean Traveling Salesman instances may be useful benchmark instances for TSP algorithms. |

Cinematic Visualization of Multiresolution Data: Ytini for Adaptive Mesh Refinement in Houdini. (arXiv:1808.02860v1 [cs.GR]) Cache Translate Page Web Page Cache |

Authors: Kalina Borkiewicz, Jill Naiman, Haoming Lai We have entered the era of multidimensional large datasets represented by increasingly complex data structures. Current tools for scientific visualization are not optimized to efficiently and intuitively create cinematic production quality, time-evolving representations of numerical data for broad impact science communication via film, media, or journalism. To present such data in a cinematic environment, it is advantageous to develop methods that integrate these complex data structures into industry standard visual effects software packages, which provide a myriad of control features otherwise unavailable in traditional scientific visualization software. In this paper, we present the general methodology for the import and visualization of nested multiresolution datasets into commercially available visual effects software. We further provide a specific example of importing Adaptive Mesh Refinement data into the software Houdini. This paper builds on our previous work, which describes a method for using Houdini to visualize uniform Cartesian datasets. We summarize a tutorial available on the website www.ytini.com, which includes sample data downloads, Python code, and various other resources to simplify the process of importing and rendering multiresolution data. |

Choose Your Neuron: Incorporating Domain Knowledge through Neuron-Importance. (arXiv:1808.02861v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Ramprasaath R. Selvaraju, Prithvijit Chattopadhyay, Mohamed Elhoseiny, Tilak Sharma, Dhruv Batra, Devi Parikh, Stefan Lee Individual neurons in convolutional neural networks supervised for image-level classification tasks have been shown to implicitly learn semantically meaningful concepts ranging from simple textures and shapes to whole or partial objects - forming a "dictionary" of concepts acquired through the learning process. In this work we introduce a simple, efficient zero-shot learning approach based on this observation. Our approach, which we call Neuron Importance-AwareWeight Transfer (NIWT), learns to map domain knowledge about novel "unseen" classes onto this dictionary of learned concepts and then optimizes for network parameters that can effectively combine these concepts - essentially learning classifiers by discovering and composing learned semantic concepts in deep networks. Our approach shows improvements over previous approaches on the CUBirds and AWA2 generalized zero-shot learning benchmarks. We demonstrate our approach on a diverse set of semantic inputs as external domain knowledge including attributes and natural language captions. Moreover by learning inverse mappings, NIWT can provide visual and textual explanations for the predictions made by the newly learned classifiers and provide neuron names. Our code is available at https://github.com/ramprs/neuron-importance-zsl. |

A Novel Tactile Force Probe for Tissue Stiffness Classification. (arXiv:1808.02862v1 [cs.RO]) Cache Translate Page Web Page Cache |

Authors: Behafarid Darvish, Siamak Najarian, Elham Shirzad, Roozbeh Khodambashi In this study, we have proposed a new type of tactile sensor that is capable of detecting the stiffness of soft objects. The sensor consists of a brass cylinder with an axial bore. An iron core can easily move inside the bore. Three peripheral bobbins were machined in the cylinder around which three coils have been wound. One of the coils was excited with an alternating current which caused a voltage to be induced in two other coils. A return spring was used to return the core to its initial position after it has been moved. The sensor was pressed against the surface of the object whose stiffness was going to be measured. The position of the core in this state was depended on the stiffness of the given object and the spring constant and was measured by measuring the change in the induced voltage in secondary coils. The proposed sensor was capable of measuring two contact parameters namely the applied force and the stiffness of the object. Using the data of this sensor, three different objects, made of polyurethane, silicon rubber and paraffin gel were discriminated. Thus, this sensor could be used in robot hands and minimally invasive surgery tools to improve their operation. |

Additional Representations for Improving Synthetic Aperture Sonar Classification Using Convolutional Neural Networks. (arXiv:1808.02868v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Isaac D Gerg, David P Williams Object classification in synthetic aperture sonar (SAS) imagery is usually a data starved and class imbalanced problem. There are few objects of interest present among much benign seafloor. Despite these problems, current classification techniques discard a large portion of the collected SAS information. In particular, a beamformed SAS image, which we call a single-look complex (SLC) image, contains complex pixels composed of real and imaginary parts. For human consumption, the SLC is converted to a magnitude-phase representation and the phase information is discarded. Even more problematic, the magnitude information usually exhibits a large dynamic range (>80dB) and must be dynamic range compressed for human display. Often it is this dynamic range compressed representation, originally designed for human consumption, which is fed into a classifier. Consequently, the classification process is completely void of the phase information. In this work, we show improvements in classification performance using the phase information from the SLC as well as information from an alternate source: photographs. We perform statistical testing to demonstrate the validity of our results. |

Parkinson's Disease Assessment from a Wrist-Worn Wearable Sensor in Free-Living Conditions: Deep Ensemble Learning and Visualization. (arXiv:1808.02870v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Terry Taewoong Um, Franz Michael Josef Pfister, Daniel Christian Pichler, Satoshi Endo, Muriel Lang, Sandra Hirche, Urban Fietzek, Dana Kulić Parkinson's Disease (PD) is characterized by disorders in motor function such as freezing of gait, rest tremor, rigidity, and slowed and hyposcaled movements. Medication with dopaminergic medication may alleviate those motor symptoms, however, side-effects may include uncontrolled movements, known as dyskinesia. In this paper, an automatic PD motor-state assessment in free-living conditions is proposed using an accelerometer in a wrist-worn wearable sensor. In particular, an ensemble of convolutional neural networks (CNNs) is applied to capture the large variability of daily-living activities and overcome the dissimilarity between training and test patients due to the inter-patient variability. In addition, class activation map (CAM), a visualization technique for CNNs, is applied for providing an interpretation of the results. |

Random directions stochastic approximation with deterministic perturbations. (arXiv:1808.02871v1 [math.OC]) Cache Translate Page Web Page Cache |

Authors: Prashanth L A, Shalabh Bhatnagar, Nirav Bhavsar, Michael Fu, Steven I. Marcus We introduce deterministic perturbation schemes for the recently proposed random directions stochastic approximation (RDSA) [17], and propose new first-order and second-order algorithms. In the latter case, these are the first second-order algorithms to incorporate deterministic perturbations. We show that the gradient and/or Hessian estimates in the resulting algorithms with deterministic perturbations are asymptotically unbiased, so that the algorithms are provably convergent. Furthermore, we derive convergence rates to establish the superiority of the first-order and second-order algorithms, for the special case of a convex and quadratic optimization problem, respectively. Numerical experiments are used to validate the theoretical results. |

Visualizing Convolutional Networks for MRI-based Diagnosis of Alzheimer's Disease. (arXiv:1808.02874v1 [cs.CV]) Cache Translate Page Web Page Cache |

Authors: Johannes Rieke, Fabian Eitel, Martin Weygandt, John-Dylan Haynes, Kerstin Ritter Visualizing and interpreting convolutional neural networks (CNNs) is an important task to increase trust in automatic medical decision making systems. In this study, we train a 3D CNN to detect Alzheimer's disease based on structural MRI scans of the brain. Then, we apply four different gradient-based and occlusion-based visualization methods that explain the network's classification decisions by highlighting relevant areas in the input image. We compare the methods qualitatively and quantitatively. We find that all four methods focus on brain regions known to be involved in Alzheimer's disease, such as inferior and middle temporal gyrus. While the occlusion-based methods focus more on specific regions, the gradient-based methods pick up distributed relevance patterns. Additionally, we find that the distribution of relevance varies across patients, with some having a stronger focus on the temporal lobe, whereas for others more cortical areas are relevant. In summary, we show that applying different visualization methods is important to understand the decisions of a CNN, a step that is crucial to increase clinical impact and trust in computer-based decision support systems. |

Uniqueness of Equilibria in Atomic Splittable Polymatroid Congestion Games. (arXiv:1512.01375v3 [cs.GT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Tobias Harks, Veerle Timmermans We study uniqueness of Nash equilibria in atomic splittable congestion games and derive a uniqueness result based on polymatroid theory: when the strategy space of every player is a bidirectional flow polymatroid, then equilibria are unique. Bidirectional flow polymatroids are introduced as a subclass of polymatroids possessing certain exchange properties. We show that important cases such as base orderable matroids can be recovered as a special case of bidirectional flow polymatroids. On the other hand we show that matroidal set systems are in some sense necessary to guarantee uniqueness of equilibria: for every atomic splittable congestion game with at least three players and nonmatroidal set systems per player, there is an isomorphic game having multiple equilibria. Our results leave a gap between base orderable matroids and general matroids for which we do not know whether equilibria are unique. |

Generalized roll-call model for the Shapley-Shubik index. (arXiv:1602.04331v2 [math.CO] UPDATED) Cache Translate Page Web Page Cache |

Authors: Sascha Kurz In 1996 Dan Felsenthal and Mosh\'e Machover considered the following model. An assembly consisting of $n$ voters exercises roll-call. All $n!$ possible orders in which the voters may be called are assumed to be equiprobable. The votes of each voter are independent with expectation $0<p<1$ for an individual vote {\lq\lq}yea{\rq\rq}. For a given decision rule $v$ the \emph{pivotal} voter in a roll-call is the one whose vote finally decides the aggregated outcome. It turned out that the probability to be pivotal is equivalent to the Shapley-Shubik index. Here we give an easy combinatorial proof of this coincidence, further weaken the assumptions of the underlying model, and study generalizations to the case of more than two alternatives. |

Unsupervised Total Variation Loss for Semi-supervised Deep Learning of Semantic Segmentation. (arXiv:1605.01368v3 [cs.CV] UPDATED) Cache Translate Page Web Page Cache |

Authors: Mehran Javanmardi, Mehdi Sajjadi, Ting Liu, Tolga Tasdizen We introduce a novel unsupervised loss function for learning semantic segmentation with deep convolutional neural nets (ConvNet) when densely labeled training images are not available. More specifically, the proposed loss function penalizes the L1-norm of the gradient of the label probability vector image , i.e. total variation, produced by the ConvNet. This can be seen as a regularization term that promotes piecewise smoothness of the label probability vector image produced by the ConvNet during learning. The unsupervised loss function is combined with a supervised loss in a semi-supervised setting to learn ConvNets that can achieve high semantic segmentation accuracy even when only a tiny percentage of the pixels in the training images are labeled. We demonstrate significant improvements over the purely supervised setting in the Weizmann horse, Stanford background and Sift Flow datasets. Furthermore, we show that using the proposed piecewise smoothness constraint in the learning phase significantly outperforms post-processing results from a purely supervised approach with Markov Random Fields (MRF). Finally, we note that the framework we introduce is general and can be used to learn to label other types of structures such as curvilinear structures by modifying the unsupervised loss function accordingly. |

Hardness Results for Consensus-Halving. (arXiv:1609.05136v2 [cs.GT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Aris Filos-Ratsikas, Soren Kristoffer Stiil Frederiksen, Paul W. Goldberg, Jie Zhang We study the consensus-halving problem of dividing an object into two portions, such that each of $n$ agents has equal valuation for the two portions. The $\epsilon$-approximate consensus-halving problem allows each agent to have an $\epsilon$ discrepancy on the values of the portions. We prove that computing $\epsilon$-approximate consensus-halving solution using $n$ cuts is in PPA, and is PPAD-hard, where $\epsilon$ is some positive constant; the problem remains PPAD-hard when we allow a constant number of additional cuts. It is NP-hard to decide whether a solution with $n-1$ cuts exists for the problem. As a corollary of our results, we obtain that the approximate computational version of the Continuous Necklace Splitting Problem is PPAD-hard when the number of portions $t$ is two. |

Equilibrium Computation in Resource Allocation Games. (arXiv:1612.00190v5 [cs.GT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Veerle Timmermans, Tobias Harks We study the equilibrium computation problem for two classical resource allocation games: atomic splittable congestion games and multimarket Cournot oligopolies. For atomic splittable congestion games with singleton strategies and player-specific affine cost functions, we devise the first polynomial time algorithm computing a pure Nash equilibrium. Our algorithm is combinatorial and computes the exact equilibrium assuming rational input. The idea is to compute an equilibrium for an associated integrally-splittable singleton congestion game in which the players can only split their demands in integral multiples of a common packet size. While integral games have been considered in the literature before, no polynomial time algorithm computing an equilibrium was known. Also for this class, we devise the first polynomial time algorithm and use it as a building block for our main algorithm. We then develop a polynomial time computable transformation mapping a multimarket Cournot competition game with firm-specific affine price functions and quadratic costs to an associated atomic splittable congestion game as described above. The transformation preserves equilibria in either games and, thus, leads -- via our first algorithm -- to a polynomial time algorithm computing Cournot equilibria. Finally, our analysis for integrally-splittable games implies new bounds on the difference between real and integral Cournot equilibria. The bounds can be seen as a generalization of the recent bounds for single market oligopolies obtained by Todd [2016]. |

Anatomy of Scholarly Information Behavior Patterns in the Wake of Academic Social Media Platforms. (arXiv:1612.07863v2 [cs.DL] UPDATED) Cache Translate Page Web Page Cache |

Authors: Hamed Alhoori, Mohammed Samaka, Richard Furuta, Edward A. Fox As more scholarly content is born digital or converted to a digital format, digital libraries are becoming increasingly vital to researchers seeking to leverage scholarly big data for scientific discovery. Although scholarly products are available in abundance-especially in environments created by the advent of social networking services-little is known about international scholarly information needs, information-seeking behavior, or information use. The purpose of this paper is to address these gaps via an in-depth analysis of the information needs and information-seeking behavior of researchers, both students and faculty, at two universities, one in the U.S. and the other in Qatar. Based on this analysis, the study identifies and describes new behavior patterns on the part of researchers as they engage in the information-seeking process. The analysis reveals that the use of academic social networks has notable effects on various scholarly activities. Further, this study identifies differences between students and faculty members in regard to their use of academic social networks, and it identifies differences between researchers according to discipline. Although the researchers who participated in the present study represent a range of disciplinary and cultural backgrounds, the study reports a number of similarities in terms of the researchers' scholarly activities. |

Creating A Multi-track Classical Musical Performance Dataset for Multimodal Music Analysis: Challenges, Insights, and Applications. (arXiv:1612.08727v3 [cs.MM] UPDATED) Cache Translate Page Web Page Cache |

Authors: Bochen Li, Xinzhao Liu, Karthik Dinesh, Zhiyao Duan, Gaurav Sharma We introduce a dataset for facilitating audio-visual analysis of music performances. The dataset comprises 44 simple multi-instrument classical music pieces assembled from coordinated but separately recorded performances of individual tracks. For each piece, we provide the musical score in MIDI format, the audio recordings of the individual tracks, the audio and video recording of the assembled mixture, and ground-truth annotation files including frame-level and note-level transcriptions. We describe our methodology for the creation of the dataset, particularly highlighting our approaches for addressing the challenges involved in maintaining synchronization and expressiveness. We demonstrate the high quality of synchronization achieved with our proposed approach by comparing the dataset with existing widely-used music audio datasets. We anticipate that the dataset will be useful for the development and evaluation of existing music information retrieval (MIR) tasks, as well as for novel multi-modal tasks. We benchmark two existing MIR tasks (multi-pitch analysis and score-informed source separation) on the dataset and compare with other existing music audio datasets. Additionally, we consider two novel multi-modal MIR tasks (visually informed multi-pitch analysis and polyphonic vibrato analysis) enabled by the dataset and provide evaluation measures and baseline systems for future comparisons (from our recent work). Finally, we propose several emerging research directions that the dataset enables. |

Born to Learn: the Inspiration, Progress, and Future of Evolved Plastic Artificial Neural Networks. (arXiv:1703.10371v3 [cs.NE] UPDATED) Cache Translate Page Web Page Cache |

Authors: Andrea Soltoggio, Kenneth O. Stanley, Sebastian Risi Biological plastic neural networks are systems of extraordinary computational capabilities shaped by evolution, development, and lifetime learning. The interplay of these elements leads to the emergence of adaptive behavior and intelligence. Inspired by such intricate natural phenomena, Evolved Plastic Artificial Neural Networks (EPANNs) use simulated evolution in-silico to breed plastic neural networks with a large variety of dynamics, architectures, and plasticity rules: these artificial systems are composed of inputs, outputs, and plastic components that change in response to experiences in an environment. These systems may autonomously discover novel adaptive algorithms, and lead to hypotheses on the emergence of biological adaptation. EPANNs have seen considerable progress over the last two decades. Current scientific and technological advances in artificial neural networks are now setting the conditions for radically new approaches and results. In particular, the limitations of hand-designed networks could be overcome by more flexible and innovative solutions. This paper brings together a variety of inspiring ideas that define the field of EPANNs. The main methods and results are reviewed. Finally, new opportunities and developments are presented. |

Algorithms for Covering Multiple Barriers. (arXiv:1704.06870v3 [cs.CG] UPDATED) Cache Translate Page Web Page Cache |

Authors: Shimin Li, Haitao Wang In this paper, we consider the problems for covering multiple intervals on a line. Given a set $B$ of $m$ line segments (called "barriers") on a horizontal line $L$ and another set $S$ of $n$ horizontal line segments of the same length in the plane, we want to move all segments of $S$ to $L$ so that their union covers all barriers and the maximum movement of all segments of $S$ is minimized. Previously, an $O(n^3\log n)$-time algorithm was given for the case $m=1$. In this paper, we propose an $O(n^2\log n\log \log n+nm\log m)$-time algorithm for a more general setting with any $m\geq 1$, which also improves the previous work when $m=1$. We then consider a line-constrained version of the problem in which the segments of $S$ are all initially on the line $L$. Previously, an $O(n\log n)$-time algorithm was known for the case $m=1$. We present an algorithm of $O(m\log m+n\log m \log n)$ time for any $m\geq 1$. These problems may have applications in mobile sensor barrier coverage in wireless sensor networks. |

A General Theory of Sample Complexity for Multi-Item Profit Maximization. (arXiv:1705.00243v4 [cs.LG] UPDATED) Cache Translate Page Web Page Cache |

Authors: Maria-Florina Balcan, Tuomas Sandholm, Ellen Vitercik The design of profit-maximizing multi-item mechanisms is a notoriously challenging problem with tremendous real-world impact. The mechanism designer's goal is to field a mechanism with high expected profit on the distribution over buyers' values. Unfortunately, if the set of mechanisms he optimizes over is complex, a mechanism may have high empirical profit over a small set of samples but low expected profit. This raises the question, how many samples are sufficient to ensure that the empirically optimal mechanism is nearly optimal in expectation? We uncover structure shared by a myriad of pricing, auction, and lottery mechanisms that allows us to prove strong sample complexity bounds: for any set of buyers' values, profit is a piecewise linear function of the mechanism's parameters. We prove new bounds for mechanism classes not yet studied in the sample-based mechanism design literature and match or improve over the best known guarantees for many classes. The profit functions we study are significantly different from well-understood functions in machine learning, so our analysis requires a sharp understanding of the interplay between mechanism parameters and buyer values. We strengthen our main results with data-dependent bounds when the distribution over buyers' values is "well-behaved." Finally, we investigate a fundamental tradeoff in sample-based mechanism design: complex mechanisms often have higher profit than simple mechanisms, but more samples are required to ensure that empirical and expected profit are close. We provide techniques for optimizing this tradeoff. |

Towards Verifying Nonlinear Integer Arithmetic. (arXiv:1705.04302v2 [cs.LO] UPDATED) Cache Translate Page Web Page Cache |

Authors: Paul Beame, Vincent Liew We eliminate a key roadblock to efficient verification of nonlinear integer arithmetic using CDCL SAT solvers, by showing how to construct short resolution proofs for many properties of the most widely used multiplier circuits. Such short proofs were conjectured not to exist. More precisely, we give n^{O(1)} size regular resolution proofs for arbitrary degree 2 identities on array, diagonal, and Booth multipliers and quasipolynomial- n^{O(\log n)} size proofs for these identities on Wallace tree multipliers. |

Interoperable Convergence of Storage, Networking and Computation. (arXiv:1706.07519v4 [cs.DC] UPDATED) Cache Translate Page Web Page Cache |

Authors: Micah Beck, Terry Moore, Piotr Luszczek In every form of digital store-and-forward communication, intermediate forwarding nodes are computers, with attendant memory and processing resources. This has inevitably originated efforts to create a wide-area infrastructure that goes beyond simple store-and-forward, a facility that makes more general and varied use of the potential of this collection of increasingly powerful nodes. Historically, these efforts predate the advent of globally routed packet networking. The desire for a converged infrastructure of this kind has only intensified over the last 30 years, as memory, storage, and processing resources have both increased in density and speed while simultaneously decreasing in cost. Although there is a general consensus seems that it should be possible to define and deploy such a dramatically more capable wide-area facility, a great deal of investment in research prototypes has yet to produce a credible candidate architecture. Drawing on technical analysis, historical examples, and case studies, we present an argument for the hypothesis that in order to realize a distributed system with the kind of convergent generality and deployment scalability that might qualify as "future-defining," we must build it from a small set of simple, generic, and limited abstractions of the low level resources (processing, storage and network) of its intermediate nodes. |

A Sublinear Tester for Outerplanarity (and Other Forbidden Minors) With One-Sided Error. (arXiv:1707.06126v4 [cs.DS] UPDATED) Cache Translate Page Web Page Cache |

Authors: Hendrik Fichtenberger, Reut Levi, Yadu Vasudev, Maximilian Wötzel We consider one-sided error property testing of $\mathcal{F}$-minor freeness in bounded-degree graphs for any finite family of graphs $\mathcal{F}$ that contains a minor of $K_{2,k}$, the $k$-circus graph, or the $(k\times 2)$-grid for any $k\in\mathbb{N}$. This includes, for instance, testing whether a graph is outerplanar or a cactus graph. The query complexity of our algorithm in terms of the number of vertices in the graph, $n$, is $\tilde{O}(n^{2/3} / \epsilon^5)$. Czumaj et~al.\ showed that cycle-freeness and $C_k$-minor freeness can be tested with query complexity $\tilde{O}(\sqrt{n})$ by using random walks, and that testing $H$-minor freeness for any $H$ that contains a cycles requires $\Omega(\sqrt{n})$ queries. In contrast to these results, we analyze the structure of the graph and show that either we can find a subgraph of sublinear size that includes the forbidden minor $H$, or we can find a pair of disjoint subsets of vertices whose edge-cut is large, which induces an $H$-minor. |

Ultra-Reliable Low Latency Cellular Networks: Use Cases, Challenges and Approaches. (arXiv:1709.00560v2 [cs.IT] UPDATED) Cache Translate Page Web Page Cache |

Authors: He Chen, Rana Abbas, Peng Cheng, Mahyar Shirvanimoghaddam, Wibowo Hardjawana, Wei Bao, Yonghui Li, Branka Vucetic The fifth-generation cellular mobile networks are expected to support mission critical ultra-reliable low latency communication (URLLC) services in addition to the enhanced mobile broadband applications. This article first introduces three emerging mission critical applications of URLLC and identifies their requirements on end-to-end latency and reliability. We then investigate the various sources of end-to-end delay of current wireless networks by taking the 4G Long Term Evolution (LTE) as an example. Subsequently, we propose and evaluate several techniques to reduce the end-to-end latency from the perspectives of error control coding, signal processing, and radio resource management. We also briefly discuss other network design approaches with the potential for further latency reduction. |

MacWilliams' extension theorem for infinite rings. (arXiv:1709.06070v3 [math.RA] UPDATED) Cache Translate Page Web Page Cache |

Authors: Friedrich Martin Schneider, Jens Zumbrägel Finite Frobenius rings have been characterized as precisely those finite rings satisfying the MacWilliams extension property, by work of Wood. In the present note we offer a generalization of this remarkable result to the realm of Artinian rings. Namely, we prove that a left Artinian ring has the left MacWilliams property if and only if it is left pseudo-injective and its finitary left socle embeds into the semisimple quotient. Providing a topological perspective on the MacWilliams property, we also show that the finitary left socle of a left Artinian ring embeds into the semisimple quotient if and only if it admits a finitarily left torsion-free character, if and only if the Pontryagin dual of the regular left module is almost monothetic. In conclusion, an Artinian ring has the MacWilliams property if and only if it is finitarily Frobenius, i.e., it is quasi-Frobenius and its finitary socle embeds into the semisimple quotient. |

Predicting Positive and Negative Links with Noisy Queries: Theory & Practice. (arXiv:1709.07308v2 [cs.DS] UPDATED) Cache Translate Page Web Page Cache |

Authors: Charalampos E. Tsourakakis, Michael Mitzenmacher, Kasper Green Larsen, Jarosław Błasiok, Ben Lawson, Preetum Nakkiran, Vasileios Nakos Social networks involve both positive and negative relationships, which can be captured in signed graphs. The {\em edge sign prediction problem} aims to predict whether an interaction between a pair of nodes will be positive or negative. We provide theoretical results for this problem that motivate natural improvements to recent heuristics. The edge sign prediction problem is related to correlation clustering; a positive relationship means being in the same cluster. We consider the following model for two clusters: we are allowed to query any pair of nodes whether they belong to the same cluster or not, but the answer to the query is corrupted with some probability $0<q<\frac{1}{2}$. Let $\delta=1-2q$ be the bias. We provide an algorithm that recovers all signs correctly with high probability in the presence of noise with $O(\frac{n\log n}{\delta^2}+\frac{\log^2 n}{\delta^6})$ queries. This is the best known result for this problem for all but tiny $\delta$, improving on the recent work of Mazumdar and Saha \cite{mazumdar2017clustering}. We also provide an algorithm that performs $O(\frac{n\log n}{\delta^4})$ queries, and uses breadth first search as its main algorithmic primitive. While both the running time and the number of queries for this algorithm are sub-optimal, our result relies on novel theoretical techniques, and naturally suggests the use of edge-disjoint paths as a feature for predicting signs in online social networks. Correspondingly, we experiment with using edge disjoint $s-t$ paths of short length as a feature for predicting the sign of edge $(s,t)$ in real-world signed networks. Empirical findings suggest that the use of such paths improves the classification accuracy, especially for pairs of nodes with no common neighbors. |

Deterministic Interpolation of Sparse Black-box Multivariate Polynomials using Kronecker Type Substitutions. (arXiv:1710.01301v2 [cs.SC] UPDATED) Cache Translate Page Web Page Cache |

Authors: Qiao-Long Huang, Xiao-Shan Gao In this paper, we propose two new deterministic interpolation algorithms for a sparse multivariate polynomial given as a standard black-box by introducing new Kronecker type substitutions. Let $f\in \RB[x_1,\dots,x_n]$ be a sparse black-box polynomial with a degree bound $D$. When $\RB=\C$ or a finite field, our algorithms either have better bit complexity or better bit complexity in $D$ than existing deterministic algorithms. In particular, in the case of deterministic algorithms for standard black-box models, our second algorithm has the current best complexity in $D$ which is the dominant factor in the complexity. |

Robust Photometric Stereo via Dictionary Learning. (arXiv:1710.08873v3 [cs.CV] UPDATED) Cache Translate Page Web Page Cache |

Authors: Andrew J. Wagenmaker, Brian E. Moore, Raj Rao Nadakuditi Photometric stereo is a method that seeks to reconstruct the normal vectors of an object from a set of images of the object illuminated under different light sources. While effective in some situations, classical photometric stereo relies on a diffuse surface model that cannot handle objects with complex reflectance patterns, and it is sensitive to non-idealities in the images. In this work, we propose a novel approach to photometric stereo that relies on dictionary learning to produce robust normal vector reconstructions. Specifically, we develop two formulations for applying dictionary learning to photometric stereo. We propose a model that applies dictionary learning to regularize and reconstruct the normal vectors from the images under the classic Lambertian reflectance model. We then generalize this model to explicitly model non-Lambertian objects. We investigate both approaches through extensive experimentation on synthetic and real benchmark datasets and observe state-of-the-art performance compared to existing robust photometric stereo methods. |

Cross-identification of stellar catalogs with multiple stars: Complexity and Resolution. (arXiv:1710.09417v2 [cs.DM] UPDATED) Cache Translate Page Web Page Cache |

Authors: Daniel Severin In this work, I present an optimization problem which consists of assigning entries of a stellar catalog to multiple entries of another stellar catalog such that the probability of such assignment is maximum. I show a way of modeling it as a Maximum Weighted Stable Set Problem which is further used to solve a real astronomical instance and I partially characterize the forbidden subgraphs of the resulting family of graphs given by that reduction. Finally, I prove that the problem is NP-Hard. |

Deep Rewiring: Training very sparse deep networks. (arXiv:1711.05136v5 [cs.NE] UPDATED) Cache Translate Page Web Page Cache |

Authors: Guillaume Bellec, David Kappel, Wolfgang Maass, Robert Legenstein Neuromorphic hardware tends to pose limits on the connectivity of deep networks that one can run on them. But also generic hardware and software implementations of deep learning run more efficiently for sparse networks. Several methods exist for pruning connections of a neural network after it was trained without connectivity constraints. We present an algorithm, DEEP R, that enables us to train directly a sparsely connected neural network. DEEP R automatically rewires the network during supervised training so that connections are there where they are most needed for the task, while its total number is all the time strictly bounded. We demonstrate that DEEP R can be used to train very sparse feedforward and recurrent neural networks on standard benchmark tasks with just a minor loss in performance. DEEP R is based on a rigorous theoretical foundation that views rewiring as stochastic sampling of network configurations from a posterior. |

Learning to select computations. (arXiv:1711.06892v3 [cs.AI] UPDATED) Cache Translate Page Web Page Cache |

Authors: Frederick Callaway, Sayan Gul, Paul M. Krueger, Thomas L. Griffiths, Falk Lieder The efficient use of limited computational resources is an essential ingredient of intelligence. Selecting computations optimally according to rational metareasoning would achieve this, but this is computationally intractable. Inspired by psychology and neuroscience, we propose the first concrete and domain-general learning algorithm for approximating the optimal selection of computations: Bayesian metalevel policy search (BMPS). We derive this general, sample-efficient search algorithm for a computation-selecting metalevel policy based on the insight that the value of information lies between the myopic value of information and the value of perfect information. We evaluate BMPS on three increasingly difficult metareasoning problems: when to terminate computation, how to allocate computation between competing options, and planning. Across all three domains, BMPS achieved near-optimal performance and compared favorably to previously proposed metareasoning heuristics. Finally, we demonstrate the practical utility of BMPS in an emergency management scenario, even accounting for the overhead of metareasoning. |

Learning with Biased Complementary Labels. (arXiv:1711.09535v3 [stat.ML] UPDATED) Cache Translate Page Web Page Cache |

Authors: Xiyu Yu, Tongliang Liu, Mingming Gong, Dacheng Tao In this paper, we study the classification problem in which we have access to easily obtainable surrogate for true labels, namely complementary labels, which specify classes that observations do \textbf{not} belong to. Let $Y$ and $\bar{Y}$ be the true and complementary labels, respectively. We first model the annotation of complementary labels via transition probabilities $P(\bar{Y}=i|Y=j), i\neq j\in\{1,\cdots,c\}$, where $c$ is the number of classes. Previous methods implicitly assume that $P(\bar{Y}=i|Y=j), \forall i\neq j$, are identical, which is not true in practice because humans are biased toward their own experience. For example, as shown in Figure 1, if an annotator is more familiar with monkeys than prairie dogs when providing complementary labels for meerkats, she is more likely to employ "monkey" as a complementary label. We therefore reason that the transition probabilities will be different. In this paper, we propose a framework that contributes three main innovations to learning with \textbf{biased} complementary labels: (1) It estimates transition probabilities with no bias. (2) It provides a general method to modify traditional loss functions and extends standard deep neural network classifiers to learn with biased complementary labels. (3) It theoretically ensures that the classifier learned with complementary labels converges to the optimal one learned with true labels. Comprehensive experiments on several benchmark datasets validate the superiority of our method to current state-of-the-art methods. |

Limited Feedback Channel Estimation in Massive MIMO with Non-uniform Directional Dictionaries. (arXiv:1712.10085v2 [cs.IT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Panos N. Alevizos, Xiao Fu, Nicholas D. Sidiropoulos, Yang Ye, Aggelos Bletsas Channel state information (CSI) at the base station (BS) is crucial to achieve beamforming and multiplexing gains in multiple-input multiple-output (MIMO) systems. State-of-the-art limited feedback schemes require feedback overhead that scales linearly with the number of BS antennas, which is prohibitive for $5$G massive MIMO. This work proposes novel limited feedback algorithms that lift this burden by exploiting the inherent sparsity in double directional (DD) MIMO channel representation using overcomplete dictionaries. These dictionaries are associated with angle of arrival (AoA) and angle of departure (AoD) that specifically account for antenna directivity patterns at both ends of the link. The proposed algorithms achieve satisfactory channel estimation accuracy using a small number of feedback bits, even when the number of transmit antennas at the BS is large -- making them ideal for $5$G massive MIMO. Judicious simulations reveal that they outperform a number of popular feedback schemes, and underscore the importance of using angle dictionaries matching the given antenna directivity patterns, as opposed to uniform dictionaries. The proposed algorithms are lightweight in terms of computation, especially on the user equipment side, making them ideal for actual deployment in $5$G systems. |

A Generalized Circuit for the Hamiltonian Dynamics Through the Truncated Series. (arXiv:1801.09720v3 [quant-ph] UPDATED) Cache Translate Page Web Page Cache |

Authors: Ammar Daskin, Sabre Kais In this paper, we present a method for the Hamiltonian simulation in the context of eigenvalue estimation problems which improves earlier results dealing with Hamiltonian simulation through the truncated Taylor series. In particular, we present a fixed-quantum circuit design for the simulation of the Hamiltonian dynamics, $H(t)$, through the truncated Taylor series method described by Berry et al. \cite{berry2015simulating}. The circuit is general and can be used to simulate any given matrix in the phase estimation algorithm by only changing the angle values of the quantum gates implementing the time variable $t$ in the series. The circuit complexity depends on the number of summation terms composing the Hamiltonian and requires $O(Ln)$ number of quantum gates for the simulation of a molecular Hamiltonian. Here, $n$ is the number of states of a spin orbital, and $L$ is the number of terms in the molecular Hamiltonian and generally bounded by $O(n^4)$. We also discuss how to use the circuit in adaptive processes and eigenvalue related problems along with a slight modified version of the iterative phase estimation algorithm. In addition, a simple divide and conquer method is presented for mapping a matrix which are not given as sums of unitary matrices into the circuit. The complexity of the circuit is directly related to the structure of the matrix and can be bounded by $O(poly(n))$ for a matrix with $poly(n)-$sparsity. |

Approximating power by weights. (arXiv:1802.00497v3 [cs.GT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Sascha Kurz Determining the power distribution of the members of a shareholder meeting or a legislative committee is a well-known problem for many applications. In some cases it turns out that power is nearly proportional to relative voting weights, which is very beneficial for both theoretical considerations and practical computations with many members. We present quantitative approximation results with precise error bounds for several power indices as well as impossibility results for such approximations between power and weights. |

The steerable graph Laplacian and its application to filtering image data-sets. (arXiv:1802.01894v2 [cs.CV] UPDATED) Cache Translate Page Web Page Cache |

Authors: Boris Landa, Yoel Shkolnisky In recent years, improvements in various image acquisition techniques gave rise to the need for adaptive processing methods, aimed particularly for large datasets corrupted by noise and deformations. In this work, we consider datasets of images sampled from a low-dimensional manifold (i.e. an image-valued manifold), where the images can assume arbitrary planar rotations. To derive an adaptive and rotation-invariant framework for processing such datasets, we introduce a graph Laplacian (GL)-like operator over the dataset, termed ${\textit{steerable graph Laplacian}}$. Essentially, the steerable GL extends the standard GL by accounting for all (infinitely-many) planar rotations of all images. As it turns out, similarly to the standard GL, a properly normalized steerable GL converges to the Laplace-Beltrami operator on the low-dimensional manifold. However, the steerable GL admits an improved convergence rate compared to the GL, where the improved convergence behaves as if the intrinsic dimension of the underlying manifold is lower by one. Moreover, it is shown that the steerable GL admits eigenfunctions of the form of Fourier modes (along the orbits of the images' rotations) multiplied by eigenvectors of certain matrices, which can be computed efficiently by the FFT. For image datasets corrupted by noise, we employ a subset of these eigenfunctions to "filter" the dataset via a Fourier-like filtering scheme, essentially using all images and their rotations simultaneously. We demonstrate our filtering framework by de-noising simulated single-particle cryo-EM image datasets. |

Faster Distributed Shortest Path Approximations via Shortcuts. (arXiv:1802.03671v3 [cs.DS] UPDATED) Cache Translate Page Web Page Cache |

Authors: Bernhard Haeupler, Jason Li A long series of recent results and breakthroughs have led to faster and better distributed approximation algorithms for single source shortest paths (SSSP) and related problems in the CONGEST model. The runtime of all these algorithms, however, is $\tilde{\Omega}(\sqrt{n})$, regardless of the network topology, even on nice networks with a (poly)logarithmic network diameter $D$. While this is known to be necessary for some pathological networks, most topologies of interest are arguably not of this type. We give the first distributed approximation algorithms for shortest paths problems that adjust to the topology they are run on, thus achieving significantly faster running times on many topologies of interest. The running time of our algorithms depends on and is close to $Q$, where $Q$ is the quality of the best shortcut that exists for the given topology. While $Q = \tilde{\Theta}(\sqrt{n} + D)$ for pathological worst-case topologies, many topologies of interest have $Q = \tilde{\Theta}(D)$, which results in near instance optimal running times for our algorithm, given the trivial $\Omega(D)$ lower bound. The problems we consider are as follows: (1) an approximate shortest path tree and SSSP distances, (2) a polylogarithmic size distance label for every node such that from the labels of any two nodes alone one can determine their distance (approximately), and (3) an (approximately) optimal flow for the transshipment problem. Our algorithms have a tunable tradeoff between running time and approximation ratio. Our fastest algorithms have an arbitrarily good polynomial approximation guarantee and an essentially optimal $\tilde{O}(Q)$ running time. On the other end of the spectrum, we achieve polylogarithmic approximations in $\tilde{O}(Q \cdot n^{\epsilon})$ rounds for any $\epsilon > 0$. |

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. (arXiv:1802.07344v3 [cs.CR] UPDATED) Cache Translate Page Web Page Cache |

Authors: Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis Coconut is a novel selective disclosure credential scheme supporting distributed threshold issuance, public and private attributes, re-randomization, and multiple unlinkable selective attribute revelations. Coconut integrates with blockchains to ensure confidentiality, authenticity and availability even when a subset of credential issuing authorities are malicious or offline. We implement and evaluate a generic Coconut smart contract library for Chainspace and Ethereum; and present three applications related to anonymous payments, electronic petitions, and distribution of proxies for censorship resistance. Coconut uses short and computationally efficient credentials, and our evaluation shows that most Coconut cryptographic primitives take just a few milliseconds on average, with verification taking the longest time (10 milliseconds). |

Dynamic Effective Resistances and Approximate Schur Complement on Separable Graphs. (arXiv:1802.09111v2 [cs.DS] UPDATED) Cache Translate Page Web Page Cache |

Authors: Gramoz Goranci, Monika Henzinger, Pan Peng We consider the problem of dynamically maintaining (approximate) all-pairs effective resistances in separable graphs, which are those that admit an $n^{c}$-separator theorem for some $c<1$. We give a fully dynamic algorithm that maintains $(1+\varepsilon)$-approximations of the all-pairs effective resistances of an $n$-vertex graph $G$ undergoing edge insertions and deletions with $\tilde{O}(\sqrt{n}/\varepsilon^2)$ worst-case update time and $\tilde{O}(\sqrt{n}/\varepsilon^2)$ worst-case query time, if $G$ is guaranteed to be $\sqrt{n}$-separable (i.e., it is taken from a class satisfying a $\sqrt{n}$-separator theorem) and its separator can be computed in $\tilde{O}(n)$ time. Our algorithm is built upon a dynamic algorithm for maintaining \emph{approximate Schur complement} that approximately preserves pairwise effective resistances among a set of terminals for separable graphs, which might be of independent interest. We complement our result by proving that for any two fixed vertices $s$ and $t$, no incremental or decremental algorithm can maintain the $s-t$ effective resistance for $\sqrt{n}$-separable graphs with worst-case update time $O(n^{1/2-\delta})$ and query time $O(n^{1-\delta})$ for any $\delta>0$, unless the Online Matrix Vector Multiplication (OMv) conjecture is false. We further show that for \emph{general} graphs, no incremental or decremental algorithm can maintain the $s-t$ effective resistance problem with worst-case update time $O(n^{1-\delta})$ and query-time $O(n^{2-\delta})$ for any $\delta >0$, unless the OMv conjecture is false. |

Screening for cancer using a learning Internet advertising system. (arXiv:1802.09352v2 [cs.CY] UPDATED) Cache Translate Page Web Page Cache |

Authors: Elad Yom-Tov Studies have shown that the traces people leave when browsing the internet may indicate the onset of diseases such as cancer. Here we show that the adaptive engines of advertising systems in conjunction with clinically verified questionnaires can be used to identify people who are suspected of having one of three types of solid tumor cancers. In the first study, 308 people were recruited through ads shown on the Bing search engine to complete a clinically verified risk questionnaire. A classifier trained to predict questionnaire response using only past queries on Bing reached an Area Under the Curve of 0.64 for all three cancer types, verifying that past searches could be used to identify people with suspected cancer. The second study was conducted using the Google ads system in the same configuration as in the first study. However, in this study the ads system was set to automatically learn to identify people with suspected cancer. A total of 70,586 people were shown the ads, and 6,484 clicked and were referred to complete the clinical questionnaires. People from countries with higher Internet access and lower life expectancy tended to click more on the ads. Over time the advertisement system learned to identify people who were likely to have symptoms consistent with suspected cancer, such that the percentage of people completing the questionnaires and found to have suspected cancer reached approximately 11\% at the end of the experiment. These results demonstrate the utility of using search engine queries to screen for possible cancer and the application of modern advertising systems to help identify people who are likely suffering from serious medical conditions. This is especially true in countries where medical services are less developed. |

A Scalable Near-Memory Architecture for Training Deep Neural Networks on Large In-Memory Datasets. (arXiv:1803.04783v2 [cs.DC] UPDATED) Cache Translate Page Web Page Cache |

Authors: Fabian Schuiki, Michael Schaffner, Frank K. Gürkaynak, Luca Benini Most investigations into near-memory hardware accelerators for deep neural networks have primarily focused on inference, while the potential of accelerating training has received relatively little attention so far. Based on an in-depth analysis of the key computational patterns in state-of-the-art gradient-based training methods, we propose an efficient near-memory acceleration engine called NTX that can be used to train state-of-the-art deep convolutional neural networks at scale. Our main contributions are: (i) a loose coupling of RISC-V cores and NTX co-processors reducing offloading overhead by 7x over previously published results; (ii) an optimized IEEE754 compliant data path for fast high-precision convolutions and gradient propagation; (iii) evaluation of near-memory computing with NTX embedded into residual area on the Logic Base die of a Hybrid Memory Cube; and (iv) a scaling analysis to meshes of HMCs in a data center scenario. We demonstrate a 2.7x energy efficiency improvement of NTX over contemporary GPUs at 4.4x less silicon area, and a compute performance of 1.2 Tflop/s for training large state-of-the-art networks with full floating-point precision. At the data center scale, a mesh of NTX achieves above 95% parallel and energy efficiency, while providing 2.1x energy savings or 3.1x performance improvement over a GPU-based system. |

Averaging Weights Leads to Wider Optima and Better Generalization. (arXiv:1803.05407v2 [cs.LG] UPDATED) Cache Translate Page Web Page Cache |

Authors: Pavel Izmailov, Dmitrii Podoprikhin, Timur Garipov, Dmitry Vetrov, Andrew Gordon Wilson Deep neural networks are typically trained by optimizing a loss function with an SGD variant, in conjunction with a decaying learning rate, until convergence. We show that simple averaging of multiple points along the trajectory of SGD, with a cyclical or constant learning rate, leads to better generalization than conventional training. We also show that this Stochastic Weight Averaging (SWA) procedure finds much broader optima than SGD, and approximates the recent Fast Geometric Ensembling (FGE) approach with a single model. Using SWA we achieve notable improvement in test accuracy over conventional SGD training on a range of state-of-the-art residual networks, PyramidNets, DenseNets, and Shake-Shake networks on CIFAR-10, CIFAR-100, and ImageNet. In short, SWA is extremely easy to implement, improves generalization, and has almost no computational overhead. |

Vehicle Security: Risk Assessment in Transportation. (arXiv:1804.07381v2 [cs.CR] UPDATED) Cache Translate Page Web Page Cache |

Authors: Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes Intelligent Transportation Systems (ITS) are critical infrastructure that are not immune to both physical and cyber threats. Vehicles are cyber/physical systems which are a core component of ITS, can be either a target or a launching point for an attack on the ITS network. Unknown vehicle security vulnerabilities trigger a race among adversaries to exploit the weaknesses and security experts to mitigate the vulnerability. In this study, we identified opportunities for adversaries to take control of the in-vehicle network, which can compromise the safety, privacy, reliability, efficiency, and security of the transportation system. This study contributes in three ways to the literature of ITS security and resiliency. First, we aggregate individual risks that are associated with hacking the in-vehicle network to determine system-level risk. Second, we employ a risk-based model to conduct a qualitative vulnerability-oriented risk assessment. Third, we identify the consequences of hacking the in-vehicle network through a risk-based approach, using an impact-likelihood matrix. The qualitative assessment communicates risk outcomes for policy analysis. The outcome of this study would be of interest and usefulness to policymakers and engineers concerned with the potential vulnerabilities of the critical infrastructures. |

Candidate Labeling for Crowd Learning. (arXiv:1804.10023v2 [stat.ML] UPDATED) Cache Translate Page Web Page Cache |

Authors: Iker Beñaran-Muñoz, Jerónimo Hernández-González, Aritz Pérez Crowdsourcing has become very popular among the machine learning community as a way to obtain labels that allow a ground truth to be estimated for a given dataset. In most of the approaches that use crowdsourced labels, annotators are asked to provide, for each presented instance, a single class label. Such a request could be inefficient, that is, considering that the labelers may not be experts, that way to proceed could fail to take real advantage of the knowledge of the labelers. In this paper, the use of candidate labeling for crowd learning is proposed, where the annotators may provide more than a single label per instance to try not to miss the real label. The main hypothesis is that, by allowing candidate labeling, knowledge can be extracted from the labelers more efficiently by than in the standard crowd learning scenario. Empirical evidence which supports that hypothesis is presented. |

Pushing the Limits of Unconstrained Face Detection: a Challenge Dataset and Baseline Results. (arXiv:1804.10275v3 [cs.CV] UPDATED) Cache Translate Page Web Page Cache |

Authors: Hajime Nada, Vishwanath A. Sindagi, He Zhang, Vishal M. Patel Face detection has witnessed immense progress in the last few years, with new milestones being surpassed every year. While many challenges such as large variations in scale, pose, appearance are successfully addressed, there still exist several issues which are not specifically captured by existing methods or datasets. In this work, we identify the next set of challenges that requires attention from the research community and collect a new dataset of face images that involve these issues such as weather-based degradations, motion blur, focus blur and several others. We demonstrate that there is a considerable gap in the performance of state-of-the-art detectors and real-world requirements. Hence, in an attempt to fuel further research in unconstrained face detection, we present a new annotated Unconstrained Face Detection Dataset (UFDD) with several challenges and benchmark recent methods. Additionally, we provide an in-depth analysis of the results and failure cases of these methods. The dataset as well as baseline results will be made publicly available in due time. The UFDD dataset as well as baseline results are available at: www.ufdd.info/ |

Restricted Max-Min Fair Allocation. (arXiv:1804.10902v2 [cs.DS] UPDATED) Cache Translate Page Web Page Cache |

Authors: Siu-Wing Cheng, Yuchen Mao The restricted max-min fair allocation problem seeks an allocation of resources to players that maximizes the minimum total value obtained by any player. It is NP-hard to approximate the problem to a ratio less than 2. Comparing the current best algorithm for estimating the optimal value with the current best for constructing an allocation, there is quite a gap between the ratios that can be achieved in polynomial time: roughly 4 for estimation and roughly $6 + 2\sqrt{10}$ for construction. We propose an algorithm that constructs an allocation with value within a factor of $6 + \delta$ from the optimum for any constant $\delta > 0$. The running time is polynomial in the input size for any constant $\delta$ chosen. |

Group Secret-Key Generation using Algebraic Rings in Three-User Wireless Networks. (arXiv:1805.00743v2 [cs.IT] UPDATED) Cache Translate Page Web Page Cache |

Authors: Manish Rao, J. Harshan Physical-layer Group Secret-Key (GSK) generation is an effective way of synthesizing symmetric keys across multiple nodes in wireless networks. Unlike the case of two-user key generation, GSK generation necessitates some nodes to act as facilitators, which broadcast linear combinations of the channel realizations thereby assisting all the nodes to witness the intended common source of randomness. However, in practice, radio devices are designed to transmit symbols from finite complex constellations, and as a result, the channel realizations are typically quantized by the facilitator which in turn impacts the overall secret-key rate. Identifying this issue, we propose a class of GSK generation protocols, called Symmetrically Quantized GSK (SQGSK) protocols, in a network of three nodes. In the proposed protocols, due to quantization of symbols at the facilitator, the other two nodes also quantize their channel realizations, and use them appropriately to generate the keys. Under special conditions, we analytically show that the SQGSK protocols provide higher key-rate than the baselines wherein only the facilitator quantizes the channel realizations. We use extensive simulations to demonstrate the benefits of the proposed protocols when the facilitator employs finite constellations such as 4-, 16-, and 64-QAM. |

Blockchain to Improve Security and Knowledge in Inter-Agent Communication and Collaboration over Restrict Domains of the Internet Infrastructure. (arXiv:1805.05250v3 [cs.AI] UPDATED) Cache Translate Page Web Page Cache |

Authors: Juliao Braga, Joao Nuno Silva, Patricia Takako Endo, Jessica Ribas, Nizam Omar This paper describes the deployment and implementation of a blockchain to improve the security, knowledge and intelligence during the inter-agent communication and collaboration processes in restrict domains of the Internet Infrastructure. It is a work that proposes the application of a blockchain, platform independent, on a particular model of agents, but that can be used in similar proposals, once the results on the specific model were satisfactory. |

Betting on Blockchain Consensus with Fantomette. (arXiv:1805.06786v2 [cs.CR] UPDATED) Cache Translate Page Web Page Cache |

Authors: Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn Blockchain-based consensus protocols present the opportunity to develop new protocols, due to their novel requirements of open participation and explicit incentivization of participants. To address the first requirement, it is necessary to consider the leader election inherent in consensus protocols, which can be difficult to scale to a large and untrusted set of participants. To address the second, it is important to consider ways to provide incentivization without relying on the resource-intensive proofs-of-work used in Bitcoin. In this paper, we propose a secure leader election protocol, Caucus; we next fit this protocol into a broader blockchain-based consensus protocol, Fantomette, that provides game-theoretic guarantees in addition to traditional blockchain security properties. Fantomette is the first proof-of-stake protocol to give formal game-theoretic proofs of security in the presence of non-rational players. |

DeepPhys: Video-Based Physiological Measurement Using Convolutional Attention Networks. (arXiv:1805.07888v2 [cs.CV] UPDATED) Cache Translate Page Web Page Cache |

Authors: Weixuan Chen, Daniel McDuff Non-contact video-based physiological measurement has many applications in health care and human-computer interaction. Practical applications require measurements to be accurate even in the presence of large head rotations. We propose the first end-to-end system for video-based measurement of heart and breathing rate using a deep convolutional network. The system features a new motion representation based on a skin reflection model and a new attention mechanism using appearance information to guide motion estimation, both of which enable robust measurement under heterogeneous lighting and major motions. Our approach significantly outperforms all current state-of-the-art methods on both RGB and infrared video datasets. Furthermore, it allows spatial-temporal distributions of physiological signals to be visualized via the attention mechanism. |

Transformations of High-Level Synthesis Codes for High-Performance Computing. (arXiv:1805.08288v3 [cs.DC] UPDATED) Cache Translate Page Web Page Cache |

Authors: Johannes de Fine Licht, Simon Meierhans, Torsten Hoefler Specialized hardware architectures promise a major step in performance and energy efficiency over the traditional load/store devices currently employed in large scale computing systems. The adoption of high-level synthesis (HLS) from languages such as C/C++ and OpenCL has greatly increased programmer productivity when designing for such platforms. While this has enabled a wider audience to target specialized hardware, the optimization principles known from software design are no longer sufficient to implement high-performance codes, due to fundamental differences between software and hardware architectures. In this work, we propose a set of optimizing transformations for HLS, targeting scalable and efficient architectures for high-performance computing (HPC) applications. We show how these can be used to efficiently exploit pipelining, on-chip distributed fast memory, and on-chip streaming dataflow, allowing for massively parallel architectures with little off-chip data movement. To quantify the effect of our transformations, we use them to optimize a set of high-throughput FPGA kernels, demonstrating that they are sufficient to scale up parallelism within the hardware constraints of the target device. With the transformations covered, we hope to establish a common framework for performance engineers, compiler developers, and hardware developers, to tap into the performance potential offered by specialized hardware architectures using HLS. |

Progressive Evaluation of Queries over Tagged Data. (arXiv:1805.12033v3 [cs.DB] UPDATED) Cache Translate Page Web Page Cache |

Authors: Dhrubajyoti Ghosh, Roberto Yus, Yasser Altowim, Sharad Mehrotra Modern information systems often collect raw data in the form of text, images, video, and sensor readings. Such data needs to be further interpreted/enriched prior to being analyzed. Enrichment is often a result of automated machine learning and or signal processing techniques that associate appropriate but uncertain tags with the data. Traditionally, with the notable exception of a few systems, enrichment is considered to be a separate pre-processing step performed independently prior to data analysis. Such an approach is becoming increasingly infeasible since modern data capture technologies enable creation of very large data collections for which it is computationally difficult/impossible and ultimately not beneficial to derive all tags as a preprocessing step. Hence, approaches that perform tagging at query/analysis time on the data of interest need to be considered. This paper explores the problem of joint tagging and query processing. In particular, the paper considers a scenario where tagging can be performed using several techniques that differ in cost and accuracy and develops a progressive approach to answering Select-Project-Join (SPJ) queries (with a restricted version of the join predicates) that enriches the right data to the right degree so as to maximize the quality of the query results. The experimental results show that the proposed approach performs significantly better compared to baseline approaches. |

A Machine Learning Framework for Stock Selection. (arXiv:1806.01743v2 [q-fin.PM] UPDATED) Cache Translate Page Web Page Cache |

Authors: XingYu Fu, JinHong Du, YiFeng Guo, MingWen Liu, Tao Dong, XiuWen Duan This paper demonstrates how to apply machine learning algorithms to distinguish good stocks from the bad stocks. To this end, we construct 244 technical and fundamental features to characterize each stock, and label stocks according to their ranking with respect to the return-to-volatility ratio. Algorithms ranging from traditional statistical learning methods to recently popular deep learning method, e.g. Logistic Regression (LR), Random Forest (RF), Deep Neural Network (DNN), and the Stacking, are trained to solve the classification task. Genetic Algorithm (GA) is also used to implement feature selection. The effectiveness of the stock selection strategy is validated in Chinese stock market in both statistical and practical aspects, showing that: 1) Stacking outperforms other models reaching an AUC score of 0.972; 2) Genetic Algorithm picks a subset of 114 features and the prediction performances of all models remain almost unchanged after the selection procedure, which suggests some features are indeed redundant; 3) LR and DNN are radical models; RF is risk-neutral model; Stacking is somewhere between DNN and RF. 4) The portfolios constructed by our models outperform market average in back tests. |

A Multi-task Deep Learning Architecture for Maritime Surveillance using AIS Data Streams. (arXiv:1806.03972v3 [cs.LG] UPDATED) Cache Translate Page Web Page Cache |

Authors: Duong Nguyen, Rodolphe Vadaine, Guillaume Hajduch, René Garello, Ronan Fablet In a world of global trading, maritime safety, security and efficiency are crucial issues. We propose a multi-task deep learning framework for vessel monitoring using Automatic Identification System (AIS) data streams. We combine recurrent neural networks with latent variable modeling and an embedding of AIS messages to a new representation space to jointly address key issues to be dealt with when considering AIS data streams: massive amount of streaming data, noisy data and irregular timesampling. We demonstrate the relevance of the proposed deep learning framework on real AIS datasets for a three-task setting, namely trajectory reconstruction, anomaly detection and vessel type identification. |

The queue-number of posets of bounded width or height. (arXiv:1806.04489v2 [math.CO] UPDATED) Cache Translate Page Web Page Cache |

Authors: Kolja Knauer, Piotr Micek, Torsten Ueckerdt Heath and Pemmaraju conjectured that the queue-number of a poset is bounded by its width and if the poset is planar then also by its height. We show that there are planar posets whose queue-number is larger than their height, refuting the second conjecture. On the other hand, we show that any poset of width $2$ has queue-number at most $2$, thus confirming the first conjecture in the first non-trivial case. Moreover, we improve the previously best known bounds and show that planar posets of width $w$ have queue-number at most $3w-2$ while any planar poset with $0$ and $1$ has queue-number at most its width. |

RAPIDNN: In-Memory Deep Neural Network Acceleration Framework. (arXiv:1806.05794v2 [cs.NE] UPDATED) Cache Translate Page Web Page Cache |

Authors: Mohsen Imani, Mohammad Samragh, Yeseong Kim, Saransh Gupta, Farinaz Koushanfar, Tajana Rosing Deep neural networks (DNN) have demonstrated effectiveness for various applications such as image processing, video segmentation, and speech recognition. Running state-of-theart DNNs on current systems mostly relies on either generalpurpose processors, ASIC designs, or FPGA accelerators, all of which suffer from data movements due to the limited onchip memory and data transfer bandwidth. In this work, we propose a novel framework, called RAPIDNN, which processes all DNN operations within the memory to minimize the cost of data movement. To enable in-memory processing, RAPIDNN reinterprets a DNN model and maps it into a specialized accelerator, which is designed using non-volatile memory blocks that model four fundamental DNN operations, i.e., multiplication, addition, activation functions, and pooling. The framework extracts representative operands of a DNN model, e.g., weights and input values, using clustering methods to optimize the model for in-memory processing. Then, it maps the extracted operands and their precomputed results into the accelerator memory blocks. At runtime, the accelerator identifies computation results based on efficient in-memory search capability which also provides tunability of approximation to further improve computation efficiency. Our evaluation shows that RAPIDNN achieves 68.4x, 49.5x energy efficiency improvement and 48.1x, 10.9x speedup as compared to ISAAC and PipeLayer, the state-of-the-art DNN accelerators, while ensuring less than 0.3% of quality loss. |

Regulating Bots on Social Media Is Easier Said Than Done Cache Translate Page Web Page Cache |

A bot is an automated software program that does Both Congress and California are currently considering legislation that would require social media bots to disclose the fact that they’re automated. These bills are designed to respond to serious, well-founded concerns about the use of social media bots to spread misinformation and sow discord online, most infamously during the 2016 election season. It’s a well-intentioned idea, but the proposals face a common challenge in the regulation of new technology: defining the technology itself. While perhaps not the most exciting part of any legislation, the definitions section is critical—it tells us who will be subject to the requirements and prohibitions that follow. While both the federal and state bills have definitions sections, neither tells us precisely what they mean by “bot.” Sen. Dianne Feinstein’s bill attempts to get around (or at least delay) definitional pitfalls by avoiding the word California’s bill initially defined The prospect of a cybot creates real obstacles to effective enforcement of bot disclosure bills. Imagine a bill requiring the implementation of a familiar tool to identify bot accounts: a CAPTCHA (“I am not a robot”). At most this would slow the cybot down: A human could check that box for her several hundred cybot accounts with relative ease, then allow them to resume their automated activity. A definition of How, then, should bot disclosure laws treat these hybrid accounts? Should we require a certain degree of automation in order for the disclosure requirement to apply? What metrics can be used to determine whether something qualifies as a bot for purposes of a disclosure requirement? And regardless of what boundaries we set, whose job will it be to investigate and determine whether a particular account is, in fact, a bot? On the basis of certain account metrics—how often the account posts, what kinds of language it uses, how many other accounts it follows, etc.—platforms such as Instagram and Twitter have performed “bot purges,” deleting millions of bots in one fell swoop. If the government steps in, however, the rules would have to change: Some kind of appeals mechanism, through which an account wrongly labeled as a bot could petition to have its automated status removed, might be necessary in the name of fairness and due process. Ultimately, determining which accounts really are bots—however the term is defined—will likely be a more labor-intensive undertaking than legislators realize. In addition to their wide range of applications and varying degrees of automation, bots vary significantly in terms of purpose and subject matter. Some bots are primarily commercial in nature, promoting products and services. Others are primarily political, expressing views on candidates and issues. Finally, there are many artistic, funny, and even useful bots, ranging from poetry bots like @accidental575 and @pentametron to Darius Kazemi’s hilarious @TwoHeadlines to natural disaster alert systems like @earthquakeBot. Some of these creative bots may utilize the unique ambiguity of the bot format to explore the boundaries between human and technology. The question for legislators is whether proposed disclosure requirements should apply to all such bots or only those that “speak” about particular subjects. While several proponents call for a blanket disclosure requirement for all bots, the First Amendment—which prohibits unnecessary government interference with the right to free expression—generally disfavors broad speech regulation. Instead, laws must be narrowly tailored to address specific harms without sweeping in too much other speech. Noting this, California narrowed its disclosure bill to apply only to commercial bots and to bots intended to influence votes in elections. The federal bill, on the other hand, would require As legislators begin regulating social media bots, they should take note of the many ways in which bots vary. If they fail to account for the complexities of bots, they may pass laws at great risk of failure due to ambiguity and inefficacy. |

A.I. «διαβάζει» τα χείλη πολύ καλύτερα από ανθρώπους Cache Translate Page Web Page Cache |

Οι κωφοί, αλλά και οι απανταχού κατάσκοποι, θα βρουν χρήσιμο ένα νέο πρόγραμμα τεχνητής νοημοσύνης που «διαβάζει» τα χείλη των ανθρώπων εξ αποστάσεως με μεγαλύτερη ακρίβεια όχι μόνο από κάθε άλλο μέχρι σήμερα, αλλά και από τους ανθρώπους με τη σχετική εξειδίκευση. Το πρόγραμμα ανέπτυξαν ερευνητές της Google και της βρετανικής θυγατρικής της Deep Mind, η οποία πρωτοπορεί διεθνώς στην τεχνητή νοημοσύνη, με επικεφαλής ένα νεαρό ελληνικής καταγωγής ειδικό της πληροφορικής, τον Γιάννη Ασσαέλ. Για τα εκατομμύρια των ανθρώπων που δεν μπορούν να ακούσουν, η ανάγνωση των χειλιών των άλλων αποτελεί ένα «παράθυρο» για την επικοινωνία, πέρα από τη νοηματική γλώσσα.Όμως το «διάβασμα» των χειλιών δεν είναι εύκολο και συχνά είναι ανακριβές, όπως αναφέρει το Αθηναϊκό Πρακτορείο Ειδήσεων. Το νέο «έξυπνο» σύστημα εμφανίζει μέσο ποσοστό λαθών 41% στην ορθή κατανόηση των λέξεων που σχηματίζουν τα χείλη. Μπορεί να φαίνεται υψηλό αυτό το ποσοστό, αλλά η καλύτερη μέχρι σήμερα υπολογιστική μέθοδος είχε ποσοστό αποτυχίας 77%, συνεπώς το νέο πρόγραμμα έχει περιορίσει σχεδόν στο μισό τα λάθη. Οι ερευνητές, με επικεφαλής τον Ασσαέλ και τον Μπρένταν Σίλινγκφορντ, οι οποίοι έκαναν τη σχετική προδημοσίευση στο arXiv, σύμφωνα με το «Science», δημιούργησαν αλγόριθμους καλύτερους από κάθε άλλους στο παρελθόν, που τα καταφέρνουν αποτελεσματικότερα και από επαγγελματίες αναγνώστες χειλιών. Αν το νέο σύστημα τελειοποιηθεί και ενσωματωθεί σε ηλεκτρονικές συσκευές, όπως τα «έξυπνα» κινητά τηλέφωνα, μπορεί μελλοντικά να προσφέρει τη δυνατότητα ανάγνωσης των χειλιών στον καθένα (κάτι που μάλλον δεν θα αρέσει σε όλους…). Έως τώρα η δημιουργία αλγορίθμων που να μπορούν να διαβάσουν χείλη ήταν τρομερά δύσκολη. Οι ερευνητές τροφοδότησαν το σύστημά τους με 140.000 ώρες βίντεο από το You Tube που έδειχναν ανθρώπους να μιλάνε στα αγγλικά, μαζί με τα αντίστοιχα απομαγνητοφωνημένα κείμενα. Στη συνέχεια, άφησαν το σύστημα μηχανικής μάθησης μόνο του να μάθει να «παντρεύει» τις διαφορετικές κινήσεις των χειλιών με τα αντίστοιχα φωνήματα και τελικά με τις αντίστοιχες λέξεις. Το σύστημα βασίζεται στα τεχνητά νευρωνικά δίκτυα, δηλαδή σε μια ομάδα αλγόριθμων που ο καθένας εκτελεί ένα διαφορετικό και απλούστερο έργο, ενώ ταυτόχρονα όλοι μαζί συνδέονται και συνεργάζονται για να επεξεργασθούν τις πληροφορίες, περίπου όπως κάνουν οι νευρώνες του ανθρώπινου εγκεφάλου. |

Finding the Happy Medium of Black Holes Cache Translate Page Web Page Cache |

Credit: X-ray: NASA/CXC/ICE/M.Mezcua et al.; Infrared: NASA/JPL-Caltech; Illustration: NASA/CXC/A.Hobart This image shows data from a massive observing campaign that includes NASA's Chandra X-ray Observatory. These Chandra data have provided strong evidence for the existence of so-called intermediate-mass black holes (IMBHs). Combined with a separate study also using Chandra data, these results may allow astronomers to better understand how the very largest black holes in the early Universe formed, as described in our latest press release. The COSMOS ("cosmic evolution survey") Legacy Survey has assembled data from some of the world's most powerful telescopes spanning the electromagnetic spectrum. This image contains Chandra data from this survey, equivalent to about 4.6 million seconds of observing time. The colors in this image represent different levels of X-ray energy detected by Chandra. Here the lowest-energy X-rays are red, the medium band is green, and the highest-energy X-rays observed by Chandra are blue. Most of the colored dots in this image are black holes. Data from the Spitzer Space Telescope are shown in grey. The inset shows an artist's impression of a growing black hole in the center of a galaxy. A disk of material surrounding the black hole and a jet of outflowing material are also depicted. Two new separate studies using the Chandra COSMOS-Legacy survey data and other Chandra data have independently collected samples of IMBHs, an elusive category of black holes in between stellar mass black holes and the supermassive black holes found in the central regions of massive galaxies. One team of researchers identified 40 growing black holes in dwarf galaxies. Twelve of them are located at distances more than five billion light years from Earth and the most distant is 10.9 billion light years away, the most distant growing black hole in a dwarf galaxy ever seen. Most of these sources are likely IMBHs with masses that are about 10,000 to 100,000 times that of the Sun. A second team found a separate, important sample of possible IMBHs in galaxies that are closer to Earth. In this sample, the most distant IMBH candidate is about 2.8 billion light years from Earth and about 90% of the IMBH candidates they discovered are no more than 1.3 billion light years away. They detected 305 galaxies in their survey with black hole masses less than 300,000 solar masses. Observations with Chandra and with ESA's XMM-Newton of a small part of this sample show that about half of the 305 IMBH candidates are likely to be valid IMBHs. The masses for the ten sources detected with X-ray observations were determined to be between 40,000 and 300,000 times the mass of the Sun. IMBHs may be able to explain how the very biggest black holes, the supermassive ones, were able to form so quickly after the Big Bang. One leading explanation is that supermassive black holes grow over time from smaller black holes "seeds" containing about a hundred times the Sun's mass. Some of these seeds should merge to form IMBHs. Another explanation is that they form very quickly from the collapse of a giant cloud of gas with a mass equal to hundreds of thousands of times that of the Sun. There is yet to be a consensus among astronomers on the role IMBHs may play. A paper describing the COSMOS-Legacy result by Mar Mezcua (Institute for Space Sciences, Spain) and colleagues was published in the August issue of the Monthly Notices of the Royal Astronomical Society and is available online. The paper by Igor Chilingarian (Harvard-Smithsonian Center for Astrophysics) on the closer IMBH sample is being published in the August 10th issue of The Astrophysical Journal and is available online. NASA's Marshall Space Flight Center in Huntsville, Alabama, manages the Chandra program for NASA's Science Mission Directorate in Washington. The Smithsonian Astrophysical Observatory in Cambridge, Massachusetts, controls Chandra's science and flight operations. |

Next Page: 10000

Site Map 2018_01_14

Site Map 2018_01_15

Site Map 2018_01_16

Site Map 2018_01_17

Site Map 2018_01_18

Site Map 2018_01_19

Site Map 2018_01_20

Site Map 2018_01_21

Site Map 2018_01_22

Site Map 2018_01_23

Site Map 2018_01_24

Site Map 2018_01_25

Site Map 2018_01_26

Site Map 2018_01_27

Site Map 2018_01_28

Site Map 2018_01_29

Site Map 2018_01_30

Site Map 2018_01_31

Site Map 2018_02_01

Site Map 2018_02_02

Site Map 2018_02_03

Site Map 2018_02_04

Site Map 2018_02_05

Site Map 2018_02_06

Site Map 2018_02_07

Site Map 2018_02_08

Site Map 2018_02_09

Site Map 2018_02_10

Site Map 2018_02_11

Site Map 2018_02_12

Site Map 2018_02_13

Site Map 2018_02_14

Site Map 2018_02_15

Site Map 2018_02_15

Site Map 2018_02_16

Site Map 2018_02_17

Site Map 2018_02_18

Site Map 2018_02_19

Site Map 2018_02_20

Site Map 2018_02_21

Site Map 2018_02_22

Site Map 2018_02_23

Site Map 2018_02_24

Site Map 2018_02_25

Site Map 2018_02_26

Site Map 2018_02_27

Site Map 2018_02_28

Site Map 2018_03_01

Site Map 2018_03_02

Site Map 2018_03_03

Site Map 2018_03_04

Site Map 2018_03_05

Site Map 2018_03_06

Site Map 2018_03_07

Site Map 2018_03_08

Site Map 2018_03_09

Site Map 2018_03_10

Site Map 2018_03_11

Site Map 2018_03_12

Site Map 2018_03_13

Site Map 2018_03_14

Site Map 2018_03_15

Site Map 2018_03_16

Site Map 2018_03_17

Site Map 2018_03_18

Site Map 2018_03_19

Site Map 2018_03_20

Site Map 2018_03_21

Site Map 2018_03_22

Site Map 2018_03_23

Site Map 2018_03_24

Site Map 2018_03_25

Site Map 2018_03_26

Site Map 2018_03_27

Site Map 2018_03_28

Site Map 2018_03_29

Site Map 2018_03_30

Site Map 2018_03_31

Site Map 2018_04_01

Site Map 2018_04_02

Site Map 2018_04_03

Site Map 2018_04_04

Site Map 2018_04_05

Site Map 2018_04_06

Site Map 2018_04_07

Site Map 2018_04_08

Site Map 2018_04_09

Site Map 2018_04_10

Site Map 2018_04_11

Site Map 2018_04_12

Site Map 2018_04_13

Site Map 2018_04_14

Site Map 2018_04_15

Site Map 2018_04_16

Site Map 2018_04_17

Site Map 2018_04_18

Site Map 2018_04_19

Site Map 2018_04_20

Site Map 2018_04_21

Site Map 2018_04_22

Site Map 2018_04_23

Site Map 2018_04_24

Site Map 2018_04_25

Site Map 2018_04_26

Site Map 2018_04_27

Site Map 2018_04_28

Site Map 2018_04_29

Site Map 2018_04_30

Site Map 2018_05_01

Site Map 2018_05_02

Site Map 2018_05_03

Site Map 2018_05_04

Site Map 2018_05_05

Site Map 2018_05_06

Site Map 2018_05_07

Site Map 2018_05_08

Site Map 2018_05_09

Site Map 2018_05_15

Site Map 2018_05_16

Site Map 2018_05_17

Site Map 2018_05_18

Site Map 2018_05_19

Site Map 2018_05_20

Site Map 2018_05_21

Site Map 2018_05_22

Site Map 2018_05_23

Site Map 2018_05_24

Site Map 2018_05_25

Site Map 2018_05_26

Site Map 2018_05_27

Site Map 2018_05_28

Site Map 2018_05_29

Site Map 2018_05_30

Site Map 2018_05_31

Site Map 2018_06_01

Site Map 2018_06_02

Site Map 2018_06_03

Site Map 2018_06_04

Site Map 2018_06_05

Site Map 2018_06_06

Site Map 2018_06_07

Site Map 2018_06_08

Site Map 2018_06_09

Site Map 2018_06_10

Site Map 2018_06_11

Site Map 2018_06_12

Site Map 2018_06_13

Site Map 2018_06_14

Site Map 2018_06_15

Site Map 2018_06_16

Site Map 2018_06_17

Site Map 2018_06_18

Site Map 2018_06_19

Site Map 2018_06_20

Site Map 2018_06_21

Site Map 2018_06_22

Site Map 2018_06_23

Site Map 2018_06_24

Site Map 2018_06_25

Site Map 2018_06_26

Site Map 2018_06_27

Site Map 2018_06_28

Site Map 2018_06_29

Site Map 2018_06_30

Site Map 2018_07_01

Site Map 2018_07_02

Site Map 2018_07_03

Site Map 2018_07_04

Site Map 2018_07_05

Site Map 2018_07_06

Site Map 2018_07_07

Site Map 2018_07_08

Site Map 2018_07_09

Site Map 2018_07_10

Site Map 2018_07_11

Site Map 2018_07_12

Site Map 2018_07_13

Site Map 2018_07_14

Site Map 2018_07_15

Site Map 2018_07_16

Site Map 2018_07_17

Site Map 2018_07_18

Site Map 2018_07_19

Site Map 2018_07_20

Site Map 2018_07_21

Site Map 2018_07_22

Site Map 2018_07_23

Site Map 2018_07_24

Site Map 2018_07_25

Site Map 2018_07_26

Site Map 2018_07_27

Site Map 2018_07_28

Site Map 2018_07_29

Site Map 2018_07_30

Site Map 2018_07_31

Site Map 2018_08_01

Site Map 2018_08_02

Site Map 2018_08_03

Site Map 2018_08_04

Site Map 2018_08_05

Site Map 2018_08_06

Site Map 2018_08_07

Site Map 2018_08_08

Site Map 2018_08_09