Next Page: 10000

          Computing’s Hippocratic oath is here      Cache   Translate Page   Web Page Cache   

Computing professionals are on the front lines of almost every aspect of the modern world. They’re involved in the response when hackers steal the personal information of hundreds of thousands of people from a large corporation. Their work can protect–or jeopardize–critical infrastructures, such as electrical grids and transportation lines. And the algorithms they write may determine who gets a job, who is approved for a bank loan, or who gets released on bail.

Technological professionals are the first, and last, lines of defense against the misuse of technology. Nobody else understands the systems as well, and nobody else is in a position to protect specific data elements or ensure that the connections between one component and another are appropriate, safe, and reliable. As the role of computing continues its decades-long expansion in society, computer scientists are central to what happens next.

That’s why the world’s largest organization of computer scientists and engineers, the Association for Computing Machinery, of which I am president, has issued a new code of ethics for computing professionals. And it’s why ACM is taking other steps to help technologists engage with ethical questions.

[Photo: Hero Images/Getty Images]

Serving the public interest

A code of ethics is more than just a document on paper. There are hundreds of examples of the core values and standards to which every member of a field is held–including for organist guilds and outdoor-advertising associations. The world’s oldest code of ethics is also its most famous: The Hippocratic oath that medical doctors take, promising to care responsibly for their patients.

I suspect that one reason for the Hippocratic oath’s fame is how personal medical treatment can be, with people’s lives hanging in the balance. It’s important for patients to feel confident their medical caregivers have their interests firmly in mind.

Technology is, in many ways, similarly personal. In modern society, computers, software, and digital data are everywhere. They’re visible in laptops and smartphones, social media and video conferencing, but they’re also hidden inside the devices that help manage people’s daily lives, from thermostats to timers on coffeemakers. New developments in autonomous vehicles, sensor networks, and machine learning mean computing will play an even more central role in everyday life in coming years.

[Photo: Hero Images/Getty Images]

A changing profession

As the creators of these technologies, computing professionals have helped usher in the new and richly vibrant rhythms of modern life. But as computers become increasingly interwoven into the fabric of life, we in the profession must personally recommit to serving society through ethical conduct.

ACM’s last code of ethics was adopted in 1992, when many people saw computing work as purely technical. The internet was in its infancy and people were just beginning to understand the value of being able to aggregate and distribute information widely. It would still be years before artificial intelligence and machine learning had applications outside research labs.

Today, technologists’ work can affect the lives and livelihoods of people in ways that may be unintended, even unpredictable. I’m not an ethicist by training, but it’s clear to me that anyone in today’s computing field can benefit from guidance on ethical thinking and behavior.

[Photo: Hero Images/Getty Images]

Updates to the code

ACM’s new ethics code has several important differences from the 1992 version. One has to do with unintended consequences. In the 1970s and 1980s, technologists built software or systems whose effects were limited to specific locations or circumstances. But over the past two decades, it has become clear that as technologies evolve, they can be applied in contexts very different from the original intent.

For example, computer vision research has led to ways of creating 3D models of objects–and people–based on 2D images, but it was never intended to be used in conjunction with machine learning in surveillance or drone applications. The old ethics code asked software developers to be sure a program would actually do what they said it would. The new version also exhorts developers to explicitly evaluate their work to identify potentially harmful side effects or potential for misuse.

Another example has to do with human interaction. In 1992, most software was being developed by trained programmers to run operating systems, databases, and other basic computing functions. Today, many applications rely on user interfaces to interact directly with a potentially vast number of people. The updated code of ethics includes more detailed considerations about the needs and sensitivities of very diverse potential users–including discussing discrimination, exclusion, and harassment.

More and more software is being developed to run with little or no input or human understanding, producing analytical results to guide decision making, such as when to approve bank loans. The outputs can have completely unintended social effects, skewed against whole classes of people–as in recent cases where data-mining predictions of who would default on a loan showed biases against people who seek longer-term loans or live in particular areas. There are also the dangers of what are called “false positives,” when a computer links two things that shouldn’t be connected–as when facial-recognition software recently matched members of Congress to criminals’ mug shots. The revised code exhorts technologists to take special care to avoid creating systems with the potential to oppress or disenfranchise whole groups of people.

[Photo: Hero Images/Getty Images]

Living ethics in technology

The code was revised over the course of more than two years, including ACM members and people outside the organization and even outside the computing and technological professions. All of these perspectives made the code better. For example, a government-employed weapons designer asked whether that job inherently required violating the code; the wording was changed to clarify that systems must be “consistent with the public good.”

Now that the code is out, there’s more to do. ACM has created a repository for case studies, showing how ethical thinking and the guidelines can be applied in a variety of real-world situations. The group’s “Ask An Ethicist” blog and video series invites the public to submit scenarios or quandaries as they arise in practice. Word is also underway to develop teaching modules so that concepts can be integrated into computing education from primary school through university.

Feedback has been overwhelmingly positive. My personal favorite was the comment from a young programmer after reading the code: “Now I know what to tell my boss if he asks me to do something like that again.”

The ACM Code of Ethics and Professional Conduct begins with the statement “Computing professionals’ actions change the world.” We don’t know if our code will last as long as the Hippocratic oath. But it highlights how important it is that the global computing community understands the impact our work has–and takes seriously our obligation to the public good.

Cherri M. Pancake is Professor Emeritus of Electrical Engineering & Computer Science at Oregon State University. This post originally appeared on The Conversation.

          Comment on Profileer- en publicatiedwang by Johan      Cache   Translate Page   Web Page Cache   
Tja, dat was te verwachten. Toen ik afstudeerde begon men geldstromen te sturen op "maatschappelijke relevantie" van het onderzoek, dus moest er in elk onderzoeks voorstel naar iets interessants nog gauw even bijverzonnen worden waarom dat maatschappelijk relevant was. Het kon verder haast niemand wat schelen maar het was nu eenmaal nodig om verder te kunnen werken. Dat zie je hier ook. Veel mensen hebben blijkbaar iets tegen elektronische publicaties zoals op , veelal met als argument dat daar weinig tot geen peer review is, en dus worden er maar papieren tijdschriften uit de grond gestampt waar je veel goedkoper in kunt publiceren dan in de gerenomeerde en waar de review een aanfluiting is. En die waarschijnlijk ook niet zo zeuren over het auteursrecht op de artikelen als sommige bekendere uitgevers (die doen vaak al moeilijk als een auteur z'n eigen artikel als pdf verspreid of uitdeelt op conferenties).
          On Rich Clubs of Path-Based Centralities in Networks. (arXiv:1808.02903v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Soumya Sarkar, Animesh Mukherjee, Sanjukta Bhowmick

Many scale-free networks exhibit a rich club structure, where high degree vertices form tightly interconnected subgraphs. In this paper, we explore the emergence of rich clubs in the context of shortest path based centrality metrics. We term these subgraphs of connected high closeness or high betweeness vertices as rich centrality clubs (RCC).

Our experiments on real world and synthetic networks highlight the inter-relations between RCCs, expander graphs, and the core-periphery structure of the network. We show empirically and theoretically that RCCs exist, if the core-periphery structure of the network is such that each shell is an expander graph, and their density decreases from inner to outer shells.

The main contributions of our paper are: (i) we demonstrate that the formation of RCC is related to the core-periphery structure and particularly the expander like properties of each shell, (ii) we show that the RCC property can be used to find effective seed nodes for spreading information and for improving the resilience of the network under perturbation and, finally, (iii) we present a modification algorithm that can insert RCC within networks, while not affecting their other structural properties. Taken together, these contributions present one of the first comprehensive studies of the properties and applications of rich clubs for path based centralities.

          A Case Study on the Impact of Similarity Measure on Information Retrieval based Software Engineering Tasks. (arXiv:1808.02911v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Md Masudur Rahman, Saikat Chakraborty, Gail Kaiser, Baishakhi Ray

Information Retrieval (IR) plays a pivotal role in diverse Software Engineering (SE) tasks, e.g., bug localization and triaging, code retrieval, requirements analysis, etc. The choice of similarity measure is the core component of an IR technique. The performance of any IR method critically depends on selecting an appropriate similarity measure for the given application domain. Since different SE tasks operate on different document types like bug reports, software descriptions, source code, etc. that often contain non-standard domain-specific vocabulary, it is essential to understand which similarity measures work best for different SE documents.

This paper presents two case studies on the effect of different similarity measure on various SE documents w.r.t. two tasks: (i) project recommendation: finding similar GitHub projects and (ii) bug localization: retrieving buggy source file(s) correspond to a bug report. These tasks contain a diverse combination of textual (i.e. description, readme) and code (i.e. source code, API, import package) artifacts. We observe that the performance of IR models varies when applied to different artifact types. We find that, in general, the context-aware models achieve better performance on textual artifacts. In contrast, simple keyword-based bag-of-words models perform better on code artifacts. On the other hand, the probabilistic ranking model BM25 performs better on a mixture of text and code artifacts.

We further investigate how such an informed choice of similarity measure impacts the performance of SE tools. In particular, we analyze two previously proposed tools for project recommendation and bug localization tasks, which leverage diverse software artifacts, and observe that an informed choice of similarity measure indeed leads to improved performance of the existing SE tools.

          Random Walk Laplacian and Network Centrality Measures. (arXiv:1808.02912v1 [cs.NA])      Cache   Translate Page   Web Page Cache   

Authors: Daniel Boley, Alejandro Buendia, Golshan Golnari

Random walks over directed graphs are used to model activities in many domains, such as social networks, influence propagation, and Bayesian graphical models. They are often used to compute the importance or centrality of individual nodes according to a variety of different criteria. Here we show how the pseudoinverse of the "random walk" Laplacian can be used to quickly compute measures such as the average number of visits to a given node and various centrality and betweenness measures for individual nodes, both for the network in general and in the case a subset of nodes is to be avoided. We show that with a single matrix inversion it is possible to rapidly compute many such quantities.

          OCT segmentation: Integrating open parametric contour model of the retinal layers and shape constraint to the Mumford-Shah functional. (arXiv:1808.02917v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Jinming Duan, Weicheng Xie, Ryan Wen Liu, Christopher Tench, Irene Gottlob, Frank Proudlock, Li Bai

In this paper, we propose a novel retinal layer boundary model for segmentation of optical coherence tomography (OCT) images. The retinal layer boundary model consists of 9 open parametric contours representing the 9 retinal layers in OCT images. An intensity-based Mumford-Shah (MS) variational functional is first defined to evolve the retinal layer boundary model to segment the 9 layers simultaneously. By making use of the normals of open parametric contours, we construct equal sized adjacent narrowbands that are divided by each contour. Regional information in each narrowband can thus be integrated into the MS energy functional such that its optimisation is robust against different initialisations. A statistical prior is also imposed on the shape of the segmented parametric contours for the functional. As such, by minimising the MS energy functional the parametric contours can be driven towards the true boundaries of retinal layers, while the similarity of the contours with respect to training OCT shapes is preserved. Experimental results on real OCT images demonstrate that the method is accurate and robust to low quality OCT images with low contrast and high-level speckle noise, and it outperforms the recent geodesic distance based method for segmenting 9 layers of the retina in OCT images.

          Characterizing Co-located Datacenter Workloads: An Alibaba Case Study. (arXiv:1808.02919v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Yue Cheng, Zheng Chai, Ali Anwar

Warehouse-scale cloud datacenters co-locate workloads with different and often complementary characteristics for improved resource utilization. To better understand the challenges in managing such intricate, heterogeneous workloads while providing quality-assured resource orchestration and user experience, we analyze Alibaba's co-located workload trace, the first publicly available dataset with precise information about the category of each job. Two types of workload---long-running, user-facing, containerized production jobs, and transient, highly dynamic, non-containerized, and non-production batch jobs---are running on a shared cluster of 1313 machines. Our multifaceted analysis reveals insights that we believe are useful for system designers and IT practitioners working on cluster management systems.

          Mobility helps problem-solving systems to avoid Groupthink. (arXiv:1808.02931v1 [physics.soc-ph])      Cache   Translate Page   Web Page Cache   

Authors: Paulo F. Gomes, Sandro M. Reia, Francisco A. Rodrigues, José F. Fontanari

Groupthink occurs when everyone in a group starts thinking alike, as when people put unlimited faith in a leader. Avoiding this phenomenon is a ubiquitous challenge to problem-solving enterprises and typical countermeasures involve the mobility of group members. Here we use an agent-based model of imitative learning to study the influence of the mobility of the agents on the time they require to find the global maxima of NK-fitness landscapes. The agents cooperate by exchanging information on their fitness and use this information to copy the fittest agent in their influence neighborhoods, which are determined by face-to-face interaction networks. The influence neighborhoods are variable since the agents perform random walks in a two-dimensional space. We find that mobility is slightly harmful for solving easy problems, i.e. problems that do not exhibit suboptimal solutions or local maxima. For difficult problems, however, mobility can prevent the imitative search being trapped in suboptimal solutions and guarantees a better performance than the independent search for any system size.

          Nonparametric Gaussian mixture models for the multi-armed contextual bandit. (arXiv:1808.02932v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Iñigo Urteaga, Chris H. Wiggins

The multi-armed bandit is a sequential allocation task where an agent must learn a policy that maximizes long term payoff, where only the reward of the played arm is observed at each iteration. In the stochastic setting, the reward for each action is generated from an unknown distribution, which depends on a given 'context', available at each interaction with the world. Thompson sampling is a generative, interpretable multi-armed bandit algorithm that has been shown both to perform well in practice, and to enjoy optimality properties for certain reward functions. Nevertheless, Thompson sampling requires sampling from parameter posteriors and calculation of expected rewards, which are possible for a very limited choice of distributions. We here extend Thompson sampling to more complex scenarios by adopting a very flexible set of reward distributions: nonparametric Gaussian mixture models. The generative process of Bayesian nonparametric mixtures naturally aligns with the Bayesian modeling of multi-armed bandits. This allows for the implementation of an efficient and flexible Thompson sampling algorithm: the nonparametric model autonomously determines its complexity in an online fashion, as it observes new rewards for the played arms. We show how the proposed method sequentially learns the nonparametric mixture model that best approximates the true underlying reward distribution. Our contribution is valuable for practical scenarios, as it avoids stringent model specifications, and yet attains reduced regret.

          (Sequential) Importance Sampling Bandits. (arXiv:1808.02933v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Iñigo Urteaga, Chris H. Wiggins

The multi-armed bandit (MAB) problem is a sequential allocation task where the goal is to learn a policy that maximizes long term payoff, where only the reward of the executed action is observed; i.e., sequential optimal decisions are made, while simultaneously learning how the world operates. In the stochastic setting, the reward for each action is generated from an unknown distribution. To decide the next optimal action to take, one must compute sufficient statistics of this unknown reward distribution, e.g. upper-confidence bounds (UCB), or expectations in Thompson sampling. Closed-form expressions for these statistics of interest are analytically intractable except for simple cases. We here propose to leverage Monte Carlo estimation and, in particular, the flexibility of (sequential) importance sampling (IS) to allow for accurate estimation of the statistics of interest within the MAB problem. IS methods estimate posterior densities or expectations in probabilistic models that are analytically intractable. We first show how IS can be combined with state-of-the-art MAB algorithms (Thompson sampling and Bayes-UCB) for classic (Bernoulli and contextual linear-Gaussian) bandit problems. Furthermore, we leverage the power of sequential IS to extend the applicability of these algorithms beyond the classic settings, and tackle additional useful cases. Specifically, we study the dynamic linear-Gaussian bandit, and both the static and dynamic logistic cases too. The flexibility of (sequential) importance sampling is shown to be fundamental for obtaining efficient estimates of the key sufficient statistics in these challenging scenarios.

          Towards Learning Fine-Grained Disentangled Representations from Speech. (arXiv:1808.02939v1 [cs.SD])      Cache   Translate Page   Web Page Cache   

Authors: Yuan Gong, Christian Poellabauer

Learning disentangled representations of high-dimensional data is currently an active research area. However, compared to the field of computer vision, less work has been done for speech processing. In this paper, we provide a review of two representative efforts on this topic and propose the novel concept of fine-grained disentangled speech representation learning.

          On the Convergence of A Class of Adam-Type Algorithms for Non-Convex Optimization. (arXiv:1808.02941v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Xiangyi Chen, Sijia Liu, Ruoyu Sun, Mingyi Hong

This paper studies a class of adaptive gradient based momentum algorithms that update the search directions and learning rates simultaneously using past gradients. This class, which we refer to as the "Adam-type", includes the popular algorithms such as the Adam, AMSGrad and AdaGrad. Despite their popularity in training deep neural networks, the convergence of these algorithms for solving nonconvex problems remains an open question. This paper provides a set of mild sufficient conditions that guarantee the convergence for the Adam-type methods. We prove that under our derived conditions, these methods can achieve the convergence rate of order $O(\log{T}/\sqrt{T})$ for nonconvex stochastic optimization. We show the conditions are essential in the sense that violating them may make the algorithm diverge. Moreover, we propose and analyze a class of (deterministic) incremental adaptive gradient algorithms, which has the same $O(\log{T}/\sqrt{T})$ convergence rate. Our study could also be extended to a broader class of adaptive gradient methods in machine learning and optimization.

          Coaxioms: flexible coinductive definitions by inference systems. (arXiv:1808.02943v1 [cs.LO])      Cache   Translate Page   Web Page Cache   

Authors: Francesco Dagnino

We introduce a generalized notion of inference system to support more flexible interpretations of recursive definitions. Besides axioms and inference rules with the usual meaning, we allow also coaxioms, which are, intuitively, axioms which can only be applied "at infinite depth" in a proof tree. Coaxioms allows us to interpret recursive definitions as fixed points which are not necessarily the least, nor the greatest one, and classical results, which smoothly extend to this generalized framework, ensure the existence of such fixed points. This notion nicely subsumes standard inference systems and their inductive and coinductive interpretation, thus allowing formal reasoning in cases where the inductive and coinductive interpretation do not provide the intended meaning, or are mixed together.

          Exploiting ergodicity of the logistic map using deep-zoom to improve security of chaos-based cryptosystems. (arXiv:1808.02949v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Jeaneth Machicao, Marcela Alves, Murilo S. Baptista, Odemir M. Bruno

This paper explores the deep-zoom properties of the chaotic k-logistic map, in order to propose an improved chaos-based cryptosystem. This map was shown to enhance the random features of the Logistic map, while at the same time reducing the predictability about its orbits. We incorporate its strengths to security into a previously published cryptosystem to provide an optimal pseudo-random number generator (PRNG) as its core operation. The result is a reliable method that does not have the weaknesses previously reported about the original cryptosystem.

          Low-complexity 8-point DCT Approximation Based on Angle Similarity for Image and Video Coding. (arXiv:1808.02950v1 [eess.IV])      Cache   Translate Page   Web Page Cache   

Authors: R. S. Oliveira, R. J. Cintra, F. M. Bayer, T. L. T. da Silveira, A. Madanayake, A. Leite

The principal component analysis (PCA) is widely used for data decorrelation and dimensionality reduction. However, the use of PCA may be impractical in real-time applications, or in situations were energy and computing constraints are severe. In this context, the discrete cosine transform (DCT) becomes a low-cost alternative to data decorrelation. This paper presents a method to derive computationally efficient approximations to the DCT. The proposed method aims at the minimization of the angle between the rows of the exact DCT matrix and the rows of the approximated transformation matrix. The resulting transformations matrices are orthogonal and have extremely low arithmetic complexity. Considering popular performance measures, one of the proposed transformation matrices outperforms the best competitors in both matrix error and coding capabilities. Practical applications in image and video coding demonstrate the relevance of the proposed transformation. In fact, we show that the proposed approximate DCT can outperform the exact DCT for image encoding under certain compression ratios. The proposed transform and its direct competitors are also physically realized as digital prototype circuits using FPGA technology.

          Feature Dimensionality Reduction for Video Affect Classification: A Comparative Study. (arXiv:1808.02956v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Chenfeng Guo, Dongrui Wu

Affective computing has become a very important research area in human-machine interaction. However, affects are subjective, subtle, and uncertain. So, it is very difficult to obtain a large number of labeled training samples, compared with the number of possible features we could extract. Thus, dimensionality reduction is critical in affective computing. This paper presents our preliminary study on dimensionality reduction for affect classification. Five popular dimensionality reduction approaches are introduced and compared. Experiments on the DEAP dataset showed that no approach can universally outperform others, and performing classification using the raw features directly may not always be a bad choice.

          Dynamic Laplace: Efficient Centrality Measure for Weighted or Unweighted Evolving Networks. (arXiv:1808.02960v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Mário Cordeiro (1 and 2), Rui Portocarrero Sarmento (1 and 2), Pavel Brazdil (2), João Gama (2) ((1) Doctoral Program in Informatics Engineering - Faculty of Engineering at University of Porto, (2) INESC TEC - Institute for Systems and Computer Engineering Technology and Science)

With its origin in sociology, Social Network Analysis (SNA), quickly emerged and spread to other areas of research, including anthropology, biology, information science, organizational studies, political science, and computer science. Being it's objective the investigation of social structures through the use of networks and graph theory, Social Network Analysis is, nowadays, an important research area in several domains. Social Network Analysis cope with different problems namely network metrics, models, visualization and information spreading, each one with several approaches, methods and algorithms. One of the critical areas of Social Network Analysis involves the calculation of different centrality measures (i.e.: the most important vertices within a graph). Today, the challenge is how to do this fast and efficiently, as many increasingly larger datasets are available. Recently, the need to apply such centrality algorithms to non static networks (i.e.: networks that evolve over time) is also a new challenge. Incremental and dynamic versions of centrality measures are starting to emerge (betweenness, closeness, etc). Our contribution is the proposal of two incremental versions of the Laplacian Centrality measure, that can be applied not only to large graphs but also to, weighted or unweighted, dynamically changing networks. The experimental evaluation was performed with several tests in different types of evolving networks, incremental or fully dynamic. Results have shown that our incremental versions of the algorithm can calculate node centralities in large networks, faster and efficiently than the corresponding batch version in both incremental and full dynamic network setups.

          Exploiting Effective Representations for Chinese Sentiment Analysis Using a Multi-Channel Convolutional Neural Network. (arXiv:1808.02961v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Pengfei Liu, Ji Zhang, Cane Wing-Ki Leung, Chao He, Thomas L. Griffiths

Effective representation of a text is critical for various natural language processing tasks. For the particular task of Chinese sentiment analysis, it is important to understand and choose an effective representation of a text from different forms of Chinese representations such as word, character and pinyin. This paper presents a systematic study of the effect of these representations for Chinese sentiment analysis by proposing a multi-channel convolutional neural network (MCCNN), where each channel corresponds to a representation. Experimental results show that: (1) Word wins on the dataset of low OOV rate while character wins otherwise; (2) Using these representations in combination generally improves the performance; (3) The representations based on MCCNN outperform conventional ngram features using SVM; (4) The proposed MCCNN model achieves the competitive performance against the state-of-the-art model fastText for Chinese sentiment analysis.

          Secret Sharing with Binary Shares. (arXiv:1808.02974v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh Safavi-Naini, Huaxiong Wang

Secret sharing is a fundamental cryptographic primitive. One of the main goals of secret sharing is to share a long secret using small shares. In this paper we consider a family of statistical secret sharing schemes indexed by $N$, the number of players. The family is associated with a pair of relative thresholds \tau and \kappa, that for a given N, specify a secret sharing scheme with privacy and reconstruction thresholds, N\tau and N\kappa, respectively. These are non-perfect schemes with gap N(\kappa-\tau) and statistical schemes with errors \epsilon(N) and \delta(N) for privacy and reconstruction, respectively. We give two constructions of secret sharing families as defined above, with security against (i) an adaptive, and (ii) a non-adaptive adversary, respectively. Both constructions are modular and use two components, an invertible extractor and a stochastic code, and surprisingly in both cases, for any \kappa>\tau, give explicit families for sharing a secret that is a constant fraction (in bits) of N, using binary shares. We show that the construction for non-adaptive adversary is optimal in the sense that it asymptotically achieves the upper bound N(\kappa-\tau) on the secret length. We relate our results to known works and discuss open questions.

          Auto-Scaling Network Resources using Machine Learning to Improve QoS and Reduce Cost. (arXiv:1808.02975v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Sabidur Rahman, Tanjila Ahmed, Minh Huynh, Massimo Tornatore, Biswanath Mukherjee

Virtualization of network functions (as virtual routers, virtual firewalls, etc.) enables network owners to efficiently respond to the increasing dynamicity of network services. Virtual Network Functions (VNFs) are easy to deploy, update, monitor, and manage. The number of VNF instances, similar to generic computing resources in cloud, can be easily scaled based on load. Hence, auto-scaling (of resources without human intervention) has been receiving attention. Prior studies on auto-scaling use measured network traffic load to dynamically react to traffic changes. In this study, we propose a proactive Machine Learning (ML) based approach to perform auto-scaling of VNFs in response to dynamic traffic changes. Our proposed ML classifier learns from past VNF scaling decisions and seasonal/spatial behavior of network traffic load to generate scaling decisions ahead of time. Compared to existing approaches for ML-based auto-scaling, our study explores how the properties (e.g., start-up time) of underlying virtualization technology impacts Quality of Service (QoS) and cost savings. We consider four different virtualization technologies: Xen and KVM, based on hypervisor virtualization, and Docker and LXC, based on container virtualization. Our results show promising accuracy of the ML classifier using real data collected from a private ISP. We report in-depth analysis of the learning process (learning-curve analysis), feature ranking (feature selection, Principal Component Analysis (PCA), etc.), impact of different sets of features, training time, and testing time. Our results show how the proposed methods improve QoS and reduce operational cost for network owners. We also demonstrate a practical use-case example (Software-Defined Wide Area Network (SD-WAN) with VNFs and backbone network) to show that our ML methods save significant cost for network service leasers.

          Sampling-Based Tour Generation of Arbitrarily Oriented Dubins Sensor Platforms. (arXiv:1808.02985v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Doo-Hyun Cho, Dae-Sung Jang, Han-Lim Choi

This paper describes a formulation and develops a novel procedure for a fleet of unmanned aerial vehicles (UAVs) from the perspective of remotely executable tasks. In a complex mission environment, the characteristics of vehicles can be different in terms of sensing capability, range, direction, or the motion constraints. The purpose of this paper is to find a set of paths that minimizes the sum of costs while every task region is visited exactly once under certain reasonable assumptions. The heterogeneous multi-UAV path planning problem is formulated as a generalized, heterogeneous, multiple depot traveling salesmen problem (GHMDATSP), which is a variant of the traveling salesman problem. The proposed transformation procedure changes an instance of the GHMDATSP into a format of an Asymmetric, Traveling Salesman Problem (ATSP) to obtain tours for which the total cost of a fleet of vehicles is minimized. The instance of the ATSP is solved using the Lin-Kernighan-Helsgaun heuristic, and the result is inversely transformed to the GHMDATSP-formatted instance to obtain a set of tours. An additional local optimization based path refinement process helps obtain a high-quality solution. Numerical experiments investigate and confirm for the validity and applicability of the proposed procedure.

          A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain. (arXiv:1808.02988v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Wei Bi, Xiaoyun Jia, Maolin Zheng

Most cryptocurrency systems or systems based on blockchain technology are currently using the elliptic curves digital signature algorithm (ECDSA) on the secp256k1 curve, which is susceptible to backdoors implemented by the curve creator (secp256k1). The paper proposes a multiple elliptic curves digi-tal signature algorithm (MECDSA), which allows not only for setting the number of elliptic curves according to practical security requirements, but also for editing the parameters of each elliptic curve. The performance analy-sis proves that the scheme is secure and efficient, and can avoid any back-doors implemented by curve creators. We suggest that the systems based on blockchain should operate in two elliptic curves considering the contradic-tion between security and efficiency.

          Controllable Image-to-Video Translation: A Case Study on Facial Expression Generation. (arXiv:1808.02992v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Lijie Fan, Wenbing Huang, Chuang Gan, Junzhou Huang, Boqing Gong

The recent advances in deep learning have made it possible to generate photo-realistic images by using neural networks and even to extrapolate video frames from an input video clip. In this paper, for the sake of both furthering this exploration and our own interest in a realistic application, we study image-to-video translation and particularly focus on the videos of facial expressions. This problem challenges the deep neural networks by another temporal dimension comparing to the image-to-image translation. Moreover, its single input image fails most existing video generation methods that rely on recurrent models. We propose a user-controllable approach so as to generate video clips of various lengths from a single face image. The lengths and types of the expressions are controlled by users. To this end, we design a novel neural network architecture that can incorporate the user input into its skip connections and propose several improvements to the adversarial training method for the neural network. Experiments and user studies verify the effectiveness of our approach. Especially, we would like to highlight that even for the face images in the wild (downloaded from the Web and the authors' own photos), our model can generate high-quality facial expression videos of which about 50\% are labeled as real by Amazon Mechanical Turk workers.

          Secrecy Outage Performance of Multi-antenna Wiretap Channels With Diversity Combinings Over Correlated Rayleigh Fading Channels. (arXiv:1808.02993v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Jiangbo Si, Zan Li, Julian Cheng, Caijun Zhong

This paper presents a detailed secrecy outage performance analysis of correlated multi-antenna wiretap channels with three popular diversity combining schemes, namely maximal ratio combining, selection combining, and equal gain combining at the legitimate receiver. For single input multiple output wiretap channels, both exact and asymptotic expressions are derived for the secrecy outage probability (SOP) of these systems. The findings suggest that, compared with the scenario where all the channels are independent, correlation of the main channels alone increases the SOP by a factor of 1/ det(U), where det(U) is the determinant of correlation matrix U. In contrast, in the high signal-to-noise ratio regime at the legitimate receiver, correlation between the main channels and the eavesdropper channels has a positive effect on SOP. Moreover, for multiple input and multiple output wiretap channels, the SOP of two transmit antenna selection (TAS) schemes are analyzed for the considered correlated channel model. The SOP relationship of the both TAS schemes is quantified by the secrecy array gain. Finally, numerical simulations are conducted to corroborate the analytical results.

          Object Detection in Satellite Imagery using 2-Step Convolutional Neural Networks. (arXiv:1808.02996v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Hiroki Miyamoto, Kazuki Uehara, Masahiro Murakawa, Hidenori Sakanashi, Hirokazu Nosato, Toru Kouyama, Ryosuke Nakamura

This paper presents an efficient object detection method from satellite imagery. Among a number of machine learning algorithms, we proposed a combination of two convolutional neural networks (CNN) aimed at high precision and high recall, respectively. We validated our models using golf courses as target objects. The proposed deep learning method demonstrated higher accuracy than previous object identification methods.

          Sample size estimation for power and accuracy in the experimental comparison of algorithms. (arXiv:1808.02997v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Felipe Campelo, Fernanda Takahashi

Experimental comparisons of performance represent an important aspect of research on optimization algorithms. In this work we present a methodology for defining the required sample sizes for designing experiments with desired statistical properties for the comparison of two methods on a given problem class. The proposed approach allows the experimenter to define desired levels of accuracy for estimates of mean performance differences on individual problem instances, as well as the desired statistical power for comparing mean performances over a problem class of interest. The method calculates the required number of problem instances, and runs the algorithms on each test instance so that the accuracy of the estimated differences in performance is controlled at the predefined level. Two examples illustrate the application of the proposed method, and its ability to achieve the desired statistical properties with a methodologically sound definition of the relevant sample sizes.

          Safe Stream-Based Programming with Refinement Types. (arXiv:1808.02998v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Benno Stein, Lazaro Clapp, Manu Sridharan, Bor-Yuh Evan Chang

In stream-based programming, data sources are abstracted as a stream of values that can be manipulated via callback functions. Stream-based programming is exploding in popularity, as it provides a powerful and expressive paradigm for handling asynchronous data sources in interactive software. However, high-level stream abstractions can also make it difficult for developers to reason about control- and data-flow relationships in their programs. This is particularly impactful when asynchronous stream-based code interacts with thread-limited features such as UI frameworks that restrict UI access to a single thread, since the threading behavior of streaming constructs is often non-intuitive and insufficiently documented.

In this paper, we present a type-based approach that can statically prove the thread-safety of UI accesses in stream-based software. Our key insight is that the fluent APIs of stream-processing frameworks enable the tracking of threads via type-refinement, making it possible to reason automatically about what thread a piece of code runs on -- a difficult problem in general.

We implement the system as an annotation-based Java typechecker for Android programs built upon the popular ReactiveX framework and evaluate its efficacy by annotating and analyzing 8 open-source apps, where we find 33 instances of unsafe UI access while incurring an annotation burden of only one annotation per 186 source lines of code. We also report on our experience applying the typechecker to two much larger apps from the Uber Technologies Inc. codebase, where it currently runs on every code change and blocks changes that introduce potential threading bugs.

          Compressed Sensing Using Binary Matrices of Nearly Optimal Dimensions. (arXiv:1808.03001v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Mahsa Lotfi, Mathukumalli Vidyasagar

In this paper, we study the problem of compressed sensing using binary measurement matrices, and $\ell_1$-norm minimization (basis pursuit) as the recovery algorithm. We derive new upper and lower bounds on the number of measurements to achieve robust sparse recovery with binary matrices. We establish sufficient conditions for a column-regular binary matrix to satisfy the robust null space property (RNSP), and show that the sparsity bounds for robust sparse recovery obtained using the RNSP are better by a factor of $(3 \sqrt{3})/2 \approx 2.6$ compared to the restricted isometry property (RIP). Next we derive universal lower bounds on the number of measurements that any binary matrix needs to have in order to satisfy the weaker sufficient condition based on the RNSP, and show that bipartite graphs of girth six are optimal. Then we display two classes of binary matrices, namely parity check matrices of array codes, and Euler squares, that have girth six and are nearly optimal in the sense of almost satisfying the lower bound. In principle randomly generated Gaussian measurement matrices are "order-optimal." So we compare the phase transition behavior of the basis pursuit formulation using binary array code and Gaussian matrices, and show that (i) there is essentially no difference between the phase transition boundaries in the two cases, and (ii) the CPU time of basis pursuit with binary matrices is hundreds of times faster than with Gaussian matrices, and the storage requirements are less. Therefore it is suggested that binary matrices are a viable alternative to Gaussian matrices for compressed sensing using basis pursuit.

          An Iterative Boundary Random Walks Algorithm for Interactive Image Segmentation. (arXiv:1808.03002v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Xiaofeng Xie, ZhuLiang Yu, Zhenghui Gu, Yuanqing Li

The interactive image segmentation algorithm can provide an intelligent ways to understand the intention of user input. Many interactive methods have the problem of that ask for large number of user input. To efficient produce intuitive segmentation under limited user input is important for industrial application. In this paper, we reveal a positive feedback system on image segmentation to show the pixels of self-learning. Two approaches, iterative random walks and boundary random walks, are proposed for segmentation potential, which is the key step in feedback system. Experiment results on image segmentation indicates that proposed algorithms can obtain more efficient input to random walks. And higher segmentation performance can be obtained by applying the iterative boundary random walks algorithm.

          LED Arrays of Laser Printers as Sources of Valuable Emissions for Electromagnetic Penetration Process. (arXiv:1808.03007v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Ireneusz Kubiak, Joe Loughry

Protection of information against electromagnetic eavesdropping is an important issue. Information may be derivable from the shape of an unintended electromagnetic signal. The resulting electromagnetic emanations can be correlated with processing of classified information. The problem extends to computer printers. This article presents a technical analysis of LED arrays used in monochrome computer printers and their contribution to unintentional electromagnetic emanations. We analysed two printers from different manufacturers, designated $A$ and $B$. The forms of useful signals and their dependence on parameters of printing data are presented. Analyses were based on realistic type sizes and distribution of glyphs. Pictures were reconstructed from received radio frequency (RF) emanations. We observed differences in legibility of information receivable at a distance that we attribute to different ways used by printer designers to control the LED arrays, particularly the difference between relatively high voltage single-ended waveforms and lower-voltage differential signals. To decode the compromising emanations required knowledge of---or guessing---printer operating parameters including resolution, printing speed, and paper size. The optimal RF bandwidth for detecting individual pixels has been determined. Measurements were carried out across differences in construction and control of the LED arrays in tested printers, and the levels of RF emissions compared for selected operating modes (fast, high quality, or toner saving mode) of the printing device.

          Radon Inversion via Deep Learning. (arXiv:1808.03015v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Ji He, Jianhua Ma

Radon transform is widely used in physical and life sciences and one of its major applications is the X-ray computed tomography (X-ray CT), which is significant in modern health examination. The Radon inversion or image reconstruction is challenging due to the potentially defective radon projections. Conventionally, the reconstruction process contains several ad hoc stages to approximate the corresponding Radon inversion. Each of the stages is highly dependent on the results of the previous stage. In this paper, we propose a novel unified framework for Radon inversion via deep learning (DL). The Radon inversion can be approximated by the proposed framework with an end-to-end fashion instead of processing step-by-step with multiple stages. For simplicity, the proposed framework is short as iRadonMap (inverse Radon transform approximation). Specifically, we implement the iRadonMap as an appropriative neural network, of which the architecture can be divided into two segments. In the first segment, a learnable fully-connected filtering layer is used to filter the radon projections along the view-angle direction, which is followed by a learnable sinusoidal back-projection layer to transfer the filtered radon projections into an image. The second segment is a common neural network architecture to further improve the reconstruction performance in the image domain. The iRadonMap is overall optimized by training a large number of generic images from ImageNet database. To evaluate the performance of the iRadonMap, clinical patient data is used. Qualitative results show promising reconstruction performance of the iRadonMap.

          Sentimental Content Analysis and Knowledge Extraction from News Articles. (arXiv:1808.03027v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Mohammad Kamel, Neda Keyvani, Hadi Sadoghi Yazdi

In web era, since technology has revolutionized mankind life, plenty of data and information are published on the Internet each day. For instance, news agencies publish news on their websites all over the world. These raw data could be an important resource for knowledge extraction. These shared data contain emotions (i.e., positive, neutral or negative) toward various topics; therefore, sentimental content extraction could be a beneficial task in many aspects. Extracting the sentiment of news illustrates highly valuable information about the events over a period of time, the viewpoint of a media or news agency to these events. In this paper an attempt is made to propose an approach for news analysis and extracting useful knowledge from them. Firstly, we attempt to extract a noise robust sentiment of news documents; therefore, the news associated to six countries: United State, United Kingdom, Germany, Canada, France and Australia in 5 different news categories: Politics, Sports, Business, Entertainment and Technology are downloaded. In this paper we compare the condition of different countries in each 5 news topics based on the extracted sentiments and emotional contents in news documents. Moreover, we propose an approach to reduce the bulky news data to extract the hottest topics and news titles as a knowledge. Eventually, we generate a word model to map each word to a fixed-size vector by Word2Vec in order to understand the relations between words in our collected news database.

          Arithmetic Word Problem Solver using Frame Identification. (arXiv:1808.03028v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Pruthwik Mishra, Litton J Kurisinkel, Dipti Misra Sharma

Automatic Word problem solving has always posed a great challenge for the NLP community. Usually a word problem is a narrative comprising of a few sentences and a question is asked about a quantity referred in the sentences. Solving word problem involves reasoning across sentences, identification of operations, their order, relevant quantities and discarding irrelevant quantities. In this paper, we present a novel approach for automatic arithmetic word problem solving. Our approach starts with frame identification. Each frame can either be classified as a state or an action frame. The frame identification is dependent on the verb in a sentence. Every frame is unique and is identified by its slots. The slots are filled using dependency parsed output of a sentence. The slots are entity holder, entity, quantity of the entity, recipient, additional information like place, time. The slots and frames helps to identify the type of question asked and the entity referred. Action frames act on state frame(s) which causes a change in quantities of the state frames. The frames are then used to build a graph where any change in quantities can be propagated to the neighboring nodes. Most of the current solvers can only answer questions related to the quantity, while our system can answer different kinds of questions like `who', `what' other than the quantity related questions `how many'.

There are three major contributions of this paper. 1. Frame Annotated Corpus (with a frame annotation tool) 2. Frame Identification Module 3. A new easily understandable Framework for word problem solving

          Policy Optimization as Wasserstein Gradient Flows. (arXiv:1808.03030v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Ruiyi Zhang, Changyou Chen, Chunyuan Li, Lawrence Carin

Policy optimization is a core component of reinforcement learning (RL), and most existing RL methods directly optimize parameters of a policy based on maximizing the expected total reward, or its surrogate. Though often achieving encouraging empirical success, its underlying mathematical principle on {\em policy-distribution} optimization is unclear. We place policy optimization into the space of probability measures, and interpret it as Wasserstein gradient flows. On the probability-measure space, under specified circumstances, policy optimization becomes a convex problem in terms of distribution optimization. To make optimization feasible, we develop efficient algorithms by numerically solving the corresponding discrete gradient flows. Our technique is applicable to several RL settings, and is related to many state-of-the-art policy-optimization algorithms. Empirical results verify the effectiveness of our framework, often obtaining better performance compared to related algorithms.

          A Constrained Shortest Path Scheme for Virtual Network Service Management. (arXiv:1808.03031v1 [cs.PF])      Cache   Translate Page   Web Page Cache   

Authors: Dmitrii Chemodanov, Flavio Esposito, Prasad Calyam, Andrei Sukhov

Virtual network services that span multiple data centers are important to support emerging data-intensive applications in fields such as bioinformatics and retail analytics. Successful virtual network service composition and maintenance requires flexible and scalable 'constrained shortest path management' both in the management plane for virtual network embedding (VNE) or network function virtualization service chaining (NFV-SC), as well as in the data plane for traffic engineering (TE). In this paper, we show analytically and empirically that leveraging constrained shortest paths within recent VNE, NFV-SC and TE algorithms can lead to network utilization gains (of up to 50%) and higher energy efficiency. The management of complex VNE, NFV-SC and TE algorithms can be, however, intractable for large scale substrate networks due to the NP-hardness of the constrained shortest path problem. To address such scalability challenges, we propose a novel, exact constrained shortest path algorithm viz., 'Neighborhoods Method' (NM). Our NM uses novel search space reduction techniques and has a theoretical quadratic speed-up making it practically faster (by an order of magnitude) than recent branch-and-bound exhaustive search solutions. Finally, we detail our NM-based SDN controller implementation in a real-world testbed to further validate practical NM benefits for virtual network services.

          Passive Compliance Control of Aerial Manipulators. (arXiv:1808.03037v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Min Jun Kim, Ribin Balachandran, Marco De Stefano, Konstantin Kondak, Christian Ott

This paper presents a passive compliance control for aerial manipulators to achieve stable environmental interactions. The main challenge is the absence of actuation along body-planar directions of the aerial vehicle which might be required during the interaction to preserve passivity. The controller proposed in this paper guarantees passivity of the manipulator through a proper choice of end-effector coordinates, and that of vehicle fuselage is guaranteed by exploiting time domain passivity technique. Simulation studies validate the proposed approach.

          Efficient Outlier Removal for Large Scale Global Structure-from-Motion. (arXiv:1808.03041v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Fei Wen, Danping Zou, Rendong Ying, Peilin Liu

This work addresses the outlier removal problem in large-scale global structure-from-motion. In such applications, global outlier removal is very useful to mitigate the deterioration caused by mismatches in the feature point matching step. Unlike existing outlier removal methods, we exploit the structure in multiview geometry problems to propose a dimension reduced formulation, based on which two methods have been developed. The first method considers a convex relaxed $\ell_1$ minimization and is solved by a single linear programming (LP), whilst the second one approximately solves the ideal $\ell_0$ minimization by an iteratively reweighted method. The dimension reduction results in a significant speedup of the new algorithms. Further, the iteratively reweighted method can significantly reduce the possibility of removing true inliers. Realistic multiview reconstruction experiments demonstrated that, compared with state-of-the-art algorithms, the new algorithms are much more efficient and meanwhile can give improved solution. Matlab code for reproducing the results is available at \textit{}.

          Hunting for Tractable Languages for Judgment Aggregation. (arXiv:1808.03043v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Ronald de Haan

Judgment aggregation is a general framework for collective decision making that can be used to model many different settings. Due to its general nature, the worst case complexity of essentially all relevant problems in this framework is very high. However, these intractability results are mainly due to the fact that the language to represent the aggregation domain is overly expressive. We initiate an investigation of representation languages for judgment aggregation that strike a balance between (1) being limited enough to yield computational tractability results and (2) being expressive enough to model relevant applications. In particular, we consider the languages of Krom formulas, (definite) Horn formulas, and Boolean circuits in decomposable negation normal form (DNNF). We illustrate the use of the positive complexity results that we obtain for these languages with a concrete application: voting on how to spend a budget (i.e., participatory budgeting).

          On Minimizing Energy Consumption for D2D Clustered Caching Networks. (arXiv:1808.03050v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Ramy Amer, M. Majid Butt, Hesham ElSawy, Mehdi Bennis, Jacek Kibiłda, Nicola Marchetti

We formulate and solve the energy minimization problem for a clustered device-to-device (D2D) network with cache-enabled mobile devices. Devices are distributed according to a Poisson cluster process (PCP) and are assumed to have a surplus memory which is exploited to proactively cache files from a library. Devices can retrieve the requested files from their caches, from neighboring devices in their proximity (cluster), or from the base station as a last resort. We minimize the energy consumption of the proposed network under a random prob- abilistic caching scheme, where files are independently cached according to a specific probability distribution. A closed-form expression for the D2D coverage probability is obtained. The energy consumption problem is then formulated as a function of the caching distribution, and the optimal probabilistic caching distribution is obtained. Results reveal that the proposed caching distribution reduces energy consumption up to 33% as compared to caching popular files scheme.

          Optimal conditions for connectedness of discretized sets. (arXiv:1808.03053v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Boris Brimkov, Valentin E. Brimkov

Constructing a discretization of a given set is a major problem in various theoretical and applied disciplines. An offset discretization of a set $X$ is obtained by taking the integer points inside a closed neighborhood of $X$ of a certain radius. In this note we determine a minimum threshold for the offset radius, beyond which the discretization of a disconnected set is always connected. The results hold for a broad class of disconnected and unbounded subsets of $R^n$, and generalize several previous results. Algorithmic aspects and possible applications are briefly discussed.

          Gradient and Newton Boosting for Classification and Regression. (arXiv:1808.03064v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Fabio Sigrist

Boosting algorithms enjoy large popularity due to their high predictive accuracy on a wide array of datasets. In this article, we argue that it is important to distinguish between three types of statistical boosting algorithms: gradient and Newton boosting as well as a hybrid variant of the two. To date, both researchers and practitioners often do not discriminate between these boosting variants. We compare the different boosting algorithms on a wide range of real and simulated datasets for various choices of loss functions using trees as base learners. In addition, we introduce a novel tuning parameter for Newton boosting. We find that Newton boosting performs substantially better than the other boosting variants for classification, and that the novel tuning parameter is important for predictive accuracy

          A Square Peg in a Round Hole: The Complex Path for Wireless in the Manufacturing Industry. (arXiv:1808.03065v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Borja Martinez, Cristina Cano, Xavier Vilajosana

The manufacturing industry is at the edge of the 4th industrial revolution, a paradigm of integrated architectures in which the entire production chain (composed of machines, workers and products) is intrinsically connected. Wireless technologies can add further value in this manufacturing revolution. However, we identify some signs that indicate that wireless could be left out from the next generation of smart-factory equipment. This is particularly relevant considering that the heavy machinery characteristic of this sector can last for decades. We argue that at the core of this issue there is a mismatch between industrial needs and the interests of academic and partly-academic (such as standardization bodies) sectors. We base our claims on surveys from renowned advisory firms and interviews with industrial actors, which we contrast with results from content analysis of scientific articles. Finally we propose some convergence paths that, while still retaining the degree of novelty required for academic purposes, are more aligned with industrial concerns.

          Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management. (arXiv:1808.03071v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Markus Miettinen, Paul C. van Oorschot, Ahmad-Reza Sadeghi

The emerging Internet of Things (IoT) drastically increases the number of connected devices in homes, workplaces and smart city infrastructures. This drives a need for means to not only ensure confidentiality of device-related communications, but for device configuration and management---ensuring that only legitimate devices are granted privileges to a local domain, that only authorized agents have access to the device and data it holds, and that software updates are authentic. The need to support device on-boarding, ongoing device management and control, and secure decommissioning dictates a suite of key management services for both access control to devices, and access by devices to wireless infrastructure and networked resources. We identify this core functionality, and argue for the recognition of efficient and reliable key management support---both within IoT devices, and by a unifying external management platform---as a baseline requirement for an IoT world. We present a framework architecture to facilitate secure, flexible and convenient device management in commodity IoT scenarios, and offer an illustrative set of protocols as a base solution---not to promote specific solution details, but to highlight baseline functionality to help domain owners oversee deployments of large numbers of independent multi-vendor IoT devices.

          Necessary Field Size and Probability for MDP and Complete MDP Convolutional Codes. (arXiv:1808.03074v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Julia Lieb

It has been shown that maximum distance profile (MDP) convolutional codes have optimal recovery rate for windows of a certain length, when transmitting over an erasure channel. In addition, the subclass of complete MDP convolutional codes has the ability to reduce the waiting time during decoding. In this paper, we derive upper bounds on the necessary field size for the existence of MDP and complete MDP convolutional codes and show that these bounds improve the already existing ones. Moreover, we derive lower bounds for the probability that a random code is MDP respective complete MDP.

          Simulation of Mixed Critical In-vehicular Networks. (arXiv:1808.03081v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Philipp Meyer, Franz Korf, Till Steinbach, Thomas C. Schmidt

Future automotive applications ranging from advanced driver assistance to autonomous driving will largely increase demands on in-vehicular networks. Data flows of high bandwidth or low latency requirements, but in particular many additional communication relations will introduce a new level of complexity to the in-car communication system. It is expected that future communication backbones which interconnect sensors and actuators with ECU in cars will be built on Ethernet technologies. However, signalling from different application domains demands for network services of tailored attributes, including real-time transmission protocols as defined in the TSN Ethernet extensions. These QoS constraints will increase network complexity even further. Event-based simulation is a key technology to master the challenges of an in-car network design. This chapter introduces the domain-specific aspects and simulation models for in-vehicular networks and presents an overview of the car-centric network design process. Starting from a domain specific description language, we cover the corresponding simulation models with their workflows and apply our approach to a related case study for an in-car network of a premium car.

          Paired 3D Model Generation with Conditional Generative Adversarial Networks. (arXiv:1808.03082v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Cihan Ongun, Alptekin Temizel

Generative Adversarial Networks (GANs) are shown to be successful at generating new and realistic samples including 3D object models. Conditional GAN, a variant of GANs, allows generating samples in given conditions. However, objects generated for each condition are different and it does not allow generation of the same object in different conditions. In this paper, we first adapt conditional GAN, which is originally designed for 2D image generation, to the problem of generating 3D models in different rotations. We then propose a new approach to guide the network to generate the same 3D sample in different and controllable rotation angles (sample pairs). Unlike previous studies, the proposed method does not require modification of the standard conditional GAN architecture and it can be integrated into the training step of any conditional GAN. Experimental results and visual comparison of 3D models show that the proposed method is successful at generating model pairs in different conditions.

          Hardware realization of residue number system algorithms by Boolean functions minimization. (arXiv:1808.03083v1 [cs.AR])      Cache   Translate Page   Web Page Cache   

Authors: Danila Gorodecky, Tiziano Villa

Residue number systems (RNS) represent numbers by their remainders modulo a set of relatively prime numbers. This paper pro- poses an efficient hardware implementation of modular multiplication and of the modulo function (X(mod P)), based on Boolean minimiza- tion. We report experiments showing a performance advantage up to 30 times for our approach vs. the results obtained by state-of-art industrial tools.

          Generalized budgeted submodular set function maximization. (arXiv:1808.03085v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Francesco Cellinese, Gianlorenzo D'Angelo, Gianpiero Monaco, Yllka Velaj

In this paper we consider a generalization of the well-known budgeted maximum coverage problem. We are given a ground set of elements and a set of bins. The goal is to find a subset of elements along with an associated set of bins, such that the overall cost is at most a given budget, and the profit is maximized. Each bin has its own cost and the cost of each element depends on its associated bin. The profit is measured by a monotone submodular function over the elements. We first present an algorithm that guarantees an approximation factor of $\frac{1}{2}\left(1-\frac{1}{e^\alpha}\right)$, where $\alpha \leq 1$ is the approximation factor of an algorithm for a sub-problem. We give two polynomial-time algorithms to solve this sub-problem. The first one gives us $\alpha=1- \epsilon$ if the costs satisfies a specific condition, which is fulfilled in several relevant cases, including the unitary costs case and the problem of maximizing a monotone submodular function under a knapsack constraint. The second one guarantees $\alpha=1-\frac{1}{e}-\epsilon$ for the general case. The gap between our approximation guarantees and the known inapproximability bounds is $\frac{1}{2}$.

We extend our algorithm to a bi-criterion approximation algorithm in which we are allowed to spend an extra budget up to a factor $\beta\geq 1$ to guarantee a $\frac{1}{2}\left(1-\frac{1}{e^{\alpha\beta}}\right)$-approximation. If we set $\beta=\frac{1}{\alpha}\ln \left(\frac{1}{2\epsilon}\right)$, the algorithm achieves an approximation factor of $\frac{1}{2}-\epsilon$, for any arbitrarily small $\epsilon>0$.

          An "Xcity" Optimization Approach to Designing Proving Grounds for Connected and Autonomous Vehicles. (arXiv:1808.03089v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Rui Chen, Mansur Arief, Ding Zhao

Proving ground, or on-track testing has been an essential part of testing and validation process for connected and autonomous vehicles (CAV). Several world-class CAV proving grounds, such as Mcity at the University of Michigan and The Castle of Waymo, have already been built, and many more are currently under construction. In this paper, we propose the first optimization approach to CAV proving ground designing and refer to any such CAV-centric design problem as "Xcity" to emphasize the enormous investment, the multi-dimensional spatial consideration, and the immense construction effort emerging globally. Inspired by the recent progress on traffic encounter clustering, we further define "road assets" as fundamental building blocks and formulate the whole design process into nonlinear optimization problems. We have shown that such framework can be utilized to adaptively generate CAV proving ground designs with optimized capability and flexibility and can further be extended to evaluate an existing "Xcity" design.

          Image Inspired Poetry Generation in XiaoIce. (arXiv:1808.03090v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Wen-Feng Cheng, Chao-Chung Wu, Ruihua Song, Jianlong Fu, Xing Xie, Jian-Yun Nie

Vision is a common source of inspiration for poetry. The objects and the sentimental imprints that one perceives from an image may lead to various feelings depending on the reader. In this paper, we present a system of poetry generation from images to mimic the process. Given an image, we first extract a few keywords representing objects and sentiments perceived from the image. These keywords are then expanded to related ones based on their associations in human written poems. Finally, verses are generated gradually from the keywords using recurrent neural networks trained on existing poems. Our approach is evaluated by human assessors and compared to other generation baselines. The results show that our method can generate poems that are more artistic than the baseline methods. This is one of the few attempts to generate poetry from images. By deploying our proposed approach, XiaoIce has already generated more than 12 million poems for users since its release in July 2017. A book of its poems has been published by Cheers Publishing, which claimed that the book is the first-ever poetry collection written by an AI in human history.

          Efficiently decoding the 3D toric codes and welded codes on cubic lattices. (arXiv:1808.03092v1 [quant-ph])      Cache   Translate Page   Web Page Cache   

Authors: Abhishek Kulkarni, Pradeep Kiran Sarvepalli

The recent years have seen a growing interest in quantum codes in three dimensions (3D). One of the earliest proposed 3D quantum codes is the 3D toric code. It has been shown that 3D color codes can be mapped to 3D toric codes. The 3D toric code on cubic lattice is also a building block for the welded code which has highest energy barrier to date. Although well known, the performance of the 3D toric code has not been studied extensively. In this paper, we propose efficient decoding algorithms for the 3D toric code on a cubic lattice with and without boundaries and report their performance for various quantum channels. We observe a threshold of $\gtrsim 12\%$ for the bit flip errors, $\approx 3\%$ for phase flip errors and $ 24.8\%$ for erasure channel. We also study the performance of the welded 3D toric code on the quantum erasure channel. We did not observe a threshold for the welded code over the erasure channel.

          On feature selection and evaluation of transportation mode prediction strategies. (arXiv:1808.03096v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Mohammad Etemad, Amilcar Soares Junior, Stan Matwin

Transportation modes prediction is a fundamental task for decision making in smart cities and traffic management systems. Traffic policies designed based on trajectory mining can save money and time for authorities and the public. It may reduce the fuel consumption and commute time and moreover, may provide more pleasant moments for residents and tourists. Since the number of features that may be used to predict a user transportation mode can be substantial, finding a subset of features that maximizes a performance measure is worth investigating. In this work, we explore wrapper and information retrieval methods to find the best subset of trajectory features. After finding the best classifier and the best feature subset, our results were compared with two related papers that applied deep learning methods and the results showed that our framework achieved better performance. Furthermore, two types of cross-validation approaches were investigated, and the performance results show that the random cross-validation method provides optimistic results.

          Energy Efficiency Maximization for C-RANs: Discrete Monotonic Optimization, Penalty, and l0-Approximation Methods. (arXiv:1808.03107v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Kien-Giang Nguyen, Quang-Doanh Vu, Markku Juntti, Le-Nam Tran

We study downlink of multiantenna cloud radio access networks (C-RANs) with finite-capacity fronthaul links. The aim is to propose joint designs of beamforming and remote radio head (RRH)-user association, subject to constraints on users' quality-of-service, limited capacity of fronthaul links and transmit power, to maximize the system energy efficiency. To cope with the limited-capacity fronthaul we consider the problem of RRH-user association to select a subset of users that can be served by each RRH. Moreover, different to the conventional power consumption models, we take into account the dependence of baseband signal processing power on the data rate, as well as the dynamics of the efficiency of power amplifiers. The considered problem leads to a mixed binary integer program (MBIP) which is difficult to solve. Our first contribution is to derive a globally optimal solution for the considered problem by customizing a discrete branch-reduce-and-bound (DBRB) approach. Since the global optimization method requires a high computational effort, we further propose two suboptimal solutions able to achieve the near optimal performance but with much reduced complexity. To this end, we transform the design problem into continuous (but inherently nonconvex) programs by two approaches: penalty and \ell_{0}-approximation methods. These resulting continuous nonconvex problems are then solved by the successive convex approximation framework. Numerical results are provided to evaluate the effectiveness of the proposed approaches.

          Rhythm-Flexible Voice Conversion without Parallel Data Using Cycle-GAN over Phoneme Posteriorgram Sequences. (arXiv:1808.03113v1 [cs.SD])      Cache   Translate Page   Web Page Cache   

Authors: Cheng-chieh Yeh, Po-chun Hsu, Ju-chieh Chou, Hung-yi Lee, Lin-shan Lee

Speaking rate refers to the average number of phonemes within some unit time, while the rhythmic patterns refer to duration distributions for realizations of different phonemes within different phonetic structures. Both are key components of prosody in speech, which is different for different speakers. Models like cycle-consistent adversarial network (Cycle-GAN) and variational auto-encoder (VAE) have been successfully applied to voice conversion tasks without parallel data. However, due to the neural network architectures and feature vectors chosen for these approaches, the length of the predicted utterance has to be fixed to that of the input utterance, which limits the flexibility in mimicking the speaking rates and rhythmic patterns for the target speaker. On the other hand, sequence-to-sequence learning model was used to remove the above length constraint, but parallel training data are needed. In this paper, we propose an approach utilizing sequence-to-sequence model trained with unsupervised Cycle-GAN to perform the transformation between the phoneme posteriorgram sequences for different speakers. In this way, the length constraint mentioned above is removed to offer rhythm-flexible voice conversion without requiring parallel data. Preliminary evaluation on two datasets showed very encouraging results.

          Training De-Confusion: An Interactive, Network-Supported Visual Analysis System for Resolving Errors in Image Classification Training Data. (arXiv:1808.03114v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Alex Bäuerle, Heiko Neumann, Timo Ropinski

Convolutional neural networks gain more and more popularity in image classification tasks since they are often even able to outperform human classifiers. While much research has been targeted towards network architecture optimization, the optimization of the labeled training data has not been explicitly targeted yet. Since labeling of training data is time-consuming, it is often performed by less experienced domain experts or even outsourced to online services. Unfortunately, this results in labeling errors, which directly impact the classification performance of the trained network. To overcome this problem, we propose an interactive visual analysis system that helps to spot and correct errors in the training dataset. For this purpose, we have identified instance interpretation errors, class interpretation errors and similarity errors as frequently occurring errors, which shall be resolved to improve classification performance. After we detect these errors, users are guided towards them through a two-step visual analysis process, in which they can directly reassign labels to resolve the detected errors. Thus, with the proposed visual analysis system, the user has to inspect far fewer items to resolve labeling errors in the training dataset, and thus arrives at satisfying training results more quickly.

          A Note on the Flip Distance Problem for Edge-Labeled Triangulations. (arXiv:1808.03126v1 [cs.CG])      Cache   Translate Page   Web Page Cache   

Authors: Alexander Pilz

For both triangulations of point sets and simple polygons, it is known that determining the flip distance between two triangulations is an NP-hard problem. To gain more insight into flips of triangulations and to characterize "where edges go" when flipping from one triangulation to another, flips in edge-labeled triangulations have lately attracted considerable interest. In a recent breakthrough, Lubiw, Mas\'arov\'a, and Wagner (in Proc. 33rd Symp. of Computational Geometry, 2017) prove the so-called "Orbit Conjecture" for edge-labeled triangulations and ask for the complexity of the flip distance problem in the edge-labeled setting. By revisiting and modifying the hardness proofs for the unlabeled setting, we show in this note that the flip distance problem is APX-hard for edge-labeled triangulations of point sets and NP-hard for triangulations of simple polygons. The main technical challenge is to show that this remains true even if the source and target triangulation are the same when disregarding the labeling.

          Finite Query Answering in Expressive Description Logics with Transitive Roles. (arXiv:1808.03130v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Tomasz Gogacz, Yazmin Ibáñez-García, Filip Murlak

We study the problem of finite ontology mediated query answering (FOMQA), the variant of OMQA where the represented world is assumed to be finite, and thus only finite models of the ontology are considered. We adopt the most typical setting with unions of conjunctive queries and ontologies expressed in description logics (DLs). The study of FOMQA is relevant in settings that are not finitely controllable. This is the case not only for DLs without the finite model property, but also for those allowing transitive role declarations. When transitive roles are allowed, evaluating queries is challenging: FOMQA is undecidable for SHOIF and only known to be decidable for the Horn fragment of ALCIF. We show decidability of FOMQA for three proper fragments of SOIF: SOI, SOF, and SIF. Our approach is to characterise models relevant for deciding finite query entailment. Relying on a certain regularity of these models, we develop automata-based decision procedures with optimal complexity bounds.

          A Survey on Sentiment and Emotion Analysis for Computational Literary Studies. (arXiv:1808.03137v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Evgeny Kim, Roman Klinger

Emotions have often been a crucial part of compelling narratives: literature tells about people with goals, desires, passions, and intentions. In the past, classical literary studies usually scrutinized the affective dimension of literature within the framework of hermeneutics. However, with emergence of the research field known as Digital Humanities (DH) some studies of emotions in literary context have taken a computational turn. Given the fact that DH is still being formed as a science, this direction of research can be rendered relatively new. At the same time, the research in sentiment analysis started in computational linguistic almost two decades ago and is nowadays an established field that has dedicated workshops and tracks in the main computational linguistics conferences. This leads us to the question of what are the commonalities and discrepancies between sentiment analysis research in computational linguistics and digital humanities? In this survey, we offer an overview of the existing body of research on sentiment and emotion analysis as applied to literature. We precede the main part of the survey with a short introduction to natural language processing and machine learning, psychological models of emotions, and provide an overview of existing approaches to sentiment and emotion analysis in computational linguistics. The papers presented in this survey are either coming directly from DH or computational linguistics venues and are limited to sentiment and emotion analysis as applied to literary text.

          A Survey on the Theory of Bonds. (arXiv:1808.03138v1 [cs.SY])      Cache   Translate Page   Web Page Cache   

Authors: Zijia Li, Josef Schicho, Hans-Peter Schröcker

Many researchers tried to understand/explain the geometric reasons for paradoxical mobility of a mechanical linkage, i.e. the situation when a linkage allows more motions than expected from counting parameters and constraints. Bond theory is a method that aims at understanding paradoxical mobility from an algebraic point of view. Here we give a self-contained introduction of this theory and discuss its results on closed linkages with revolute or prismatic joints.

          Low Ply Drawings of Tree and 2-Trees. (arXiv:1808.03139v1 [cs.CG])      Cache   Translate Page   Web Page Cache   

Authors: Michael T. Goodrich, Timothy Johnson

Ply number is a recently developed graph drawing metric inspired by studying road networks. Informally, for each vertex v, which is associated with a point in the plane, a disk is drawn centered on v with a radius that is alpha times the length of the longest edge incident to v, for some constant alpha in (0, 0.5]. The ply number is the maximum number of disks that overlap at a single point. We show that any tree with maximum degree Delta has a 1-ply drawing when alpha = O(1 / Delta). We also show that when alpha = 1/2, trees can be drawn with logarithmic ply number, with an area that is polynomial for bounded-degree trees. Lastly, we show that this logarithmic upper bound does not apply to 2-trees, by giving a lower bound of Omega(sqrt(n / log n)) ply for any value of alpha.

          A Hybrid Dynamic-regenerative Damping Scheme for Energy Regeneration in Variable Impedance Actuators. (arXiv:1808.03143v1 [cs.SY])      Cache   Translate Page   Web Page Cache   

Authors: Fan Wu, Matthew Howard

Increasing research efforts have been made to improve the energy efficiency of variable impedance actuators (VIAs) through reduction of energy consumption. However, the harvesting of dissipated energy in such systems remains underexplored. This study proposes a novel variable damping module design enabling energy regeneration in VIAs by exploiting the regenerative braking effect of DC motors. The proposed damping module uses four switches to combine regenerative and dynamic braking, in a hybrid approach that enables energy regeneration without reduction in the range of damping achievable. Numerical simulations and a physical experiment are presented in which the proposed module shows an optimal trade-off between task performance and energy efficiency.

          A New Optimization Layer for Real-Time Bidding Advertising Campaigns. (arXiv:1808.03147v1 [cs.GT])      Cache   Translate Page   Web Page Cache   

Authors: Gianluca Micchi, Saeid Soheily-Khah, Jacob Turner

While it is relatively easy to start an online advertising campaign, obtaining a high Key Performance Indicator (KPI) can be challenging. A large body of work on this subject has already been performed and platforms known as DSPs are available on the market that deal with such an optimization. From the advertiser's point of view, each DSP is a different black box, with its pros and cons, that needs to be configured. In order to take advantage of the pros of every DSP, advertisers are well-advised to use a combination of them when setting up their campaigns. In this paper, we propose an algorithm for advertisers to add an optimization layer on top of DSPs. The algorithm we introduce, called SKOTT, maximizes the chosen KPI by optimally configuring the DSPs and putting them in competition with each other. SKOTT is a highly specialized iterative algorithm loosely based on gradient descent that is made up of three independent sub-routines, each dealing with a different problem: partitioning the budget, setting the desired average bid, and preventing under-delivery. In particular, one of the novelties of our approach lies in our taking the perspective of the advertisers rather than the DSPs. Synthetic market data is used to evaluate the efficiency of SKOTT against other state-of-the-art approaches adapted from similar problems. The results illustrate the benefits of our proposals, which greatly outperforms the other methods.

          ARQ with Cumulative Feedback to Compensate for Burst Errors. (arXiv:1808.03153v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Derya Malak, Muriel Medard, Edmund M. Yeh

We propose a cumulative feedback-based ARQ (CF ARQ) protocol for a sliding window of size 2 over packet erasure channels with unreliable feedback. We exploit a matrix signal-flow graph approach to analyze probability-generating functions of transmission and delay times. Contrasting its performance with that of the uncoded baseline scheme for ARQ, developed by Ausavapattanakun and Nosratinia, we demonstrate that CF ARQ can provide significantly less average delay under bursty feedback, and gains up to about 20% in terms of throughput. We also outline the benefits of CF ARQ under burst errors and asymmetric channel conditions. The protocol is more predictable across statistics, hence is more stable. This can help design robust systems when feedback is unreliable. This feature may be preferable for meeting the strict end-to-end latency and reliability requirements of future use cases of ultra-reliable low-latency communications in 5G, such as mission-critical communications and industrial control for critical control messaging.

          One Billion Apples' Secret Sauce: Recipe for the Apple Wireless Direct Link Ad hoc Protocol. (arXiv:1808.03156v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Milan Stute, David Kreitschmann, Matthias Hollick

Apple Wireless Direct Link (AWDL) is a proprietary and undocumented IEEE 802.11-based ad hoc protocol. Apple first introduced AWDL around 2014 and has since integrated it into its entire product line, including iPhone and Mac. While we have found that AWDL drives popular applications such as AirPlay and AirDrop on more than one billion end-user devices, neither the protocol itself nor potential security and Wi-Fi coexistence issues have been studied. In this paper, we present the operation of the protocol as the result of binary and runtime analysis. In short, each AWDL node announces a sequence of Availability Windows (AWs) indicating its readiness to communicate with other AWDL nodes. An elected master node synchronizes these sequences. Outside the AWs, nodes can tune their Wi-Fi radio to a different channel to communicate with an access point, or could turn it off to save energy. Based on our analysis, we conduct experiments to study the master election process, synchronization accuracy, channel hopping dynamics, and achievable throughput. We conduct a preliminary security assessment and publish an open source Wireshark dissector for AWDL to nourish future work.

          A Set-Theoretic Framework for Parallel Graph Rewriting. (arXiv:1808.03161v1 [cs.LO])      Cache   Translate Page   Web Page Cache   

Authors: Thierry Boy de la Tour, Rachid Echahed

We tackle the problem of attributed graph transformations and propose a new algorithmic approach for defining parallel graph transformations allowing overlaps. We start by introducing some abstract operations over graph structures. Then, we define the notion of rewrite rules as three inclusions of the form $L \supseteq K \supseteq M \subseteq R$. We provide six conditions that parallel graph rewrite relations should ideally satisfy, which lead us to define two distinct full parallel graph rewrite relations. A central notion of regularity of matchings is proved to be equivalent to these six conditions, and to the equality of these two relations. Furthermore, we take advantage of the symmetries that may occur in $L$, $K$, $M$ and $R$ and define another pair of rewrite relations that factor out possibly many equivalent matchings up to their common symmetries. These definitions and the corresponding proofs combine operations on graphs with group-theoretic notions, thus illustrating the relevance of our framework.

          Bounds for the diameter of the weight polytope. (arXiv:1808.03165v1 [cs.GT])      Cache   Translate Page   Web Page Cache   

Authors: Sascha Kurz

A weighted game or a threshold function in general admits different weighted representations even if the sum of non-negative weights is fixed to one. Here we study bounds for the diameter of the corresponding weight polytope. It turns out that the diameter can be upper bounded in terms of the maximum weight and the quota or threshold. We apply those results to approximation results between power distributions, given by power indices, and weights.

          Routing Protocols Performance in Mobile Ad-Hoc Networks Using Millimeter Wave. (arXiv:1808.03168v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Mustafa S. Aljumaily

Self-Organized networks (SONs) have been studied for many years, and have attracted many researchers due to their substantial applications. Although the performance of such networks in the lower band networks (sub-6 GHz band frequencies) has been well studied, there are only sparse studies on SON in higher frequency bands, such as the millimeter wave (mmWave) band ranges between 28GHz and 300GHz. mmWave frequencies have attracted many researchers in the past few years because of its unique features and are now considered as an important part of the next generation of wireless communications namely (5G).In this paper, we study the performance of some well-known routing protocols in the case of mmWave Mobile Ad hoc Networks (MANET) using the ns-3 mmwave module that was developed recently. SONs are within the goals for the next release of the 3GPP New Radio (NR) standardization process (Release-16) for the 5G, which makes the study of the behavior of such frequency bands for these networks an important activity towards achieving such goal. Mathematical and simulation results show a great improvement in the routing protocols delivery rates and power consumption when using mmWave compared to the sub6GHz band frequencies.

          Building a Kannada POS Tagger Using Machine Learning and Neural Network Models. (arXiv:1808.03175v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Ketan Kumar Todi, Pruthwik Mishra, Dipti Misra Sharma

POS Tagging serves as a preliminary task for many NLP applications. Kannada is a relatively poor Indian language with very limited number of quality NLP tools available for use. An accurate and reliable POS Tagger is essential for many NLP tasks like shallow parsing, dependency parsing, sentiment analysis, named entity recognition. We present a statistical POS tagger for Kannada using different machine learning and neural network models. Our Kannada POS tagger outperforms the state-of-the-art Kannada POS tagger by 6%. Our contribution in this paper is three folds - building a generic POS Tagger, comparing the performances of different modeling techniques, exploring the use of character and word embeddings together for Kannada POS Tagging.

          Efficiently Manifesting Asynchronous Programming Errors in Android Apps. (arXiv:1808.03178v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Lingling Fan, Ting Su, Sen Chen, Guozhu Meng, Yang Liu, Lihua Xu, Geguang Pu

Android, the #1 mobile app framework, enforces the single-GUI-thread model, in which a single UI thread manages GUI rendering and event dispatching. Due to this model, it is vital to avoid blocking the UI thread for responsiveness. One common practice is to offload long-running tasks into async threads. To achieve this, Android provides various async programming constructs, and leaves developers themselves to obey the rules implied by the model. However, as our study reveals, more than 25% apps violate these rules and introduce hard-to-detect, fail-stop errors, which we term as aysnc programming errors (APEs). To this end, this paper introduces APEChecker, a technique to automatically and efficiently manifest APEs. The key idea is to characterize APEs as specific fault patterns, and synergistically combine static analysis and dynamic UI exploration to detect and verify such errors. Among the 40 real-world Android apps, APEChecker unveils and processes 61 APEs, of which 51 are confirmed (83.6% hit rate). Specifically, APEChecker detects 3X more APEs than the state-of-art testing tools (Monkey, Sapienz and Stoat), and reduces testing time from half an hour to a few minutes. On a specific type of APEs, APEChecker confirms 5X more errors than the data race detection tool, EventRacer, with very few false alarms.

          Overcoming Missing and Incomplete Modalities with Generative Adversarial Networks for Building Footprint Segmentation. (arXiv:1808.03195v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Benjamin Bischke, Patrick Helber, Florian König, Damian Borth, Andreas Dengel

The integration of information acquired with different modalities, spatial resolution and spectral bands has shown to improve predictive accuracies. Data fusion is therefore one of the key challenges in remote sensing. Most prior work focusing on multi-modal fusion, assumes that modalities are always available during inference. This assumption limits the applications of multi-modal models since in practice the data collection process is likely to generate data with missing, incomplete or corrupted modalities. In this paper, we show that Generative Adversarial Networks can be effectively used to overcome the problems that arise when modalities are missing or incomplete. Focusing on semantic segmentation of building footprints with missing modalities, our approach achieves an improvement of about 2% on the Intersection over Union (IoU) against the same network that relies only on the available modality.

          Learning to Optimize Join Queries With Deep Reinforcement Learning. (arXiv:1808.03196v1 [cs.DB])      Cache   Translate Page   Web Page Cache   

Authors: Sanjay Krishnan, Zongheng Yang, Ken Goldberg, Joseph Hellerstein, Ion Stoica

Exhaustive enumeration of all possible join orders is often avoided, and most optimizers leverage heuristics to prune the search space. The design and implementation of heuristics are well-understood when the cost model is roughly linear, and we find that these heuristics can be significantly suboptimal when there are non-linearities in cost. Ideally, instead of a fixed heuristic, we would want a strategy to guide the search space in a more data-driven way---tailoring the search to a specific dataset and query workload. Recent work in deep reinforcement learning (Deep RL) may provide a new perspective on this problem. Deep RL poses sequential problems, like join optimization, as a series of 1-step prediction problems that can be learned from data. We present our deep RL-based DQ optimizer, which currently optimizes select-project-join blocks, and we evaluate DQ on the Join Order Benchmark. We found that DQ achieves plan costs within a factor of 2 of the optimal solution on all cost models and improves on the next best heuristic by up to $3\times$. Furthermore, DQ executes 10,000$\times$ faster than exhaustive enumeration and more than 10$\times$ faster than left/right-deep enumeration on the largest queries in the benchmark.

          A note on limit results for the Penrose-Banzhaf index. (arXiv:1808.03197v1 [cs.GT])      Cache   Translate Page   Web Page Cache   

Authors: Sascha Kurz

It is well known that the Penrose-Banzhaf index of a weighted game can differ starkly from corresponding weights. Limit results are quite the opposite, i.e., under certain conditions the power distribution approaches the weight distribution. Here we provide parametric examples that give necessary conditions for the existence of limit results for the Penrose-Banzhaf index.

          The Buck-Passing Game. (arXiv:1808.03206v1 [cs.GT])      Cache   Translate Page   Web Page Cache   

Authors: Roberto Cominetti, Matteo Quattropani, Marco Scarsini

We consider a model where agents want to transfer the responsibility of doing a job to one of their neighbors in a social network. This can be considered a network variation of the public good model. The goal of the agents is to see the buck coming back to them as rarely as possible. We frame this situation as a game, called the buck-passing game, where players are the vertices of a directed graph and the strategy space of each player is the set of her out-neighbors. The cost that a player incurs is the expected long term frequency of times she gets the buck. We consider two versions of the game. In the deterministic one the players choose one of their out-neighbors. In the stochastic version they choose a probability vector that determines who of their out-neighbors is chosen. We use the finite improvement property to show that the deterministic buck-passing game admits a pure equilibrium. Under some conditions on the strategy space this is true also for the stochastic version. This is proved by showing the existence of an ordinal potential function. These equilibria are prior-free, that is, they do not depend on the initial distribution according to which the first player having the buck is chosen.

          Testing Implementation of FAMTAR: Adaptive Multipath Routing. (arXiv:1808.03209v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Piotr Jurkiewicz, Robert Wójcik, Jerzy Domżał, Andrzej Kamisiński

Flow-Aware Multi-Topology Adaptive Routing (FAMTAR) is a new approach to multipath and adaptive routing in IP networks which enables automatic use of alternative paths when the primary one becomes congested. It provides more efficient network resource utilization and higher quality of transmission compared to standard IP routing. However, thus far it has only been evaluated through simulations. In this paper we share our experiences from building a real-time FAMTAR router and present results of its tests in a physical network. The results are in line with those obtained previously through simulations and they open the way to implementation of a production grade FAMTAR router.

          Data-driven polynomial chaos expansion for machine learning regression. (arXiv:1808.03216v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: E. Torre, S. Marelli, P. Embrechts, B. Sudret

We present a regression technique for data driven problems based on polynomial chaos expansion (PCE). PCE is a popular technique in the field of uncertainty quantification (UQ), where it is typically used to replace a runnable but expensive computational model subject to random inputs with an inexpensive-to-evaluate polynomial function. The metamodel obtained enables a reliable estimation of the statistics of the output, provided that a suitable probabilistic model of the input is available.

In classical machine learning (ML) regression settings, however, the system is only known through observations of its inputs and output, and the interest lies in obtaining accurate pointwise predictions of the latter. Here, we show that a PCE metamodel purely trained on data can yield pointwise predictions whose accuracy is comparable to that of other ML regression models, such as neural networks and support vector machines. The comparisons are performed on benchmark datasets available from the literature. The methodology also enables the quantification of the output uncertainties and is robust to noise. Furthermore, it enjoys additional desirable properties, such as good performance for small training sets and simplicity of construction, with only little parameter tuning required. In the presence of statistically dependent inputs, we investigate two ways to build the PCE, and show through simulations that one approach is superior to the other in the stated settings.

          Identifying Protein-Protein Interaction using Tree LSTM and Structured Attention. (arXiv:1808.03227v1 [q-bio.QM])      Cache   Translate Page   Web Page Cache   

Authors: Mahtab Ahmed, Jumayel Islam, Muhammad Rifayat Samee, Robert E. Mercer

Identifying interactions between proteins is important to understand underlying biological processes. Extracting a protein-protein interaction (PPI) from the raw text is often very difficult. Previous supervised learning methods have used handcrafted features on human-annotated data sets. In this paper, we propose a novel tree recurrent neural network with structured attention architecture for doing PPI. Our architecture achieves state of the art results (precision, recall, and F1-score) on the AIMed and BioInfer benchmark data sets. Moreover, our models achieve a significant improvement over previous best models without any explicit feature extraction. Our experimental results show that traditional recurrent networks have inferior performance compared to tree recurrent networks for the supervised PPI problem.

          Does Hamiltonian Monte Carlo mix faster than a random walk on multimodal densities?. (arXiv:1808.03230v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Oren Mangoubi, Natesh S. Pillai, Aaron Smith

Hamiltonian Monte Carlo (HMC) is a very popular and generic collection of Markov chain Monte Carlo (MCMC) algorithms. One explanation for the popularity of HMC algorithms is their excellent performance as the dimension $d$ of the target becomes large: under conditions that are satisfied for many common statistical models, optimally-tuned HMC algorithms have a running time that scales like $d^{0.25}$. In stark contrast, the running time of the usual Random-Walk Metropolis (RWM) algorithm, optimally tuned, scales like $d$. This superior scaling of the HMC algorithm with dimension is attributed to the fact that it, unlike RWM, incorporates the gradient information in the proposal distribution. In this paper, we investigate a different scaling question: does HMC beat RWM for highly $\textit{multimodal}$ targets? We find that the answer is often $\textit{no}$. We compute the spectral gaps for both the algorithms for a specific class of multimodal target densities, and show that they are identical. The key reason is that, within one mode, the gradient is effectively ignorant about other modes, thus negating the advantage the HMC algorithm enjoys in unimodal targets. We also give heuristic arguments suggesting that the above observation may hold quite generally. Our main tool for answering this question is a novel simple formula for the conductance of HMC using Liouville's theorem. This result allows us to compute the spectral gap of HMC algorithms, for both the classical HMC with isotropic momentum and the recent Riemannian HMC, for multimodal targets.

          Deep Video Color Propagation. (arXiv:1808.03232v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Simone Meyer, Victor Cornillère, Abdelaziz Djelouah, Christopher Schroers, Markus Gross

Traditional approaches for color propagation in videos rely on some form of matching between consecutive video frames. Using appearance descriptors, colors are then propagated both spatially and temporally. These methods, however, are computationally expensive and do not take advantage of semantic information of the scene. In this work we propose a deep learning framework for color propagation that combines a local strategy, to propagate colors frame-by-frame ensuring temporal stability, and a global strategy, using semantics for color propagation within a longer range. Our evaluation shows the superiority of our strategy over existing video and image color propagation methods as well as neural photo-realistic style transfer approaches.

          OBOE: Collaborative Filtering for AutoML Initialization. (arXiv:1808.03233v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Chengrun Yang, Yuji Akimoto, Dae Won Kim, Madeleine Udell

Algorithm selection and hyperparameter tuning remain two of the most challenging tasks in machine learning. The number of machine learning applications is growing much faster than the number of machine learning experts, hence we see an increasing demand for efficient automation of learning processes. Here, we introduce OBOE, an algorithm for time-constrained model selection and hyperparameter tuning. Taking advantage of similarity between datasets, OBOE finds promising algorithm and hyperparameter configurations through collaborative filtering. Our system explores these models under time constraints, so that rapid initializations can be provided to warm-start more fine-grained optimization methods. One novel aspect of our approach is a new heuristic for active learning in time-constrained matrix completion based on optimal experiment design. Our experiments demonstrate that OBOE delivers state-of-the-art performance faster than competing approaches on a test bed of supervised learning problems.

          User-Guided Deep Anime Line Art Colorization with Conditional Adversarial Networks. (arXiv:1808.03240v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Yuanzheng Ci, Xinzhu Ma, Zhihui Wang, Haojie Li, Zhongxuan Luo

Scribble colors based line art colorization is a challenging computer vision problem since neither greyscale values nor semantic information is presented in line arts, and the lack of authentic illustration-line art training pairs also increases difficulty of model generalization. Recently, several Generative Adversarial Nets (GANs) based methods have achieved great success. They can generate colorized illustrations conditioned on given line art and color hints. However, these methods fail to capture the authentic illustration distributions and are hence perceptually unsatisfying in the sense that they are often lack of accurate shading. To address these challenges, we propose a novel deep conditional adversarial architecture for scribble based anime line art colorization. Specifically, we integrate the conditional framework with WGAN-GP criteria as well as the perceptual loss to enable us to robustly train a deep network that makes the synthesized images more natural and real. We also introduce a local features network that is independent of synthetic data. With GANs conditioned on features from such network, we notably increase the generalization capability over "in the wild" line arts. Furthermore, we collect two datasets that provide high-quality colorful illustrations and authentic line arts for training and benchmarking. With the proposed model trained on our illustration dataset, we demonstrate that images synthesized by the presented approach are considerably more realistic and precise than alternative approaches.

          Augmenting Physical Simulators with Stochastic Neural Networks: Case Study of Planar Pushing and Bouncing. (arXiv:1808.03246v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Anurag Ajay, Jiajun Wu, Nima Fazeli, Maria Bauza, Leslie P. Kaelbling, Joshua B. Tenenbaum, Alberto Rodriguez

An efficient, generalizable physical simulator with universal uncertainty estimates has wide applications in robot state estimation, planning, and control. In this paper, we build such a simulator for two scenarios, planar pushing and ball bouncing, by augmenting an analytical rigid-body simulator with a neural network that learns to model uncertainty as residuals. Combining symbolic, deterministic simulators with learnable, stochastic neural nets provides us with expressiveness, efficiency, and generalizability simultaneously. Our model outperforms both purely analytical and purely learned simulators consistently on real, standard benchmarks. Compared with methods that model uncertainty using Gaussian processes, our model runs much faster, generalizes better to new object shapes, and is able to characterize the complex distribution of object trajectories.

          3D Shape Perception from Monocular Vision, Touch, and Shape Priors. (arXiv:1808.03247v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Shaoxiong Wang, Jiajun Wu, Xingyuan Sun, Wenzhen Yuan, William T. Freeman, Joshua B. Tenenbaum, Edward H. Adelson

Perceiving accurate 3D object shape is important for robots to interact with the physical world. Current research along this direction has been primarily relying on visual observations. Vision, however useful, has inherent limitations due to occlusions and the 2D-3D ambiguities, especially for perception with a monocular camera. In contrast, touch gets precise local shape information, though its efficiency for reconstructing the entire shape could be low. In this paper, we propose a novel paradigm that efficiently perceives accurate 3D object shape by incorporating visual and tactile observations, as well as prior knowledge of common object shapes learned from large-scale shape repositories. We use vision first, applying neural networks with learned shape priors to predict an object's 3D shape from a single-view color image. We then use tactile sensing to refine the shape; the robot actively touches the object regions where the visual prediction has high uncertainty. Our method efficiently builds the 3D shape of common objects from a color image and a small number of tactile explorations (around 10). Our setup is easy to apply and has potentials to help robots better perform grasping or manipulation tasks on real-world objects.

          Counterfactual Normalization: Proactively Addressing Dataset Shift and Improving Reliability Using Causal Mechanisms. (arXiv:1808.03253v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Adarsh Subbaswamy, Suchi Saria

Predictive models can fail to generalize from training to deployment environments because of dataset shift, posing a threat to model reliability and the safety of downstream decisions made in practice. Instead of using samples from the target distribution to reactively correct dataset shift, we use graphical knowledge of the causal mechanisms relating variables in a prediction problem to proactively remove relationships that do not generalize across environments, even when these relationships may depend on unobserved variables (violations of the "no unobserved confounders" assumption). To accomplish this, we identify variables with unstable paths of statistical influence and remove them from the model. We also augment the causal graph with latent counterfactual variables that isolate unstable paths of statistical influence, allowing us to retain stable paths that would otherwise be removed. Our experiments demonstrate that models that remove vulnerable variables and use estimates of the latent variables transfer better, often outperforming in the target domain despite some accuracy loss in the training domain.

          Ethnographie de la structuration d'un corpus collectif de messages de soutien social en ligne. (arXiv:1808.03256v1 [cs.DL])      Cache   Translate Page   Web Page Cache   

Authors: Goritsa Ninova (Tech-CICO), Hassan Atifi (Tech-CICO)

In this paper, we propose a study of progressive development of the structure of corpus collected starting from the discussion forums. These are the first results from an ethnographic description of constitution and analysis practices of a corpus located within an interdisciplinary project. At first, we describe the personal digital documents folder of a researcher, relative to his corpus analysis of interactions of social support online. Next, we examine the constitution of a shared corpus, result of the pooling of individual corpora, small size, produced by researchers participating in the project, each individual corpus reflecting his producer's perspectives of research.

          Application of Bounded Total Variation Denoising in Urban Traffic Analysis. (arXiv:1808.03258v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Shanshan Tang, Haijun Yu

While it is believed that denoising is not always necessary in many big data applications, we show in this paper that denoising is helpful in urban traffic analysis by applying the method of bounded total variation denoising to the urban road traffic prediction and clustering problem. We propose two easy-to-implement methods to estimate the noise strength parameter in the denoising algorithm, and apply the denoising algorithm to GPS-based traffic data from Beijing taxi system. For the traffic prediction problem, we combine neural network and history matching method for roads randomly chosen from an urban area of Beijing. Numerical experiments show that the predicting accuracy is improved significantly by applying the proposed bounded total variation denoising algorithm. We also test the algorithm on clustering problem, where a recently developed clustering analysis method is applied to more than one hundred urban road segments in Beijing based on their velocity profiles. Better clustering result is obtained after denoising.

          Few Cuts Meet Many Point Sets. (arXiv:1808.03260v1 [cs.CG])      Cache   Translate Page   Web Page Cache   

Authors: Sariel Har-Peled, Mitchell Jones

We study the problem of how to breakup many point sets in $\mathbb{R}^d$ into smaller parts using a few splitting (shared) hyperplanes. This problem is related to the classical Ham-Sandwich Theorem. We provide a logarithmic approximation to the optimal solution using the greedy algorithm for submodular optimization.

          The KIT Motion-Language Dataset. (arXiv:1607.03827v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Matthias Plappert, Christian Mandery, Tamim Asfour

Linking human motion and natural language is of great interest for the generation of semantic representations of human activities as well as for the generation of robot activities based on natural language input. However, while there have been years of research in this area, no standardized and openly available dataset exists to support the development and evaluation of such systems. We therefore propose the KIT Motion-Language Dataset, which is large, open, and extensible. We aggregate data from multiple motion capture databases and include them in our dataset using a unified representation that is independent of the capture system or marker set, making it easy to work with the data regardless of its origin. To obtain motion annotations in natural language, we apply a crowd-sourcing approach and a web-based tool that was specifically build for this purpose, the Motion Annotation Tool. We thoroughly document the annotation process itself and discuss gamification methods that we used to keep annotators motivated. We further propose a novel method, perplexity-based selection, which systematically selects motions for further annotation that are either under-represented in our dataset or that have erroneous annotations. We show that our method mitigates the two aforementioned problems and ensures a systematic annotation process. We provide an in-depth analysis of the structure and contents of our resulting dataset, which, as of October 10, 2016, contains 3911 motions with a total duration of 11.23 hours and 6278 annotations in natural language that contain 52,903 words. We believe this makes our dataset an excellent choice that enables more transparent and comparable research in this important area.

          Steerable Principal Components for Space-Frequency Localized Images. (arXiv:1608.02702v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Boris Landa, Yoel Shkolnisky

This paper describes a fast and accurate method for obtaining steerable principal components from a large dataset of images, assuming the images are well localized in space and frequency. The obtained steerable principal components are optimal for expanding the images in the dataset and all of their rotations. The method relies upon first expanding the images using a series of two-dimensional Prolate Spheroidal Wave Functions (PSWFs), where the expansion coefficients are evaluated using a specially designed numerical integration scheme. Then, the expansion coefficients are used to construct a rotationally-invariant covariance matrix which admits a block-diagonal structure, and the eigen-decomposition of its blocks provides us with the desired steerable principal components. The proposed method is shown to be faster then existing methods, while providing appropriate error bounds which guarantee its accuracy.

          Exploring the Function Space of Deep-Learning Machines. (arXiv:1708.01422v3 [cond-mat.dis-nn] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Bo Li, David Saad

The function space of deep-learning machines is investigated by studying growth in the entropy of functions of a given error with respect to a reference function, realized by a deep-learning machine. Using physics-inspired methods we study both sparsely and densely-connected architectures to discover a layer-wise convergence of candidate functions, marked by a corresponding reduction in entropy when approaching the reference function, gain insight into the importance of having a large number of layers, and observe phase transitions as the error increases.

          Bayesian bandits: balancing the exploration-exploitation tradeoff via double sampling. (arXiv:1709.03162v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Iñigo Urteaga, Chris H. Wiggins

Reinforcement learning studies how to balance exploration and exploitation in real-world systems, optimizing interactions with the world while simultaneously learning how the world operates. One general class of algorithms for such learning is the multi-armed bandit setting. Randomized probability matching, based upon the Thompson sampling approach introduced in the 1930s, has recently been shown to perform well and to enjoy provable optimality properties. It permits generative, interpretable modeling in a Bayesian setting, where prior knowledge is incorporated, and the computed posteriors naturally capture the full state of knowledge. In this work, we harness the information contained in the Bayesian posterior and estimate its sufficient statistics via sampling. In several application domains, for example in health and medicine, each interaction with the world can be expensive and invasive, whereas drawing samples from the model is relatively inexpensive. Exploiting this viewpoint, we develop a double sampling technique driven by the uncertainty in the learning process: it favors exploitation when certain about the properties of each arm, exploring otherwise. The proposed algorithm does not make any distributional assumption and it is applicable to complex reward distributions, as long as Bayesian posterior updates are computable. Utilizing the estimated posterior sufficient statistics, double sampling autonomously balances the exploration-exploitation tradeoff to make better informed decisions. We empirically show its reduced cumulative regret when compared to state-of-the-art alternatives in representative bandit settings.

          Variational inference for the multi-armed contextual bandit. (arXiv:1709.03163v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Iñigo Urteaga, Chris H. Wiggins

In many biomedical, science, and engineering problems, one must sequentially decide which action to take next so as to maximize rewards. One general class of algorithms for optimizing interactions with the world, while simultaneously learning how the world operates, is the multi-armed bandit setting and, in particular, the contextual bandit case. In this setting, for each executed action, one observes rewards that are dependent on a given 'context', available at each interaction with the world. The Thompson sampling algorithm has recently been shown to enjoy provable optimality properties for this set of problems, and to perform well in real-world settings. It facilitates generative and interpretable modeling of the problem at hand. Nevertheless, the design and complexity of the model limit its application, since one must both sample from the distributions modeled and calculate their expected rewards. We here show how these limitations can be overcome using variational inference to approximate complex models, applying to the reinforcement learning case advances developed for the inference case in the machine learning community over the past two decades. We consider contextual multi-armed bandit applications where the true reward distribution is unknown and complex, which we approximate with a mixture model whose parameters are inferred via variational inference. We show how the proposed variational Thompson sampling approach is accurate in approximating the true distribution, and attains reduced regrets even with complex reward distributions. The proposed algorithm is valuable for practical scenarios where restrictive modeling assumptions are undesirable.

          APPD: Adaptive and Precise Pupil Boundary Detection using Entropy of Contour Gradients. (arXiv:1709.06366v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Cihan Topal, Halil Ibrahim Cakir, Cuneyt Akinlar

Eye tracking spreads through a vast area of applications from ophthalmology, assistive technologies to gaming and virtual reality. Precisely detecting the pupil's contour and center is the very first step in many of these tasks, hence needs to be performed accurately. Although detection of pupil is a simple problem when it is entirely visible; occlusions and oblique view angles complicate the solution. In this study, we propose APPD, an adaptive and precise pupil boundary detection method that is able to infer whether entire pupil is in clearly visible by a heuristic that estimates the shape of a contour in a computationally efficient way. Thus, a faster detection is performed with the assumption of no occlusions. If the heuristic fails, a more comprehensive search among extracted image features is executed to maintain accuracy. Furthermore, the algorithm can find out if there is no pupil as an helpful information for many applications. We provide a dataset containing 3904 high resolution eye images collected from 12 subjects and perform an extensive set of experiments to obtain quantitative results in terms of accuracy, localization and timing. The proposed method outperforms three other state of the art algorithms and has an average execution time $\sim$5 ms in single-thread on a standard laptop computer for 720p images.

          Neural and Synaptic Array Transceiver: A Brain-Inspired Computing Framework for Embedded Learning. (arXiv:1709.10205v3 [cs.NE] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Georgios Detorakis, Sadique Sheik, Charles Augustine, Somnath Paul, Bruno U. Pedroni, Nikil Dutt, Jeffrey Krichmar, Gert Cauwenberghs, Emre Neftci

Embedded, continual learning for autonomous and adaptive behavior is a key application of neuromorphic hardware. However, neuromorphic implementations of embedded learning at large scales that are both flexible and efficient have been hindered by a lack of a suitable algorithmic framework. As a result, the most neuromorphic hardware is trained off-line on large clusters of dedicated processors or GPUs and transferred post hoc to the device. We address this by introducing the neural and synaptic array transceiver (NSAT), a neuromorphic computational framework facilitating flexible and efficient embedded learning by matching algorithmic requirements and neural and synaptic dynamics. NSAT supports event-driven supervised, unsupervised and reinforcement learning algorithms including deep learning. We demonstrate the NSAT in a wide range of tasks, including the simulation of Mihalas-Niebur neuron, dynamic neural fields, event-driven random back-propagation for event-based deep learning, event-based contrastive divergence for unsupervised learning, and voltage-based learning rules for sequence learning. We anticipate that this contribution will establish the foundation for a new generation of devices enabling adaptive mobile systems, wearable devices, and robots with data-driven autonomy.

          Exponential improvements for quantum-accessible reinforcement learning. (arXiv:1710.11160v3 [quant-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Vedran Dunjko, Yi-Kai Liu, Xingyao Wu, Jacob M. Taylor

Quantum computers can offer dramatic improvements over classical devices for data analysis tasks such as prediction and classification. However, less is known about the advantages that quantum computers may bring in the setting of reinforcement learning, where learning is achieved via interaction with a task environment. Here, we consider a special case of reinforcement learning, where the task environment allows quantum access. In addition, we impose certain "naturalness" conditions on the task environment, which rule out the kinds of oracle problems that are studied in quantum query complexity (and for which quantum speedups are well-known). Within this framework of quantum-accessible reinforcement learning environments, we demonstrate that quantum agents can achieve exponential improvements in learning efficiency, surpassing previous results that showed only quadratic improvements. A key step in the proof is to construct task environments that encode well-known oracle problems, such as Simon's problem and Recursive Fourier Sampling, while satisfying the above "naturalness" conditions for reinforcement learning. Our results suggest that quantum agents may perform well in certain game-playing scenarios, where the game has recursive structure, and the agent can learn by playing against itself.

          Energy-Efficient Transmission Strategies for CoMP Downlink - Overview, Extension, and Numerical Comparison. (arXiv:1711.07783v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Kien-Giang Nguyen, Oskari Tervo, Quang-Doanh Vu, Le-Nam Tran, Markku Juntti

This paper focuses on energy-efficient coordinated multi-point (CoMP) downlink in multi-antenna multi-cell wireless communications systems. We provide an overview of transmit beamforming designs for various energy efficiency (EE) metrics including maximizing the overall network EE, sum weighted EE and fairness EE. Generally, an EE optimization problem is a nonconvex program for which finding the globally optimal solutions requires high computational effort. Consequently, several low-complexity suboptimal approaches have been proposed. Here we sum up the main concepts of the recently proposed algorithms based on the state-of-the-art successive convex approximation (SCA) framework. Moreover, we discuss the application to the newly posted EE problems including new EE metrics and power consumption models. Furthermore, distributed implementation developed based on alternating direction method of multipliers (ADMM) for the provided solutions is also discussed. For the sake of completeness, we provide numerical comparison of the SCA based approaches and the conventional solutions developed based on parametric transformations (PTs). We also demonstrate the differences and roles of different EE objectives and power consumption models.

          A variational inequality framework for network games: Existence, uniqueness, convergence and sensitivity analysis. (arXiv:1712.08277v2 [cs.GT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Francesca Parise, Asuman Ozdaglar

We provide a unified variational inequality framework for the study of fundamental properties of the Nash equilibrium in network games. We identify several conditions on the underlying network (in terms of spectral norm, infinity norm and minimum eigenvalue of its adjacency matrix) that guarantee existence, uniqueness, convergence and continuity of equilibrium in general network games with multidimensional and possibly constrained strategy sets. We delineate the relations between these conditions and characterize classes of networks that satisfy each of these conditions.

          Spurious Local Minima are Common in Two-Layer ReLU Neural Networks. (arXiv:1712.08968v3 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Itay Safran, Ohad Shamir

We consider the optimization problem associated with training simple ReLU neural networks of the form $\mathbf{x}\mapsto \sum_{i=1}^{k}\max\{0,\mathbf{w}_i^\top \mathbf{x}\}$ with respect to the squared loss. We provide a computer-assisted proof that even if the input distribution is standard Gaussian, even if the dimension is arbitrarily large, and even if the target values are generated by such a network, with orthonormal parameter vectors, the problem can still have spurious local minima once $6\le k\le 20$. By a concentration of measure argument, this implies that in high input dimensions, \emph{nearly all} target networks of the relevant sizes lead to spurious local minima. Moreover, we conduct experiments which show that the probability of hitting such local minima is quite high, and increasing with the network size. On the positive side, mild over-parameterization appears to drastically reduce such local minima, indicating that an over-parameterization assumption is necessary to get a positive result in this setting.

          Semantic Segmentation of Human Thigh Quadriceps Muscle in Magnetic Resonance Images. (arXiv:1801.00415v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ezak Ahmad, Manu Goyal, Jamie S. McPhee, Hans Degens, Moi Hoon Yap

This paper presents an end-to-end solution for MRI thigh quadriceps segmentation. This is the first attempt that deep learning methods are used for the MRI thigh segmentation task. We use the state-of-the-art Fully Convolutional Networks with transfer learning approach for the semantic segmentation of regions of interest in MRI thigh scans. To further improve the performance of the segmentation, we propose a post-processing technique using basic image processing methods. With our proposed method, we have established a new benchmark for MRI thigh quadriceps segmentation with mean Jaccard Similarity Index of 0.9502 and processing time of 0.117 second per image.

          Soft Actor-Critic: Off-Policy Maximum Entropy Deep Reinforcement Learning with a Stochastic Actor. (arXiv:1801.01290v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Tuomas Haarnoja, Aurick Zhou, Pieter Abbeel, Sergey Levine

Model-free deep reinforcement learning (RL) algorithms have been demonstrated on a range of challenging decision making and control tasks. However, these methods typically suffer from two major challenges: very high sample complexity and brittle convergence properties, which necessitate meticulous hyperparameter tuning. Both of these challenges severely limit the applicability of such methods to complex, real-world domains. In this paper, we propose soft actor-critic, an off-policy actor-critic deep RL algorithm based on the maximum entropy reinforcement learning framework. In this framework, the actor aims to maximize expected reward while also maximizing entropy. That is, to succeed at the task while acting as randomly as possible. Prior deep RL methods based on this framework have been formulated as Q-learning methods. By combining off-policy updates with a stable stochastic actor-critic formulation, our method achieves state-of-the-art performance on a range of continuous control benchmark tasks, outperforming prior on-policy and off-policy methods. Furthermore, we demonstrate that, in contrast to other off-policy algorithms, our approach is very stable, achieving very similar performance across different random seeds.

          Estimating the Number of Connected Components in a Graph via Subgraph Sampling. (arXiv:1801.04339v2 [math.ST] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jason M. Klusowski, Yihong Wu

Learning properties of large graphs from samples has been an important problem in statistical network analysis since the early work of Goodman \cite{Goodman1949} and Frank \cite{Frank1978}. We revisit a problem formulated by Frank \cite{Frank1978} of estimating the number of connected components in a large graph based on the subgraph sampling model, in which we randomly sample a subset of the vertices and observe the induced subgraph. The key question is whether accurate estimation is achievable in the \emph{sublinear} regime where only a vanishing fraction of the vertices are sampled. We show that it is impossible if the parent graph is allowed to contain high-degree vertices or long induced cycles. For the class of chordal graphs, where induced cycles of length four or above are forbidden, we characterize the optimal sample complexity within constant factors and construct linear-time estimators that provably achieve these bounds. This significantly expands the scope of previous results which have focused on unbiased estimators and special classes of graphs such as forests or cliques.

Both the construction and the analysis of the proposed methodology rely on combinatorial properties of chordal graphs and identities of induced subgraph counts. They, in turn, also play a key role in proving minimax lower bounds based on construction of random instances of graphs with matching structures of small subgraphs.

          Multi-Label Learning from Medical Plain Text with Convolutional Residual Models. (arXiv:1801.05062v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Xinyuan Zhang, Ricardo Henao, Zhe Gan, Yitong Li, Lawrence Carin

Predicting diagnoses from Electronic Health Records (EHRs) is an important medical application of multi-label learning. We propose a convolutional residual model for multi-label classification from doctor notes in EHR data. A given patient may have multiple diagnoses, and therefore multi-label learning is required. We employ a Convolutional Neural Network (CNN) to encode plain text into a fixed-length sentence embedding vector. Since diagnoses are typically correlated, a deep residual network is employed on top of the CNN encoder, to capture label (diagnosis) dependencies and incorporate information directly from the encoded sentence vector. A real EHR dataset is considered, and we compare the proposed model with several well-known baselines, to predict diagnoses based on doctor notes. Experimental results demonstrate the superiority of the proposed convolutional residual model.

          Astor: Exploring the Design Space of Generate-and-Validate Program Repair beyond GenProg. (arXiv:1802.03365v2 [cs.SE] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Matias Martinez, Martin Monperrus

During last years, researches have proposed novel repair approaches that automatically generate patches for repairing software bugs. Repair approaches can be loosely characterized along the main design philosophy such generate- and-validate or synthesis-based. Each of those repair approaches is a point in the design space of program repair. Our goal is to facilitate the design, development and evaluation of repair approaches by providing a framework that: a) contains components commonly present in approaches implementations thus new approaches can be built over them, b) provides built-in implementations of existing repair approach. This paper presents a framework named Astor that encores the design space of generate-and-validate repair approaches. Astor provides extension points that form the explicit decision space of program repair. Over those extension points, researchers can reuse existing components or implements new ones. Astor includes 6 Java implementation of repair approaches, including one of the pioneer: GenProg. Researcher have been already defining new approaches over Astor, proposing improvements of those built-in approaches by using the extension points, and executing approaches implementations from Astor in their evaluations. The implementations of the repair approaches built over Astor are capable of repair, in total, 98 real bugs from 5 large Java programs.

          An Overview of Physical Layer Security with Finite-Alphabet Signaling. (arXiv:1802.06401v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Sina Rezaei Aghdam, Alireza Nooraiepour, Tolga M. Duman

Providing secure communications over the physical layer with the objective of achieving perfect secrecy without requiring a secret key has been receiving growing attention within the past decade. The vast majority of the existing studies in the area of physical layer security focus exclusively on the scenarios where the channel inputs are Gaussian distributed. However, in practice, the signals employed for transmission are drawn from discrete signal constellations such as phase shift keying and quadrature amplitude modulation. Hence, understanding the impact of the finite-alphabet input constraints and designing secure transmission schemes under this assumption is a mandatory step towards a practical implementation of physical layer security. With this motivation, this article reviews recent developments on physical layer security with finite-alphabet inputs. We explore transmit signal design algorithms for single-antenna as well as multi-antenna wiretap channels under different assumptions on the channel state information at the transmitter. Moreover, we present a review of the recent results on secure transmission with discrete signaling for various scenarios including multi-carrier transmission systems, broadcast channels with confidential messages, cognitive multiple access and relay networks. Throughout the article, we stress the important behavioral differences of discrete versus Gaussian inputs in the context of the physical layer security. We also present an overview of practical code construction over Gaussian and fading wiretap channels, and we discuss some open problems and directions for future research.

          Inapproximability of Matrix $p\rightarrow q$ Norms. (arXiv:1802.07425v2 [cs.CC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Vijay Bhattiprolu, Mrinalkanti Ghosh, Venkatesan Guruswami, Euiwoong Lee, Madhur Tulsiani

We study the problem of computing the $p\rightarrow q$ norm of a matrix $A \in R^{m \times n}$, defined as \[ \|A\|_{p\rightarrow q} ~:=~ \max_{x \,\in\, R^n \setminus \{0\}} \frac{\|Ax\|_q}{\|x\|_p} \] This problem generalizes the spectral norm of a matrix ($p=q=2$) and the Grothendieck problem ($p=\infty$, $q=1$), and has been widely studied in various regimes. When $p \geq q$, the problem exhibits a dichotomy: constant factor approximation algorithms are known if $2 \in [q,p]$, and the problem is hard to approximate within almost polynomial factors when $2 \notin [q,p]$.

The regime when $p < q$, known as \emph{hypercontractive norms}, is particularly significant for various applications but much less well understood. The case with $p = 2$ and $q > 2$ was studied by [Barak et al, STOC'12] who gave sub-exponential algorithms for a promise version of the problem (which captures small-set expansion) and also proved hardness of approximation results based on the Exponential Time Hypothesis. However, no NP-hardness of approximation is known for these problems for any $p < q$.

We study the hardness of approximating matrix norms in both the above cases and prove the following results:

- We show that for any $1< p < q < \infty$ with $2 \notin [p,q]$, $\|A\|_{p\rightarrow q}$ is hard to approximate within $2^{O(\log^{1-\epsilon}\!n)}$ assuming $NP \not\subseteq BPTIME(2^{\log^{O(1)}\!n})$. This suggests that, similar to the case of $p \geq q$, the hypercontractive setting may be qualitatively different when $2$ does not lie between $p$ and $q$.

- For all $p \geq q$ with $2 \in [q,p]$, we show $\|A\|_{p\rightarrow q}$ is hard to approximate within any factor than $1/(\gamma_{p^*} \cdot \gamma_q)$, where for any $r$, $\gamma_r$ denotes the $r^{th}$ norm of a gaussian, and $p^*$ is the dual norm of $p$.

          Security: Doing Whatever is Needed... and Not a Thing More!. (arXiv:1802.08915v2 [cs.CR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Omer Katz, Benjamin Livshits

As malware, exploits, and cyber-attacks advance over time, so do the mitigation techniques available to the user. However, while attackers often abandon one form of exploitation in favor of a more lucrative one, mitigation techniques are rarely abandoned. Mitigations are rarely retired or disabled since proving they have outlived their usefulness is often impossible. As a result, performance overheads, maintenance costs, and false positive rates induced by the different mitigations accumulate, culminating in an outdated, inefficient, and costly security solution.

We advocate for a new kind of tunable framework on which to base security mechanisms. This new framework enables a more reactive approach to security allowing us to optimize the deployment of security mechanisms based on the current state of attacks. Based on actual evidence of exploitation collected from the field, our framework can choose which mechanisms to enable/disable so that we can minimize the overall costs and false positive rates while maintaining a satisfactory level of security in the system.

We use real-world Snort signatures to simulate the benefits of reactively disabling signatures when no evidence of exploitation is observed and compare them to the costs of the current state of deployment. Additionally, we evaluate the responsiveness of our framework and show that in case disabling a security mechanism triggers a reappearance of an attack we can respond in time to prevent mass exploitation.

Through large-scale simulations that use integer linear and Bayesian solvers, we discover that our responsive strategy is both computationally affordable and results in significant reductions in false positives (~20% over traces that are about 9 years long), at the cost of introducing a moderate number of false negatives. Finding the optimal sampling strategy takes less than 2.5 minutes in the vast majority of cases.

          Robust Power Flow and Three-Phase Power Flow Analyses. (arXiv:1803.01211v2 [eess.SP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Amritanshu Pandey, Marko Jereminov, Martin R. Wagner, David M. Bromberg, Gabriela Hug, Larry Pileggi

Robust simulation is essential for reliable operation and planning of transmission and distribution power grids. At present, disparate methods exist for steady-state analysis of the transmission (power flow) and distribution power grid (three-phase power flow). Due to the non-linear nature of the problem, it is difficult for alternating current (AC) power flow and three-phase power flow analyses to ensure convergence to the correct physical solution, particularly from arbitrary initial conditions, or when evaluating a change (e.g. contingency) in the grid. In this paper, we describe our equivalent circuit formulation approach with current and voltage variables that models both the positive sequence network of the transmission grid and three-phase network of the distribution grid without loss of generality. The proposed circuit models and formalism enable the extension and application of circuit simulation techniques to solve for the steady-state solution with excellent robustness of convergence. Examples for positive sequence transmission and three-phase distribution systems, including actual 75k+ nodes Eastern Interconnection transmission test cases and 8k+ nodes taxonomy distribution test cases, are solved from arbitrary initial guesses to demonstrate the efficacy of our approach.

          Noise2Noise: Learning Image Restoration without Clean Data. (arXiv:1803.04189v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jaakko Lehtinen, Jacob Munkberg, Jon Hasselgren, Samuli Laine, Tero Karras, Miika Aittala, Timo Aila

We apply basic statistical reasoning to signal reconstruction by machine learning -- learning to map corrupted observations to clean signals -- with a simple and powerful conclusion: it is possible to learn to restore images by only looking at corrupted examples, at performance at and sometimes exceeding training using clean data, without explicit image priors or likelihood models of the corruption. In practice, we show that a single model learns photographic noise removal, denoising synthetic Monte Carlo images, and reconstruction of undersampled MRI scans -- all corrupted by different processes -- based on noisy data only.

          Multi-user Multi-task Offloading and Resource Allocation in Mobile Cloud Systems. (arXiv:1803.06577v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Meng-Hsi Chen, Ben Liang, Min Dong

We consider a general multi-user Mobile Cloud Computing (MCC) system where each mobile user has multiple independent tasks. These mobile users share the computation and communication resources while offloading tasks to the cloud. We study both the conventional MCC where tasks are offloaded to the cloud through a wireless access point, and MCC with a computing access point (CAP), where the CAP serves both as the network access gateway and a computation service provider to the mobile users. We aim to jointly optimize the offloading decisions of all users as well as the allocation of computation and communication resources, to minimize the overall cost of energy, computation, and delay for all users. The optimization problem is formulated as a non-convex quadratically constrained quadratic program, which is NP-hard in general. For the case without a CAP, an efficient approximate solution named MUMTO is proposed by using separable semidefinite relaxation (SDR), followed by recovery of the binary offloading decision and optimal allocation of the communication resource. To solve the more complicated problem with a CAP, we further propose an efficient three-step algorithm named MUMTO-C comprising of generalized MUMTO SDR with CAP, alternating optimization, and sequential tuning, which always computes a locally optimal solution. For performance benchmarking, we further present numerical lower bounds of the minimum system cost with and without the CAP. By comparison with this lower bound, our simulation results show that the proposed solutions for both scenarios give nearly optimal performance under various parameter settings, and the resultant efficient utilization of a CAP can bring substantial cost benefit.

          Towards Open-Set Identity Preserving Face Synthesis. (arXiv:1803.11182v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jianmin Bao, Dong Chen, Fang Wen, Houqiang Li, Gang Hua

We propose a framework based on Generative Adversarial Networks to disentangle the identity and attributes of faces, such that we can conveniently recombine different identities and attributes for identity preserving face synthesis in open domains. Previous identity preserving face synthesis processes are largely confined to synthesizing faces with known identities that are already in the training dataset. To synthesize a face with identity outside the training dataset, our framework requires one input image of that subject to produce an identity vector, and any other input face image to extract an attribute vector capturing, e.g., pose, emotion, illumination, and even the background. We then recombine the identity vector and the attribute vector to synthesize a new face of the subject with the extracted attribute. Our proposed framework does not need to annotate the attributes of faces in any way. It is trained with an asymmetric loss function to better preserve the identity and stabilize the training process. It can also effectively leverage large amounts of unlabeled training face images to further improve the fidelity of the synthesized faces for subjects that are not presented in the labeled training face dataset. Our experiments demonstrate the efficacy of the proposed framework. We also present its usage in a much broader set of applications including face frontalization, face attribute morphing, and face adversarial example detection.

          Uniqueness for the 3-State Antiferromagnetic Potts Model on the Tree. (arXiv:1804.03514v3 [cs.DM] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Andreas Galanis, Leslie Ann Goldberg, Kuan Yang

The antiferromagnetic $q$-state Potts model is perhaps the most canonical model for which the uniqueness threshold on the tree is not yet understood, largely because of the absence of monotonicities. Jonasson established the uniqueness threshold in the zero-temperature case, which corresponds to the $q$-colourings model. In the permissive case (where the temperature is positive), the Potts model has an extra parameter $\beta\in(0,1)$, which makes the task of analysing the uniqueness threshold even harder and much less is known.

In this paper, we focus on the case $q=3$ and give a detailed analysis of the Potts model on the tree by refining Jonasson's approach. In particular, we establish the uniqueness threshold on the $d$-ary tree for all values of $d\geq 2$. When $d\geq3$, we show that the 3-state antiferromagnetic Potts model has uniqueness for all $\beta\geq 1-3/(d+1)$. The case $d=2$ is critical since it relates to the 3-colourings model on the binary tree ($\beta=0$), which has non-uniqueness. Nevertheless, we show that the Potts model has uniqueness for all $\beta\in (0,1)$ on the binary tree. Both of these results are tight since it is known that uniqueness does not hold in the complementary regime.

Our proof technique gives for general $q>3$ an analytical condition for proving uniqueness based on the two-step recursion on the tree, which we conjecture to be sufficient to establish the uniqueness threshold for all non-critical cases ($q\neq d+1$).

          An Improvement of Non-binary Code Correcting Single b-Burst of Insertions or Deletions. (arXiv:1804.04824v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Toyohiko Saeki, Takayuki Nozaki

This paper constructs a non-binary code correcting a single $b$-burst of insertions or deletions with a large cardinality. This paper also proposes a decoding algorithm of this code and evaluates a lower bound of the cardinality of this code. Moreover, we evaluate an asymptotic upper bound on the cardinality of codes which correct a single burst of insertions or deletions.

          A Multi-task Selected Learning Approach for Solving New Type 3D Bin Packing Problem. (arXiv:1804.06896v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Haoyuan Hu, Lu Duan, Yu Gong, Kenny Zhu, Xiaodong Zhang, Yinghui Xu, Jiangwen Wei

This paper studies a new type of 3D bin packing problem (BPP), in which a number of cuboid-shaped items must be put into a bin one by one orthogonally. The objective is to find a way to place these items that can minimize the surface area of the bin. This problem is based on the fact that there is no fixed-sized bin in many real business scenarios and the cost of a bin is proportional to its surface area. Based on previous research on 3D BPP, the surface area is determined by the sequence, spatial locations and orientations of items. It is a new NP-hard combinatorial optimization problem on unfixed-sized bin packing, for which we propose a multi-task framework based on Selected Learning, generating the sequence and orientations of items packed into the bin simultaneously. During training steps, Selected Learning chooses one of loss functions derived from Deep Reinforcement Learning and Supervised Learning corresponding to the training procedure. Numerical results show that the method proposed significantly outperforms Lego baselines by a substantial gain of 7.52%. Moreover, we produce large scale 3D Bin Packing order data set for studying bin packing problems and will release it to the research community.

          Subgame Perfect Equilibria of Sequential Matching Games. (arXiv:1804.10353v2 [cs.GT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yasushi Kawase, Yutaro Yamaguchi, Yu Yokoi

We study a decentralized matching market in which firms sequentially make offers to potential workers. For each offer, the worker can choose "accept" or "reject," but the decision is irrevocable. The acceptance of an offer guarantees her job at the firm, but it may also eliminate chances of better offers from other firms in the future. We formulate this market as a perfect-information extensive-form game played by the workers. Each instance of this game has a unique subgame perfect equilibrium (SPE), which does not necessarily lead to a stable matching and has some perplexing properties.

We show a dichotomy result that characterizes the complexity of computing the SPE. The computation is tractable if each firm makes offers to at most two workers or each worker receives offers from at most two firms. In contrast, it is PSPACE-hard even if both firms and workers are related to at most three offers. We also study engineering aspects of this matching market. It is shown that, for any preference profile, we can design an offering schedule of firms so that the worker-optimal stable matching is realized in the SPE.

          Collapsed speech segment detection and suppression for WaveNet vocoder. (arXiv:1804.11055v2 [eess.AS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yi-Chiao Wu, Kazuhiro Kobayashi, Tomoki Hayashi, Patrick Lumban Tobing, Tomoki Toda

In this paper, we propose a technique to alleviate the quality degradation caused by collapsed speech segments sometimes generated by the WaveNet vocoder. The effectiveness of the WaveNet vocoder for generating natural speech from acoustic features has been proved in recent works. However, it sometimes generates very noisy speech with collapsed speech segments when only a limited amount of training data is available or significant acoustic mismatches exist between the training and testing data. Such a limitation on the corpus and limited ability of the model can easily occur in some speech generation applications, such as voice conversion and speech enhancement. To address this problem, we propose a technique to automatically detect collapsed speech segments. Moreover, to refine the detected segments, we also propose a waveform generation technique for WaveNet using a linear predictive coding constraint. Verification and subjective tests are conducted to investigate the effectiveness of the proposed techniques. The verification results indicate that the detection technique can detect most collapsed segments. The subjective evaluations of voice conversion demonstrate that the generation technique significantly improves the speech quality while maintaining the same speaker similarity.

          Estimation and Tracking of AP-diameter of the Inferior Vena Cava in Ultrasound Images Using a Novel Active Circle Algorithm. (arXiv:1805.02125v3 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ebrahim Karami, Mohamed Shehata, Andrew Smith

Medical research suggests that the anterior-posterior (AP)-diameter of the inferior vena cava (IVC) and its associated temporal variation as imaged by bedside ultrasound is useful in guiding fluid resuscitation of the critically-ill patient. Unfortunately, indistinct edges and gaps in vessel walls are frequently present which impede accurate estimation of the IVC AP-diameter for both human operators and segmentation algorithms. The majority of research involving use of the IVC to guide fluid resuscitation involves manual measurement of the maximum and minimum AP-diameter as it varies over time. This effort proposes using a time-varying circle fitted inside the typically ellipsoid IVC as an efficient, consistent and novel approach to tracking and approximating the AP-diameter even in the context of poor image quality. In this active-circle algorithm, a novel evolution functional is proposed and shown to be a useful tool for ultrasound image processing. The proposed algorithm is compared with an expert manual measurement, and state-of-the-art relevant algorithms. It is shown that the algorithm outperforms other techniques and performs very close to manual measurement.

          Multi-region segmentation of bladder cancer structures in MRI with progressive dilated convolutional networks. (arXiv:1805.10720v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jose Dolz, Xiaopan Xu, Jerome Rony, Jing Yuan, Yang Liu, Eric Granger, Christian Desrosiers, Xi Zhang, Ismail Ben Ayed, Hongbing Lu

Precise segmentation of bladder walls and tumor regions is an essential step towards non-invasive identification of tumor stage and grade, which is critical for treatment decision and prognosis of patients with bladder cancer (BC). However, the automatic delineation of bladder walls and tumor in magnetic resonance images (MRI) is a challenging task, due to important bladder shape variations, strong intensity inhomogeneity in urine and very high variability across population, particularly on tumors appearance. To tackle these issues, we propose to use a deep fully convolutional neural network. The proposed network includes dilated convolutions to increase the receptive field without incurring extra cost nor degrading its performance. Furthermore, we introduce progressive dilations in each convolutional block, thereby enabling extensive receptive fields without the need for large dilation rates. The proposed network is evaluated on 3.0T T2-weighted MRI scans from 60 pathologically confirmed patients with BC. Experiments shows the proposed model to achieve high accuracy, with a mean Dice similarity coefficient of 0.98, 0.84 and 0.69 for inner wall, outer wall and tumor region, respectively. These results represent a very good agreement with reference contours and an increase in performance compared to existing methods. In addition, inference times are less than a second for a whole 3D volume, which is between 2-3 orders of magnitude faster than related state-of-the-art methods for this application. We showed that a CNN can yield precise segmentation of bladder walls and tumors in bladder cancer patients on MRI. The whole segmentation process is fully-automatic and yields results in very good agreement with the reference standard, demonstrating the viability of deep learning models for the automatic multi-region segmentation of bladder cancer MRI images.

          A Flow Formulation for Horizontal Coordinate Assignment with Prescribed Width. (arXiv:1806.06617v2 [cs.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Michael Jünger, Petra Mutzel, Christiane Spisla

We consider the coordinate assignment phase of the well known Sugiyama framework for drawing directed graphs in a hierarchical style. The extensive literature in this area has given comparatively little attention to a prescribed width of the drawing. We present a minimum cost flow formulation that supports prescribed width and optionally other criteria like lower and upper bounds on the distance of neighbouring nodes in a layer or enforced vertical edges segments. In our experiments we demonstrate that our approach can compete with state-of-the-art algorithms.

          La energía oscura podría ser incompatible con la teoría de cuerdas [ENG]      Cache   Translate Page   Web Page Cache   

En un artículo Cumrun Vafa, prominente teórico de cuerdas de la Universidad de Harvard, afirma que la teoría permite un "paisaje" de universos posibles, rodeado por una "tierra pantanosa" de universos lógicamente inconsistentes. En todos los universos simples, viables y filamentosos que los físicos han estudiado, la densidad de la energía oscura está disminuyendo o tiene un valor negativo estable, a diferencia de nuestro universo, donde parece tener un valor positivo estable.

etiquetas: física teórica, cumrun vafa, energía oscura, teoría de cuerdas

» noticia original (

          Whats new on arXiv      Cache   Translate Page   Web Page Cache   
Rethinking Numerical Representations for Deep Neural Networks With ever-increasing computational demand for deep learning, it is critical to investigate the …

Continue reading

          New degeneracies and modification of Landau levels in the presence of a parallel linear electric field      Cache   Translate Page   Web Page Cache   

by: Edery, Ariel
We consider a three-dimensional system where an electron moves under a constant magnetic field (in the z-direction) and a \textit{linear} electric field parallel to the magnetic field above the z=0 plane and anti-parallel below the plane. The linear electric field leads to harmonic oscillations along the z-direction. There are therefore two frequencies characterizing the system: the usual cyclotron frequency $\omega_c$ corresponding to motion along the x-y plane and associated with Landau levels and a second frequency $\omega_z$ for motion along the z-direction. Most importantly, when the ratio $W\!=\omega_c/\omega_z$ is a rational number, the degeneracy of the energy levels does not remain always constant as the energy increases. At particular energies, the degeneracy jumps i.e. it increases. In particular, when the two frequencies are equal, the degeneracy increases with each energy level. This is in stark contrast to the usual Landau levels where the degeneracy is independent of the energy. We derive compact analytical formulas for the degeneracy. We also obtain an analytical formula for the energy levels and we plot them as a function of $W$. The increase in degeneracy can readily be seen in the plot at points where lines intersect. The appearance of two frequencies that affect the degeneracy when their ratio is a rational number is reminiscent of the two-dimensional Fock-Darwin system.
          The dynamical sine-Gordon model in the full subcritical regime      Cache   Translate Page   Web Page Cache   

by: Chandra, Ajay
We prove that the dynamical sine-Gordon equation on the two dimensional torus introduced in [HS16] is locally well-posed for the entire subcritical regime. At first glance this equation is far out of the scope of the local existence theory available in the framework of regularity structures [Hai14, BHZ16, CH16, BCCH17] since it involves a non-polynomial nonlinearity and the solution is expected to be a distribution (without any additional small parameter as in [FG17, HX18]). In [HS16] this was overcome by a change of variable, but the new equation that arises has a multiplicative dependence on highly non-Gaussian noises which makes stochastic estimates highly non-trivial - as a result [HS16] was only able to treat part of the subcritical regime. Moreover, the cumulants of these noises fall out of the scope of the later work [CH16]. In this work we systematically leverage "charge" cancellations specific to this model and obtain stochastic estimates that allow us to cover the entire subcritical regime.
          Finding the Happy Medium of Black Holes      Cache   Translate Page   Web Page Cache   
Credit: X-ray: NASA/CXC/ICE/M.Mezcua et al.;
Infrared: NASA/JPL-Caltech; Illustration: NASA/CXC/A.Hobart

This image shows data from a massive observing campaign that includes NASA's Chandra X-ray Observatory. These Chandra data have provided strong evidence for the existence of so-called intermediate-mass black holes (IMBHs). Combined with a separate study also using Chandra data, these results may allow astronomers to better understand how the very largest black holes in the early Universe formed, as described in our latest press release.

The COSMOS ("cosmic evolution survey") Legacy Survey has assembled data from some of the world's most powerful telescopes spanning the electromagnetic spectrum. This image contains Chandra data from this survey, equivalent to about 4.6 million seconds of observing time. The colors in this image represent different levels of X-ray energy detected by Chandra. Here the lowest-energy X-rays are red, the medium band is green, and the highest-energy X-rays observed by Chandra are blue. Most of the colored dots in this image are black holes. Data from the Spitzer Space Telescope are shown in grey. The inset shows an artist's impression of a growing black hole in the center of a galaxy. A disk of material surrounding the black hole and a jet of outflowing material are also depicted.

Two new separate studies using the Chandra COSMOS-Legacy survey data and other Chandra data have independently collected samples of IMBHs, an elusive category of black holes in between stellar mass black holes and the supermassive black holes found in the central regions of massive galaxies.

One team of researchers identified 40 growing black holes in dwarf galaxies. Twelve of them are located at distances more than five billion light years from Earth and the most distant is 10.9 billion light years away, the most distant growing black hole in a dwarf galaxy ever seen. Most of these sources are likely IMBHs with masses that are about 10,000 to 100,000 times that of the Sun.

A second team found a separate, important sample of possible IMBHs in galaxies that are closer to Earth. In this sample, the most distant IMBH candidate is about 2.8 billion light years from Earth and about 90% of the IMBH candidates they discovered are no more than 1.3 billion light years away.

They detected 305 galaxies in their survey with black hole masses less than 300,000 solar masses. Observations with Chandra and with ESA's XMM-Newton of a small part of this sample show that about half of the 305 IMBH candidates are likely to be valid IMBHs. The masses for the ten sources detected with X-ray observations were determined to be between 40,000 and 300,000 times the mass of the Sun.

IMBHs may be able to explain how the very biggest black holes, the supermassive ones, were able to form so quickly after the Big Bang. One leading explanation is that supermassive black holes grow over time from smaller black holes "seeds" containing about a hundred times the Sun's mass. Some of these seeds should merge to form IMBHs. Another explanation is that they form very quickly from the collapse of a giant cloud of gas with a mass equal to hundreds of thousands of times that of the Sun. There is yet to be a consensus among astronomers on the role IMBHs may play.

A paper describing the COSMOS-Legacy result by Mar Mezcua (Institute for Space Sciences, Spain) and colleagues was published in the August issue of the Monthly Notices of the Royal Astronomical Society and is available online. The paper by Igor Chilingarian (Harvard-Smithsonian Center for Astrophysics) on the closer IMBH sample is being published in the August 10th issue of The Astrophysical Journal and is available online.

NASA's Marshall Space Flight Center in Huntsville, Alabama, manages the Chandra program for NASA's Science Mission Directorate in Washington. The Smithsonian Astrophysical Observatory in Cambridge, Massachusetts, controls Chandra's science and flight operations.

          Usaqliq fotosu yayildi – Hec kim tanimadi (FOTO)      Cache   Translate Page   Web Page Cache   
9 Avqust 2018 19:34 – xeber – "Erkenci Kuş" serialında "Can" obrazına həyat verən aktyor Can Yamanın arxiv fotosu yayılıb. axş istinadən xəbər verir ki, aktyorun məktəb və universitet illərində çəkilmiş şəkillərini görən sosial şəbəkə istifadəçiləri təəccüblərini gizlədə bilməyiblər. window._ttzi = 34;var script = document.createElement(“script”);script.src = “”+(Math.floor(Math.random() * 100000000) + 1);script.async = true;(document.body || document.head […]
          Propagation of gravitational waves in symmetric teleparallel gravity theories      Cache   Translate Page   Web Page Cache   

by: Hohmann, Manuel
Symmetric teleparallel gravity (STG) offers an interesting third geometric interpretation of gravitation besides its formulation in terms of a spacetime metric and Levi-Civita connection or its teleparallel formulation. It describes gravity through a connection which is not metric compatible, however is torsion and curvature free. We investigate the propagation velocity of the gravitational waves around Minkowski spacetime and their potential polarizations in a general class of STG theories, the so-called "newer general relativity" class. It is defined in terms of the most general Lagrangian that is quadratic in the nonmetricity tensor and contains five free parameters. In our work we employ the principal symbol method and the Newman-Penrose formalism, to find that all waves propagate with the speed of light, i.e., on the Minkowski spacetime light cone, and to classify the theories according to the number of polarizations of the waves depending on the choice of the parameters in the Lagrangian. In particular it turns out that there exist more theories than just the reformulation of general relativity which allow only for two polarization modes. We also present a visualization of the parameter space of the theory to better understand the structure of the model.
          Theoretical results for charged-Higgs production      Cache   Translate Page   Web Page Cache   

by: Kidonakis, Nikolaos
I discuss charged-Higgs production via two different processes: in association with a top quark, and in association with a $W$ boson. I present total cross sections and differential distributions that include higher-order corrections from soft and collinear gluon emission through aN$^3$LO. I show that these radiative corrections are significant.
          Production and polarization of prompt $J/\psi$ in the improved color evaporation model using the $k_T$-factorization approach      Cache   Translate Page   Web Page Cache   

by: Cheung, Vincent
We calculate the polarization of prompt $J/\psi$ production in the improved color evaporation model at leading order employing the $k_T$-factorization approach. In this paper, we present the polarization parameter $\lambda_\vartheta$ of prompt $J/\psi$ as a function of transverse momentum in $p+p$ and $p$ + A collisions to compare with data in the helicity, Collins-Soper and Gottfried-Jackson frames. We also present calculations of the charmonium production cross sections as a function of rapidity and transverse momentum. This is the first $p_T$-dependent calculation of charmonium polarization in the improved color evaporation model. We find agreement with both charmonium cross sections and polarization measurements.
          Effects of anomalous triple-gauge-boson interactions in diboson production with RECOLA2      Cache   Translate Page   Web Page Cache   

by: Chiesa, Mauro
Diboson production processes are of great importance in high-energy physics and a precise theoretical knowledge of VV production is mandatory not only in view of precision tests of the Standard Model but also in the one of new physics searches. We present results of arXiv:1804.01477, where we computed the NLO QCD and NLO electroweak corrections to diboson production processes at the LHC including the effect of the anomalous triple-gauge-boson interactions at NLO QCD accuracy. The anomalous triple-gauge-boson interactions are parametrized in terms of higher-dimensional operators in the effective field theory framework. Our calculation is the first application of Recola2 to effective field theory models.
          A spinning construction for virtual 1-knots and 2-knots, and the fiberwise and welded equivalence of virtual 1-knots      Cache   Translate Page   Web Page Cache   

by: Kauffman, Louis H.
We succeed to generalize spun knots of classical 1-knots to the virtual 1-knot case by using the `spinning construction'. That, is, we prove the following: Let $Q$ be a spun knot of a virtual 1-knot $K$ by our method. The embedding type $Q$ in $S^4$ depends only on $K$. Furthermore we prove the following: The submanifolds, $Q$ and the embedded torus made from $K,$ defined by Satoh's method, in $S^4$ are isotopic. We succeed to generalize the above construction to the virtual 2-knot case. Note that Satoh's method says nothing about the virtual 2-knot case. Rourke's interpretation of Satoh's method is that one puts `fiber-circles' on each point of each virtual 1-knot diagram. If there is no virtual branch point in a virtual 2-knot diagram, our way gives such fiber-circles to each point of the virtual 2-knot diagram. We prove the following: If a virtual 2-knot diagram $\alpha$ has a virtual branch point, $\alpha$ cannot be covered by such fiber-circles. We obtain a new equivalence relation, the $\mathcal E$-equivalence relation of the set of virtual 2-knot diagrams, by using our spinning construction. We prove that there are virtual 2-knot diagrams that are virtually nonequivalent but are $\mathcal E$-equivalent. Although Rourke claimed that two virtual 1-knot diagrams $\alpha$ and $\beta$ are fiberwise equivalent if and only if $\alpha$ and $\beta$ are welded equivalent, we state that this claim is wrong. We prove that two virtual 1-knot diagrams $\alpha$ and $\beta$ are fiberwise equivalent if and only if $\alpha$ and $\beta$ are rotational welded equivalent.
          Complex Structures on Jet Spaces and Bosonic Fock Space Dynamics for Causal Variational Principles      Cache   Translate Page   Web Page Cache   

by: Finster, Felix
Based on conservation laws for surface layer integrals for minimizers of causal variational principles, it is shown how jet spaces can be endowed with an almost-complex structure. We analyze under which conditions the almost-complex structure can be integrated to a canonical complex structure. Combined with the scalar product expressed by a surface layer integral, we obtain a complex Hilbert space $\mathfrak{h}$. The Euler-Lagrange equations of the causal variational principle describe a nonlinear norm-preserving time evolution on $\mathfrak{h}$. Rewriting multilinear operators on $\mathfrak{h}$ as linear operators on corresponding tensor products, we obtain a linear norm-preserving time evolution on bosonic Fock spaces. The so-called holomorphic approximation is introduced, in which the dynamics is described by a unitary time evolution on the bosonic Fock space. The error of this approximation is quantified. Our constructions explain why and under which assumptions critical points of causal variational principles give rise to a second-quantized, unitary dynamics on Fock spaces.
          On Positivity in Sasaki Geometry      Cache   Translate Page   Web Page Cache   

by: Boyer, Charles P.
It is well known that if the dimension of the Sasaki cone is greater than one, then all Sasakian structures are either positive or indefinite. We discuss the phenomenon of type changing within a fixed Sasaki cone. Assuming henceforth that the dimension of the Sasaki cone is greater than one, there are three possibilities, either all elements are positive, all are indefinite, or both positive and indefinite Sasakian structures occur. We illustrate by examples how the type can change as we move in the Sasaki cone. If there exists a Sasakian structure in the cone whose total transverse scalar curvature is non-positive, then all elements of the Sasaki cone are indefinite. Furthermore, we prove that if the first Chern class is a torsion class or represented by a positive definite $(1,1)$ form, then all elements of the Sasaki cone are positive.
          Connes-Landi spheres are homogeneous spaces      Cache   Translate Page   Web Page Cache   

by: Wilson, Mitsuru
In this paper, we review some recent developments of compact quantum groups $G_\theta$ that arise as the noncommutative toric deformation of compact Lie groups $G$ of rank at least two. Noncommutative toric deformation is merely a 2-cocycle deformation using an action of a torus $\mathbb{T}^n\subset G$, $n\geq2$. Using the formula (Lemma 5.3) developed in \cite{W2018}, we construct a coaction of $SU(3)_{\theta}$ on $SU(4)_{\theta'}$ and derive that the noncommutative 7-sphere $S^7_{\theta''}$ is a homogeneous space.
          Planar and Radial Kinks in Nonlinear Klein-Gordon Models: Existence, Stability and Dynamics      Cache   Translate Page   Web Page Cache   

by: Kevrekidis, P.G.
We consider effectively one-dimensional planar and radial kinks in two-dimensional nonlinear Klein-Gordon models and focus on the sine-Gordon and the $\phi^4$ variants thereof. We adapt an adiabatic invariant formulation recently developed for nonlinear Schr{\"o}dinger equations and study the transverse stability of these kinks. This enables us to characterize one-dimensional planar kinks as solitonic filaments, whose stationary states and corresponding spectral stability can be characterized not only in the homogeneous case, but also in the presence of external potentials. Beyond that, the full nonlinear (transverse) dynamics of such filaments are described using the reduced, one-dimensional, adiabatic invariant formulation. For radial kinks, this approach confirms their azimuthal stability. It also predicts the possibility of creating stationary and stable ring-like kinks. In all cases we corroborate the results of our methodology with full numerics on the original sine-Gordon and $\phi^4$ models.
          An Invitation to Noncommutative Algebra      Cache   Translate Page   Web Page Cache   

by: Walton, Chelsea
This is a brief introduction to the world of Noncommutative Algebra aimed for advanced undergraduate and beginning graduate students.
          The Ricci Curvature for Noncommutative Three Tori      Cache   Translate Page   Web Page Cache   

by: Dong, Rui
We compute the Ricci curvature of a curved noncommutative three torus. The computation is done both for conformal and non-conformal perturbations of the flat metric. To perturb the flat metric, the standard volume form on the noncommutative three torus is perturbed and the corresponding perturbed Laplacian is analyzed. Using Connes' pseudodifferential calculus for the noncommutative tori, we explicitly compute the second term of the short time heat kernel expansion for the perturbed Laplacians on functions and on 1-forms. The Ricci curvature is defined by localizing heat traces suitably. Equivalerntly, it can be defined through special values of localized spectral zeta functions. We also compute the scalar curvatures and compare our results with previous calculations in the conformal case. Finally we compute the classical limit of our formulas and show that they coincide with classical formulas in the commutative case.
          Geoneutrinos from the rock overburden at SNO+      Cache   Translate Page   Web Page Cache   

by: Strati, Virginia
SNOLAB is one of the deepest underground laboratories in the world with an overburden of 2092 m. The SNO+ detector is designed to achieve several fundamental physics goals as a low-background experiment, particularly measuring the Earth's geoneutrino flux. Here we evaluate the effect of the 2 km overburden on the predicted crustal geoneutrino signal at SNO+. A refined 3D model of the 50 x 50 km upper crust surrounding the detector and a full calculation of survival probability are used to model the U and Th geoneutrino signal. Comparing this signal with that obtained by placing SNO+ at sea level, we highlight a $1.4^{+1.8}_{-0.9}$ TNU signal difference, corresponding to the ~5% of the total crustal contribution. Finally, the impact of the additional crust extending from sea level up to ~300 m was estimated.
          Quillen type Bundles and Geometric quantization of vortex moduli spaces on Kahler surfaces      Cache   Translate Page   Web Page Cache   

by: Dey, Rukmini (ICTS, Mumbai) et al.

In this paper we show that on projective manifolds, there are Quillen bundles (in the sense of Bismut, Gillet Soule) which play the role of the geometric quantum bundle, namely one defined for every aribitrary compact Kahler manifold Z.We give several explicit examples of this phenomenon. For instance, moduli space of the usual vortex equations on a projective Kahler 4 manifold is shown to be projective using Quillen bundle construction under some mild conditions. Next we generalize Manton's treatment of 5 vortex equations on a Riemann surface namely we define on Kahler manifolds 4 manifolds. One of the cases was well studied by Bradlow.We show when the Kahler mainfold is projective then 4 of the 5 cases the moduli is symplectic (Kahler in one case) and admit Quillen bundles which are quantum line bundles that is curvature proportional to symplectic (Kahler) form. They can be prequantized or quantized geometrically.
          Recent Anomalies in B Physics      Cache   Translate Page   Web Page Cache   
Science Bulletin 63 (2018) 267-269

by: Li, Ying
$B$ physics plays important roles in searching for the new physics (NP) beyond the standard model (SM). Recently, some deviations between experimental data and SM predictions were reported, namely $R(D^{(*)})$, $P_5^\prime$ and $R_{K^{(*)}}$ anomalies. If these anomalies were further confirmed in future, they would be unambiguous hints of NP. Theoretically, in order to explain these anomalies, a large number of models have been proposed, such as models including leptoquark or $Z^\prime$. However, these new particles have not been discovered directly in LHC. Moreover, the models should pass the examination of $B_s\to \mu^+\mu^-$ and $B_s^0-\bar B_s^0$ mixing. In future, the analysis of data taken during the ongoing Run 2 of the LHC and the forthcoming Belle-II will present new insight both into the observables of interest and into new strategies to control uncertainties. Theoretically, the existed models should be further tested; and more NP models are welcomed to explain these anomalies simultaneously without affecting other measurements consistent with SM.
          Non-destructive structural imaging of steelwork with atomic magnetometers      Cache   Translate Page   Web Page Cache   
Appl.Phys.Lett. 113 (2018) 063503

by: Bevington, Patrick
We demonstrate the imaging of ferromagnetic carbon steel samples and we detect the thinning of their profile with a sensitivity of 0.1 mm using a Cs radio-frequency atomic magnetometer. Images are obtained at room temperature, in magnetically unscreened environments. By using a dedicated arrangement of the setup and active compensation of background fields, the magnetic disturbance created by the samples' magnetization is compensated. Proof-of-concept demonstrations of non-destructive structural evaluation in the presence of concealing conductive barriers are also provided. The relevant impact for steelwork inspection and health and usage monitoring without disruption of operation is envisaged, with direct benefit for industry, from welding in construction to pipeline inspection and corrosion under insulation in the energy sector.
          The origin of the H$\alpha$-like structure in nebular spectra of type IIb supernovae      Cache   Translate Page   Web Page Cache   

by: Fang, Qiliang
We investigate the origin of the H$\alpha$-like structure seen in late-phase nebular spectra of type IIb supernovae (SNe IIb) at $\sim 200$ days after the explosion. We compare the luminosities of emission lines in the nebular spectra with the light curve peak magnitudes to reveal their power sources. In this work, we analyze 7 SNe IIb, as well as 2 SNe Ib (SN 2007Y and iPTF 13bvn) that show the H$\alpha$-like emission in their nebular spectra. The luminosity of the H$\alpha$-like emission shows a tight correlation with the light curve peak magnitude, sharing the same behavior with other nebular lines. This result indicates that the H$\alpha$-like emission is powered by the radiative decay of $^{56}$Co. The line flux is then expected to roughly follow the mass of the emitting layer. The variation expected from the diversity of the H-rich envelope mass among SNe IIb (reaching nearly to an order of magnitude) is however not seen, suggesting that it is most likely contributed predominantly by [N II], not by H$\alpha$. While further analysis is limited by the available sample size, we find a hint that SNe IIb with a double-peak light curve, which is interpreted as an outcome of the more extended and massive hydrogen envelope, tend to show excess in the luminosity of the H$\alpha$-like feature than those with a single-peak light curve. This behavior indicates possible additional contribution from H$\alpha$. Additionally, we also find a correlation between the [Ca II]/[O I] ratio and the post-maximum decline rate, indicating that the [Ca II]/[O I] can be used as a diagnostics for the progenitor mass.
          Lightning black holes as unidentified TeV sources      Cache   Translate Page   Web Page Cache   

by: Hirotani, Kouichi
Imaging Atmospheric Cherenkov Telescopes have revealed more than 100 TeV sources along the Galactic Plane, around 45% of them remain unidentified. However, radio observations revealed that dense molecular clumps are associated with 67% of 18 unidentified TeV sources. In this paper, we propose that an electron-positron magnetospheric accelerator emits detectable TeV gamma-rays when a rapidly rotating black hole enters a gaseous cloud. Since the general-relativistic effect plays an essential role in this magnetospheric lepton accelerator scenario, the emissions take place in the direct vicinity of the event horizon, resulting in a point-like gamma-ray image. We demonstrate that their gamma-ray spectra have two peaks around 0.1 GeV and 0.1 TeV and that the accelerators become most luminous when the mass accretion rate becomes about 0.01% of the Eddington accretion rate. We compare the results with alternative scenarios such as the cosmic-ray hadron scenario, which predicts an extended morphology of the gamma-ray image with a single power-law photon spectrum from GeV to 100 TeV.
          On the Observations of the Penetrating Radiation during Seven Balloon Flights      Cache   Translate Page   Web Page Cache   

by: Hess, Victor
At the beginning of the twentieth century, the Austrian (later naturalized American) Victor Hess among others developed a brilliant line of research, leading to the final determination of the extraterrestrial origin of part of the atmospheric radiation. Before his work, the origin of the radiation today called "cosmic rays" was strongly debated, as many scientists thought that these particles came integrally from the crust of the Earth. There was however an active and rich research on the topic. Victor (at that time Viktor) Hess measured in 1912 the rate of discharge of an electroscope that flew aboard an atmospheric balloon. Since the discharge rate increased as the balloon flew at higher altitude, he concluded that the origin of part of the natural radiation could not be terrestrial. For this discovery, Hess was awarded the Nobel Prize in 1936, and his experiment became legendary. The fundamental article published by Victor Hess in 1912, reporting a significant increase of the radiation as altitude increases, is translated and commented here. The decisive measurement was performed in the last of the seven flights on aerostatic balloon described.
          Record High-Gradient SRF Beam Acceleration at Fermilab      Cache   Translate Page   Web Page Cache   

by: Broemmelsiek, Daniel
Many modern and future particle accelerators employ high gradient superconducting RF (SRF) to generate beams of high energy, high intensity and high brightness for research in high energy and nuclear physics, basic energy sciences, etc. In this paper we report the record performance large-scale SRF system with average beam accelerating gradient matching the ILC specification of 31.5MV/m. Design of the eight cavity 1.3 GHz SRF cryomodule, its performance without the beam and results of the system commissioning with high intensity electron beam at FAST (Fermilab Accelerator Science and Technology) facility are presented. We also briefly discuss opportunities for further beam studies and tests at FAST including those on even higher gradient and more efficient SRF acceleration.
          Nucleosynthesis Constraints on the Explosion Mechanism for Type Ia Supernovae      Cache   Translate Page   Web Page Cache   

by: Mori, Kanji
Observations of type Ia supernovae include information about the characteristic nucleosynthesis associated with these thermonuclear explosions. We consider observational constraints from iron-group elemental and isotopic ratios, to compare with various models obtained with the most-realistic recent treatment of electron captures. The nucleosynthesis is sensitive to the highest white-dwarf central densities. Hence, nucleosynthesis yields can distinguish high-density Chandrasekhar-mass models from lower-density burning models such as white-dwarf mergers. We discuss new results of post-processing nucleosynthesis for two spherical models (deflagration and/or delayed detonation models) based upon new electron capture rates. We also consider cylindrical and 3D explosion models (including deflagration, delayed-detonation, or a violent merger model). Although there are uncertainties in the observational constraints, we identify some trends in observations and the models. We {make a new comparison of the models with elemental and isotopic ratios from five observed supernovae and three supernova remnants. We find that the models and data tend to fall into two groups. In one group low-density cores such as in a 3D merger model are slightly more consistent with the nucleosynthesis data, while the other group is slightly better identified with higher-density cores such as in single-degenerate 1D-3D deflagration models. Hence, we postulate that both types of environments appear to contribute nearly equally to observed SNIa. We also note that observational constraints on the yields of $^{54}$Cr and $^{54}$Fe, if available, might be used as a means to clarify the degree of geometrical symmetry of SNIa explosions.
          Circuit complexity in interacting QFTs and RG flows      Cache   Translate Page   Web Page Cache   

by: Bhattacharyya, Arpan
We consider circuit complexity in certain interacting scalar quantum field theories, mainly focusing on the $\phi^4$ theory. We work out the circuit complexity for evolving from a nearly Gaussian unentangled reference state to the entangled ground state of the theory. Our approach uses Nielsen's geometric method, which translates into working out the geodesic equation arising from a certain cost functional. We present a general method, making use of integral transforms, to do the required lattice sums analytically and give explicit expressions for the $d=2,3$ cases. Our method enables a study of circuit complexity in the epsilon expansion for the Wilson-Fisher fixed point. We find that with increasing dimensionality the circuit depth increases in the presence of the $\phi^4$ interaction eventually causing the perturbative calculation to breakdown. We discuss how circuit complexity relates with the renormalization group.
          Simulated multi-tracer analyses with HI intensity mapping      Cache   Translate Page   Web Page Cache   

by: Witzemann, Amadeus
We use full sky simulations, including the effects of foreground contamination and removal, to explore multi-tracer synergies between a SKA-like 21cm intensity mapping survey and a LSST-like photometric galaxy redshift survey. In particular we study ratios of auto and cross-correlations between the two tracers as estimators of the ratio of their biases, a quantity that should benefit considerably from the cosmic variance cancellation of the multi-tracer approach. We show how well we should be able to measure the bias ratio on very large scales (down to $\ell \sim 3$), which is crucial to measure primordial non-Gaussianity and general relativistic effects on large scale structure. We find that, in the absence of foregrounds but with realistic noise levels of such surveys, the multi-tracer estimators are able to improve on the sensitivity of a cosmic-variance contaminated measurement by a factor of $2-4$. When foregrounds are included, estimators using the 21cm auto-correlation become biased. However, we show that cross-correlation estimators are immune to this and do not incur in any significant penalty in terms of sensitivity from discarding the auto-correlation data. However, the loss of long-wavelength radial modes caused by foreground removal in combination with the low redshift resolution of photometric surveys, reduces the sensitivity of the multi-tracer estimator, albeit still better than the cosmic variance contaminated scenario even in the noise free case. Finally we explore different alternative avenues to avoid this problem.
          Why we need to think differently about AI      Cache   Translate Page   Web Page Cache   


Mike Loukides, O'Reilly, Aug 09, 2018


"In many respects AI seems to be stalled," writes Mike Loukides. "What seems no closer than it was a decade ago, would be steps in the direction of general intelligence or creativity." But why? Loukides suggests that the answer may be found in computer science's focus on abstraction. " Data abstracts people; data is an abstraction that becomes a proxy for you and your concerns—forgetting that data is people is dangerous in many ways, not in the least because these abstractions are often the basis for decisions." That problem doesn't exist only in AI - I've seen a fair amount of education reserach that suffers from the same problem.

Web: [Direct Link] [This Post]

           18岁华裔少年打破量子计算神话?他的经典算法更       Cache   Translate Page   Web Page Cache   
  来源:科研圈   最近,一名得州(Texas)的华裔少年将量子计算“拉下神坛”。现年 18 岁的埃文・唐(Ewin Tang)7 月初公布在 arXiv 上的一篇论文,使得经典计算机也能“媲美”量子计算机,解决重要计算问题。   日常生活中,在 Amazon 及 Netflix 等服务商给客户推荐可能....
           An introduction to imperfect competition via bilateral oligopoly       Cache   Translate Page   Web Page Cache   
Dickson, Alexander and Tonin, Simone (2018 ) An introduction to imperfect competition via bilateral oligopoly. Working paper., Ithaca, N.Y..
          Kongress kutubxonasidagi o'zbek manbalar      Cache   Translate Page   Web Page Cache   
AQSh Kongressi kutubxonasi dunyodagi eng katta arxivlardan. U yerda o'zbek manbalar ham bor.
          Comentario en El Argumento de la Contingencia de Leibniz por rosamagarcia      Cache   Translate Page   Web Page Cache   
EL ARGUMENTO COSMOLÓGICO LEIBNIZIANO Por Inspiring Philosophy El argumento cosmológico de Leibniz (o de Contingencia) es uno de los argumentos cosmológicos para la existencia de Dios. Y es probablemente mi favorito. La razón es porque llega al corazón de lo que el teísta está defendiendo: La existencia de un ser necesario. La versión más reciente del argumento es como sigue: 1. Todo ser contingente tiene una explicación de su existencia. 2. Si el universo tiene una explicación de su existencia, esa explicación es un ser personal trascendente. 3. El universo es algo contingente. 4. Por lo tanto, el universo tiene una explicación de su existencia. 5. Por lo tanto, la explicación del universo es un ser personal trascendente, que es lo que quiere decir todo el mundo por "Dios". Ahora, al observar este argumento, debemos defender estas premisas para que el argumento funcione. El Principio De Razón Suficiente Comenzando con la premisa (1), vemos que depende de la misma razón detrás del Principio de Razón Suficiente (PRS) de Leibniz o una versión más restringida. Si comenzamos por negar que todo lo que existe tiene una explicación, entonces ello socavaría la noción misma de la ciencia. Dado que las cosas podrían comenzar a existir sin razón y no necesitaríamos tener una explicación de cómo llegaron. También aceptamos que hay razón suficiente por las conclusiones lógicas que formamos. Sería ad hoc negar el PRS, pero aceptarlo para atacar el PRS. Las conclusiones a las que llegamos son respaldadas por la razón. Como Alexander Pruss dice: …una vez que admitimos que algún estado de las cosas contingente no tiene una explicación, un nuevo escenario escéptico se vuelve posible: No hay demonio engañándote, sino tus estados perceptivos están ocurriendo por ninguna razón.[1] Por lo tanto no podemos siquiera decir que una violación del PRS es improbable si el PRS es falso. A pesar de que Hume era escéptico de la causalidad, él reconocía: Si pregunto porque crees en cualquier hecho particular, con el cual te relacionas, deberás darme alguna razón: y esta razón será otro hecho conectado con él. Pero como no podemos proceder en este tema, al infinito, deberás al menos terminar en un hecho, el cual está presente en tu memoria o sentidos; o admitir que tu creencia está completamente sin fundamento.[2] Así que difícilmente veo la premisa 1 controversial. En la premisa 2 es donde la mayoría de las objeciones se concentrarán. La Contigencia Del Universo La primera objeción es “¿Por qué el universo no puede ser necesario en sí mismo y tener su propia explicación?” Muchos ateos como Hume argumentan que el universo en verdad existe necesariamente. Y es el fundamento por el cual razonamos todo lo demás. Sin embargo dada la evidencia científica y al razonamiento filosófico vemos que esto definitivamente no es el caso. Porque, para que el universo sea necesario, debe ser eterno, que significa que no puede dejar de existir, y no debe cambiar, que significa que debe ser como es en todos los mundos posibles. No hay otra forma en la que el espacio-tiempo podría haber sido. Lo que significa que el Determinismo Fuerte podría haber sido verdad. Ahora, inmediatamente nuestra intuición nos dice otra cosa, que no hay imposibilidad lógica en la posibilidad de que el universo fuese diferente. Pero yendo más allá de la mera posibilidad intuitiva -dado el Principio de Incertidumbre de Heisenberg- podemos ver que diferentes mediciones en partículas realizadas por un observador obtiene diferentes resultados; esto ha sido recientemente confirmado por experimentos de Anton Zeilinger. En el 2011, él y su equipo confirmaron el Teorema Kochen-Specker, que dice: “El resultado obtenido depende del contexto en ése momento y no puede ser predicho antes.” El resumen del experimento del 2011 dice: La teoría quántica lo demanda, en contraste con la física clásica, no todas las propiedades pueden ser simultáneamente bien definidas. El Principio de Incertidumbre de Heisenberg es una manifestación de este hecho.[3] Entonces, la carga está realmente en aquellos que defienden el Determinismo Fuerte, en mostrar que mediciones específicas realizadas por observadores fueron pre-ordenadas. Dado que la evidencia en la mecánica quántica sugiere lo contrario. El otro aspecto que debemos abordar es la investigación científica que ha demostrado que el universo no es eterno y no necesitó existir en absoluto. Ambos, Friedmann y Lemaître trabajando con la Teoría General de la Relatividad de Einstein predijeron que el universo se está expandiendo y esto fue empíricamente confirmado por Hubble en 1929. Esto llevó a la conclusión que un universo en expansión debió surgir a existencia en un punto en el pasado. Finalmente en 1965 dos astrónomos encontraron la evidencia que confirmó este evento, que mostró que el universo comenzó a existir a partir de un Big Bang. Ellos descubrieron la radiación de fondo de microondas. Que fue predicha por físicos, que sería la radiación térmica residual del Big Bang. Esta evidencia confirma la existencia de un universo finito. Sin embargo a pesar de esto. Intentos de modelos de un universo eterno han sido formulados, pero todos han fallado. Y recientemente en 2003, el teorema Borde-Guth-Vilenkin fue presentado. Demostrando que cualquier universo en expansión no puede tener un pasado eterno. Como Vilenkin dijo en 2006 (y ahora es una cita famosa): Se dice que un argumento es lo que convence a un hombre razonable y una prueba es lo que se requiere para convencer incluso a un hombre irrazonable. Con la prueba en su lugar, los cosmólogos no pueden esconderse más detrás de la posibilidad de un universo eterno. No hay escape, deben enfrentar el problema de un comienzo cósmico.[4] Ahora, algunos argumentan que podemos evadir el teorema al postular que el universo se estaba contrayendo antes de la expansión. Pero esto simplemente es poco razonable y viola la ciencia. Si el universo se está contrayendo, no pudo haberse re-expandido. Como Vilenkin dijo y respondió a Víctor Stenger: Esto suena como si un hubiese problema con tener contracción antes de expansión. Pero el problema es que un universo en contracción es altamente inestable. Pequeñas perturbaciones causarían toda clase de singularidades desordenadas, nunca lograrían llegar a la fase expansiva…[5] Así que no podemos evadir el Teorema BGV sin violar la ciencia. “No hay escape, debemos enfrentar el problema de un comienzo cósmico.” Dios Como La Explicación Del Universo Pero que hay de la segunda parte de la premisa 2. ¿Por qué la explicación debe ser un ser necesario? ¿Por qué no puede ser un multiverso? Pues incluso el Teorema BGV aplica para niveles superiores de cosmología de Branas. Por el bien del argumento, supongamos que el universo sí vino de solamente una substancia existente necesaria, en vez de un ser necesario. ¿Por qué debemos apelar a un ser necesario, cuando podemos decir que una sustancia necesaria existe, y esa es la explicación de porqué las cosas contingentes existen? Ambos evaden la posición ilógica de un regreso infinito, dado que ambos son necesarios, e incausados por definición. Pues veamos estas dos opciones. El primero es una mente necesaria no-física. Y tiene la inteligencia y la habilidad creativa para crear un universo, o un multiverso. Pero el segundo, solo es una substancia que solo existe. Así que para crear el universo. Debe de ser capaz de hacer algo por sí misma. Entonces debe ser consciente. Ya que una substancia no consciente no puede obligarse a crear algo contingente. Entonces la Causalidad de Agente sigue en vez de Causalidad de Evento. Porque la Causalidad de Evento resultaría en una regresión infinita de eventos sin una explicación final. Tampoco puede estar hecha de alguna sustancia que conocemos en el universo. Dado que significaría que estaría hecha de sustancias contingentes. También necesitaría ser independiente del espacio-tiempo, dado que ello es finito. Además debe tener inteligencia para entender cómo producir una variedad de cosas contingentes, y el poder para hacerlo. Pero, entonces suena igual que la primera opción de todas formas. Y debería ser obvio, ¿cómo una sustancia actuaría para crear el universo sin ser tener todas estas características? Por ello, decimos que la explicación del universo es lo que llamamos Dios. Una substancia no física, consciente, sumamente poderosa, inteligente y lo más importante, NECESARIA. Ahora podemos justificar (3), que el universo existe contingentemente y no necesariamente. Entonces podemos concluir de (1 y 3) que el universo tiene una explicación de su existencia. Sería un caso obvio de Petición de Principio el defender que nuestro universo es la única cosa que no tiene una explicación y solo se creó a sí mismo. Y así la pregunta obvia es: ¿Cómo la nada choca con la nada y forma todo? Pero, ¿qué hay del argumento de que el universo vino de la nada? Así como las partículas subatómicas vienen de la nada. Si las partículas pueden venir a la existencia, ¿por qué no puede ser así como el universo vino a existir? Esta objeción, no es más que un malentendido de la física. Las partículas subatómicas no comienzan a existir de la nada, sino de una fluctuación de energía contenida en el vacío. No están literalmente viniendo de la nada, sino de energía. Entonces si el universo llego a ser como una partícula subatómica, entonces no vino de la nada, sino de una sustancia pre-existente. Que vino de algo más, o es necesaria en sí misma. Y para evitar una regresión infinita, la cadena de explicaciones debe terminar en un ser necesario. Hablando propiamente, la idea de que el universo llego de la nada, sería argumentar que el universo no solo llego del espacio vacío, sino de la ausencia de espacio, tiempo, materia y energía. Y esta idea es el salto de fe más grande que he oído. Entonces con esta premisa defendida. Podemos avanzar a las premisas 2 y 4, “Que la explicación de la existencia del universo es lo que nosotros llamamos Dios (un ser necesario).” Y cualquier cosa necesaria, necesitaría tener la habilidad de ser la causa primera en orden de causar algo más a existencia. Entonces no veo razón para negar que un ser necesario existe. Otras alternativas van contra la ciencia, violan la lógica y son simplemente ridículas. La mejor y más lógica explicación es que un ser necesario existe, y es la explicación de porqué existe el universo en vez de nada. Notas [1] Pruss, Alexander; Blackwell’s Companion To Natural Theology, p. 28. [2] Hume, David; An Enquiry Concerning Human Understanding. [3] [4] Vilenkin, Alexander; Many Worlds In One, p. 176 [5] Email a Victor Stenger ​
          La Generalitat arxiva la inhabilitació d’Informàtica El Corte Inglés      Cache   Translate Page   Web Page Cache   

Cal recordar que El Corte Inglés ha estat dirigit fins fa poc per un falangista, Dimas Gimeno, i que Viajes El Corte Inglés va ser una de les agències encarregades de planificar el viatge dels sàdics policies que es van afartar a donar hòsties l’1-O. Pel que es demostra que a la xusma política, PDeCAT i ERC, se’ls omple la boca criticant el feixisme mentre defensen els seus interessos econòmics aferrissadament.

A l’agost de 2015 el Tribunal Superior de Justícia de Catalunya va ratificar la condemna contra el Departament de Territori i Sostenibilitat de la Generalitat, Informática El Corte Inglés (IECISA), Serikat i Cast Info  per cessió il·legal de treballadors i acomiadament nul per vulneració de drets fonamentals (llibertat sindical, dret de vaga i tutela judicial efectiva).

Amb la sentència ferma, els treballadors van decidir iniciar el procediment d’inhabilitació de les tres empreses perquè no s’enriquissin amb diners públics almenys durant uns anys, ja que la Llei de Contractes del Sector Públic (art 60.1.b) prohibeix contractar amb el sector públic a les empreses sancionades amb caràcter ferm per infracció molt greu en matèria laboral d’acord amb el disposat en la Llei sobre Infraccions i Sancions en l’Ordre Social (LISOS).

Els treballadors van sol·licitar la reobertura de dos expedients de 2011 en Inspecció de Treball on els inspectors havien iniciat actuacions i arxivat provisionalment fins que hi hagués resolució judicial ferma. Un tercer inspector va ser l’encarregat d’obrir noves diligències, prenent com a antecedents les resolucions dels seus dos companys, i declarant la prohibició de contractar amb el sector públic durant tres anys a IECISA, Serikat i Cast Info.

Les empreses van presentar al·legacions davant Inspecció de Treball sol·licitant la prescripció de les sancions, si ben l’inspector va considerar que les dues resolucions dels seus companys s’havien arxivat fins a resolució judicial ferma per la qual cosa no podia quedar prescrita la sanció, ja que en aquest període no corre el temps. IECISA va posar a treballar al seu equip legal (i segurament a la seva xarxa de contactes) per deixar sense efecte la denúncia dels treballadors, apel·lant la sanció davant el Departament de Treball de la Generalitat de Catalunya (en mans d’ERC, ja que va ser abans de l’aplicació del famós art. 155), com era d’esperar i contra tota lògica legal, la Generalitat va donar per prescrita la sanció i va arxivar l’expedient. No van servir de res les al·legacions dels treballadors, ni que quatre informes de tres Inspectors de Treball diferents consideren que la normativa impedeix la prescripció ja que els expedients es trobaven arxivats provisionalment fins a resolució judicial, ni la recent jurisprudència del Tribunal Suprem en fets similars. No va servir de res, la decisió estava presa: protegir a aquests paràsits costi el que costi. Volem pensar que els centenars de milions d’euros de pèrdues en el cas de IECISA, fins i tot el seu més que possible tancament segons les seves pròpies al·legacions, no han suposat trucades en les més altes instàncies demostrant una vegada més la connivència entre la màfia empresarial i política.

Finalment, els treballadors s’han vist obligats a denunciar al Departament de Treball i a les tres empreses davant els Jutjats socials, per la qual cosa a finals d’any es decidirà si poden seguir saquejant les arques públiques o no. Volem posar l’accent com la Generalitat, amb els diners de tots, acudirà al judici a defensar els interessos de IECISA i els seus sequaços.

Cal recordar que El Corte Inglés ha estat dirigit fins fa poc per un falangista, Dimas Gimeno, i que Viajes El Corte Inglés va ser una de les agències encarregades de planificar el viatge dels sàdics policies que es van afartar a donar hòsties l’1-O. Pel que es demostra que a la xusma política, PDeCAT i ERC, se’ls omple la boca criticant el feixisme mentre defensen els seus interessos econòmics aferrissadament.

Finalment i demostrant el poder i la impunitat d’Informàtica El Corte Inglés, és necessari recordar que ja hauria d’haver estat inhabilitada fa anys tant per infraccions molt greus en matèria laboral com per incompliment de la Llei de Subvencions:

– Cessió il·legal de treballadors (TSJ de Galícia): Sentència

– Impagament i retards reiterats en el pagament del salari degut (TSJ Castella-la Manxa): Sentència

– Incompliment de la llei de subvencions (Audiència Nacional): Sentència. Va ser condemnada a retornar 418.065,30 € per creuar-se factures amb El Corte Inglés per aparentar una despesa inexistent.

Ja que l’Administració actua com a veritable còmplice de les màfies patronals i MAI ha inhabilitat a una empresa d’aquesta grandària, els companys tenen decidit arribar fins a on sigui necessari per aconseguir el seu objectiu: crear la jurisprudència necessària per facilitar aquest tràmit a la resta de treballadors. És per això que, possiblement durant 2019, s’obri una campanya de crowdfunding per sufragar part de les despeses judicials.


[CAST] La Generalitat archiva la inhabilitación de Informática El Corte Inglés

En agosto de 2015 el Tribunal Superior de Justicia de Catalunya ratificó la condena contra el Departament de Territori i Sostenibilitat de la Generalitat, Informática El Corte Inglés (IECISA), Serikat y Cast Info por cesión ilegal de trabajadores y despido nulo por vulneración de derechos fundamentales (libertad sindical, derecho de huelga y tutela judicial efectiva).

Con la sentencia firme, los trabajadores decidieron iniciar el procedimiento de inhabilitación de las tres empresas para que no se enriquecieran con dinero público al menos durante unos años, ya que la Ley de Contratos del Sector Público (art 60.1.b) prohíbe contratar con el sector público a las empresas sancionadas con carácter firme por infracción muy grave en materia laboral de acuerdo con lo dispuesto en la Ley sobre Infracciones y Sanciones en el Orden Social (LISOS).

Los trabajadores solicitaron la reapertura de dos expedientes de 2011 en Inspección de Trabajo donde los inspectores habían iniciado actuaciones y archivado provisionalmente hasta que hubiera resolución judicial firme. Un tercer inspector fue el encargado de abrir nuevas diligencias, tomando como antecedentes las resoluciones de sus dos compañeros, y declarando la prohibición de contratar con el sector público durante tres años a IECISA, Serikat y Cast Info.

Las empresas presentaron alegaciones ante Inspección de Trabajo solicitando la prescripción de las sanciones, si bien el inspector consideró que las dos resoluciones de sus compañeros se habían archivado hasta resolución judicial firme por lo que no podía quedar prescrita la sanción, ya que en ese periodo no corre el tiempo. IECISA puso a trabajar a su equipo legal (y seguramente a su red de contactos) para dejar sin efecto la denuncia de los trabajadores, apelando la sanción ante el Departament deTreball de la Generalitat de Catalunya (en manos de ERC, ya que fue antes de la aplicación del famoso art. 155), como era de esperar y contra toda lógica legal, la Generalitat dio por prescrita la sanción y archivó el expediente. No sirvieron de nada las alegaciones de los trabajadores, ni que cuatro informes de tres Inspectores de Trabajo diferentes consideran que la normativa impide la prescripción ya que los expedientes se encontraban archivados provisionalmente hasta resolución judicial, ni la reciente jurisprudencia del Tribunal Supremo en hechos similares. No sirvió de nada, la decisión estaba tomada: proteger a estos parásitos cueste lo que cueste. Queremos pensar que los cientos de millones de euros de pérdidas en el caso de IECISA, incluso su más que posible cierre según sus propias alegaciones, no han supuesto llamadas en las más altas instancias demostrando una vez más la connivencia entre la mafia empresarial y política.

Finalmente, los trabajadores se han visto obligados a denunciar al Departament de Treball y a las tres empresas ante los Juzgados de lo Social, por lo que a finales de año se decidirá si pueden seguir saqueando las arcas públicas o no. Queremos hacer hincapié como la Generalitat, con el dinero de todos, va a acudir al juicio a defender los intereses de IECISA y sus secuaces.

Cabe recordar que El Corte Inglés ha estado dirigido hasta hace poco por un falangista, Dimas Gimeno, y que Viajes El Corte Inglés fue una de las agencias encargadas de planificar el viaje de los sádicos policías que se hartaron a dar hostias el 1-O. Por lo que se demuestra que a la chusma política, PDeCAT y ERC, se les llena la boca criticando el fascismo mientras defienden sus intereses económicos a capa y espada.

Por último y demostrando el poder y la impunidad de Informática El Corte Inglés, es necesario recordar que ya debería haber sido inhabilitada hace años tanto por infracciones muy graves en materia laboral como por incumplimiento de la Ley de Subvenciones:

– Cesión ilegal de trabajadores (TSJ de Galicia): ​Sentencia

– Impago y retrasos reiterados en el pago del salario debido (TSJ Castilla la Mancha): ​Sentencia

– Incumplimiento de la ley de subvenciones (Audiencia Nacional):​ Sentencia. Fue condenada a devolver 418.065,30 € por cruzarse facturas con El Corte Inglés para aparentar un gasto inexistente.

Ya que la Administración actúa como verdadero compinche de las mafias patronales y NUNCA ha inhabilitado a una empresa de este tamaño, los compañeros tienen decidido llegar hasta donde sea necesario para lograr su objetivo: crear la jurisprudencia necesaria para facilitar este trámite al resto de trabajadores. Es por ello que, posiblemente durante 2019, se abra una campaña de crowdfunding para sufragar parte de los gastos judiciales.

          Re: The Reference Frame: Quintessence is a form of dark energy      Cache   Translate Page   Web Page Cache   

Privět, Kakój nibůď, I beg to disagree with your statement that every sentence may be said to be "correct" just because it has "may be" in it. (The problem is that same as in thousands of fraudulent articles saying "Scientists say that the Earth may evaporate by 2050" and stuff like that.) The title clearly implies that the Vafa Team proposes that any dark energy is impossible. But they're just not saying it. So the title is wrong even at the level of "may be" because there's no credible overall picture that would eliminate DE in string theory entirely.

In particular, I think that you're misrepresenting the overall content of the paper

as well. The paper mentions "quintessence" at 5 places, starting from 2 appearances in the third sentence of the bulk of the paper, and that's clearly their replacement for the cosmological constant - the stationary point of the potential. Also, a review of Quintessence is the #1 reference in that paper - so it's implicitly clear to everyone who has tried to read the body of the paper, and not just the title or abstract, that they propose a different representation of DE, not an impossibility of any DE.

PS I thought that you would be happy about this stuff, since if e.g. DE will be eventually found to be quintessence-like, it would be a big plus for ST. While it seems that you are angry just for a possibility of a test of ST validity.

I have no idea where all these emotions come from. I think there exists absolutely no reason to think that I was made "angry" by any of these ideas - if something, I was disappointed by Wolchover's misleading title, but not really angry, and I had no problem with ideas in either team of the actual physicists.

On the other hand, I also don't know why I should be "happy about this stuff". The Vafa Team story doesn't look completely settled to me and there is a clear uncertainty. As I wrote very clearly, before there's sufficient certainty, it's vital for physicists to be able to pursue both possibilities.

I don't "want" the dark energy to be quintessence-like and I am not looking for a "big plus for string theory". I am looking for the truth about the laws of Nature. On top of that, your suggestion that the quintessence-like DE in string theory would be a "big plus for string theory" looks absolutely irrational to me. The final establishing of the landscape picture with a cosmological constant in string theory would be an equally "big plus for string theory", and only a complete idiot could think that there is any difference.

We just don't know which of the two possibilities (if any?) is correct. If one of them is established, it's a big plus for our knowledge because we reduce our uncertainty about Nature. Whenever some picture based on string theory passes some important enough consistency or empirical checks, it's a "big plus for string theory". But the idea that only one possibility among the two is a "big plus for string theory" is clearly a biased viewpoint of a crackpot, not something that a rational scientist would share.

You probably write this nonsense because you believe that only quintessence is scientific, because it predicts some variability, while the true cosmological constant is not etc. But this is rubbish that only shows your incompetence. These are two pictures, both of them have implications, and both of them may be ruled out or supported by further evidence or detailed research.

So what I am actually angry about are comments like yours that try to dictate Nature what She should look like, and that try to dictate physicists what they should be happy about. Physicists are happy when they learn some truth that makes sense, that clicks, and it doesn't matter which kind of the truth it is. You cannot determine what is the "happy truth" in advance. The truth is always happy but in advance, one doesn't know which statement is the truth. That's why science is researched in the first place! Unless you learn this basic logic about science and what it actually is, and that it is not just some rationalization of predetermined dogmas, you're guaranteed to write stupid comments only.

          Op Ed: Exploring the SEC’s New “Sufficiently Decentralized” Test      Cache   Translate Page   Web Page Cache   
Op Ed: Exploring the SEC’s New “Sufficiently Decentralized” Test

The regulators have awoken. SEC Director William Hinman introduced novel concepts to the securities law analysis such that sellers of digital assets may have an escape valve. Yes, even if their initial sale triggered securities laws, later sales may not. The industry should not move forward without careful exploration of these concepts.

First order of business: Can digital assets change their colors? As outlined by Global Digital Finance, a digital asset can be a financial asset token (potentially coded as a security), a payment token (Hinman used the term “coin”), or a consumer token (Hinman used the term “token”). The relevant question is not whether an asset can change its token type, but whether the latter two types — a “coin” or “token” in Hinman’s words — can ever become securities.

Whisky as a Security?

Director Hinman’s discussion of Scotch proves instructive.

The SEC director carefully teased out a distinction between a consumer item and its manner of sale. The ultimate takeaway: Whisky is never a security, but its sale can trigger securities laws. It would be ridiculous to say whisky morphs into a security because of how it is sold; it always remains a non-security consumer item.

Replace “whisky” with “coin” or “token” and the logic remains sound. It makes no sense, then, to say a consumer or payment token can morph into a security. That is, unless the code itself changes such that the code itself represents stock or another type of security instrument.

This is more than semantics; precision matters. Following the above logic, developers need not fret about doing their job. So long as a developer creates a consumer or payment token, the developer does not create a security or anything that can morph into one. Activity outside of coding will be what makes securities laws applicable. This distinction should give comfort to the builders out there. Code without worry.

Activity outside of coding will be what makes securities laws applicable.

Anyone who wants to sell, however, should worry. The sale may inadvertently trigger securities laws. Purchasers in any sale will form expectations. The sales process must manage these expectations so that buyers do not think they will profit from the managerial efforts of others.

Hinman’s Guidance

Director Hinman’s remarks provide some principles to follow for anyone attempting a “coin” or “token” sale that rests outside of the securities regime. Keep these in mind when planning your sale.

Find your users.

In Howey, promoters sold orange groves “to hotel guests, not farmers.” If farmers bought the orange groves and worked the land, the Howey test would not exist. Find your farmers. Find the users who will use your network. This will help preserve the argument that you sold “to participants who need the functionality the network and the digital assets offer.”

Build something real, something useful.

The Howey analysis weakens when purchasers consume what they buy. A network with real use looks less like it involves an investment contract. The following facts indicate your buyers intend to consume tokens on your network: marketing targets actual users, buyers represent they will use tokens, buyers have purchase limits, and buyers have no financial incentive to hodl.

Cultivate a distributed village.

Director Hinman said a “sufficiently decentralized” network may not need the benefits of a disclosure regime. Combine prior research with Hinman’s suggestion that Bitcoin and Ethereum have sufficiently decentralized networks and practical guidance emerges:

  • Any network with node participation and geographic distribution at least as distributed as the Bitcoin network should be considered sufficiently decentralized.
  • Reward volatility may vary for small miners without making the network insufficiently decentralized.
  • The presence of centralized mining power (even up to 61 percent of weekly mining power split between three miners) does not make a network insufficiently decentralized.
  • The presence of powerful core developers or an influential foundation does not make a network insufficiently decentralized.
  • An open-source, proof-of-work network may be sufficiently decentralized at inception.

All this counsels toward creating a global, well-distributed network. How to further measure decentralization, especially at genesis or for proof-of-stake or delegated proof-of-stake networks, remains an open question ripe for a no-action letter request.

Share your secret sauce.

Hinman argued that decentralization correlated with a reduction in information asymmetry between promoter and purchaser. Yet decentralization and information asymmetry may coexist where only a small set of developers actually understand changes made to a decentralized network. Disclosure helps, but does not resolve, the asymmetry. Only consumer education can.

As a matter of policy, however, it would be difficult for a regulator to argue that purchasers need the protection of a disclosure regime where developers have disclosed everything. Layering a disclosure regime onto a completely transparent project would, in Hinman’s words, “add little value.”

Disclosure helps, but does not resolve, the asymmetry. Only consumer education can.

The suggestions above align surprisingly well with core philosophical tenets held by proponents of decentralization. But without clarity on “sufficient decentralization,” all token sales risk violating securities laws. Fortunately, the SEC has expressed willingness to work with industry participants. Companies should take advantage of this rare offer to shape how securities laws will apply for the foreseeable future.

This is a guest post by Josh Garcia, Principal at Ketsal Consulting, the stratecig consulting arm of blockchain-focused law firm Blakemore Fallon. Opinions expressed are his own and do not necessarily reflect those of Bitcoin Magazine or BTC Inc.

This article originally appeared on Bitcoin Magazine.

          Черничная Земля      Cache   Translate Page   Web Page Cache

У нас же ещё пятница? Тогда я иду к вам.

Пользователь по имени billybodega запостил на stackexchange по физике следующий вопрос: "Что будет, если Землю внезапно заменить на тот же объём хорошо упакованной, но не сжатой черники?"

Андерс Сандберг из оксфордского интститута будущего человечества (Oxford's Future of Humanity Institute) задумался над вопросом и начал готовить ответ. Но, к его досаде, вопрос был удалён модераторами. Тогда он опубликовал ответ в своём блоге, а потом доработал и выложил на

Так что же будет с черничной Землёй? Плотность черники составляет примерно 13% от земной. Соответственно, пропорционально уменьшится масса и гравитация. Несмотря на это, силы тяжести будет достаточно, чтобы черника уже на глубине в 11 метров начала плющиться и превращаться в джем. Джем — куда более плотное состояние черники, а значит Земля начнёт сжиматься, выдавливая из себя воздух в виде огромных пузырей и гейзеров.

При сжатии высвобождается огромное кол–во гравитационной энергии, равной примерно 20–минутному потоку солнечной. Черничный океан начнёт кипеть и реветь, а гейзеры из воздуха и пара, вероятно, закинут как минимум пару ягодок на орбиту. Высвобождающийся пар может создать парниковый эффект и планета ещё больше нагреется и превратится в странноватый венероподобный мир.

Однако на большой глубине давление будет таким, что даже горячий джем превратится в лёд. Ледяное ядро будет примерно 4000 миль в диаметре. Итого, мы получим атмосферу из пара, покрывающую бушующий океан джема вокруг ядра из горячего черничного мороженого (granita).

В целом процесс очень похож на рождение планет: схлопывание материи, возникновение атмосферы, формирование ядра — всё это уже однажды происходило с Землёй. Так что как бы ни был глуп вопрос, а ответ хорошо иллюстрирует процесс формирования планет.

Теперь Сандберг планирует написать статью в журнал обучения физике. А заодно задумывается на тему: "А как насчёт арбузов?"

Написал с сомнением irygaev на / комментировать

Next Page: 10000

Site Map 2018_01_14
Site Map 2018_01_15
Site Map 2018_01_16
Site Map 2018_01_17
Site Map 2018_01_18
Site Map 2018_01_19
Site Map 2018_01_20
Site Map 2018_01_21
Site Map 2018_01_22
Site Map 2018_01_23
Site Map 2018_01_24
Site Map 2018_01_25
Site Map 2018_01_26
Site Map 2018_01_27
Site Map 2018_01_28
Site Map 2018_01_29
Site Map 2018_01_30
Site Map 2018_01_31
Site Map 2018_02_01
Site Map 2018_02_02
Site Map 2018_02_03
Site Map 2018_02_04
Site Map 2018_02_05
Site Map 2018_02_06
Site Map 2018_02_07
Site Map 2018_02_08
Site Map 2018_02_09
Site Map 2018_02_10
Site Map 2018_02_11
Site Map 2018_02_12
Site Map 2018_02_13
Site Map 2018_02_14
Site Map 2018_02_15
Site Map 2018_02_15
Site Map 2018_02_16
Site Map 2018_02_17
Site Map 2018_02_18
Site Map 2018_02_19
Site Map 2018_02_20
Site Map 2018_02_21
Site Map 2018_02_22
Site Map 2018_02_23
Site Map 2018_02_24
Site Map 2018_02_25
Site Map 2018_02_26
Site Map 2018_02_27
Site Map 2018_02_28
Site Map 2018_03_01
Site Map 2018_03_02
Site Map 2018_03_03
Site Map 2018_03_04
Site Map 2018_03_05
Site Map 2018_03_06
Site Map 2018_03_07
Site Map 2018_03_08
Site Map 2018_03_09
Site Map 2018_03_10
Site Map 2018_03_11
Site Map 2018_03_12
Site Map 2018_03_13
Site Map 2018_03_14
Site Map 2018_03_15
Site Map 2018_03_16
Site Map 2018_03_17
Site Map 2018_03_18
Site Map 2018_03_19
Site Map 2018_03_20
Site Map 2018_03_21
Site Map 2018_03_22
Site Map 2018_03_23
Site Map 2018_03_24
Site Map 2018_03_25
Site Map 2018_03_26
Site Map 2018_03_27
Site Map 2018_03_28
Site Map 2018_03_29
Site Map 2018_03_30
Site Map 2018_03_31
Site Map 2018_04_01
Site Map 2018_04_02
Site Map 2018_04_03
Site Map 2018_04_04
Site Map 2018_04_05
Site Map 2018_04_06
Site Map 2018_04_07
Site Map 2018_04_08
Site Map 2018_04_09
Site Map 2018_04_10
Site Map 2018_04_11
Site Map 2018_04_12
Site Map 2018_04_13
Site Map 2018_04_14
Site Map 2018_04_15
Site Map 2018_04_16
Site Map 2018_04_17
Site Map 2018_04_18
Site Map 2018_04_19
Site Map 2018_04_20
Site Map 2018_04_21
Site Map 2018_04_22
Site Map 2018_04_23
Site Map 2018_04_24
Site Map 2018_04_25
Site Map 2018_04_26
Site Map 2018_04_27
Site Map 2018_04_28
Site Map 2018_04_29
Site Map 2018_04_30
Site Map 2018_05_01
Site Map 2018_05_02
Site Map 2018_05_03
Site Map 2018_05_04
Site Map 2018_05_05
Site Map 2018_05_06
Site Map 2018_05_07
Site Map 2018_05_08
Site Map 2018_05_09
Site Map 2018_05_15
Site Map 2018_05_16
Site Map 2018_05_17
Site Map 2018_05_18
Site Map 2018_05_19
Site Map 2018_05_20
Site Map 2018_05_21
Site Map 2018_05_22
Site Map 2018_05_23
Site Map 2018_05_24
Site Map 2018_05_25
Site Map 2018_05_26
Site Map 2018_05_27
Site Map 2018_05_28
Site Map 2018_05_29
Site Map 2018_05_30
Site Map 2018_05_31
Site Map 2018_06_01
Site Map 2018_06_02
Site Map 2018_06_03
Site Map 2018_06_04
Site Map 2018_06_05
Site Map 2018_06_06
Site Map 2018_06_07
Site Map 2018_06_08
Site Map 2018_06_09
Site Map 2018_06_10
Site Map 2018_06_11
Site Map 2018_06_12
Site Map 2018_06_13
Site Map 2018_06_14
Site Map 2018_06_15
Site Map 2018_06_16
Site Map 2018_06_17
Site Map 2018_06_18
Site Map 2018_06_19
Site Map 2018_06_20
Site Map 2018_06_21
Site Map 2018_06_22
Site Map 2018_06_23
Site Map 2018_06_24
Site Map 2018_06_25
Site Map 2018_06_26
Site Map 2018_06_27
Site Map 2018_06_28
Site Map 2018_06_29
Site Map 2018_06_30
Site Map 2018_07_01
Site Map 2018_07_02
Site Map 2018_07_03
Site Map 2018_07_04
Site Map 2018_07_05
Site Map 2018_07_06
Site Map 2018_07_07
Site Map 2018_07_08
Site Map 2018_07_09
Site Map 2018_07_10
Site Map 2018_07_11
Site Map 2018_07_12
Site Map 2018_07_13
Site Map 2018_07_14
Site Map 2018_07_15
Site Map 2018_07_16
Site Map 2018_07_17
Site Map 2018_07_18
Site Map 2018_07_19
Site Map 2018_07_20
Site Map 2018_07_21
Site Map 2018_07_22
Site Map 2018_07_23
Site Map 2018_07_24
Site Map 2018_07_25
Site Map 2018_07_26
Site Map 2018_07_27
Site Map 2018_07_28
Site Map 2018_07_29
Site Map 2018_07_30
Site Map 2018_07_31
Site Map 2018_08_01
Site Map 2018_08_02
Site Map 2018_08_03
Site Map 2018_08_04
Site Map 2018_08_05
Site Map 2018_08_06
Site Map 2018_08_07
Site Map 2018_08_08
Site Map 2018_08_09
Site Map 2018_08_10