BBE Simulating the Microstructural Dynamics of an In Play Betting Exchange via Agent Based Modelling

The “Bristol BettingExchange” (BBE) is intended as a common platform, a data-source and experimental test-bed, for researchers studying the application of AI and machine learning techniques to issues arising in betting exchanges . BBE is a free open-source agent-based simulation model consisting of asports-betting exchange, but also a minimal simulation model of racetracksporting events about which bets may be made .…

Can Self Reported Symptoms Predict Daily COVID 19 Cases

The COVID-19 pandemic has impacted lives and economies across the globe, leading to many deaths . Online surveys have been shown to be an effectivemethod for data collection amidst the pandemic . The best model predicts daily cases with a meanabsolute error (MAE) of 226.30 (normalized MAE of 27.09%) per state .…

Independent Asymmetric Embedding Model for Cascade Prediction on Social Network

The prediction for information diffusion on social networks has greatpractical significance in marketing and public opinion control . Cascadeprediction aims to predict the individuals who will potentially repost themessage on the social network . One kind of methods exploitdemographical, structural, and temporal features for prediction, or explicitlyrely on particular information diffusion models .…

The Topological Mu Calculus completeness and decidability

We study the topological topological $mu$-calculus . We prove completeness, decidability and FMP over generaltopological spaces . We also investigaterelational $\mu$calculus, providing general completeness results . Unlike most other such proofs for such a function, ours ismodel-theoretic, making an innovative use of a known Modal Logic method (–the’final’ submodel of the canonical model) that has the twin advantages of greatgenerality and essential simplicity .…

Durable Queues The Second Amendment

We consider durable data structures for non-volatile main memory, such as thenew Intel Optane memory architecture . We show that access to flushed content is of high cost due to cache invalidation in current architectures . The proposed design outperforms state-of-the-art durable queues, we discuss the theoretical optimal number of accesses to flushedcontent.…

Learning Based Robust Resource allocation for D2D Underlaying Cellular Network

In this paper, we study the resource allocation in D2D underlaying cellularnetwork with uncertain channel state information (CSI) For satisfying the diversity requirements of different users, i.e. the minimum rate requirement for cellular user and the reliability requirement for D2.D user, we attempt tomaximize the cellular user’s throughput whilst ensuring a chance constraint forD2D user .…

GSF locality is not sufficient for proximity oblivious testing

In Property Testing, proximity-oblivious testers (POTs) form a class of simple simple simple testing algorithms . We prove our result by exploiting a recent work of the authorswhich constructed a first-order (FO) property that is not testable [SODA 2021]. We prove that our property does not admit a POT, despite being GSF-local .…

PNLSS Toolbox 1 0

This is a demonstration of the PNLSS Toolbox 1.0.0 . The toolbox is designed to identify polynomial nonlinear state-space models from data . It can describe a wide range of nonlinear systems, such as the forced Duffing oscillator .…

Livewired Neural Networks Making Neurons That Fire Together Wire Together

Until recently, artificial neural networks were typically designed with afixed network structure . Here, I argue that network structure is highlyrelevant to function, and therefore neural networks should be livewired . I discuss how this approach may enable suchnetworks to build compositional world models that operate on symbols and thatachieve few-shot learning, capabilities thought by many to be critical to human-level cognition .…

Confronting Structural Inequities in AI for Education

The dominant paradigm of evaluating fairness on the basis of performance disparities in AI models is inadequate for confronting structural inequities that educational AI systems (re)produce) We draw on a lens of structural injustice informed bycritical theory and Black feminist scholarship to critically interrogates widely-studied and widely-adopted categories of educational AI .…

Fine Grained View on Bribery for Group Identification

Given a set of agents qualifying or disqualifying each other, groupidentification is the task of identifying a socially qualified subgroup of agents . Social qualification depends on the specific rule used to aggregate individual qualifications . Conceptually, we also consider a more fine-grainedconcept of bribery cost, where we ask how many single qualifications need to bechanged, nonunit prices for different bribery actions, and a more generalbribery goal that combines the constructive and destructive setting .…

Simulating 3 symbol Turing machines with SIMD DNA

SIMD||DNA is a model of DNA strand displacement allowing parallel in-memorycomputation on DNA storage . We show how to simulate an arbitrary 3-symbolspace-bounded Turing machine with a SIMD|DNA program . We alsodevelop software that can simulate SIMD::DNA programs and produce SVG figures .…

Modeling the Sequential Dependence among Audience Multi step Conversions with Multi task Learning in Targeted Display Advertising

In most real-world large-scale online applications, customer acquisition is usually a multi-step conversion process ofaudiences . For example, an impression-click-purchase process is usually performed of audiences for e-commerce platforms . However, it is more difficult to acquire customers in financial advertising than in traditional advertising .…

LEA A Learned Encoding Advisor for Column Stores

LEA is trained on synthetic datasets with various distributions on the target system . LEA can optimize for encoded size, query performance, or a combination of the two . Compared to the heuristic-based encoding advisor of a commercial columnstore on TPC-H, LEA achieves 19% lower query latency while using 26% less space.…

Strategic alignment between IT flexibility and dynamic capabilities an empirical investigation

Dynamic capabilities theory emerged as a leading framework in the process of value creation for firms . The proposed framework helps firms assess and improve their maturity and alignment of ITflexibility and dynamic capabilities . Findings of this studysuggests that there is a significant positive relationship between the firmsdegree of strategic alignment defined as the degree of balance between all dimensions and competitive firm performance .…

EMISSOR A platform for capturing multimodal interactions as Episodic Memories and Interpretations with Situated Scenario based Ontological References

EMISSOR is a platform to capture multimodal interactions asrecordings of episodic experiences with explicit referential interpretation . The platform stores streamsof multiple modalities as parallel signals . Each signal is segmented andannotated independently with interpretation . Annotations are eventually mapped to explicit identities and relations in the eKG .…

Utility Based Precoding Optimization Framework for Large Intelligent Surfaces

The spectral efficiency of wireless networks can be made nearly infinitelylarge by deploying many antennas . The deployment of very many antennas requires new topologies beyond the compact and discrete antenna arrays used by conventional base stations . In this paper, we consider the large intelligentsurface scenario where small antennas are deployed on a large and densetwo-dimensional grid .…

Approximate solutions of convex semi infinite optimization problems in finitely many iterations

We develop two adaptive discretization algorithms for convex semi-infiniteoptimization . They terminate after finitely many iterations at approximatesolutions of arbitrary precision . Applications to parametric and non-parametric regression problems under shape constraints are discussed . All occurring finite optimization subproblems in our algorithms have to besolved only approximately, and continuity is the only regularity assumption onour objective and constraint functions .…

Delay Bounded Scheduling Without Delay Extended Technical Report

Delay-boundeddeterministic scheduling, introduced in prior work, is an efficient bug-finding technique to curb the large cost associated with full schedulingnondeterminism . In this paper we present a technique to lift the delaybound for the case of finite-domain variable programs . We demonstrate how, combined withpredicate abstraction, our technique can both refute and verify safetyproperties of programs with unbounded variable domains, even for unbounded thread counts .…

3D Displays Their Evolution Inherent Challenges Future Perspectives

The development has mostly focused on Head Mounted Displays (HMD) development for Virtual Reality and in general ignored non-HMD 3D displays . This paper will seek to identify what areas of future software development could mitigate this dereliction . The paper will outline six distinct areas where the context-awareness concept will allow for non-3D displays in particular light field displays that can not only compete but surpass their HMD-based brethren for many specific use cases .…

Informatiekunde Visie 2003

This document discusses (in Dutch) the vision underlying the businessinformatics (Informatiekunde) curriculum and research programme at the NijmegenInstitute for Informatics and Information Science (NIII) It is to be expected that in the coming years, updatesto this document will also pay more attention to business informatics research .…

CNN based Approaches For Cross Subject Classification in Motor Imagery From The State of The Art to DynamicNet

Motor imagery (MI)-based brain-computer interface (BCI) systems are being increasingly employed to provide alternative means of communication and control for people suffering from neuro-motor impairments . However, MI classification is still a challenging task, because the signals are characterized by poor SNR, highintra-subject and cross-subject variability .…

New LCD MDS codes of non Reed Solomon type

Most of LCD MDS codes have been constructed by employing generalized Reed-Solomon codes . In this paper, we construct some classes of new LCD codes that are not monomiallyequivalent to Reed-solomon codes, called LCD codes of non-Reed- Solomontype . Our method is based on the constructions of Beelen et al.…

Studying the association of online brand importance with museum visitors An application of the semantic brand score

This paper explores the association between brand importance and growth in museum visitors . We analyzed 10 years of online forum discussions and applied the Semantic Brand Score (SBS) to assess the brand importance of five European museums . Results suggest that in order to attract more visitors, museum brand managers should focus on increasing the volume of online posting and the richness of information generated by users around the brand, rather than controlling for the posts’ overall positivity or negativity .…

A Data Efficient Approach to Behind the Meter Solar Generation Disaggregation

With the emergence of battery storage and the decline in thesolar photovoltaic (PV) levelized cost of energy (LCOE), the number ofbehind-the-meter solar PV systems is expected to increase steadily . The ability to estimate solar generation from these latent systems is crucial for a range of applications, including distribution system planning and operation, demandresponse, and non-intrusive load monitoring .…

Connectivity of 1d random geometric graphs

A 1d random geometric graph (1d RGG) is built by joining a random sample of $n$ points from an interval of the real line with probability $p$ We count thenumber of $k$-hop paths between two vertices of the graph in the case where the space is the 1d interval $[0,1]$.…

Personality correlates of key roles in informal advice networks

We use Social Network Analysis to detect individuals who play a strategic role in advice networks . We investigate whether an association between key players and the big five personality traits exists, by means of nonparametricstatistics . Results give evidence of significant associations between key positions andConscientiousness, Neuroticism and Agreeableness .…

On Decentralization of Bitcoin An Asset Perspective

Since its advent in 2009, Bitcoin, a cryptography-enabled peer-to-peer digital payment system, has been gaining increasing attention from bothacademia and industry . We present in this paper the first systematicinvestigation of the degree of decentralization for Bitcoin based on its entiretransaction history .…

On exploration requirements for learning safety constraints

Enforcing safety for dynamical systems is challenging, since it requiresconstraint satisfaction along trajectory predictions . Equivalent controlconstraints can be computed in the form of sets that enforce positiveinvariance . However, these constraints are cumbersome to compute from models, and it is not yet well established how to infer constraints from data .…

Distributionally Robust Chance Constrained Flexibility Planning for Integrated Energy System

Inflexible combined heat and power plants and uncertain wind power production result in excess power in distribution networks . Power-to-X facilities such aselectrolyser and electric boilers can offer extra flexibility to theintegrated energy system . A case study validates the effectiveness of introducing the electrolyserand electric boiler into the integrated energy system, with respect to the decreased system cost, expanded CHP plant flexibility and reduced inverse powerflow .…

The State of Infodemic on Twitter

In the context of the current COVID-19 pandemic, social mediaposts and platforms are at risk of rumors and misinformation in the face of the serious uncertainty surrounding the virus itself . Twitter, in particular, has taken a center stage in the storm where Covid-19 has been a much talked about subject .…