## BBE Simulating the Microstructural Dynamics of an In Play Betting Exchange via Agent Based Modelling

The “Bristol BettingExchange” (BBE) is intended as a common platform, a data-source and experimental test-bed, for researchers studying the application of AI and machine learning techniques to issues arising in betting exchanges . BBE is a free open-source agent-based simulation model consisting of asports-betting exchange, but also a minimal simulation model of racetracksporting events about which bets may be made .…

## Can Self Reported Symptoms Predict Daily COVID 19 Cases

The COVID-19 pandemic has impacted lives and economies across the globe, leading to many deaths . Online surveys have been shown to be an effectivemethod for data collection amidst the pandemic . The best model predicts daily cases with a meanabsolute error (MAE) of 226.30 (normalized MAE of 27.09%) per state .…

## Gradient Flows Nonlinear Power Methods and Computation of Nonlinear Eigenfunctions

This chapter describes how gradient flows and nonlinear power methods in Banach spaces can be used to solve nonlinear eigenvector-dependent eigenvalue problems . Wereview several flows from literature, which were proposed to compute nonlineareigenfunctions, and show that they all relate to normalized gradient flows .…

## ModelPS An Interactive and Collaborative Platform for Editing Pre trained Models at Scale

AI engineering has emerged as a crucial discipline to democratize deep neuralnetwork (DNN) models among software developers . We propose and develop a low-codesolution, ModelPS (an acronym for “Model Photoshop”) to enable and empowercollaborative DNN model editing and intelligent model serving .…

## OpenGraphGym MG Using Reinforcement Learning to Solve Large Graph Optimization Problems on MultiGPU Systems

This paper presents an extensible, high performance framework (namedOpenGraphGym-MG) thatuses deep reinforcement learning and graph embedding to solve large graphoptimization problems with multiple GPUs . The time of a singlestep of RL training and a single step of RL inference on large graphs with more than 30 million edges, is reduced from 316.4s to 54.5s .…

## IRS Aided Wireless Relaying Optimal Deployment and Capacity Scaling

In this letter, we consider an intelligent reflecting surface (IRS)-aidedwireless relaying system . A decode-and-forward relay (R) is employed to send data from a source (S) to a destination (D), aided by M passivereflecting elements . We show that deploying IRS near R achieves the highest capacity as compared to that near S or D .…

## A Generalized Framework for Measuring Pedestrian Accessibility around the World Using Open Data

Pedestrian accessibility is an important factor in urban transport and landuse policy . The study develops an open source software framework to construct pedestrian accessibility indicators for cities using open and consistent data . The software is made publiclyavailable for reuse in an open repository .…

## Independent Asymmetric Embedding Model for Cascade Prediction on Social Network

The prediction for information diffusion on social networks has greatpractical significance in marketing and public opinion control . Cascadeprediction aims to predict the individuals who will potentially repost themessage on the social network . One kind of methods exploitdemographical, structural, and temporal features for prediction, or explicitlyrely on particular information diffusion models .…

## The Topological Mu Calculus completeness and decidability

We study the topological topological $mu$-calculus . We prove completeness, decidability and FMP over generaltopological spaces . We also investigaterelational $\mu$calculus, providing general completeness results . Unlike most other such proofs for such a function, ours ismodel-theoretic, making an innovative use of a known Modal Logic method (–the’final’ submodel of the canonical model) that has the twin advantages of greatgenerality and essential simplicity .…

## Durable Queues The Second Amendment

We consider durable data structures for non-volatile main memory, such as thenew Intel Optane memory architecture . We show that access to flushed content is of high cost due to cache invalidation in current architectures . The proposed design outperforms state-of-the-art durable queues, we discuss the theoretical optimal number of accesses to flushedcontent.…

## Learning Based Robust Resource allocation for D2D Underlaying Cellular Network

In this paper, we study the resource allocation in D2D underlaying cellularnetwork with uncertain channel state information (CSI) For satisfying the diversity requirements of different users, i.e. the minimum rate requirement for cellular user and the reliability requirement for D2.D user, we attempt tomaximize the cellular user’s throughput whilst ensuring a chance constraint forD2D user .…

## GSF locality is not sufficient for proximity oblivious testing

In Property Testing, proximity-oblivious testers (POTs) form a class of simple simple simple testing algorithms . We prove our result by exploiting a recent work of the authorswhich constructed a first-order (FO) property that is not testable [SODA 2021]. We prove that our property does not admit a POT, despite being GSF-local .…

## PNLSS Toolbox 1 0

This is a demonstration of the PNLSS Toolbox 1.0.0 . The toolbox is designed to identify polynomial nonlinear state-space models from data . It can describe a wide range of nonlinear systems, such as the forced Duffing oscillator .…

## Livewired Neural Networks Making Neurons That Fire Together Wire Together

Until recently, artificial neural networks were typically designed with afixed network structure . Here, I argue that network structure is highlyrelevant to function, and therefore neural networks should be livewired . I discuss how this approach may enable suchnetworks to build compositional world models that operate on symbols and thatachieve few-shot learning, capabilities thought by many to be critical to human-level cognition .…

## Confronting Structural Inequities in AI for Education

The dominant paradigm of evaluating fairness on the basis of performance disparities in AI models is inadequate for confronting structural inequities that educational AI systems (re)produce) We draw on a lens of structural injustice informed bycritical theory and Black feminist scholarship to critically interrogates widely-studied and widely-adopted categories of educational AI .…

## Fine Grained View on Bribery for Group Identification

Given a set of agents qualifying or disqualifying each other, groupidentification is the task of identifying a socially qualified subgroup of agents . Social qualification depends on the specific rule used to aggregate individual qualifications . Conceptually, we also consider a more fine-grainedconcept of bribery cost, where we ask how many single qualifications need to bechanged, nonunit prices for different bribery actions, and a more generalbribery goal that combines the constructive and destructive setting .…

## DID eFed Facilitating Federated Learning as a Service with Decentralized Identities

Federated learning emerges as afunctional solution that can help build high-performance models shared among parties while still complying with user privacy and dataconfidentiality requirements . We present a FLaaS system: DID-eFed, where FL isfacilitated by decentralized identities (DID) and a smart contract .…

## Simulating 3 symbol Turing machines with SIMD DNA

SIMD||DNA is a model of DNA strand displacement allowing parallel in-memorycomputation on DNA storage . We show how to simulate an arbitrary 3-symbolspace-bounded Turing machine with a SIMD|DNA program . We alsodevelop software that can simulate SIMD::DNA programs and produce SVG figures .…

## Modeling the Sequential Dependence among Audience Multi step Conversions with Multi task Learning in Targeted Display Advertising

In most real-world large-scale online applications, customer acquisition is usually a multi-step conversion process ofaudiences . For example, an impression-click-purchase process is usually performed of audiences for e-commerce platforms . However, it is more difficult to acquire customers in financial advertising than in traditional advertising .…

## Handling Structural Mismatches in Real time Opera Tracking

Algorithms for reliable real-time score following in live opera promise a lot of useful applications such as automatic subtitles display . Until now, such systems were based on the strong assumption that an opera performance follows the structure of the scorelinearly .…

## Decoupling multivariate functions using a non parametric Filtered CPD approach

Black-box model structures are dominated by large multivariate functions . So-called decoupling techniques aim at translatingmultivariate functions into an alternative basis . In this work afiltered canonical polyadic decomposition (CPD) is introduced . It is anon-parametric method which is able to retrieve decoupled functions even whenfacing non-unique decompositions .…

## Robust Physics Based Manipulation by Interleaving Open and Closed Loop Execution

We present a planning and control framework for physics-based manipulationunder uncertainty . Key idea is to interleave robust open-loop executionwith closed-loop control . We use these metrics to plan trajectories that are robust to both stateuncertainty and model inaccuracies . We conduct experiments on a real robotic system forreaching in clutter .…

## LEA A Learned Encoding Advisor for Column Stores

LEA is trained on synthetic datasets with various distributions on the target system . LEA can optimize for encoded size, query performance, or a combination of the two . Compared to the heuristic-based encoding advisor of a commercial columnstore on TPC-H, LEA achieves 19% lower query latency while using 26% less space.…

## A SAT attack on higher dimensional Erdős Szekeres numbers

A famous result by Erd\H{o}s and Szekeres (1935) asserts that, for every $k,d\in \mathbb{N}$, there is a smallest integer $n = g^{(d)(k)$ such that everyset of at least $n$ points in $\mathbb {R}^d$ in general position contains a$k$-gon, i.e., a subset of $k$ points which is in convex position .…

## Strategic alignment between IT flexibility and dynamic capabilities an empirical investigation

Dynamic capabilities theory emerged as a leading framework in the process of value creation for firms . The proposed framework helps firms assess and improve their maturity and alignment of ITflexibility and dynamic capabilities . Findings of this studysuggests that there is a significant positive relationship between the firmsdegree of strategic alignment defined as the degree of balance between all dimensions and competitive firm performance .…

## EMISSOR A platform for capturing multimodal interactions as Episodic Memories and Interpretations with Situated Scenario based Ontological References

EMISSOR is a platform to capture multimodal interactions asrecordings of episodic experiences with explicit referential interpretation . The platform stores streamsof multiple modalities as parallel signals . Each signal is segmented andannotated independently with interpretation . Annotations are eventually mapped to explicit identities and relations in the eKG .…

## Educators Solicitors Flamers Motivators Sympathizers Characterizing Roles in Online Extremist Movements

Social media provides the means by which extremist social movements, such as white supremacy and anti LGBTQ, thrive online . Yet, we know little about the roles played by the participants of such movements . We identify five roles surrounding extremistactivism: educators, solicitors, flamers, motivators, sympathizers .…

## Utility Based Precoding Optimization Framework for Large Intelligent Surfaces

The spectral efficiency of wireless networks can be made nearly infinitelylarge by deploying many antennas . The deployment of very many antennas requires new topologies beyond the compact and discrete antenna arrays used by conventional base stations . In this paper, we consider the large intelligentsurface scenario where small antennas are deployed on a large and densetwo-dimensional grid .…

## Approximate solutions of convex semi infinite optimization problems in finitely many iterations

We develop two adaptive discretization algorithms for convex semi-infiniteoptimization . They terminate after finitely many iterations at approximatesolutions of arbitrary precision . Applications to parametric and non-parametric regression problems under shape constraints are discussed . All occurring finite optimization subproblems in our algorithms have to besolved only approximately, and continuity is the only regularity assumption onour objective and constraint functions .…

## Delay Bounded Scheduling Without Delay Extended Technical Report

Delay-boundeddeterministic scheduling, introduced in prior work, is an efficient bug-finding technique to curb the large cost associated with full schedulingnondeterminism . In this paper we present a technique to lift the delaybound for the case of finite-domain variable programs . We demonstrate how, combined withpredicate abstraction, our technique can both refute and verify safetyproperties of programs with unbounded variable domains, even for unbounded thread counts .…

## 3D Displays Their Evolution Inherent Challenges Future Perspectives

The development has mostly focused on Head Mounted Displays (HMD) development for Virtual Reality and in general ignored non-HMD 3D displays . This paper will seek to identify what areas of future software development could mitigate this dereliction . The paper will outline six distinct areas where the context-awareness concept will allow for non-3D displays in particular light field displays that can not only compete but surpass their HMD-based brethren for many specific use cases .…

## Informatiekunde Visie 2003

This document discusses (in Dutch) the vision underlying the businessinformatics (Informatiekunde) curriculum and research programme at the NijmegenInstitute for Informatics and Information Science (NIII) It is to be expected that in the coming years, updatesto this document will also pay more attention to business informatics research .…

## CNN based Approaches For Cross Subject Classification in Motor Imagery From The State of The Art to DynamicNet

Motor imagery (MI)-based brain-computer interface (BCI) systems are being increasingly employed to provide alternative means of communication and control for people suffering from neuro-motor impairments . However, MI classification is still a challenging task, because the signals are characterized by poor SNR, highintra-subject and cross-subject variability .…

## New LCD MDS codes of non Reed Solomon type

Most of LCD MDS codes have been constructed by employing generalized Reed-Solomon codes . In this paper, we construct some classes of new LCD codes that are not monomiallyequivalent to Reed-solomon codes, called LCD codes of non-Reed- Solomontype . Our method is based on the constructions of Beelen et al.…

## Learning to Act Safely with Limited Exposure and Almost Sure Certainty

This paper aims to put forward the concept that learning to take safe actions in unknown environments, even with probability one guarantees, can be achieved without the need for an unbounded number of exploratory trials . We provide an algorithm that provably detects allunsafe machines in an (expected) finite number of rounds .…

## The effect of algorithmic bias and network structure on coexistence consensus and polarization of opinions

Little is known about impact of algorithms on daily life and society, little is known on how they affect information transfer and opinion formation . Here we introduce ageneral theoretical framework to systematically link models of opiniondynamics, social network structure, and content filtering .…

## Studying the association of online brand importance with museum visitors An application of the semantic brand score

This paper explores the association between brand importance and growth in museum visitors . We analyzed 10 years of online forum discussions and applied the Semantic Brand Score (SBS) to assess the brand importance of five European museums . Results suggest that in order to attract more visitors, museum brand managers should focus on increasing the volume of online posting and the richness of information generated by users around the brand, rather than controlling for the posts’ overall positivity or negativity .…

## The Theory of Functional Connections A journey from theory to application

Theory of Functional Connections (TFC) is a general methodology forfunctional interpolation that can embed a set of user-specified linearconstraints . The functionals derived from this method, called \emph{constrainedexpressions}, analytically satisfy the imposed constraints and can be leveraged to transform constrained optimization problems to unconstrained ones .…

## A Data Efficient Approach to Behind the Meter Solar Generation Disaggregation

With the emergence of battery storage and the decline in thesolar photovoltaic (PV) levelized cost of energy (LCOE), the number ofbehind-the-meter solar PV systems is expected to increase steadily . The ability to estimate solar generation from these latent systems is crucial for a range of applications, including distribution system planning and operation, demandresponse, and non-intrusive load monitoring .…

## Connectivity of 1d random geometric graphs

A 1d random geometric graph (1d RGG) is built by joining a random sample of $n$ points from an interval of the real line with probability $p$ We count thenumber of $k$-hop paths between two vertices of the graph in the case where the space is the 1d interval $[0,1]$.…

## Deep Learning Models in Software Requirements Engineering

Thegenerated sentences are not plausible English and contain only a few meaningful words . We believe that applying the model to a larger dataset may produces significantly better results . Further research is needed to improve the quality of generated data .…

## Using social network and semantic analysis to analyze online travel forums and forecast tourism demand

Forecasting tourism demand has important implications for both policy makers and companies operating in the tourism industry . We analyzed forums of 7 major Europeancapital cities, over a period of 10 years, collecting more than 2,660,000 posts, written by about 147,000 users .…

## Personality correlates of key roles in informal advice networks

We use Social Network Analysis to detect individuals who play a strategic role in advice networks . We investigate whether an association between key players and the big five personality traits exists, by means of nonparametricstatistics . Results give evidence of significant associations between key positions andConscientiousness, Neuroticism and Agreeableness .…

## On Decentralization of Bitcoin An Asset Perspective

Since its advent in 2009, Bitcoin, a cryptography-enabled peer-to-peer digital payment system, has been gaining increasing attention from bothacademia and industry . We present in this paper the first systematicinvestigation of the degree of decentralization for Bitcoin based on its entiretransaction history .…

## On exploration requirements for learning safety constraints

Enforcing safety for dynamical systems is challenging, since it requiresconstraint satisfaction along trajectory predictions . Equivalent controlconstraints can be computed in the form of sets that enforce positiveinvariance . However, these constraints are cumbersome to compute from models, and it is not yet well established how to infer constraints from data .…

## Efficient Off Policy Q Learning for Data Based Discrete Time LQR Problems

This paper introduces and analyzes an improved Q-learning algorithm for discrete-time linear time-invariant systems . The proposed method does not require knowledge of the system dynamics, and it enjoys significantefficiency advantages over other data-based optimal control methods in the literature .…

## Low Input Accurate Periodic Motion of an Underactuated Mechanism Mass Distribution and Nonlinear Spring Shaping

This work presents a control-oriented structural design approach for a 2-DOFunderactuated mechanical system . To achieve the desired periodic motion, we propose to adjust the dynamic response of the mechanism by selecting its mass distribution and the characteristic of a nonlinear spring .…

## Distributionally Robust Chance Constrained Flexibility Planning for Integrated Energy System

Inflexible combined heat and power plants and uncertain wind power production result in excess power in distribution networks . Power-to-X facilities such aselectrolyser and electric boilers can offer extra flexibility to theintegrated energy system . A case study validates the effectiveness of introducing the electrolyserand electric boiler into the integrated energy system, with respect to the decreased system cost, expanded CHP plant flexibility and reduced inverse powerflow .…

## The State of Infodemic on Twitter

In the context of the current COVID-19 pandemic, social mediaposts and platforms are at risk of rumors and misinformation in the face of the serious uncertainty surrounding the virus itself . Twitter, in particular, has taken a center stage in the storm where Covid-19 has been a much talked about subject .…

## Microservices in IoT Security Current Solutions Research Challenges and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the emergence of multiple smart applications in different vital sectors . The main issue in IoT environments is that they can present potential vulnerabilities to be illegally accessed by malicious users .…