Who Owns the Data A Systematic Review at the Boundary of Information Systems and Marketing

This paper gives a systematic research review at the boundary of theinformation systems (IS) and marketing disciplines . The citation asymmetries between IS and marketing are noted and an overall conceptual model is created . Forwardlooking suggestions are made on how academic researchers can better interfacewith industry and how academic research at the boundaries of IS can be further developed .…

Towards Semantic Interoperability in Historical Research Documenting Research Data and Knowledge with Synthesis

A vast area of research in historical science concerns the documentation and study of artefacts and related evidence . Current practice mostly usesspreadsheets or simple relational databases to organise the information as rowswith multiple columns of related attributes . Synthesis documentationsystem is Web-based andcollaborative, and makes use of existing standards for informationdocumentation and publication (CIDOC-CRM, RDF), focusing on semanticinteroperability and the production of data of high value and long-termvalidity .…

Accelerated Multiple Precision Direct Method and Mixed Precision Iterative Refinement on Python Programming Environment

Current Python programming environment does not have any reliable and efficient multiple precision floating-point arithmetic . MPF library can be utilized for middlelength precision arithmetic under 200 bits, but they are not widely used on Python . In this paper, we describe our accelerated MPF direct method withAVX2 techniques and its application to mixed precision iterative refinement combined with mpmath, and demonstrate their efficiency on x86\_64 computational environments .…

Quantum Annealing Algorithms for Boolean Tensor Networks

Quantum annealers manufactured by D-Wave Systems, Inc., are computational devices capable of finding high-quality solutions of NP-hard problems . In this contribution, we explore the potential and effectiveness of such quantumanneals for computing Boolean tensor networks . We show that tensor with up to millions of elements can bedecomposed efficiently using a DWave 2000Q adiabatic quantum annealer .…

Bottom Up Derivatives of Tree Expressions

In this paper, we extend the notion of (word) derivatives and partialderivatives due to (respectively) Brzozowski and Antimirov to tree derivatives . We define a new family of extended regular tree expressions (using negationor intersection operators) We show how to compute a Brozozowski-likeinductive tree automaton .…

Accelerated Multiple Precision Direct Method and Mixed Precision Iterative Refinement on Python Programming Environment

Current Python programming environment does not have any reliable and efficient multiple precision floating-point arithmetic . MPF library can be utilized for middlelength precision arithmetic under 200 bits, but they are not widely used on Python . In this paper, we describe our accelerated MPF direct method withAVX2 techniques and its application to mixed precision iterative refinement combined with mpmath, and demonstrate their efficiency on x86\_64 computational environments .…

MLDev Data Science Experiment Automation and Reproducibility Software

In this paper we explore the challenges of automating experiments in datascience . We propose an extensible experiment model as a foundation forintegration of different open source tools for running research experiments . Weimplement our approach in a prototype open source MLDev software package andevaluate it in a series of experiments yielding promising results .…

Bibliometric Profile of Nursing Research in Ex Yugoslavian Countries

Slovenia was the most productive country, followed byCroatia and Serbia . Nursing research in ex-Yugoslavian countries is growing both in scope and number of publications . A substantial part of the research is published in national journalsin national languages . The study also revealed substantial international cooperation among ex-yugoslavians and European Union.…

Reradiation and Scattering from a Reconfigurable Intelligent Surface A General Macroscopic Model

Reconfigurable Intelligent Surfaces (RISs) have attracted attention in the last year for their characteristics of nearly-passive, thin structures that candynamically change their reflection or refraction behaviour . In this paper, we introduce a general macroscopic model for therealistic evaluation of RIS scattering, based on its decomposition intomultiple scattering mechanisms and aimed at being embedded into ray models .…

Logics Meet 2 Way 1 Clock Alternating Timed Automata

In this paper, we study the extension of 1-clock Alternating Timed Automata(1-ATA) with the ability to read in both forward and backward direction . We propose a “non-punctuality” like restriction,called non-adjacency, for 2-Way 1-ATA-rfl, and also for GQMSO, for which theemptiness (respectively, satisfiability) checking becomes decidable, in general .…

MLDev Data Science Experiment Automation and Reproducibility Software

In this paper we explore the challenges of automating experiments in datascience . We propose an extensible experiment model as a foundation forintegration of different open source tools for running research experiments . Weimplement our approach in a prototype open source MLDev software package andevaluate it in a series of experiments yielding promising results .…

Hyperbolic Diffusion in Flux Reconstruction Optimisation through Kernel Fusion within Tensor Product Elements

Novel methods are presented for the fusion of GPU kernels in the artificialcompressibility method (ACM) The fused kernels are able to achieve 3-4 times speedup, which compares favourably with atheoretical maximum speedup of 4.3 times . In three dimensional test cases, thegenerated fused kernels were found to reduce total runtime by ${\sim}25\%$, and,when compared to the standard ACM formulation, simulations demonstrate that aspeedup of $2.3$ times can be achieved .…

Hyperbolic Diffusion in Flux Reconstruction Optimisation through Kernel Fusion within Tensor Product Elements

Novel methods are presented for the fusion of GPU kernels in the artificialcompressibility method (ACM) The fused kernels are able to achieve 3-4 times speedup, which compares favourably with atheoretical maximum speedup of 4.3 times . In three dimensional test cases, thegenerated fused kernels were found to reduce total runtime by ${\sim}25\%$, and,when compared to the standard ACM formulation, simulations demonstrate that aspeedup of $2.3$ times can be achieved .…

Logical Characterization of Coherent Uninterpreted Programs

An uninterpreted program (UP) is a program whose semantics is defined over the theory of uninterpretated functions . This is a common abstraction used inequivalence checking, compiler optimization, and program verification . Recently, a class of UP programs, called coherent, has been proposed and shown to be decidable .…

A 51 3 TOPS W 134 4 GOPS In memory Binary Image Filtering in 65nm CMOS

Neuromorphic vision sensors (NVS) can enable energy savings due to theirevent-driven that exploits the temporal redundancy in video streams from astationary camera . Noise-driven events lead to the false triggering of the object recognition processor . Image denoise operations require memoryintensive processing leading to a bottleneck in energy and latency .…

Caveats for the use of Web of Science Core Collection in old literature retrieval and historical bibliometric analysis

This research note tries to uncover the 1991 phenomenon from theperspective of database limitation by probing the limitations of search inabstract/author keywords/keywords plus fields of Web of Science Core Collection . The lowavailability rates of abstract/author keyword searches in WoSCC found in this study can explain the “watershed” phenomenon of AIscholarship in 1991 to a large extent .…

Lower Bounds for Symmetric Circuits for the Determinant

Dawar and Wilsenach (ICALP 2020) show an exponential separation between the sizes of symmetric arithmeticcircuits for computing the determinant and the permanent . The symmetryrestriction is that the circuits which take a matrix input are unchanged by a permutation applied simultaneously to the rows and columns of the matrix .…

Comprehending nulls

The Nested Relational Calculus (NRC) has been an influential high-level query language . It has been used as a basis for language-integrated queries in programming languages such as F#, Scala, and Links . However, NRC’s treatment of incomplete information, using nulls and three-valued logic, is not compatible with `standard’ NRC based on two-valued .…

Resolution Adaptive All Digital Spatial Equalization for mmWave Massive MU MIMO

All-digital basestation (BS) architectures for millimeter-wave (mmWave)massive multi-user multiple-input multiple- input multiple-output (MU-MIMO) have advantages inspectral efficiency, flexibility, and baseband-processing simplicity overhybrid analog-digital solutions . We demonstrate that adapting the resolution of the analog-to-digitalconverters (ADCs) and spatial equalizer of an all-digital system to the communication scenario enables orders-of-magnitude power savings for realisticmmWave channels .…

ArchaeoDAL A Data Lake for Archaeological Data Management and Analytics

Archaeological data have many different formats (images,texts, sensor data) and can be structured, semi-structured and unstructured . Such variety makes data difficult to collect, store, manage, search and analyze . We propose a generic, flexible andcomplete data lake architecture . Our metadata management system exploitsgoldMEDAL, which is the most complete metadata model currently available .…

Beamforming Design and Power Allocation for Transmissive RMS based Transmitter Architectures

This letter investigates a downlink multiple input single output (MISO)system based on transmissive reconfigurable metasurface (RMS) transmitter . It proposes an alternating optimization (AO) techniquebased on difference-of-convex (DC) programming and successive convexapproximation (SCA) Simulation results verify that the proposed algorithm canachieve convergence and improve the achievable sum-rate of the system .…

On data lake architectures and metadata management

So-called big data generally come from transactionalsystems, and even more so from the Internet of Things and social media . A data lake is a large, raw data repository that stores and manages all company databearing any format . The data lake concept remains ambiguous or fuzzy for many researchers and practitioners, who often confuse it with the Hadoop technology .…

OLR 2021 Challenge Datasets Rules and Baselines

This paper introduces the sixth Oriental Language Recognition (OLR) 2021Challenge . It intends to improve the performance of language recognitionsystems and speech recognition systems within multilingual scenarios . The dataprofile, four tasks, two baselines, and the evaluation principles are presented .…

Entropy Derivation Operators and Huffman Trees

We build a theory of binary trees on finite multisets that categorifies, oroperationalizes, the entropy of a finite probability distribution . Multisetsoperationalize probabilities as the event outcomes of an experiment . Huffmantrees operationalize the entertainment of the distribution of these events .…

When a crisis strikes Emotion analysis and detection during COVID 19

Understanding emotions that people express during large-scale crises helps inform policy makers and first responders about theemotional states of the population . We present CovidEmo, ~1K tweets labeled withemotions. We examine how well large pre-trained language models generalizeacross domains and crises in the task of perceived emotion prediction .…

On shared and multiple information

We address three outstanding problems in information theory . Problem one is the definition of a non-negative decomposition of the information conveyed by two or more sources about a target variable . Problem three is a measure of multiple mutual information, that is the extension of mutual information to more than two variables .…

Finite Bit Quantization For Distributed Algorithms With Linear Convergence

This paper studies distributed algorithms for (strongly convex) compositeoptimization problems over mesh networks . Instead of focusing on a specific algorithmic design, we propose a black-boxmodel casting distributed algorithms in the form of fixed-point iterates,converging at linear rate . The algorithmic model is coupled with a novel(random) Biased Compression (BC-)rule on the quantizer design, which preserves linear convergence .…

A Differentiable Language Model Adversarial Attack on Text Classifiers

Transformer-based models for natural language processing are an important issue due to their capabilities and wide adoption . In this paper, we propose a new black-box sentence-level attack . Our methodfine-tunes a pre-trained language model to generate adversarial examples . The proposed attack outperforms competitors on a diverse set of NLP problems for both computed metrics and human evaluation .…