## On line Optimal Ranging Sensor Deployment for Robotic Exploration

The approach is general for any class of mobile system, we run simulations and experiments with indoor drones . We provide a detailed analysis of the uncertainty of the positioning system while the UWB infrastructure grows . We developed a genetic algorithm that minimizes the deployment of newanchors, saving energy and resources on the mobile robot and maximizing the mission .…

## A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

Geofences are proposed as one line of defence to limit UAVs from flying into perimeters of other aircraft and restricted locations . Geofencing algorithms lack accuracy during the calculation of complex geofences, particularly in dynamic urban environments . We propose a new algorithm based on alpha shapes and Voronoi diagrams, which we integrate into an on-drone framework using an open-source mapping database from OpenStreetMap .…

## Minimal Multi Layer Modifications of Deep Neural Networks

Deep neural networks may err and produce incorrect outputs in safety-critical settings, such as autonomousdriving, medical diagnosis, and airborne collision avoidance systems . New tool, called 3M-DNN, for repairing agiven DNN, which is known to err on some set of inputs .…

## Ranking Facts for Explaining Answers to Elementary Science Questions

Explanations are created from a human-annotated set ofnearly 5,000 candidate facts in the WorldTree corpus . Our aim is to obtainbetter matches for valid facts of an explanation for the correct answer of a question over the available fact candidates .…

## Diameter constrained Steiner tree and related problems

We give a dynamic programming solution to find the minimum cost of a diameterconstrained Steiner tree in case of directed graphs . Then we show a simple reduction from undirected version to the directed version to realize an analgorithm of similar complexity i.e,…

## Investigating Man in the Middle based False Data Injection in a Smart Grid Laboratory Environment

The security of energy supply is increasingly threatened by cyber-attacks . Traditional cyber-security measures can be used as mitigation and prevention measures, but their effective use requires a deep understanding of the potential threat landscape and complex attack processes in energyinformation systems .…

## Learning Realtime One Counter Automata

Ouralgorithm uses membership and equivalence queries as in Angluin’s L* algorithm . In a partialequivalence query, we ask the teacher whether the language of a givenfinite-state automaton coincides with a counter-bounded subset of the targetlanguage . We evaluate an implementation of our algorithm on a number of randombenchmarks .…

## A dynamic mode decomposition extension for the forecasting of parametric dynamical systems

Dynamic mode decomposition (DMD) has recently become a popular tool for thenon-intrusive analysis of dynamical systems . Exploiting the proper orthogonaldecomposition as dimensionality reduction technique, DMD is able to approximatea dynamical system as a sum of (spatial) basis evolving linearly in time .…

## Mobility Label Based Network Hierarchical Mobility Management and Packet Forwarding Architecture

Mobility LabelBased Network (MLBN) is a new approach to the network layer mobility management problem that relies solely on MPLS to provide both macro- and micro-mobility for IPv4 and IPv6 mobile hosts and routers . This new approach does not rely on the existing IP mobility management protocols such as Mobile IP and is based on the combination of Multi- Protocol BGP (MP-BGP) and MPLS .…

## Learning to Learn a Cold start Sequential Recommender

The cold-start recommendation is an urgent problem in contemporary online applications . Many data-driven algorithms, suchas the widely used matrix factorization, underperform because of datasparseness . This work adopts the idea of meta-learning to solve the user’scold start recommendation problem .…

## Algorithms Using Local Graph Features to Predict Epidemics

We study a simple model of epidemics where an infected node transmits theinfection to its neighbors independently with probability $p$. This is alsoknown as the independent cascade or Susceptible-Infected-Recovered (SIR) model . The size of an outbreak in this model is closelyrelated to that of the giant connected component in “edge percolation”, whereeach edge of the graph is kept independently .…

## Understanding Players Interaction Patterns with Mobile Game App UI via Visualizations

Understanding how players interact with the mobile game app on smartphonedevices is important for game experts to develop and refine their app products . Visualizing therecorded logs of users’ UI operations is a promising way for quantitativelyunderstanding the interaction patterns .…

## The complexity of the Quantified CSP having the polynomially generated powers property

The Quantified CSP can be reduced to the CSP over the same constraint language with constants . The only limitation of this reduction is that it is applicable only for theconstraint languages with constant . We drastically simplified the reductionand generalized it for constraint languages without constants .…

## Dynamic Tolling for Inducing Socially Optimal Traffic Loads

How to design tolls that induce socially optimal traffic loads? We propose atwo-timescale discrete-time stochastic dynamics that adaptively adjusts thetoll prices on a parallel link network . We show that the loads and the tolls concentrate in a neighborhood of the fixed point, which correspondsto the socially optimal load and toll price .…

## RL4RS A Real World Benchmark for Reinforcement Learning based Recommender System

Reinforcement learning based recommender systems (RL-based RS) aims at learning a good policy from a batch of collected data . However, current RL-basedRS benchmarks commonly have a large reality gap, because they involve artificial RL datasets or semi-simulated RS datasets .…