## Energy Efficient UAV Multicasting with Simultaneous FSO Backhaul and Power Transfer

This letter studies an unmanned aerial vehicle (UAV) aided multicasting (MC) system . It is enabled by simultaneous free space optics (FSO) backhaul and power transfer . The UAV applies the power-splitting technique to harvestwireless power and decode backhaul information simultaneously over the FSOlink .…

## Evaluating the state of the art in mapping research spaces a Brazilian case study

Scientific knowledge cannot be seen as a set of isolated fields, but as ahighly connected network . Understanding how research areas are connected is ofparamount importance for adequately allocating funding and human resources . Relationshipbetween disciplines can be drawn from data on data on the trajectory of individualscientists, as researchers often make contributions in a small set of interrelated areas .…

## Destroying Multicolored Paths and Cycles in Edge Colored Graphs

We study the computational complexity of $c$-Colored $P_\ell$ Deletion and $c$. Deletions . We show that both problems are fixed-parameter tractable with respect to the colored neighborhood diversity of the input graph . We also provide hardness results to outline the limits ofparameterization by the standard parameter solution size $k$.…

## A Cycle Joining Construction of the Prefer Max De Bruijn Sequence

We propose a novel construction for the well-known prefer-max De Bruijnsequence . We show that the construction implies known results from the literature in a straightforward manner . It also forms analternative proof for the seminal FKM-theorem . We also show that it implies the correctness of onion-theoracle onion theorem and of the shift rules for preferred-max and prefer-min .…

## Maximal and minimal dynamic Petri net slicing

Presenting two new Petri net slicing algorithms to isolate those places and transitions that may contribute tokens to one or more places given (the slicing criterion) The completeness of thefirst algorithm and the minimality of the second algorithm are formally proven .…

## Edsger W Dijkstra a Commemoration

This article is a multiauthored portrait of Edsger Wybe Dijkstra that includes testimonials written by friends, colleagues and students . It provides unique insights into his personality, working style andhabits .…

## Edsger W Dijkstra a Commemoration

This article is a multiauthored portrait of Edsger Wybe Dijkstra that includes testimonials written by friends, colleagues and students . It provides unique insights into his personality, working style andhabits .…

## ACM Net Action Context Modeling Network for Weakly Supervised Temporal Action Localization

Weakly-supervised temporal action localization aims to localize actioninstances temporal boundary and identify the corresponding action category with only video-level labels . Traditional methods mainly focus on foreground and background frames separation with only a single attention branch and classactivation sequence .…

## The Value of Excess Supply in Spatial Matching Markets

We study dynamic matching in a spatial setting . Riders arrive in some (possibly adversarial) order at random points . Unmatched riders incur a waiting cost $c$ per period . The cost of matching a driver to a rider is equal to the distance between them .…

## Correlation Sketches for Approximate Join Correlation Queries

In this paper, we introduce a new class of data augmentation queries: join-correlation queries . We propose asketching method that enables the construction of an index for a large number of tables . We also explore different scoring strategies that effectively rank the query results based on how well the columns are correlated with the query .…

## Efficient and Accurate In Database Machine Learning with SQL Code Generation in Python

We describe a novel method for In-Database Machine Learning (IDBML) We contribute a process for . SQL-codegeneration in Python using template macros in Jinja2 as well as the prototype . We measured accuracy and .computation time . Our multidimensional probability estimation was significantlymore accurate than Naive Bayes .…

## Rethinking the Backdoor Attacks Triggers A Frequency Perspective

Backdoor attacks have been considered a severe security threat to deeplearning . Such attacks can make models perform abnormally on inputs with triggers and still retain state-of-the-art performance on cleandata . Many current backdoor attacks exhibit severe high-frequency artifacts, which persistacross different datasets and resolutions .…

## Towards Optimal Use of Exception Handling Information for Function Detection

Function entry detection is critical for security of binary code . Call frames have been used inexception-handling for function start detection . But existing methods have two problems: combining call frames with heuristic-based approaches often brings error and uncertain benefits .…

## Minimax Estimation of Linear Functions of Eigenvectors in the Face of Small Eigen Gaps

Eigen vector perturbation analysis plays a vital role in various statistical data science applications . The proposed estimators are nearly minimax optimaleven when the associated eigen-gap is substantially smaller than what is required in prior theory . In order to mitigate a non-negligible bias issue inherent to thenatural “plug-in” estimator, we develop de-biased estimators that (1) achieveminimax lower bounds for a family of scenarios (modulo some logarithmicfactor) and (2) can be computed in a data-driven manner without samplesplitting.…

## Community Detection with Contextual Multilayer Networks

In this paper, we study community detection when we observe $m$ sparsenetworks and a high dimensional covariate matrix, all encoding the same community structure among $n$ subjects . In the asymptotic regime where thenumber of features and the number of subjects $p$ grows proportionally, we find a sharp threshold of phase transition .…

## ELO System for Skat and Other Games of Chance

The ELO ranking system has proven to be a reliable method for calculating therelative skill levels of players in zero-sum games . The evaluation of player strength in trick-taking card games like Skat orBridge is not obvious . We propose a new ELO system for Skat to overcome these weaknesses, based on a tournament scoringsystem .…

## PrivGenDB Efficient and privacy preserving query executions over encrypted SNP Phenotype database

PrivGenDB is the first SSE-based approach ensuring the confidentiality of shared SingleNucleotide Polymorphism (SNP)-phenotype data through encryption . It supports a variety of query types on genomic data, including countqueries, Boolean queries, and k’-out-of-k match queries . Computer evaluations on a dataset with 5,000 records and 1,000 SNPs demonstrate that a count/Boolean query and a k-out-to-match query over 40 SNPs take approximately 4.3s and 86.4{\mu}s, respectively, that outperforms the existing schemes .…

## Shared Dining Broadcasting Secret Shares using Dining Cryptographers Groups

A k-anonymous broadcast can be implemented using a small group of diningcryptographers to first share the message, followed by a flooding phase started by group members . Members have little incentive to forward the message in atimely manner, as forwarding incurs costs, or they may even profit from keeping the message .…

## A matrix math facility for Power ISA TM processors

Power ISA(TM) Version 3.1 has introduced a new family of matrix mathinstructions, collectively known as the Matrix-Multiply Assist (MMA) facility . These instructions have led to a power- and area-efficient implementation of ahigh throughput math engine in the future POWER10 processor .…

## Intelligent Reflecting Surfaces Assisted Terahertz Communications toward 6G

Terahertz (THz) communications have emerged as a promising candidate to support the heavy data traffic and exploding network capacity in the future 6G networks . However, THz communications are facing many challenges forpractical implementation, such as propagation loss, signal blockage, and hardware cost .…

## Understanding the Benefit of Being Patient in Payment Channel Networks

Scaling blockchain efficiency is crucial to its widespread usage in which thepayment channel is one of the most prominent approaches . With payment channelsand the network they construct, two users can move some transactions off-chain in a predetermined duration to avoid expensive and time-consuming on-chainsettlements .…

## Contingency Analysis Based on Partitioned and Parallel Holomorphic Embedding

The traditional Newton-Raphson method suffers from non-convergence issues when solving post-outage power flow problems . The HE-based simulator guarantees convergence if the true power flow solution exists . The PHE method does notundermine the numerical robustness of HE and significantly reduces thecomputation burden in large-scale contingency analysis .…

## Exploring Task Placement for Edge to Cloud Applications using Emulation

A vast and growing number of IoT applications connect physical devices, suchas scientific instruments, technical equipment, machines, and cameras, across heterogeneous infrastructure from the edge to the cloud . As edge and cloud layers are increasingly tightly integrated, imbalancedresource allocations and sub-optimally placed tasks can quickly deteriorate the overall system performance .…

## Pilot Edge Distributed Resource Management Along the Edge to Cloud Continuum

We proposePilot-Edge as a common abstraction for resource management across the edge-to-cloud continuum . Pilot-Edge is based on the pilot abstraction, which provides aFunction-as-a-Service (FaaS) interface for application-level tasks . Theabstraction allows applications to encapsulate common functions in high-leveltasks that can then be configured and deployed across the continuum .…

## Hybrid QSS and Dynamic Extended Term Simulation Based on Holomorphic Embedding

Power system simulations that extend over a time period of minutes, hours, oreven longer are called extended-term simulations . Extended-term simulation is needed for many power system analysis tasks (e.g., resilience analysis, renewable energyintegration, cascading failures) The conventional approaches are insufficient for dealing with the extended-time simulation of multi-timescaleprocesses .…

## Decentralized Cross Network Identity Management for Blockchain Interoperation

Interoperation for data sharing between permissioned blockchain networksrelies on networks’ abilities to independently authenticate requests andvalidate proofs accompanying the data . This requires counterparty networks to know the identities andcertification chains of each other’s members . But permissioned networks are ad hoc consortia of existing organizations, whose network affiliations may not be well-known or well-established even though their individual identities are .…

## Optimal CPU Scheduling in Data Centers via a Finite Time Distributed Quantized Coordination Mechanism

In this paper we analyze the problem of optimal task scheduling for datacenters . We propose a fast distributediterative algorithm which operates over a large scale network of nodes . The algorithm is guaranteed to converge to the exact optimal scheduling plan in a finitenumber of time steps .…

## DJXPerf Identifying Memory Inefficiencies via Object centric Profiling for Java

Java is the “go-to” programming language choice for developing scalableenterprise cloud applications . In such systems, even a few percent CPU timesavings can offer a significant competitive advantage . In this paper, we present DJXPerf, a lightweight, object-centric memoryprofiler for Java, which associates memory-hierarchy performance metrics (e.g.,…

## Scaling Scaling Laws with Board Games

The performance achievable with a fixed amount of compute degrades predictably as the game gets larger and harder . We further show that the test-time and train-time compute available to an agent can be traded off while maintaining performance . We also show the test time and training time compute available can be trade off while keeping performance on the large scale of the problem .…

## Valued rank metric codes

In this paper, we study linear spaces of matrices defined over discretelyvalued fields . We take first steps into the theory ofrank-metric codes over discrete valuation rings by means of skew algebras derived from Galois extensions of rings . We modelprojectivizations of rank-metic codes via Mustafin varieties, which we then give sufficient conditions for a decrease in the dimension .…

## Active learning using weakly supervised signals for quality inspection

The ability to rapidly updatemachine vision based inspection systems is paramount . We develop amethodology for learning actively, from rapidly mined, weakly (i.e. partially)annotated data, enabling a fast, direct feedback from the operators on theproduction line . We also consider the problem of covariate shift, which arises inevitably due tochanging conditions during data acquisition .…

## Prism Private Verifiable Set Computation over Multi Owner Outsourced Databases

Prism is a secret sharing based approach to compute privateset operations (i.e., intersection and union), as well as aggregates overoutsourced databases belonging to multiple owners . Prism enables data owners topre-load the data onto non-colluding servers and exploits the additive and multiplicative properties of secret-shares to compute the above-listedoperations in (at most) two rounds of communication between the servers and the querier .…

## Edsger W Dijkstra a Commemoration

This article is a multiauthored portrait of Edsger Wybe Dijkstra that includes testimonials written by friends, colleagues and students . It provides unique insights into his personality, working style andhabits .…

## Graph Reordering for Cache Efficient Near Neighbor Search

Graph search is one of the most successful algorithmic trends in nearneighbor search . We find thatreordering improves the query time by up to 40%, and we demonstrate that the time needed to reorder the graph is negligible compared to the time required to construct the index .…

## Serverless Predictions 2021 2030

Advances on resource disaggregation will enable transparency for most Cloud applications . ServerlessSuperComputer or Infinite Laptop proposals will be equivalent to Tim Wagner’s serverless supercomputer proposals . We present five serverless predictions for the next decade that will realize this vision of transparency .…

## A Preliminary Proposal for an Analytical Model for Evaluating the Impact on Performance of Data Access Patterns in Transaction Execution

We present a preliminary proposal for an analytical model for evaluating the performance of data access patterns in concurrent transaction execution . We consider the case of concurrency control protocols that uselocking to ensure isolation in the execution of transactions .…

## Synthesized Trust Learning from Limited Human Feedback for Human Load Reduced Multi Robot Deployments

Human multi-robot system (MRS) collaboration is demonstrating potentials in wide application scenarios . A novel Synthesized Trust Learning (STL) method was developed to model human trust in the collaboration . STL explores two aspects of human trust (trust level and trust preference) and accelerates convergence speed by integrating active learning to reduce workload .…

## Evaluating Medical IoT MIoT Device Security using NISTIR 8228 Expectations

How do healthcare organizations evaluate the cybersecurity and privacy protection of Medical Internet ofThings (MIoT) used in clinical settings? This paper suggests an approach for such evaluation using National Institute of Standards and Technology (NIST)guidance) How do organizations (from small Practices to large HDOs) evaluate compliance with NISTIR 8228 Expectations?…

## Polynomial Circuit Verification using BDDs

Verification is one of the central tasks during circuit design . It is shown that for circuits with specificstructural properties, like e.g. tree-like circuits, and circuits based onmultiplexers derived from BDDs complete formal verification can be carried out in polynomial time and space .…

## Multimodal Entity Linking for Tweets

In many information extraction applications, entity linking (EL) has emerged as a crucial task that allows leveraging information about named entities from a knowledge base . In this paper, we address the task of multimodal entitylinking (MEL), an emerging research field in which textual and visualinformation is used to map an ambiguous mention to an entity in a knowledgebase .…

## Visualization of the Computation Process of a Universal Register Machine

Universal register machine, a formal model of computation, can be emulated on the array of the Game of Life, a two-dimensional cellular automaton . We performspectral analysis on the computation dynamical process of the universalregister machine . The array is divided into small sectors and the power spectrum is calculated from the evolution in each sector .…

## DyGCN Dynamic Graph Embedding with Graph Convolutional Network

Dynamic GraphConvolutional Network (DyGCN) generalizes the embedding propagation scheme of GCN to dynamicsetting in an efficient manner . The most affected nodes are first updated, and then their changes are propagated to the further nodes and leads to theirupdate . Extensive experiments conducted on various dynamic graphs demonstratethat our model can update the node embeddings in a time-saving andperformance-preserving way .…

## Reinforcement Learning with a Disentangled Universal Value Function for Item Recommendation

In recent years, there are great interests as well as challenges in applyingreinforcement learning (RL) to recommendation systems . In this paper, wesummarize three key practical challenges of large-scale RL-based recommendersystems: massive state and action spaces, high-variance environment, and theunspecific reward setting in recommendation .…

## Bootstrapping Your Own Positive Sample Contrastive Learning With Electronic Health Record Data

Electronic Health Record (EHR) data has been of tremendous utility inArtificial Intelligence for healthcare such as predicting future clinicalevents . These tasks often come with many challenges when using machine learning models due to a myriad of factors including classimbalance and data heterogeneity .…

## Analysis of Twitter Users Lifestyle Choices using Joint Embedding Model

This paper suggests a joint embedding model incorporating users’ social and textual information to learn contextualized user representations used for understanding their lifestyle choices . We apply our model to tweets related to two lifestyleactivities, Yoga’ and Keto diet’ and use it to analyze users’ activity type and motivation .…

## HumAID Human Annotated Disaster Incidents Data from Twitter with Deep Learning Benchmarks

Social networks are widely used for information consumption anddissemination, especially during time-critical events such as natural disasters . Despite its significantly large volume, social media content is often too noisy for direct use in any application . In this paper, we present a new large-scale dataset with~77K human-labeled tweets, sampled from a pool of ~24 million tweets across 19disaster events that happened between 2016 and 2019 .…

## AI in Smart Cities Challenges and approaches to enable road vehicle automation and smart traffic control

Smart Cities and Communities (SCC) constitute a new paradigm in urbandevelopment . SCC ideates on a data-centered society aiming at improving efficiency by automating and optimizing activities and utilities . Thispaper describes AI perspectives in SCC and gives an overview of AI-basedtechnologies used in traffic to enable road vehicle automation and smarttraffic control .…

## TenSEAL A Library for Encrypted Tensor Operations Using Homomorphic Encryption

TenSEAL is an open-source library for Privacy-Preserving Machine Learning usingHomomorphic Encryption that can be easily integrated within popular machinelearning frameworks . We benchmark our implementation using MNIST and show that an encrypted convolutional neural network can be evaluated in less than asecond, using less than half a megabyte of communication.…

## Plinius Secure and Persistent Machine Learning Model Training

Persistent memory (PM) is resilient to power loss, provides fast and fine-granular access to memory (unlike disk storage) and has latency and bandwidth close to DRAM (in the order of ns andGB/s) We present PLINIUS, a ML framework using Intel SGXenclaves for secure training of ML models and PM for fault toleranceguarantees .…

## MPN Multimodal Parallel Network for Audio Visual Event Localization

Audio-visual event localization aims to localize an event that is bothaudible and visible in the wild . This task is a widespread audio-visual sceneanalysis task for unconstrained videos . We propose aMultimodal Parallel Network (MPN) which can perceive global semantics and local information parallelly .…