## Semi analytic integration for a parallel space time boundary element method modeling the heat equation

The presented paper concentrates on the boundary element method (BEM) for the heat equation in three spatial dimensions . In particular, we deal with tensorproduct space-time meshes allowing for quadrature schemes analytic in time andnumerical in space . The results are validated by numerical experiments in an HPC environment.…

## Curvy An Interactive Design Tool for Varying Density Support Structures

Curvy-an interactive design tool to generate varying density support structures for 3D printing . Curvy allows users to define high-level preferences on surface quality directly on the target object . These preferences are then translated into low-level design parameters to generate the support structure .…

## Cornus One Phase Commit for Cloud Databases with Storage Disaggregation

Cornus is a one-phase commit (1PC) protocol specifically designed for distributed databases . Cornus can achieve 1.5x speedup in latency compared to 2PCon YCSB and TPC-C workloads . We present Cornus in detail, formally prove itscorrectness, develop certain optimization techniques, and evaluate against 2P con workloads.…

## Meeting Effectiveness and Inclusiveness in Remote Collaboration

A primary goal of remote collaboration tools is to provide effective andinclusive meetings for all participants . Thisshows a method of measuring and understanding these metrics which are bothpractical and useful in a commercial CMC system . The model shows the following factors are correlated with inclusiveness, effectiveness, participation, and feeling comfortable to contribute in meetings: sending a pre-meeting communication, sending a meeting agenda, attendee location, remote-only meeting, audio/video quality and reliability, video usage, andmeeting size.…

## Trends in Vehicle Re identification Past Present and Future A Comprehensive Review

Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS) Due to its versatile applicability inmetropolitan cities, it gained significant attention . However, it becomes more difficult due to inter-class similarity, intra-classvariability, viewpoint changes, and spatio-temporal uncertainty .…

## Principled Simplicial Neural Networks for Trajectory Prediction

We consider the construction of neural network architectures for data onsimplicial complexes . In studying maps on the chain complex of a simplicialcomplex, we define three desirable properties of a neural networkarchitecture . The last property encodes the desirable feature that the output of the neural network depends on the entire simplicial complex and not on a subset of its dimensions .…

## Random Walks with Erasure Diversifying Personalized Recommendations on Social and Information Networks

Most existing personalization systems promote items that match a user’s previous choices or those that are popular among similar users . This results in recommendations that are highly similar to the ones users are already exposed to, resulting in their isolation inside familiar but insulated informationsilos .…

## On Gradient Coding with Partial Recovery

We consider a generalization of the recently proposed gradient coding framework . Each workertransmits to a master node one or more linear combinations of the gradientsover the data subsets assigned to it . The broad goal of our work is to study the optimal computation andcommunication load per worker .…

## AISPEECH SJTU accent identification system for the Accented English Speech Recognition Challenge

This paper describes the AISpeech-SJTU system for the accent identification track of the Accented English Speech Recognition Challenge . In this challenge track, only 160-hour accented English data collected from 8countries and the auxiliary Librispeech dataset are provided for training .…

## Interest aware Message Passing GCN for Recommendation

Graph Convolution Networks (GCNs) manifest great potential in recommendation . When stacking more layers, node embeddings become more similar and eventually indistinguishable, resulted in performance degradation . In this paper, we propose a novel Interest-awareMessage-Passing GCN (IMP-GCN) recommendation model, which performs high-ordergraph convolution inside subgraphs .…

## Unit selection synthesis based data augmentation for fixed phrase speaker verification

Data augmentation is commonly used to help build a robust speakerverification system, especially in limited-resource case . We propose a unit selection synthesis based data augmentation method to leverage the abundant text-independent data resources . In this approachtext-independent speeches of each speaker are firstly broke up to speechsegments each contains one phone unit .…

## DyNetKAT An Algebra of Dynamic Networks

We introduce a formal language for specifying dynamic updates for SoftwareDefined Networks . Our language builds upon Network Kleene Algebra with Tests(NetKAT) and adds constructs for synchronisations and multi-packet behaviour . We provide a sound and ground-complete axiomatisation of our language .…

## Asset Management Taxonomy A Roadmap

The concept of assets is not well-understood and generally delimited to a few types of assets . Artefacts whichhave inherent value for the organisation are assets, and as assets, they are subject to degradation . This degradation occurs over time, as artefacts age, and can be more immediate or slowly over a period of time, similar to the concept of technical debt .…

## SEPAL Towards a Large scale Analysis of SEAndroid Policy Customization

SEPAL applies the NLP technique and employs and trains awide&deep model to quickly and precisely predict whether one rule isunregulated or not . SEPAAL outperforms the state-art approach (i.e.,EASEAndroid) by 15% accuracy rate on average . We further discover the policycustomization problem is getting worse in newer Android versions (e.g.,…

## Architectural Decay as Predictor of Issue and Change Proneness

Architectural decay imposes real costs in terms of developer effort, systemcorrectness, and performance . Over time, those problems are likely to be revealed as explicit implementation issues (defects, feature changes, etc. etc. Over time they will likely be explicit problems, such as defects and feature changes .…

## Causal Inference Q Network Toward Resilient Reinforcement Learning

Deep reinforcement learning (DRL) has demonstrated impressive performance invarious gaming simulators and real-world applications . In practice, aDRL agent may receive faulty observation by abrupt interferences such as black-out, frozen-screen, and adversarial perturbation . How to design aresilient DRL algorithm against these rare but mission-critical and safety-crucial scenarios is an important yet challenging task .…

## Using Jupyter for reproducible scientific workflows

Literate computing has emerged as an important tool for computational studies and open science, with growing folklore of best practices . In this work, wereport two case studies – one in computational magnetism and another incomputational mathematics – where domain-specific software was exposed to the Jupyter environment .…

## Implicit Regularization in Tensor Factorization

Deep learning is perceived as a tendency of gradient-based optimization to fit training data with predictors of minimal”complexity” The fact that only some types of data give rise to generalization is understood to result from them being especially amenable to fitting with lowcomplexity predictors .…

## Effective Cache Apportioning for Performance Isolation Under Compiler Guidance

Com-CAS is a compiler-guided cache apportioningsystem that provides smart cache allocation to co-executing applications . The system improved averagethroughput by 21%, with a maximum of 54% while maintaining the worst individual execution time degradation within 15% to meet SLA requirements .…

## Defense against flooding attacks using probabilistic thresholds in the internet of things ecosystem

LSFA-IoT is proposed that protects the AODV routing protocol as well as the IoT network against flooding . The proposed method isdivided into two main phases; The first phase includes a physical layerintrusion and attack detection system used to detect attacks, and the second phase involves detecting incorrect events through APT-RREQ messages .…

## Tail Modulo Cons

OCaml function calls consume space on the system stack . If a program runs out of stack space, they get the dreaded “StackOverflow” exception — they crash . Tail-recursion requires the programmer to manually performsophisticated program transformations . In this work we propose an implementation of “Tail Modulo Cons” (TMC) forOCaml .…

## B ETS A Trusted Blockchain based Emissions Trading System for Vehicle to Vehicle Networks

Urban areas are negatively impacted by Carbon Dioxide (CO2 ) and NitrogenOxide (NOx) emissions . The European Union (EU) introduced an Emissions Trading System (ETS) where organizations can buy or receive emission allowances as needed . However, the current ETS cannotefficiently cope with vehicle mobility, even though vehicles are one of the primary sources of CO2 and NOx emissions .…

## Low Resource Audio to Lyrics Alignment From Polyphonic Music Recordings

Lyrics alignment in long music recordings can be memory exhaustive when performed in a single pass . The proposed system first spots the anchoring words within the audio signal . With respect to theseanchors, the recording is then segmented and a second-pass alignment is performed to obtain the word timings .…

## Automated Curriculum Learning for Embodied Agents A Neuroevolutionary Approach

We demonstrate how an evolutionary algorithm can be extended with acurriculum learning process that selects automatically the environmental conditions in which the evolving agents are evaluated . Environmentalconditions are selected so to adjust the level of difficulty to the ability of the current evolving agents and so to challenge the weaknesses of theevolving agents .…