## Developing a Conversational Recommendation System for Navigating Limited Options

We have developed a conversational recommendation system designed to help users navigate through a set of limited options to find the best choice . Unlike internet scale systems that use a singular set of search terms, our system uses multi-turnuser dialog to deeply understand the users preferences .…

## A Gaussian fixed point random walk

In this note, we design a discrete random walk on the real line which takessteps $0, \pm 1$ (and one with steps in $\{\pm 1, 2\}$) We recover linear time algorithms for logarithmicbounds for Koml\'{o}s conjecture in an oblivious online setting .…

## Maintenance scheduling of manufacturing systems based on optimal price of the network

Goods can exhibit positive externalities impacting decisions of customers insocials networks . Suppliers can integrate these externalities in their pricing strategies to increase their revenue . Predictive maintenance has the potential to reduce the maintenance costs and improve the system availability .…

## Managing Cloud networking costs for data intensive applications by provisioning dedicated network links

Many scientific high-throughput applications can benefit from the elastic nature of Cloud resources, especially when there is a need to reduce time to completion . For data-intensive applications,egress networking costs can exceed the compute costs . Dedicated network links provide a way to lower the networking costs, but they do add complexity .…

## Mitigating the Effects of Reading Interruptions by Providing Reviews and Previews

As reading on mobile devices is becoming more ubiquitous, content is consumed in shorter intervals and is punctuated by frequent interruptions . Short summaries of eitherpreviously read content (reviews) or upcoming content (previews) will help thereader re-engage with the reading task .…

## Five Degree of Freedom Property Interpolation of Arbitrary Grain Boundaries via Voronoi Fundamental Zone Octonion Framework

We introduce Voronoi fundamental zone octonion interpolation framework for grain boundary (GB) structure-property models and surrogates . The VFZOframework offers an advantage over other five degree-of-freedom based propertyinterpolation methods because it is constructed as a point set in a manifold .…

## OneVision Centralized to Distributed Controller Synthesis with Delay Compensation

We propose a new algorithm to simplify the controller development for distributed robotic systems subject to external observations, disturbances, and communication delays . We formulate our goal as nonlinear optimal control –using a regret minimizing objective that measures how much the distributedagents behave differently from the delay-free centralized response .…

## Monitoring Open Access at a national level French case study

Only open data and information available on the Web are used, leveraging as much as we can large-scale systems such as Unpaywall, HAL, ORCID and IDRef . We estimate that theoverall OA rate for French affiliated publications ranges from 39% to 42% between 2013 and 2017 .…

## Student and Faculty Adviser Insights in an Agile Methodology Integrated Filipino Company Sponsored I T Capstone Program

Theseshowed issues with time management, communication, and competency . Groupsthat excelled exhibited better team coordination and a complete grasp of the Agile methodology . For future implementations, clearer task definition and reducing skill gaps are necessary for better execution . For the future implementation of Agile Methodology, clearer tasks definition and reduced skill gaps necessary for future implementation, according to the authors .…

## On the Complexity of a Family of Decoupled Multi Robot Motion Planning Problems

In multi-robot motion planning (MRMP) the aim is to plan the motion of several robots operating in a common workspace while avoiding collisions with other robots . The main contribution of this paper is asimple construction that serves as a lower bound for the computational cost of a variety of prevalent MRMP problems .…

## Burling graphs revisited Part 1 New characterizations

Burling sequence is a sequence of triangle-free graphs of increasingchromatic number . Each of them is isomorphic to the intersection graph of a set of axis-parallel boxes in $R^3$ These graphs were also proved to have othergeometrical representations: intersection graphs of line segments in the plane, and intersection graphs .…

## Improving Optimal Power Flow Relaxations Using 3 Cycle Second Order Cone Constraints

This paper develops a novel second order cone relaxation of the semidefiniteprogramming formulation of optimal power flow, that does not imply the `anglerelaxation’ We build on a technique developed by Kim et al., extend it forcomplex matrices, and apply it to 3×3 positive semideFinite matrices .…

## Enumerating All Convex Polyhedra Glued from Squares in Polynomial Time

We present an algorithm that enumerates and classifies all edge-to-edgegluings of unit squares that correspond to convex polyhedra . We show that thenumber of such gluings of $n$ squares is polynomial in $n$, and the algorithmruns in time polynomnial in time .…

## Identity Inference on Blockchain using Graph Neural Network

Identity inference, which aims to make apreliminary inference about account identity, plays a significant role in security . As a common tool, graph mining technique can effectivelyrepresent the interactive information between accounts and be used for identityinference . But existing methods cannot balance scalability and end-to-endarchitecture, resulting high computational consumption and weak featurerepresentation .…

## Automated Allocation of Detention Rooms Based on Inverse Graph Partitioning

Room allocation is a challenging task in detention centers since lots ofrelated people need to be held separately with limited rooms . It is extremely difficult and risky to allocate rooms manually, especially for organized crime groups with close connections .…

## Relevance Aware Anomalous Users Detection in Social Network

Graph Neural Networks (GNNs) have been widely applied toreveal the suspicious nodes or relevance by aggregating the neighborhood information . Increasing scale of users’ behaviors and interactions as well as the manifold camouflage techniques have largely complicated the discrimination process .…

## ABEM An Adaptive Agent based Evolutionary Approach for Mining Influencers in Online Social Networks

A key step in influence maximization in online social networks is the identification of a small number of users, known as influencers, who are able to spread influence quickly and widely to other users . The evolving nature of the topological structure of these networks makes it difficult to locate and identify these influencers .…

## Impact of risk factors on work zone crashes using logistic models and Random Forest

Study focuses on the 2016 severe crashes that occurred in the State of Michigan (USA) in work zones along highway I-94 . The study identified therisk factors from a wide range of crash variables characterizing environmental, driver, crash and road-related variables .…

## Influenza Surveillance using Search Engine SNS On line Shopping Q A Service and Past Flu Patients

Influenza, an infectious disease, causes many deaths worldwide . Predictinginfluenza victims during epidemics is an important task for clinical, hospital,and community outbreak preparation . On-line user-generated contents (UGC) are generally used for prediction for reaction to sudden and unusual outbreaks .…

## A Quantum Circuit Obfuscation Methodology for Security and Privacy

In this paper, we propose obfuscation of quantum circuits tohide the functionality . Quantum circuits have inherent margin between correctand incorrect outputs . We insert dummy SWAPgates one at a time for maximum corruption of functionality before sending the quantum circuit to an untrusted compiler .…

## Fairness in Rankings and Recommendations An Overview

We increasingly depend on a variety of data-driven algorithmic systems to assist us in many aspects of life . This has given rise to important concerns regarding the fairness of such systems . In this work, we aim at presenting a toolkit of definitions,models and methods used for ensuring fairness in rankings and recommendations .…

## Sectors Beams and Environmental Impact on Commercial 5G mmWave Cell Coverage an Empirical Study

This paper presents the results of a measurement campaign to investigate and analyze the performance of a 5G mmWave cell . We evaluate the signal and beamcoverage map of an operational network, considering various scenarios . To the best of our knowledge, thispaper is the first to report on a commercial deployment while not treating the radio as a black box .…

## Few shot Image Generation via Cross domain Correspondence

Training generative models on a target domain containing limited examples can easily result in overfitting . In this work, weseek to utilize a large source domain for pretraining and transfer the diversity information from source to target . We propose to preserve therelative similarities and differences between instances in the source via anovel cross-domain distance consistency loss .…

## Towards Better Understanding of User Authorization Query Problem via Multi variable Complexity Analysis

User authorization queries in the context of role-based access control have attracted considerable interest in the last 15 years . Such queries are used todetermine whether it is possible to allocate a set of roles to a user that enables the user to complete a task .…

## VariTex Variational Neural Face Textures

VariTex is the first method that learns a latent feature space ofneural face textures . We combinethis generative model with a parametric face model and gain explicit controlover head pose and facial expressions . To generate images of complete humanheads, we propose an additive decoder that generates plausible additional details such as hair .…

## ShapeMOD Macro Operation Discovery for 3D Shape Programs

ShapeMOD is an algorithm that automatically discovers macros that are useful across large datasets of shape programs . ShapeMOD operates on shape programs expressed in animperative, statement-based language . It is designed to discover macros that make programs more compact by minimizing the number of function calls and freeparameters required to represent an input shape collection .…

## Going dark Analysing the impact of end to end encryption on the outcome of Dutch criminal court cases

Main argument put forward by law enforcement is that end-to-end encryption (E2EE) hampers authorities prosecuting criminals who rely on encrypted communication . This statement, however, is not supported by evidence, and therefore not suitable as the sole basis ofpolicymaking . In contrast to what the US attorney general wants us tobelieve, at least the prosecution of cases does not seem hampered by E2EE .…