Designing Optimal Key Lengths and Control Laws for Encrypted Control Systems based on Sample Identifying Complexity and Deciphering Time

There has been no systematic methodology of constructing cyber-physical systems that can achieve desired control performance while being protected against eavesdropping attacks . We propose a systematic method for designing the both of an optimal key length and an optimal controller to maximize both of the controlperformance and the difficulty of the identification .…

dualFace Two Stage Drawing Guidance for Freehand Portrait Sketching

dualFace consists of two-stage drawing assistance toprovide global and local visual guidance: global guidance, which helps users draw contour lines of portraits, and local guidance, inspired by traditional artist workflows in portrait drawing . In the stage of local guidance users synthesize detailed portrait images with a deep generative model, but use the synthesized results as detailed drawing guidance .…

Distributed Eco Driving Algorithm of Vehicle Platoon Using Traffic Light and Road Slope Information

This paper investigates the problem of ecological driving (Eco-driving) of vehicle platoons . To reduce the probability of a platoon stopping at red lights, a two-layer control architecture is proposed . The leader attempts to follow the planning speed profile in real time, while the follower keeps track of the nearest preceding vehicle and leader, to preserve the desired inter-vehicular distances .…

Vulnerabilities and Open Issues of Smart Contracts A Systematic Mapping

Smart Contracts (SCs) are programs stored in a Blockchain to ensureagreements between two or more parties . Failure or errors in SCs become perpetual once published . Thereliability of SCs is essential to avoid financial losses . This paper conducted asystematic literature mapping identifying initiatives and tools to analyze SCsand how to deal with the identified vulnerabilities.…

Easy and Efficient Transformer Scalable Inference Solution For large NLP mode

EET achieves a 1.5-15x state-of-art speedup varying with context length . Easy and Efficient Transformer (EET) has a significantperformance improvement over the existing schemes . EET is available on GitHub and is available at:https://://://github.com/NetEase-FuXi/EET. The ultra-large-scale pre-training model can effectively improve the effect of a variety of tasks, and it also brings a heavy computational burden toinference.…

The uniqueness of observatory publications

Large collections of observatory publications seem to be rare; or at the least rarely digitally described or accessible on the Internet . Notable examples to the contrary are the WoodmanAstronomical Library at Wisconsin-Madison and the Dudley Observatory in Loudonville, New York both in the US .…

Syft 0 5 A Platform for Universally Deployable Structured Transparency

Syft is a general-purpose framework that combines a core group of privacy-enhancing technologies that facilitate a universal set of structured transparency systems . This framework is demonstrated through the design and implementation of a novel privacy-preserving inference information flow wherewe pass homomorphically encrypted activation signals through a split neuralnetwork for inference .…

Finite sample approximations of exact and entropic Wasserstein distances between covariance operators and Gaussian processes

This work studies finite sample approximations of the exact and entropic regularized Wasserstein distances between centered Gaussian processes and, moregenerally, covariance operators of functional random processes . We first show that these distances/divergences are fully represented by reproducing kernelHilbert space (RKHS) covariance and cross-covariance operators associated with the corresponding covariance functions .…

Improving Botnet Detection with Recurrent Neural Network and Transfer Learning

Botnet detection is a critical step in stopping the spread of botnets and preventing malicious activities . Recent approaches employing machinelearning (ML) showed improved performance than earlier ones, but these ML-based approaches still have significant limitations . To address these challenges, we propose a novel botnetdetection method, built upon Recurrent Variational Autoencoder (RVAE) that captures sequential characteristics of botnet activities .…

Leaving My Fingerprints Motivations and Challenges of Contributing to OSS for Social Good

Growing interest in open source software has also been attributed to developers deciding to use their technical skills to benefit a commonsocietal good . Researchers conducted 21semi-structured interviews with OSS for Social Good (OSS4SG) contributors . They found that OSS4SG contributors focus less on benefiting themselves by padding their resumewith new technology skills and are more interested in leaving their mark on society at statistically significant levels .…

Improve Vision Transformers Training by Suppressing Over smoothing

Training vanilla transformers on vision tasks has been shown to yield sub-optimal results . We propose to modify transformer structures by incorporating convolutional layers to improve performance . We show that our proposedtechniques stabilize the training and allow us to train wider and deeper visiontransformers, achieving 85.0\% top-1 accuracy on ImageNet validation set without introducing extra teachers or additional convolution layers .…

We Haven t Gone Paperless Yet Why the Printing Press Can Help Us Understand Data and AI

This paper argues that the effects of datafication should be understood as a constitutive shift in social and political relations . We use analogy of the printing press toprovide a framework for understanding constitutive change . We highlight thattechnologies such as data fication and AI both disrupted extant power arrangements, leading to decentralization, and triggered a recentralization of power by new actors better adapted toleveraging the new technology .…

Provenance based Data Skipping TechReport

Database systems analyze queries to determine upfront which data is needed for answering them and use indexes and other physical design techniques to speed-up access to that data . For important classes of queries, e.g.,HAVING and top-k queries, it is impossible to determine up-front what data is relevant .…

ANT Learning Accurate Network Throughput for Better Adaptive Video Streaming

Adaptive Bit Rate (ABR) decision plays a crucial role for ensuringsatisfactory Quality of Experience (QoE) in video streaming applications . Past network statistics are mainly leveraged for future network bandwidthprediction . This paper proposes to learn the ANT (a.k.a., Accurate Network Throughput) model to characterize the full spectrum of network throughput dynamics in the past forderiving the proper network condition associated with a specific cluster ofnetwork throughput segments (NTS) Each cluster of NTS is then used to generate a dedicated ABR model, by which we wish to better capture the network dynamicsfor diverse connections .…

Predicting Depressive Symptom Severity through Individuals Nearby Bluetooth Devices Count Data Collected by Mobile Phones A Preliminary Longitudinal Study

The Bluetooth sensor embedded in mobile phones provides an unobtrusive,continuous, and cost-efficient means to capture individuals’ proximityinformation . This paper aims to explore theNBDC data’s value in predicting depressive symptom severity as measured via the8-item Patient Health Questionnaire (PHQ-8) The data used in this paperincluded 2,886 bi-weekly PHQ- 8 records collected from 316 participants in the Netherlands, Spain, and the UK as part of the EU RADAR-CNS study .…

What Makes a Message Persuasive Identifying Adaptations Towards Persuasiveness in Nine Exploratory Case Studies

The ability to persuade others is critical to professional and personalsuccess . We conducted nine exploratory case studies to identify adaptationsthat professional and non-professional writers make in written scenarios to increase their subjective persuasiveness . We identified challengesthat those writers faced and identified strategies to resolve them with artificial language generation, i.e.,…

Dynamic Degradation for Image Restoration and Fusion

The DDRF-Net is capable of solving twoproblems, i.e., static restoration and fusion, dynamic degradation . In order to solve the static fusion problem of existing methods, dynamic convolution is introduced . In addition, adynamic degradation kernel is proposed to improve the robustness of imagerestoration and fusion .…

HAO Hardware aware neural Architecture Optimization for Efficient Inference

Automatic algorithm-hardware co-design for DNN has shown great success in improving the performance of DNNs on FPGAs . The solution searched by our algorithm achieves 72.5% top-1 accuracy on ImageNet at framerate 50, which is 60% faster than MnasNet . With lowcomputational cost, our algorithm can generate quantized networks that achievestate-of-the-art accuracy and hardware performance on Xilinx Zynq (ZU3EG) FPGA for image classification on image classification .…

Stochastic Recurrent Neural Network for Multistep Time Series Forecasting

Time series forecasting based on deep architectures has been gaining popularity in recent years due to their ability to model complex non-lineartemporal dynamics . The recurrent neural network is one such model capable of handling variable-length input and output . In our model design, the transition function of therecurrent neural network, which determines the evolution of the hidden states, is stochastic rather than deterministic as in a regular recurrent neuralnetwork .…

Communication Efficient and Personalized Federated Lottery Ticket Learning

LotteryFL relies on unicasttransmission on the downlink, and ignores mitigating stragglers, questioningscalability . CELL is a federated lottery ticket learning algorithm, coinedCELL, which exploits downlink broadcast for communication efficiency. CELL achieves up to 3.6% higher personalized task classification accuracy with 4.3x smaller total communication cost until convergence under the CIFAR-10 dataset .…

Rich Semantics Improve Few shot Learning

Human learning benefits from multi-modal inputs that often appear as richsemantics . This enables us to learn generalizable concepts from very limited visual examples . However, current few-shot learning (FSL) methods use numerical class labels to denote object classes which do not provide rich semantic meanings about the learned concepts .…

Quadratic Payments with constrained probabilities

“Quadratic Payments: A Primer” is written by Vitalik Buterin . The book focuses on the voting scenario depicted in the book . It aims to create a simple referendum model with more realistic outcome probability and marginal probability qualitativeshapes . It also discusses how quadratic payments can be generalized to take into account these new functions shapes, and the way they are still quadratically is discussed .…

Boolean Reasoning Based Biclustering for Shifting Pattern Extraction

Shifting patterns are interesting as they account constantfluctuations in data, i.e. they capture situations in which all the values inthe pattern move up or down for one dimension maintaining the range amplitudefor all the dimensions . The induction of shifting patterns by means of Boolean reasoning is due to theability of finding all inclusion–maximal {\delta-shifting patterns .…

Efficient Hyperparameter Optimization for Physics based Character Animation

Physics-based character animation has seen significant advances in recent years with the adoption of Deep Reinforcement Learning (DRL) However,DRL-based learning methods are usually computationally expensive . Tuninghyperparameters for these methods often requires repetitive training of controlpolicies . In this work, we propose a novel Curriculum-based Multi-Fidelity Bayesian Optimization framework .…

International Migration in Academia and Citation Performance An Analysis of German Affiliated Researchers by Gender and Discipline Using Scopus Publications 1996 2020

Germany has become a major country of immigration, as well as a researchpowerhouse in Europe . As Germany spends a higher fraction of its GDP onresearch and development than most countries with advanced economies, there is an expectation that Germany should be able to attract and retain internationalscholars who have high citation performance .…

Represent Items by Items An Enhanced Representation of the Target Item for Recommendation

Item-based collaborative filtering (ICF) has been widely used in industrial applications such as recommender system and online advertising . In this paper, we propose an enhanced representation of the target item which distills relevant information from the co-occurrence items . With the enhanced representation, CER has strongerrepresentation power for the tail items compared to the state-of-the-art ICFmethods.…

To mock a Mocking bird Studies in Biomimicry

This paper dwells on certain novel game-theoretic investigations inbio-mimicry . The model is used to study the situation where multi-armedbandit predators with zero prior information are introduced into the ecosystem . The prey can be either nutritious or toxic to the predator, but the prey may signal (possibly) deceptively without revealing its true “type” The model uses a model to study a panmictic ecosystem occupied by species of prey with a relatively short lifespan, which evolve mimicry signals over generations .…

Wasserstein distance estimates for the distributions of numerical approximations to ergodic stochastic differential equations

We present a framework that allows for the non-asymptotic study of the $2$-Wasserstein distance between the invariant distribution of an ergodicstochastic differential equation and the distribution of its numericalapproximation in the strongly log-concave case . This allows us to study in aunified way a number of different integrators proposed in the literature for the overdamped and underdamped Langevin dynamics .…

Isabelle s Metalogic Formalization and Proof Checker

Isabelle is a generic theorem prover with a fragment of higher-order logic as a metalogic for defining object logics . Isabelle also provides proof terms . We use Isabelle/HOL to create an executable (but inefficient) proof term checker . We integrate the proof checker with Isabelle and run it on a range of logics and theories to check the correctness of all proofs .…