## From Modular Decomposition Trees to Rooted Median Graphs

Every symmetric map can be explained by “extended” hypercubes and half-grids . We argue that theresulting “tree-like” median graphs may be of use in phylogenetics as a model of evolutionary relationships . We then derive a a linear-time algorithm that stepwisely resolves primevertices in the modular decomposition tree to obtain a rooted and labeledmedian graph that explains a given symmetric Map $delta$ The algorithm may be used to model evolutionary relationships in the phylogenetics of phylogenetics .…

## Arc Completion of 2 Colored Best Match Graphs to Binary Explainable Best Match Graphs

Best match graphs (BMGs) arise inmathematical phylogenetics to formalize the notion of evolutionary closestgenes w.r.t. an unknown phylogenetic tree . BMGs are explained byunique least resolved trees . We prove that the property of a rooted,leaf-colored tree to be least resolved for some BMG is preserved by thecontraction of inner edges .…

## Imagined Trailing Whitespace Agnostic Levenshtein Distance For Plaintext Table Detection

The standard algorithm for Levenshtein distance, treats trailing whitespacethe same as any other letter or symbol . When humans compare 2 strings, we implicitly assume that both strings are padded by infinite trailingwhitespace . This informs our expectations for what the costs for insertion,deletion and replacement, should be .…

## Memristive Stochastic Computing for Deep Learning Parameter Optimization

Stochastic Computing (SC) is a computing paradigm that allows for thelow-cost and low-power computation of various arithmetic operations usingstochastic bit streams and digital logic . In contrast to conventionalrepresentation schemes used within the binary domain, the sequence of bitstreams in the stochastic domain is inconsequential, and computation is usuallynon-deterministic .…

## Ordered Semiautomatic Rings with Applications to Geometry

The underlying ring has always to be a countabledense subring of the real numbers and additions and comparisons and multiplications with constants need to be automatic . It is shown that the ring can be selected such that equilateral triangles can be represented androtations by 30 degrees are possible, while the standard representation of theb-adic rationals does not allow this .…

## Impacts of the Numbers of Colors and Shapes on Outlier Detection from Automated to User Evaluation

The design of efficient representations is well established as a fruitful way to explore and analyze complex or large data . In these representations, dataare encoded with various visual attributes depending on the needs of therepresentation itself . We consider a visual search task wheresubjects are asked to find an unknown outlier in a grid of randomly laid outdistractor .…

## An FFT based method for computing the effective crack energy of a heterogeneous material on a combinatorially consistent grid

We introduce an FFT-based solver for the combinatorial continuous maximumflow discretization applied to computing the minimum cut through heterogeneousmicrostructures . We discretizethe minimum cut problem on heterogeneous microstructures by the combinatorsialcontinuous maximum flow discretizations introduced by Couprie et al.Furthermore, we introduce an associated FDT-based ADMM solver and provides adaptive strategies for choosing numerical parameters .…

## COVID 19 Optimal Allocation of Ventilator Supply under Uncertainty and Risk

This study presents a new risk-averse multi-stage stochasticepidemics-ventilator-logistics compartmental model to address the resourceallocation challenges of mitigating COVID-19 . Disease transmission is also forecasted through a new formulation of transmission rates that evolve overspace and time with respect to various non-pharmaceutical interventions, such as wearing masks, social distancing, and lockdown .…

## Covering a Curve with Subtrajectories

We study subtrajectory clustering under the Fr\’echet distance . We suggest a new approach to solving this problem based on a set cover formulation leading to polynomial-time approximational algorithms . Our solutions rely on carefully designed set system oracles forsystems of sub-trajectories .…

## Delaunay triangulations of generalized Bolza surfaces

The Bolza surface can be seen as the quotient of the hyperbolic plane, represented by the Poincar\’e disk model . We propose an extension of Bowyer’s algorithm to thesesurfaces . In particular, we compute the value of the systole of $g$ in $mathbb{M}_g$ .…

## Vertex Fault Tolerant Spanners for Weighted Points in Polygonal Domains

Given a set $S of$n$points, a weight function$w$to associate anon-negative weight to each point in$S$, a positive integer$k \ge 1$and areal number$epsilon 0$We devise the following algorithms to compute a$k$-vertex fault-tolerant spanner network$G(S, E)$for the metric space induced by the weighted points in$G .…

## Fairness On The Ground Applying Algorithmic Fairness Approaches to Production Systems

Many technical approaches have been proposed for ensuring that decisions made by machine learning systems are fair, but few of these proposals have beenstress-tested in real-world systems . This paper presents an example of oneteam’s approach to the challenge of applying algorithmic fairness approaches to complex production systems within the context of a large technology company .…

## Designing Disaggregated Evaluations of AI Systems Choices Considerations and Tradeoffs

Several pieces of work have uncovered performance disparities by conducting”disaggregated evaluations” of AI systems . We argue that adeeper understanding of the choices, considerations, and tradeoffs involved indesigning disaggregated evaluations will better enable researchers,practitioners, and the public to understand the ways in which AI systems may beunderperforming for particular groups of people, we say .…

## On spatial variation in the detectability and density of social media user protest supporters

The research reported here uses spatial capture-recapturemethods to determine influence of the built environment, physical proximity to protest location, and collective posting rhythm on variations in users’s detectability and density during a protest in Mexico City . The best-obtained model, together with explaining the spatial density of users, shows that there is high variability in the detectability of social media userprotest supporters .…

## Learning Organization using Conversational Social Network for Social Customer Relationship Management Effort

The challenge of each organization is how they adapt to the shift of more complex technology such as mobile, big data, interconnected world, and theInternet of things . Learning organization continues to transform by listening andmaintain the connection with their counterparts .…

## Analysing the Correlation of Geriatric Assessment Scores and Activity in Smart Homes

A continuous monitoring of the physical strength and mobility of elderly people is important for maintaining their health and treating diseases at anearly stage . The evaluation ona real-world dataset shows a moderate to strong correlation with the scores of standardised geriatrics physical assessments .…

## Deep Sensing of Urban Waterlogging

The use of a deep sensing system in the monsoon season in Taiwan was demonstrated . The system couldsense approximately 2379 vision sources through an internet of video thingsframework and transmit the event-location information in 5 min . The proposed approach can sense waterlogging events at a national scale and provide an efficient and highly scalable alternative to conventional waterloging sensing methods .…

## Removing Gamification A Research Agenda

The effect of removing gamification elements from interactive systems has been a long-standing question in gamification research . Yet, nearly a decade later, no work to date has sought consensus on these matters . Asmall corpus of 8 papers published between 2012 and 2020 were found .…

## On Modeling Human Perceptions of Allocation Policies with Uncertain Outcomes

Many policies allocate harms or benefits that are uncertain in nature . In many instances the policies selected in practice are hard to explain by preferences based only on the expected value of the total harm or benefit they produce .…

## Functional Collection Programming with Semi Ring Dictionaries

This paper introduces semi-ring dictionaries, a powerful class ofcompositional and purely functional collections that subsume other collectiontypes such as sets, multisets, arrays, vectors, and matrices . SDQL unifies a wide range ofoptimizations commonly used in databases and linear algebra . As a result, SDQL can give up to one order of magnitude speedup over Trance, a state-of-the-art nested relational engine.…

## FiLiPo A Sample Driven Approach for Finding Linkage Points between RDF Data and APIs Extended Version

FiLiPo is an open source sample-driven schemamatching system that models API services as parameterized queries . It is able to find valid input values for API services automatically (e.g.IDs) and can determine valid alignments between KBs and APIs . The system performs well in terms of precisionand recall and outperforms the current state-of-the-art system, says the authors .…

## MP RW LSH An Efficient Multi Probe LSH Solution to ANNS in L_1 Distance

MP-RW-LSH is the first and so far only multi-probe LSH solution to ANNS in $L_1$ distance . It uses 15 to 53 times fewer hash tables for achieving similar query accuracy . It also explains why a state-of-the-art ANNS-$1$ solution called Cauchy projection LSH is fundamentally not suitable .…

## BIKED A Dataset and Machine Learning Benchmarks for Data Driven Bicycle Design

In this paper, we present “BIKED,” a dataset comprised of 4500 individuallydesigned bicycle models . The dataset is comprised of a variety of design information including assembly images, component images,numerical design parameters, and class labels . We expect BIKED toenable a .…

## Equi Joins Over Encrypted Data for Series of Queries

Encryption provides a method to protect data outsourced to a DBMS provider,e.g., in the cloud . But performing database operations over encrypted datarequires specialized encryption schemes that carefully balance security andperformance . In this paper, we present a new encryption scheme that canefficiently perform equi-joins over encrypted data with better security .…

## Multiple Linear Regression Based Energy Aware Resource Allocation in the Fog Computing Environment

Fog computing is a promising computing paradigm for time-sensitive Internetof Things (IoT) applications . It helps to process data close to the users, inorder to deliver faster processing outcomes than the Cloud . Most of the Fog devices are battery powered hence the chances of application failure is high which leads to delaying the application outcome .…

## Fuzzy Logic based Robust Failure Handling Mechanism for Fog Computing

Fog computing is an emerging computing paradigm which is suitable for time-sensitive and real-time Internet of Things (IoT) applications . The key idea of the Fog computing paradigm is touse idle computation resources of various handheld, mobile, stationery and network devices around us .…

## A Lattice Linear Predicate Parallel Algorithm for the Dynamic Programming Problems

It has been shown that the parallel Lattice Linear Predicate (LLP) algorithmsolves many combinatorial optimization problems such as the shortest pathproblem, the stable marriage problem and the market clearing price problem . The parallel LLP algorithm requires only read-write atomicity and no higher-levelatomic instructions .…

## Exploring Blockchain for The Coordination of Distributed Energy Resources

The fast growth of distributed energy resources (DERs), such as rooftop PV panels, energy storage systems, electricvehicles, and controllable appliances, drives the power system toward adecentralized system with bidirectional power flow . The coordination of DERsthrough an aggregator, such as a utility, system operator, emerges as a promising paradigm, but it is not wellunderstood how to enable trust between the aggregator and DERs to integrateDERs efficiently .…

## A Distributed Decoupled System for Losslessly Streaming Dynamic Light Probes to Thin Clients

We present a networked, high performance graphics system that combines dynamic, high quality, ray traced global illumination with primary visibility computed on a client . This approach provides many of the image quality benefits of real-time ray tracing onlow-power and legacy hardware, while maintaining a low latency response andmobile form factor .…

## A Resourceful Coordination Approach for Multilevel Scheduling

HPC operators favor increasing the number of executed applications per time unit and increasing system utilization . RCA enables applicationschedulers to share their allocated but idle computing resources with other applications through the batch system . The results show that RCA increased system utilization up to 12.6% and decreased system makespan by the same percent without affecting applications’ performance.…

## What Have We Learned from OpenReview

Anonymous peer review is used by the great majority of computer science conferences . The paper, (meta) reviews, rebuttals, and final decisions are all released to public . We collect 5,527 submissions and their 16,853reviews from the OpenReview platform . We also collect these submissions’ citation data from Google Scholar and their non-peer-reviewed versions fromarXiv.org…

## Heuristic Algorithms for Best Match Graph Editing

Best match graphs (BMGs) are a class of colored digraphs that naturally appear in mathematical phylogenetics . They can be approximated with the help ofsimilarity measures between gene sequences, albeit not without errors . The corresponding graph editing problem can be used as a means of error correction .…

## Binary Signed Digit Integers the Stern Diatomic Sequence and Stern Polynomials

Stern’s diatomic sequence is a well-studied and simply defined sequence with many fascinating characteristics . We link these two objects, showing that the number of BSD representations of an integer $n<2^i$ is the$(2-n)^\text{th}$ element in Stern's Diatomic sequence . This correspondence makes the vast range of results known about the Sterndiatomic sequence available for consideration in the study of binarysigned-digit integers, and vice versa . Applications of this relationship include a weight-distribution theorem for BSDrepresentations, linking these representations to Stern polynomials, arecursion for number of optimal BSD …

## Bounds on half graph orders in powers of sparse graphs

Half graphs and their variants, such as ladders, semi-ladders and co-matchings, are combinatorial objects that encode total orders in graphs . In this work we provide nearly tight asymptotic lower and upper bounds on the maximum order of half graphs, parameterized on the distance .…

## Effectively Counting s t Simple Paths in Directed Graphs

An important tool in analyzing complex social and information networks is s-tsimple path counting, which is known to be #P-complete . In this paper, we studyefficient s-t simple path counting in directed graphs . For a given pair ofvertices s and t in a directed graph, first we propose a pruning technique that can efficiently and considerably reduce the search space .…

## Quantum Algorithms in Cybernetics

A new method for simulation of a binary homogeneous Markov process using aquantum computer was proposed . The IBM’sYorktown ‘bow-tie’ back-end performs quite better than the 5-qubit T-shaped and 14-quinst Melbourne quantum processors in terms of quantum fidelity . The creation of a quantum controlled n-throot of X gate using only the existing basic quantum logic gates at the available cloud platforms is possible, although the hardware devices are still too noisy, which results in a significant measurement error increase.…

## Pebble Guided Near Optimal Treasure Hunt in Anonymous Graphs

We study the problem of treasure hunt in a graph by a mobile agent . The nodes in the graph are anonymous and the edges at any node $v$ of degree $deg(v)$ arelabeled arbitrarily as $0,1,\ldots, deg(v)-1$. A mobile agent, starting from anode, must find a stationary object, called {\it treasure, located on an unknown node at a distance $D$ from its initial position .…

## Bounded Invariant Checking for Stateflow Programs

Stateflow models are complex software models, often used as part of safety-critical software solutions designed with Matlab Simulink . They incorporate design principles that are typically very hard to verify formally . The Stateflow language lacks a formal semantics, which hinders the formal analysis .…

## What is Multimodality

The last years have shown rapid developments in the field of multimodalmachine learning . We propose a new task-relativedefinition of (multi)modality in the context of multimodeal machine learning that focuses on representations and information that are relevant for a given machine learning task .…

## Explaining dimensionality reduction results using Shapley values

Dimensionality reduction (DR) techniques have been consistently supportinghigh-dimensional data analysis in various applications . ClusterShapley explains the formation of clusters and the meaning of their relationship, which is useful for exploratory data analysis . We propose novel visualization techniques to guide the interpretation of features’ contributions on clustering formation and validate our methodology through case studies of publicly available datasets .…

## A Social Welfare Maximization Mechanism for Blockchain Storage

Miners in a blockchain system are suffering from the ever-increasing storagecosts, which in general have not been properly compensated by the users’transaction fees . In the long run, this may lead to less participation ofminers in the system and jeopardize the blockchain security .…

## Selling Data to an Agent with Endogenous Information

We consider the model of the data broker selling information to a single agent to maximize his revenue . We show that in the optimalmechanism, there is no distortion at the top and the agent has no incentive to acquire any additional costly information under equilibrium .…

## Ranking Clarifying Questions Based on Predicted User Engagement

This research aims to predict the user engagement with the clarification pane as an indicator of relevance based on the lexical information: query, question, and answers . The prediction models were able to improve significantly upon thenaive baselines, and the predicted user engagement feature significantlyimproved the RankNet results in terms of NDCG and MRR .…

## This Browser is Lightning Fast The Effects of Message Content on Perceived Performance

Westudied 1495 participants who read either an article about performance improvements to Mozilla Firefox, or a piece about self-driving cars . The study found that reading articles about Firefox increased participants’ perceived performance of Firefox over the most widely used web browser, Google Chrome .…

## OpenTera A Microservice Architecture Solution for Rapid Prototyping of Robotic Solutions to COVID 19 Challenges in Care Facilities

Telehealth frameworks are becoming more widely adopted in the context of long-term care (LTC) for older adults . This paper presents OpenTera, an open source telehealth framework, to facilitate prototyping of such solutions by software and roboticdesigners . The need to deal with the effects of the COVID-19 pandemic emphasizes the benefits of this approach, but also highlights new challenges for which robots could be interesting solutions to bedeployed in LTC facilities .…

## Using Cognitive Models to Train Warm Start Reinforcement Learning Agents for Human Computer Interactions

Reinforcement learning (RL) agents in human-computer interactions require repeated user interactions before they can perform well . We propose a novel approach of using cognitive models to pre-train RL agents before they are applied to real users . We hope this position paper stimulates conversations betweenRL, HCI, and cognitive science researchers in order to explore the fullpotential of the approach .…

## Developing and evaluating an human automation shared control takeover strategy based on Human in the loop driving simulation

A “human-in-the-loop” driving simulator experiment was conducted to evaluate the impact of the proposed shared control takeover strategy under different disengagement conditions . Results of thirty-two drivers showed sharedcontrol takeover strategy could improve safety performance at the aggregatedlevel . For more urgentdisengagements caused by another vehicle’s sudden brake, a shared controlstrategy enlarges individual differences .…

## Mixed Reality Interaction Techniques

This chapter gives an overview of interaction techniques for mixed reality including augmented and virtual reality (AR/VR) Various modalities for input and output are discussed . Techniques for tangible and surface-based interaction include gesture-based, pen-based and gaze-based . Interaction with intelligent virtual agents is considered in the book .…

## Novel tile segmentation scheme for omnidirectional video

Regular omnidirectional video encoding technics use map projection to flattena scene from a spherical shape into one or several 2D shapes . Common projectionmethods including equirectangular and cubic projection have varying levels ofpolation that create a large number of non-information-carrying pixelsthat lead to wasted bitrate .…

## Fast and flexible Human program induction in abstract reasoning tasks

The Abstraction and Reasoning Corpus (ARC) is a challenging program inductiondataset that was recently proposed by Chollet (2019) Here, we report the first set of results collected from a behavioral study of humans solving a subset oftasks from ARC (40 out of 1000) Although this subset of tasks contains considerable variation, our results showed that humans were able to infer theunderlying program and generate the correct test output for a novel test input .…