## General Knapsack Problems in a Dynamic Setting

The world is dynamic and changes over time, so any optimization problems must address this dynamic nature . In the multistage model we are given aseries of instance of an optimization problem, and a solution is provided foreach instance . The strive for continuous and similar solutions over time are quantified and integrated into the objective function .…

## Deterministic and game separability for regular languages of infinite trees

We show that it is decidable whether two regular languages of infinite trees are separable by a deterministic language . We considertwo variants of separability, depending on whether the set of priorities of theseparator is fixed, or not . In each case, we show that separability can bedecided in EXPTIME, and that separating automata of exponential size suffice .…

## AirMixML Over the Air Data Mixup for Inherently Privacy Preserving Edge Machine Learning

Wireless channels can be inherently privacy-preserving by distorting thereceived signals due to channel noise and superpositioning multiple signalsover-the-air . AirMixML is a differentially private (DP)mechanism limiting the disclosure of each worker’s private sample information at the server, while the worker’s transmit power determines the privacy level .…

## Security Properties for Stack Safety

“stack safety” is associated with avariety of compiler, run-time, and hardware mechanisms for protecting stackmemory . We propose a formal characterization of stack safety, formulated with concepts from language-based security . We use these properties to validatethe stack-safety “micro-policies” proposed by Roessler and DeHon [2018].…

## Cross Modal Self Attention with Multi Task Pre Training for Medical Visual Question Answering

Existing methods of medical visual question answering usually rely on transfer learning to obtain effective image feature representation . We introduce a cross-modal self-attention module to capture the long-range contextual relevance for more effectivefusion of visual and linguistic features . Experimental results demonstrate that the proposed method outperforms existing state-of-the-art methods .…

## QDOT Quantized Dot Product Kernel for Approximate High Performance Computing

Error sensitive applications in high-performance computing are unable to benefit from existing approximatecomputing strategies that are not developed with guaranteed error bounds . Using qdot for the dot products in CG can result in amajority of components being perforated or quantized to half precision withoutincreasing the iteration count required for convergence to the same solution as CG using a double precision dot product .…

## Semantic Proof of Confluence of the Categorical Reduction System for Linear Logic

We verify a confluence result for the rewriting calculus of the linear category introduced in our previous paper . We obtain a method to determine if two morphisms are equal up to a certain equivalence . The generalized coherence theorem for linear category is established .…

## CARL DTN Context Adaptive Reinforcement Learning based Routing Algorithm in Delay Tolerant Network

Delay/Disruption-Tolerant Networks (DTN) invented to describe and cover all types of long-delay, disconnected, intermittently connected networks . The term is characterized by frequent network partitioning, intermittentconnectivity, large or variable delay, asymmetric data rate, and low transmission reliability . In DTNthere is a trade-off off between delivery ratio and overhead .…

## Surgical Gesture Recognition Based on Bidirectional Multi Layer Independently RNN with Explainable Spatial Feature Extraction

A Bidirectional Multi-Layer independently RNN (BML-indRNN) model is proposed in this paper . spatial feature extraction is implemented via fine-tuning of a Deep Convolutional Neural Network . Gradient-weighted Class Activation Mapping (Grad-CAM) is employed to eliminate the black-box effects of DCNN .…

## Model Checking Quantum Continuous Time Markov Chains

A real-time system, we specify the temporal properties on QCTMC by signal temporal logic (STL) To effectivelycheck the atomic propositions in STL, we develop a state-of-art real rootisolation algorithm under Schanuel’s conjecture . Further, we check the generalSTL formula by interval operations with a bottom-up fashion, whose querycomplexity turns out to be linear in the size of the input formula by calling the real root isolation algorithm .…

## A LiDAR Assisted Control Module with High Precision in Parking Scenarios for Autonomous Driving Vehicle

Autonomous driving has been quite promising in recent years . The public hasseen Robotaxi delivered by Waymo, Baidu, Cruise, and so on . But inless complex scenarios autonomous driving may have the potentiality to reliablyoutperform humans . In this paper, we introduce a real-world,industrial scenario of which human drivers are not capable .…

## Reducing Bus Bunching with Asynchronous Multi Agent Reinforcement Learning

Bus bunching has become a common phenomenon that undermines the reliability and efficiency of busservices . Little research has focused on bus fleet control due to the tricky characteristic — control action only happens when a busarrives at a bus stop and thus agents do not act simultaneously .…

## Lecture Notes on Voting Theory

Lectures were developed for the course Computational SocialChoice of the Artificial Intelligence MSc programme at the University of Groningen . They cover mathematical and algorithmic aspects of voting theory .…

## AI Assisted MAC for Reconfigurable Intelligent Surface Aided Wireless Networks Challenges and Opportunities

Recently, significant research attention has been devoted to the study ofreconfigurable intelligent surfaces (RISs) RISs are capable of reconfiguring the wireless propagation environment by exploiting the unique properties ofmetamaterials-based integrated large arrays of inexpensive antennas . The medium access control (MAC) of multiple usersaccessing an RIS-enabled channel is still in its infancy, while many open issues remain to be addressed .…

## In cell Discontinuous Reconstruction path conservative methods for non conservative hyperbolic systems Second order extension

An extension to second-order of a new strategy based on in-cell discontinuous reconstructions to deal with this challenging topic is presented . Several numerical tests are proposed to validate the methods for the Coupled-Burgers system, Gasdynamics equations in Lagrangian coordinates and the modified shallow watersystem .…

## Kubernetes Autoscaling YoYo Attack Vulnerability and Mitigation

In recent years, we have witnessed a new kind of DDoS attack, the burstattack . The attacker launches periodic bursts of traffic overload on online targets . The auto-scaling mechanism translates the flat DDoS attacks into Economic Denial of Sustainability attacks .…

## Improving Perception via Sensor Placement Designing Multi LiDAR Systems for Autonomous Vehicles

Recent years have witnessed an increasing interest in improving theperception performance of LiDARs on autonomous vehicles . We propose an easy-to-computeinformation-theoretic surrogate cost metric based on Probabilistic OccupancyGrids . We show acorrelation between our surrogate function and common object detectionperformance metrics .…

## OR Net Pointwise Relational Inference for Data Completion under Partial Observation

Current methods fail to perceive datarelativity under partial observation . Omni-Relational Network (OR-Net) to model the pointwise relativity in two aspects . It is demonstrated that the proposed OR-Net can be wellgeneralized for data completion tasks of various modalities, including functionregression, image completion on MNIST and CelebA datasets, and also sequentialmotion generation conditioned on the observed poses .…

## A Systematic Review of Security in the LoRaWAN Network Protocol

The age of the Internet of Things is adding an increasing number of new devices to the Internet and is expected to have fifty billion connected units by 2021 . The review identifies nineteen areas of vulnerability in the LoRaWAN protocol .…

## GODSAC Graph Optimized DSAC for Robot Relocalization

Deep learning based camera pose estimation from monocular camera images has a recent uptake in Visual SLAM research . GODSAC* outperforms the state-of-the-artapproaches in pose estimation accuracy, as we demonstrate in our experiments . The approach augments posepredictions from a trained neural network with noisy odometry data through theoptimization of a pose graph .…

## Dynamic Routing for Traffic Flow through Multi agent Systems

Current routeplanning algorithms are developed under ideal situations where all drivers are expected to behave rationally and properly . However, for jumbled urban roadnetworks, drivers’ actual routing strategies deteriorated to a series ofempirical and selfish decisions that result in congestion .…

## Dialectica models of type theory

We present two Dialectica-like constructions for models of intensionalMartin-L\”of type theory . We propose a new semantic notion of finite sum for dependent types, generalizingfinitely-complete extensive categories . The second avoids extensivityassumptions using biproducts in a Kleisli category for a fibred additive monad .…

## Paradiseo From a Modular Framework for Evolutionary Computation to the Automated Design of Metaheuristics 22 Years of Paradiseo

ParadisEO is a comprehensive C++ freesoftware which targets the development of modular metaheuristics . It is of prior importance to have access to mature and flexible software frameworks which allow for an efficient exploration of the algorithm design space . This articlesummarizes the features of the framework, a highly modular architecture, a large set of components, speed of execution and automated algorithm design features, which are key to modern approaches to metaheiristics development .…

## Data Driven Model Order Reduction for Problems with Parameter Dependent Jump Discontinuities

We propose a data-driven model order reduction (MOR) technique for partial differential equations that exhibit parameter-dependentjump-discontinuities . We build upon themethodology of approximating the map between the parameter domain and theexpansion coefficients of the reduced basis via regression . The online stagequeries the regression model for the expansion coefficients and recovers areduced approximation for the solution .…

## Synthesizing Abstract Transformers

This paper addresses the problem of creating abstract transformersautomatically . The method we present provides the basis for creating a tool toautomate the construction of program analyzers in a fashion similar to the wayyacc automates parsers . We used it to create a set of replacement abstracttransformers for those used in an existing analyzer, and obtained essentially identical performance .…

## Probabilistic Analysis of Operating Modes in Cache Enabled Full Duplex D2D Networks

Cache-enabled Device-to-Device (D2D) communication is one of the key enablers of the fifth generation (5G) cellular network . But conventional half-duplex(HD) communication may not be sufficient to provide fast enough content delivery over D2D links . In-band full-duple (FD) can provide more content deliveryopportunities, thus resulting improved spectral efficiency and latency reduction .…