## GeoSim Photorealistic Image Simulation with Geometry Aware Composition

Scalable sensor simulation is an important yet challenging open problem for safety-critical domains such as self-driving . GeoSim is a geometry-aware image composition process thatsynthesizes novel urban driving scenes by augmenting existing images with dynamic objects extracted from other scenes and rendered at novel poses .…

## SceneGen Learning to Generate Realistic Traffic Scenes

SceneGen is a neural autoregressive model of traffic scenes that eschews the need for rules and heuristics . SceneGen inserts actors of various classes into the scene and synthesizes their sizes, orientations, and velocities . It can be used to train perception models that generalize to the real world, we say .…

## Strings and Coins and Nimstring are PSPACE complete

Strings-and-Coins is strongly PSPACE-complete onmultigraphs . This result improves the best previous result, NP-hardness, argued in Winning Ways . Our result also applies to the Nimstring variant, where thewinner is determined by normal play . One step in our reduction is the reduction (also from Winning Ways) from Nimstring toStrings andCoins .…

## Hypernetworks From Posets to Geometry

We show that hypernetworks can be regarded as posets which, in their turn,have a natural interpretation as simplicial complexes . This greatly simplifies the geometric PersistentHomology method we previously proposed . This allows us to canonicallyassociate a simplicial complex structure to a hypernetwork, directed orundirected .…

## Linguistically Enriched and Context Aware Zero shot Slot Filling

Slot filling is identifying contiguous spans of words in an utterance that correspond to certain parameters (i.e., slots) of a user request/query . Supervised learning approaches have proven effective at tackling this challenge, but they need a significant amount of labeled training data in agiven domain .…

## Match Ignition Plugging PageRank into Transformer for Long form Text Matching

There areusually many noises in the setting of long-form text matching, and it is difficult for existing semantic text matching to capture the key matchingsignals from noisy information . We propose a novel hierarchical noise filtering model in this paper, namely Match-Ignition .…

## ComQA Compositional Question Answering via Hierarchical Graph Neural Networks

A large-scale compositional questionanswering dataset contains more than 120k human-labeled questions . The answer in this dataset is composed of discontiguous sentences in the corresponding document . To tackle the ComQA problem, we proposed a hierarchical graph neuralnetworks, which represents the document from the low-level word to the high-level sentence .…

## Latent Variable Models for Visual Question Answering

Conventional models for Visual Question Answering (VQA) explore deterministic approaches with various types of image features, question features, and attention mechanisms . In this work, we propose latent variable models for VQA where extrainformation (e.g. captions and answer categories) are incorporated as latentvariables to improve inference, which in turn benefits question-answering performance .…

## To Understand Representation of Layer aware Sequence Encoders as Multi order graph

In this paper, we propose a unified explanation of representation for layer-aware neural sequence encoders . The proposed MoG-inspired model can yield effectiveperformance improvement . We further propose agraph-based self-attention network empowered Graph-Transformer by enhancing theability of capturing subgraph information over the current models .…

## Tuiteamos o pongamos un tuit Investigating the Social Constraints of Loanword Integration in Spanish Social Media

Speakers of non-English languages often adopt loanwords from English to express new or unusual concepts . Linguists have often considered the process of loanword integration to be more dependent on language-internal constraints, but sociolinguistic constraints as speaker background remain only qualitatively understood .…

## Comparison of Machine Learning for Sentiment Analysis in Detecting Anxiety Based on Social Media Data

This concept will adopt a sentiment analysis in detecting anxiety based on positive and negative comments from netizens . Negative data identify anxiety, while positive data identifies hope (not anxious) Machine learning isprocessed based on feature extraction of count-vectorization and TF-IDF .…

## Weakly Supervised Hierarchical Models for Predicting Persuasive Strategies in Good faith Textual Requests

Modeling persuasive language has the potential to better facilitate ourdecision-making processes . We introduce a large-scalemulti-domain text corpus for modeling persuasive strategies in good-faith text requests . We design a hierarchical weakly-supervised latent variablemodel that can leverage partially labeled data to predict such associatedpersuasive strategies for each sentence .…

## Intrusion Detection Systems for Smart Home IoT Devices Experimental Comparison Study

Intrusion Detection Systems are presented as pertinent tools that can provide network-level protection for smart devices deployed in home environments . These systems monitor the network activities of the smarthome-connected de-vices and focus on alerting suspicious or malicious activity . They also can deal with detected abnormal activities by hindering the impostorsin accessing the victim devices .…

## T Lease A Trusted Lease Primitive for Distributed Systems

A lease is an important primitive for building distributed protocols, and it is ubiquitously employed in distributed systems . We tackle this problem by introducing trusted lease — a lease that maintains its correctness properties even in the presence of a clock-manipulating attacker .…

## AGChain A Blockchain based Gateway for Permanent Distributed and Secure App Delegation from Existing Mobile App Markets

Mobile app markets fall short in several aspects, including no transparent app listing, noworld-wide app access, and even insecure app downloading . To address these problems, we propose a novel blockchain-based gateway, AGChain, to bridge endusers and app markets . We have implemented an AGChain prototype(https://www.agchain.ltd/)…

## Revisiting Driver Anonymity in ORide

ORide is a privacy-preserving RHS proposed in 2017 and uses SomewhatHomomorphic Encryption (SHE) In their protocol, a rider and all drivers in azone send their encrypted coordinates to the RHS Service Provider . The rider decrypts these and selects the optimal driver with leastEuclidean distance .…

## SEDAT Security Enhanced Device Attestation with TPM2 0

Remote attestation is one of the ways to verify the state of an untrusteddevice . SEDAT provides a way for verifier to get on-demand device integrity and authenticity status via a secure channel . It also enablesthe verifier can detect counterfeit hardware, change in firmware, and softwarecode on the device .…

## Dissecting the Meme Magic Understanding Indicators of Virality in Image Memes

We train machine learning models to distinguish between image memes that are likely to go viral and those that are unlikely to be re-shared . Highly viral memes are more likely to use aclose-up scale, contain characters, and include positive or negative emotions .…

## What was the river Ister in the time of Strabo A mathematical approach

Strabo’s river Ister best coincides with the Tauernbach-Isel-Drava-Danube course, not with the Danube . The result is supported by carefully designed mathematically measurements . Based on this result we also show that . Strabo’s Suevi in the Hercynian Forest .corresponds to the Slavic people in the Carpathian-Alpine basin and thus that .…

## AR based Modern Healthcare A Review

Augmented reality has proposed numerous smart applications in healthcaredomain including wearable access, telemedicine, remote surgery, diagnosis of medical reports, emergency medicine, etc. The aim of the developed augmentedhealthcare application is to improve patient care, increase efficiency, anddecrease costs . This article explores the services of augmented-based healthcare solutions and throws light onrecently invented ones as well as their respective platforms.…

## GPU Methodologies for Numerical Partial Differential Equations

In this thesis we develop techniques to efficiently solve numerical PartialDifferential Equations (PDEs) using Graphical Processing Units (GPUs) The thesis is presented on both performance and re–usability of the methods developed, to this enda library, cuSten, for applying finite–difference stencils to numerical grids is presented .…

## Big Data application in congestion detection and classification using Apache spark

With the era of big data, an explosive amount of information is nowavailable . Spark’s Spark’s research is behind optimizing Spark’s performance to make it state of the art, a fast and general data processing system . The objective is to improve the safety andmanagement of transportation networks by reducing congestion and incidents .…

## Galleon Reshaping the Square Peg of NFV

Software is often used for Network Functions (NFs) that are applied to traffic in thenetwork . The community has hoped that NFV would enable rapid development of newNFs and leverage commodity computing infrastructure . The challenge for researchers and operators has been to align the square peg of high-speed packetprocessing with the round hole of cloud computing infrastructures andabstractions, all while delivering performance, scalability, and isolation .…

## Dynamic Ternary Content Addressable Memory Is Indeed Promising Design and Benchmarking Using Nanoelectromechanical Relays

Ternary content addressable memory (TCAM) has been a critical component incaches, routers, etc., in which density, speed, power efficiency, and reliability are the major design targets . This paper proposes a custom low-power dynamic TCAM using nanoelectromechanical(NEM) relay devices . By harnessing the unique NEM relay characteristics with a proposed novel cell structure, the proposed TCAM occupies a small footprint of only 3transistors (with two NEM relays integrated on the top through theback-end-of-line process), which significantly outperforms the density of16-transistor SRAM-based TCAM .…

## Binary strings of finite VC dimension

The complexity of a string can be measured by the richness of its substrings . This kind of complexity is captured by the standard stringcomplexity function . Substrings can be viewed as subsets of an index set . This allows us to apply measures of subset complexity such as VC dimension .…

## Visualizing and Interacting with Geospatial Networks A Survey and Design Space

This paper surveys visualization and interaction techniques for geospatialnetworks from a total of 95 papers . Geospatial networks are graphs where nodesand links can be associated with geographic locations . Examples can includes social networks, trade and migration, as well as traffic and transportnetworks .…

## Evaluating User Experiences in Mixed Reality

Measure user experience in MR (i.e., AR/VR) user studies is essential . Researchers apply a wide range of measuring methods using objective (e.g.,biosignals, time logging), behavioral (e., gaze direction, movementamplitude) metrics . Many of these measurement instruments were adapted from use-cases outside of MR buthave not been validated for usage in MR experiments .…

## Attention Based Video Summaries of Live Online Zoom Classes

Using facial attention analysis software we create personalised videosummaries composed of just the parts where a student’s attention was below somethreshold . We can also factor in other criteria into video summary generations such as parts where the student was not paying attention while others in the class were, and parts of the video that other students have replayedextensively .…

## Self Supervised Multi Channel Hypergraph Convolutional Network for Social Recommendation

Hypergraph provides anatural way to model complex high-order relations, while its potential for social recommendation is under-explored . Social relations are often used to improve recommendation quality and mostexisting social recommendation models exploit pairwise relations to minepotential user preferences . We propose a multi-channel hypergraph convolutional network to enhance socialrecommendation .…

## A Survey on Extraction of Causal Relations from Natural Language Text

Existing causality extractiontechniques include knowledge-based, statistical machine learning(ML)-based, anddeep learning-based approaches . Each method has its advantages and weaknesses . Curating cause-effect relations from text helps in building causal networks for predictive tasks . In this paper, we conduct acomprehensive survey of causality extractions .…

## A Zero Attentive Relevance Matching Networkfor Review Modeling in Recommendation System

Review-based methods for recommendation can be categorized into two groups: siamese models that build static userand item representations from reviews . Interaction-based models encode user and item representations according to thesimilarity or relationships of their reviews . Our model implements a relevance matching model with regularized training losses to discover user relevant information from longitem reviews, and it also adapts a zero attention strategy to dynamicallybalance the item-dependent and item-independent information extracted from userreviews .…

## Controlling the Risk of Conversational Search via Reinforcement Learning

Users often formulate their search queries with immature language without well-developed keywords and complete structures . Such queries fail to expresstheir true information needs and raise ambiguity . This gives search engines a hardtime processing and understanding the query, and eventually leads tounsatisfactory retrieval results .…

## On linear codes with one dimensional Euclidean hull and their applications to EAQECCs

The Euclidean hull of a linear code is the intersection of $C$ with itsEuclidean dual $C^\perp$ The hull with low dimensions gets much interest dueto its crucial role in determining the complexity of algorithms for computing the automorphism group of a .…

## A Novel Prediction Approach for Exploring PM2 5 Spatiotemporal Propagation Based on Convolutional Recursive Neural Networks

The spread of PM2.5 pollutants that endanger health is difficult to predict because it involves many atmospheric variables . These micron particles can spread rapidly from their source to residential areas, increasing the risk of respiratory disease if exposed for long periods .…

## PL2 Towards Predictable Low Latency in Rack ScaleNetworks

High performance rack-scale offerings package disaggregated pools of compute,memory and storage hardware in a single rack . The intra-rack network is typically high speed Ethernet, which cansuffer from congestion leading to packet drops and may not satisfy the tail latency requirements for some workloads .…

## Overlap Minimization Scheduling Strategy for Data Transmission in VANET

The vehicular ad-hoc network (VANET) based on dedicated short-rangecommunication (DSRC) is a distributed communication system . The competition and backoff mechanisms ofCSMA/CA often bring additional delays and data packet collisions, which mayhardly meet the QoS requirements in terms of delay and packets delivery ratio(PDR) This paper presents a connection-level scheduling algorithm overlaid on CSMA/ca to schedule the start sending time of each transmission .…

## Blind Optimal User Association in Small Cell Networks

Finding an optimal user association policy in dynamic environments is challenging because trafficdemand fluctuations over time are non-stationary and difficult to characterizestatistically . We introduce a periodic benchmark for OCO problems that generalizes state-of-the-art benchmarks . We exploit inherentproperties of the online user association problem and propose PerOnE, a simple online learning scheme that dynamically adapts the association policy toarbitrary traffic demand variations .…

## Boosting performance for software defined networks from traffic engineering perspective

RACKE+AD system combines path selection techniques with average delay and load balancing . The proposed system outperformed SMORE and SWAN by 4.2% and 9.6% respectively, achieving 27% better utilization and delivering 34% more traffic with 50% less latency compared with both systems on a GEANT network .…

## Manifestly Phased Communication via Shared Session Types

Session types denote message protocols between concurrent processes, allowing a type-safe formalization of inter-process communication . We demonstrate that this allows shared sessions to be released at a different type, allowing the encoding of phases in a shared protocol to be encoded in the session type .…

## From hand to brain and back Grip forces deliver insight into the functional plasticity of somatosensory processes

The human somatosensory cortex is intimately linked to other central brain functions such as vision, audition, mechanoreception, and motor planning andcontrol . These links are established through brain learning, and display aconsiderable functional plasticity . Variations in human grip force are adirect reflection of this kind of functional Plasticity .…

## Wearable Sensors for Spatio Temporal Grip Force Profiling

Wearable biosensor technology enables real-time, convenient, and continuousmonitoring of users behavioral signals . Such include signals relative to bodymotion, body temperature, biological or biochemical markers, and individualgrip forces . A four step pick and drop imageguided and robot assisted precision task has been designed for exploiting awearable wireless sensor glove system .…