Experiments on transfer learning architectures for biomedical relation extraction

Relation extraction (RE) consists in identifying and structuringautomatically relations of interest from texts . Among tested architectures and strategies, our*BERT-segMCNN with finetuning reaches performances higher than the state-of-the-art on the two corpora (1.73 % and 32.77 % absolute improvement onChemProt and PGxCorpus corpora respectively) More generally, our experimentsillustrate the expected interest of fine-tuning with BERT, but also theunexplored advantage of using structural information (with sentencesegmentation), in addition to the context classically leveraged by BERT.…

Exploring the landscapes of computing digital neuromorphic unconventional and beyond

The acceleration race of digital computing technologies seems to be steeringtoward impasses — technological, economical and environmental — a condition that has spurred research efforts in alternative, “neuromorphic” (brain-like)computing technologies . The idea of exploiting nonlinear physical phenomena “directly” for non-digital computing has been explored under names like “unconventional computing”, “natural computing”,”physical computing”, or “in-materio computing” I stake out how a general concept of “computing” can bedeveloped which comprises digital, neuromorphic, unconventional and possible future paradigms .…

Multiscale Modeling of Elasto Plasticity in Heterogeneous Geomaterials Based on Continuum Micromechanics

The aim is to upscale theelasto-plastic behavior for a representative volume of the material . The validity of sucheigen-strain based formulation of multiscale elastic media is hereinexamined by comparing its predictions against Finite Element (FE) simulations .Considering the plastic strains as eigen-stressed elastic media allows us to employ the tools offered by Continuum Micromechanics which are mainly developed .…

InTAS The Ingolstadt Traffic Scenario for SUMO

InTAS roadtopology accurately represents Ingolstadt real road map . Twenty trafficlights systems were simulated according to the real program deployed on the traffic lights . Traffic demand was modeled based on the activitygen method,considering demographic data and real-traffic information . The city public transport system was also simulated accordingly to bus time-tables and their routes .…

Safely Learning Dynamical Systems from Short Trajectories

A fundamental challenge in learning to control an unknown dynamical system is to reduce model uncertainty by making measurements while maintaining safety . In our framework, the state of the system is required to stay within a given safety region under the (possibly repeated) action of all systems that are consistent with the information gathered so far .…

A decentralized approach towards secure firmware updates and testing over commercial IoT Devices

The solution for this problem can besolved using a decentralized database to hold the hashes and the firmware . This paper discusses the possible implications of insecure servers used to host thefirmwares of commercial IoT products . It aims to provide a blockchain baseddecentralized solution to host firmware files with the property ofimmutability, and controlled access to the firmware upload functions so as to stop unauthorized use .…

Contract Scheduling With Predictions

Contract scheduling is a general technique that allows to design a system with interruptible capabilities, given an algorithm that is not necessarilyinterruptible . Previous work on this topic has largely assumed that the interruption is a worst-case deadline that is unknown to the scheduler .…

The Reads From Equivalence for the TSO and PSO Memory Models

The verification of concurrent programs remains an open challenge due to thenon-determinism in inter-process communication . The reads-from (RF) equivalence was recently shownto be coarser than the Mazurkiewicz equivalence, leading to impressivescalability improvements for SMC under SC . For TSO and PSO, the standard equivalence has been Shasha-Snir traces .…

Inverse problems for semiconductors models and methods

We consider the problem of identifying discontinuous doping profiles insemiconductor devices from data obtained by different models connected to thevoltage-current map . Stationary as well as transient settings are discussed . Numericalimplementations for the so-called stationary unipolar and stationary bipolarcases show the effectiveness of a level set approach to tackle the inverse problem .…

Stochastic sparse adversarial attacks

Stochastic sparse adversarial attacks (SSAA) are simple, fast and purely noise-based targeted and untargeted attacks of NNC . SSAA offer new examples of sparse (or $L_0$) attacks for which only few methodshave been proposed previously . These attacks are devised by exploiting asmall-time expansion idea widely used for Markov processes .…

Energy Based Models for Continual Learning

Energy-Based Models (EBMs) have a natural way to support a dynamically-growing number of tasks or classes that causes less interference with previously learned information . EBMs outperform the baseline methods by a large margin on several continual learningbenchmarks . We also show that EBMs are adaptable to a more general continuallearning setting where the data distribution changes without the notion of explicitly delineated tasks .…

General Purpose Atomic Crosschain Transactions

The General Purpose Atomic Crosschain Transaction protocol allows composableprogramming across multiple Ethereum blockchains . It allows for inter-contractand inter-blockchain function calls that are both synchronous and atomic . If one part fails, the whole call graph of function calls is rolled back .…

Rotational Error Metrics for Quadrotor Control

We analyze and experimentally compare various rotational error metrics for use in quadrotor controllers . We provide a catalog of proposed rotational metrics, place them into the same framework . We show experimental results to highlight the salient differences between the rotational errors .…

Solving Two Dimensional H curl elliptic Interface Systems with Optimal Convergence On Unfitted Meshes

In this article, we develop and analyze a finite element method with the first family N\’ed\’elec elements of the lowest degree for solving a Maxwellinterface problem . We establish a few important properties for the IFEfunctions including the unisolvence according to the edge degrees of freedom, the exact sequence relating to the $H^1$ IFE functions and the optimalapproximation capabilities .…

Fuzzy Stochastic Timed Petri Nets for Causal properties representation

Imagery is frequently used to model, represent and communicate knowledge . Causality is defined in terms of precedence (thecause precedes the effect), concurrency (often, an effect is provokedsimultaneously by two or more causes) and circularity (a cause provokes the effectand the effect reinforces the cause) We will introduce Fuzzy Stochastic Timed Petri Nets as a graphical tool able to represent time, co-occurrence, loopingand imprecision in causal flow .…

Generate Asset Condition Data for Power System Reliability Studies

Paper explores unconventional method-generating numerical and non-numerical asset condition data based on condition degradation, condition correlation and categorical distribution models . Empirical knowledge from human experts can also be incorporated in themodeling process . Method can be used to conveniently generatehypothetical data for research purposes .…

PeleNet A Reservoir Computing Framework for Loihi

PeleNetframework aims to simplify reservoir computing for neuromorphic hardware . It is build on top of the NxSDK from Intel and is written in Python . The framework manages weight matrices, parameters and probes . With this, the user is not confronted with technical details and can concentrate on experiments .…

InstaHide s Sample Complexity When Mixing Two Private Images

Inspired by InstaHide challenge [Huang, Song, Li and Arora’20], [Chen, Songand Zhuo’20] recently provides one mathematical formulation of InstaHash attackproblem under Gaussian images distribution . They show that it suffices to use $O(n_{\mathsf{priv) +\mathrm{poly}(n__priv)$ samplesto recover one private image in $n_n_priv_time for any integer $k_\maths$ – 2/(k_maths) + 1)$ .…

On the Serverless Nature of Blockchains and Smart Contracts

Serverless architecture is more frequently associated with the architectural style for developing cloud-native applications . Blockchains are distributed systems designed to enable collaborative scenarios involving untrusted parties . The decentralizedpeer-to-peer nature of blockchains makes it interesting to consider them inserverless architectures, since resource allocation and management tasks are not required to be performed by users .…

CAT Change focused Android GUI Testing

Android Apps are frequently updated, every couple of weeks, to keep up withchanging user, hardware and business demands . Correctness of App updates ischecked through extensive testing . Recent research has proposed tools forautomated GUI event generation in Android Apps .…

An Optimal Triangle Projector with Prescribed Area and Orientation Application to Position Based Dynamics

The vast majority of mesh-based modelling applications iteratively transform mesh vertices under prescribed geometric conditions . In current PBD implementations, the area preservation constraint is linearised . The solution comes out through the iterations, without a guarantee of optimality, and the process may fail for degenerate inputs where thevertices are colinear or colocated .…