Tezos smart contracts are written in alow-level stack-based language called Michelson . Albert is an intermediate language for Tezo smart contracts which abstractsMichelson stacks as linearly typed records . We also describe its compiler, written in Coq, that targets Mi-Cho-Coq .…

## Counting Maximum Matchings in Planar Graphs Is Hard

Here we prove that counting maximum matchings in planar, bipartite graphs is#P-complete . This is somewhat surprising in the light that the number ofperfect matchings can be computed in polynomial time . We alsoprove that counting non-necessarily perfect matchings isalready .…

## An extended quantum process algebra eQPAlg approach for distributed quantum systems

In this work, we have expounded the communication procedure of quantum systems by means of process algebra . The main objective of our research effort is to formally represent the communication between distributed quantum systems . Examples have been provided to describe the working of the improved algebra that formally explain the sending and receiving of both classical as well as quantum data, keeping in mind the principalfeatures of quantum mechanics .…

## Price Competition with LTE U and WiFi

LTE-U is an extension of the Long Term Evolution (LTE) standard for operationin unlicensed spectrum . The difference in spectralefficiency between LTE and WiFi also plays a role in the competition among SPs . The welfare impacts of this technology are subtle, depending in part on the amount of unlicensed spectrum and number of entures and the amount of unlicensed reservoirs used by the technology .…

## Modeling Musical Structure with Artificial Neural Networks

In recent years, artificial neural networks have become a universaltool for tackling real-world problems . Some structural aspects are particularly challenging to learn with current ANN architectures . In this thesis, I explore the application of ANNs to different aspects of musicalstructure modeling .…

## Joint Communication and Computational Resource Allocation for QoE driven Point Cloud Video Streaming

Point cloud video is the most popular representation of hologram, which is the medium to precedent natural content in VR/AR/MR and is expected to be the next generation video . The inherent challenges lie in the large size by the necessity of recording the three-dimensional coordinates besides color information, and the associated high computation complexity of encoding .…

## A Hybrid MPI CUDA Approach for Nonequispaced Discrete Fourier Transformation

Nonequispaced discrete Fourier transformation (NDFT) is widely applied in all aspects of computational science and engineering . The computational efficiencyand accuracy of NDFT has always been a critical issue in hindering itscomprehensive applications both in intensive and in extensive aspects of scientific computing .…

## A Calculus for Modular Loop Acceleration

Loop acceleration can be used to prove safety, reachability, runtime bounds, and (non-termination) of programs operating on integers . We present a calculus that allows for combining acceleration techniques in a modular way . We propose two novel acceleration techniques that can be incorporated into our calculus seamlessly .…

## New lower bounds for Massively Parallel Computation from query complexity

Roughgarden, Vassilvitskii, and Wang (JACM 18) recently introduced a novel framework for proving lower bounds for Massively Parallel Computation using techniques from boolean function complexity . We give the first unconditional lower boundson the complexity of distinguishing whether an input graph is a cycle of length$n$ or two cycles of length $n/2 .…

## Hardware Software Co verification Using Path based Symbolic Execution

Conventional tools for formal hardware/software co-verification use boundedmodel checking techniques to construct a single monolithic propositionalformula . Formulas generated in this way are extremely complex and contain a great deal of irrelevant logic, hence are difficult to solve even by the state-of-the-art Satis ability (SAT) solvers .…

## A Diagrammatic Calculus for Algebraic Effects

We introduce a new diagrammatic notation for representing the result of(algebraic) effectful computations . Our notation explicitly separates theeffects produced during a computation from the possible values returned, thisway simplifying the extension of definitions and results on pure computationsto an effectful setting .…

## Business Negotiation Definition Language

The target of this paper is to present an industry-ready prototype software for general game playing . This software can also be used as the central element for experimental economics research, interfacing of game-theoretic libraries, AI-driven software testing, algorithmic trade, human behavior mining and simulation of (strategic) interactions .…

## Multi Agent Interactions Modeling with Correlated Policies

In multi-agent systems, complex interacting behaviors arise due to the highcorrelations among agents . DecentralizedAdversarial Imitation Learning algorithm with Correlated policies (CoDAIL) allows for decentralized training and execution . Various experiments demonstrate that CoDAIL can better regenerate complex interactions close to thedemonstrators and outperforms state-of-the-art multagent imitation learning methods .…

## Represented Value Function Approach for Large Scale Multi Agent Reinforcement Learning

In this paper, we consider the problem of large scale multi agentreinforcement learning . We adopt a l2-norm trick to ensure the trivial term of theroximated value function is bounded . Thirdly, experimental results on battlegame demonstrate the effectiveness of the proposed approach to learning .…

## On the Finite Optimal Convergence of Logic Based Benders Decomposition in Solving 0 1 Min max Regret Optimization Problems with Interval Costs

This paper addresses a class of problems under interval data uncertaintycomposed of min-max regret versions of classical 0-1 optimization problems withinterval costs . The separation subproblems may be NP-hard, not all of them can be modeled by means of linear programming, unlessP = NP .…

## Hard 3 CNF SAT problems are in P A first step in proving NP P

The relationship between the complexity classes $P$ and $NP$ is an unsolved question in theoretical computer science . In the first part of this paper, a lattice framework is proposed to handle the 3-CNF-SAT problems . The complexity needed for the computation of $Im\; {\cal H}__\varphi$ the set of all solutions, is shown to be polynomial for hard 3-NAT problems, i.e.…

## Cyberphysical Blockchain Enabled Peer to Peer Energy Trading

Scalability and security problems of the centralized architecture models incyberphysical systems have great potential to be solved by novel blockchainbased distributed models . A decentralized energy trading system takes advantageof various sources and effectively coordinates the energy to ensure optimalutilization of the available resources .…

## Control Challenges for Resilient Control Systems

The main challenge for control systems is its cyber-physical nature which strongly couples the cyber systems with physical layerdynamics . Decentralized control of such systems is indispensable . We extend the resiliency framework to address distributed and collaborative resiliencies among decentralized control agents .…

## Selfish Algorithm and Emergence of Collective Intelligence

We propose a model for demonstrating emergence of collectiveintelligent behavior from selfish individual agents . Agents’ behavior ismodeled using our proposed selfish algorithm ($SA$) with three learningmechanisms: reinforced learning ($SAL$), trust ($SAT$) and connection ($SAC$) The $SA$ provides a generalization of theself-organized temporal criticality ($SOTC$) model and shows thatself-interested individuals can simultaneously produce maximum social benefit from their decisions .…

## Intelligent Roundabout Insertion using Deep Reinforcement Learning

The proposed module is based on a neural network trained to predict when and how entering the roundabout throughout the whole duration of the maneuver . It is trained such that agents feature a unique tunable behavior, emulatingreal world scenarios where drivers have their own driving styles .…

## Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication

The problem of secret-key based authentication under privacy and storage constraints on the source sequence is considered . The identifier measurementchannels during authentication are assumed to be controllable via acost-constrained action sequence . The results are relevant for several user and deviceauthentication scenarios including physical and biometric identifiers with multiple measurements that provide diversity and multiplexing gains .…

## Verifying Cryptographic Security Implementations in C Using Automated Model Extraction

This thesis presents an automated method for verifying security properties ofprotocol implementations written in the C language . We assume that each successful run of a protocol follows the same path through the C code, justified by the fact that typical security protocols have linear structure .…

## Algorithmic Number On the Forehead Protocols Yielding Dense Ruzsa Szemerédi Graphs and Hypergraphs

One protocol leads to a simple and naturalextension of the original construction of Ruzsa and Szemer\'{e}di . Another protocol is an explicit (and slightly simpler) version of the construction of Alon,Moitra and Sudakov . We alsogeneralize the above protocols to more than three players, in order to construct dense uniform hypergraphs in which every edge lies in a positivesmall number of simplices .…

## Coarse Grained Complexity for Dynamic Algorithms

To date, the only way to argue polynomial lower bounds for dynamic algorithms is via fine-grained complexity arguments . These arguments rely on strongassumptions about specific problems such as the Strong Exponential TimeHypothesis (SETH) and the Online Matrix- Vector Multiplication Conjecture (OMv) Dynamic algorithms missout some benefits and lessons from the traditional “coarse grained” approach .…

## Incremental Monoidal Grammars

In this work we define formal grammars in terms of free monoidal categories . This allows us to link the categorical viewpoint on natural language to the standard machinelearning notion of probabilistic language model . We also develop a functor from the category of formal grammarmars to category ofautomata .…

## Representing Unordered Data Using Complex Weighted Multiset Automata

Unordered, variable-sized inputs arise in many settings across multiplefields . The ability for set- and multiset-oriented neural networks to handle this type of input has been the focus of much work in recent years . We propose a new theoretical andintuitive justification for the Transformer model’s representation of positions using sinusoidal functions .…

## Quick or cheap Breaking points in dynamic markets

We examine two-sided markets where players arrive stochastically over time and are drawn from a continuum of types . The cost of matching a client and provider varies, so a social planner is faced with two contending objectives:a) to reduce players’ waiting time before getting matched; and b) to formefficient pairs in order to reduce matching costs .…

## Let s Share A Game Theoretic Framework for Resource Sharing in Mobile Edge Clouds

Mobile edge computing seeks to provide resources to different delay-sensitive applications . There is a need for an efficient and effectivemechanism to share resources among service providers . We model resource sharing as amulti-objective optimization problem and present a solution framework based on cooperative game theory .…

## Vehicle Platooning Impact on Drag Coefficients and Energy Fuel Saving Implications

In this paper, empirical data from the literature are used to develop generalpower models that capture the impact of a vehicle position, in a platoon ofhomogeneous vehicles, and the distance gap to its lead (and following) vehicle on its drag coefficient .…

## Toward Optimal Adversarial Policies in the Multiplicative Learning System with a Malicious Expert

We consider a learning system based on the conventional multiplicative weight(MW) rule that combines experts’ advice to predict a sequence of true outcomes . In the offline setting where the malicious expert must choose its entire sequence of decisions a priori, we show somewhat surprisingly that asimple greedy policy of always reporting false prediction is asymptoticallyoptimal with an approximation ratio of $1+O(\sqrt{\frac{\ln N}{N) $N$is the total number of prediction stages .…

## Open Challenges and Issues Artificial Intelligence for Transactive Management

A smart energy management system,Transactive management (TM) is a concept to improve the efficiency and reliability of the power system . The advancement of Artificial Intelligence (AI) has improved the automationof energy managements . The aim of this article is to look for the current development of TM methods based on AI and Machine Learning (ML) technology .…

## From Drinking Philosophers to Wandering Robots

In this paper, we consider the multi-robot path execution problem where agroup of robots move on predefined paths from their initial to target positions . We then propose modifications to an existing DrPP algorithm to allow more concurrent behavior, and provide conditions under which our method is deadlock-free .…

## Single Bit Consensus with Finite Time Convergence Theory and Applications

In this brief paper, a new consensus protocol based on the sign ofinnovations is proposed . Based on this protocol each agent only requiressingle-bit of information about its relative state to its neighboring agents . This is significant in real-time applications, since it requires lesscomputation and/or communication load on agents .…

## DeepFakes and Beyond A Survey of Face Manipulation and Fake Detection

Thissurvey provides a thorough review of techniques for manipulating face images including DeepFake methods . Inparticular, four types of facial manipulation are reviewed: entire facesynthesis, identity swap (DeepFakes), attribute manipulation, and expression swap . In addition to the survey information, we also discuss open issues and future trends that should be considered to advance in the field .…

## Hints and Principles for Computer System Design

This new long version of my 1983 paper suggests the goals you might have for your system . It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas .…

## An Empirical Evaluation of Bluetooth based Decentralized Contact Tracing in Crowds

Digital contact tracing is being used by many countries to help contain COVID-19’s spread in a post-lockdown world . As of October 2020, there have been millions of downloads of such Bluetooth-based contract-tracing apps, as more and more countries officially adopt them .…

## DoWhy An End to End Library for Causal Inference

DoWhy is an open-source Python library that is built with causal assumptions as its first-class citizens . DoWhy implements a number of robustness checks including placebo tests, bootstrap tests, and tests for unobervedconfounding . The library is available at https://://://github.com/Microsoft/dowhy and the library is free to download from http://www.mnt.org/doWhy-why-pennifera-gui-a-libraries-to-measurement-by-mechanical-association-assumption-checker-assertions.…

## Stress Testing Method for Scenario Based Testing of Automated Driving Systems

For automated driving systems (ADS) ofSAE level 3+ the scenario space is infinite and calling for virtual testing . Even in simulation, the generation of safety-relevant scenarios for ADS is expensive and time-consuming . Microscopic traffic flow simulation models (TFSM) are becoming a crucial part of scenario-based testing of ADS .…

## Fourier based and Rational Graph Filters for Spectral Processing

Data are represented as graphs in a wide range of applications, such as Computer Vision and Graphics . We introduce a spectrum-free approach, which requires the solution of a small set of sparse, symmetric, well-conditioned linear systems . Approximating arbitrary graph filters with rational polynomials provides a more accurate andnumerically stable alternative with respect to polyomials .…

## Designing Game Feel A Survey

The act of polishing that determines game feel, takes the shape of tuning, juicing, and streamlining respectively . Tuning thephysicality of game objects creates cohesion, predictability, and the resultingmovement informs many other design aspects . Juicing is the act of plishingamplification and it results in empowerment and provides clarity of feedback by communicating the importance of game events .…

## Assembling a Pipeline for 3D Face Interpolation

This paper describes a pipeline built with open source tools forinterpolating 3D facial expressions taken from images . Given the input photos, corresponding 3D face models are constructed and texture-mappedusing the photos as textures aligned with facial features . Animations are thengenerated by morphing the models by interpolation of the geometries andtextures of the models .…

## Iso Points Optimizing Neural Implicit Surfaces with Hybrid Representations

A hybrid neural surface representation allows us to imposegeometry-aware sampling and regularization . We propose to use \emph{iso-points as an explicitrepresentation for a neural implicit function . These points are computed andupdated on-the-fly during training to capture important geometric features and impose geometric constraints on the optimization .…

## Deep Learning Based Human Pose Estimation A Survey

The goal of this survey paper is toprovide a comprehensive review of recent deep learning-based solutions for both 2D and 3D pose estimation . More than 240research papers since 2014 are covered in this survey . The challenges involved,applications, and future research directions are concluded .…

## An Marching Cube Algorithm Based on Edge Growth

Marching Cube algorithm is currently one of the most popular 3D surface rendering algorithms . It forms cube voxels through the input image, then uses 15 basic topological configurations to extract theisosurfaces in the voxel . The algorithm first extractsseed triangles, then grows the seed triangles and reconstructs the entire 3D model .…

## TopoKnit A Process Oriented Representation for Modeling the Topology of Yarns in Weft Knitted Textiles

Machine knitted textiles are complex multi-scale material structuresincreasingly important in many industries . Wepropose a process-oriented representation, TopoKnit, that defines afoundational data structure for representing the topology of weft-knittedtextiles at the yarn scale . Process space serves as an intermediary between themachine and fabric spaces, and supports a concise, computationally efficientevaluation approach based on on-demand, near constant-time queries .…

## PAVEL Decorative Patterns with Packed Volumetric Elements

Ouralgorithm works by determining the locations in which to add the decorative elements and then removing the non-physical overlap between them while preserving the decoration volume . It can be used to enhance virtual surfaces, as well as 3D-printed pieces, by assembling the decorations onto real-surfacesto obtain tangible reproductions .…

## Meta PU An Arbitrary Scale Upsampling Network for Point Cloud

Point cloud upsampling is vital for the quality of the mesh in three-dimensional reconstruction . The methods need to train a specific model for eachscale factor, which is both inefficient and impractical for storage and computing in real applications . We propose a novel method called “Meta-PU” to support point cloudupsampling of arbitrary scale factors with a single model .…

## An all in one geometric algorithm for cutting tearing drilling deformable models

Conformal Geometric Algebra (CGA) is a framework that allows therepresentation of objects, such as points, planes and spheres, and deformations, as uniform vectors . For the first time, one may perform real-timecuts and tears as well as drill holes on a rigged 3D model .…