## A Robust Reputation based Group Ranking System and its Resistance to Bribery

Current state-of-the-art solutions rank the items with an average of the ratingsexpressed for an item, with a consequent lack of personalization for the users . Oursystem is novel in that it reflects the diversity of preferences by (possibly)assigning distinct rankings to the same item, for different groups of users .…

## A non cooperative meta modeling game for automated third party calibrating validating and falsifying constitutive laws with parallelized adversarial attacks

The evaluation of constitutive models, especially for high-risk and high-regret engineering applications, requires efficient and rigorousthird-party calibration, validation and falsification . We introduce an automated meta-modelinggame where two competing AI agents systematically generate experimental data tocalibrate a given constitutive model and to explore its weakness .…

## Thinking While Moving Deep Reinforcement Learning with Concurrent Control

We study reinforcement learning in settings where sampling an action from the policy must be done concurrently with the time evolution of the controlled system . Much like a person or an animal, the robot mustthink and move at the same time, deciding on its next action before the previous one has completed .…

## Adversarial Augmentation Policy Search for Domain and Cross Lingual Generalization in Reading Comprehension

Reading comprehension models often overfit to nuances of training datasetsand fail at adversarial evaluation . Training with adversarially augmenteddataset improves robustness against those adversarial attacks but hurts generalization of the models . We propose three new methods for generating QAadversaries, that introduce multiple points of confusion within the context, show dependence on insertion location of the distractor, and reveal the compound effect of mixing adversarial strategies with syntactic and semanticparaphrasing methods .…

## BLEU might be Guilty but References are not Innocent

The quality of automatic metrics for machine translation has been called into question, especially for high-quality systems . Thispaper demonstrates that, while choice of metric is important, the nature of thereferences is also critical . Ourmethod yields higher correlation with human judgment not only for thesubmissions of WMT 2019 English to German, but also for Back-translation andAPE augmented MT output, which have been shown to have low correlation with automatic metrics using standard references .…

## K spin Hamiltonian for quantum resolvable Markov decision processes

The Markov decision process is the mathematical formalization underlying themodern field of reinforcement learning when transition and reward functions are unknown . We derive a pseudo-Boolean cost function that is equivalent to aK-spin Hamiltonian representation of the discrete, finite, discounted Markovdecision process with infinite horizon .…

## Compass aligned Distributional Embeddings for Studying Semantic Differences across Corpora

Word2vec is one of the most used algorithms to generate word embeddings . However, word meaning is not static and depends on the context in which words are used . Differences in word meaning that depends on time, location, topic, and other factors, can be studied by analyzingembeddings generated from different corpora in collections that arerepresentative of these factors .…

## A Deep Reinforcement Learning Framework for Continuous Intraday Market Bidding

The large integration of variable energy resources is expected to shift alarge part of the energy exchanges closer to real-time, where more accurate forecasts are available . The goal of the storage device operator is the maximization of the profits received over the entire trading horizon, while taking into account the operational constraints of the unit .…

## Knowledge Distillation and Student Teacher Learning for Visual Intelligence A Review and New Outlooks

Knowledge distillation (KD) has been proposed to transfer information learned from one model to another . KD is often characterized by theso-called `Student-Teacher’ (S-T) learning framework and has been broadly applied in model compression and knowledge transfer . This paper is about KD and S-T learning, which are being actively studied in recent years .…

## Technical Report NEMO DNN Quantization for Deployment Model

This technical report aims at defining a formal framework for Deep NeuralNetwork (DNN) layer-wise quantization . It also acts as a documentation for the NEMO(NEural Minimization for pytOrch) framework . An important feature of this model is that it enables DNN inference using purelyintegers – without resorting to real-valued numbers in any part of thecomputation and without relying on an explicit fixed-point numericalrepresentation .…

## From Machine Reading Comprehension to Dialogue State Tracking Bridging the Gap

The scarcity of labeled data is an obstacle to building accurate and robust state tracking systems that work across a variety of domains . Existing approaches generally require some dialogue data with state information and their ability to generalize to unknown domains is limited .…

## MLR A Two stage Conversational Query Rewriting Model with Multi task Learning

Conversational context understanding aims to recognize the real intention ofuser from the conversation history . Multi-task model on sequence Labeling and query Rewriting. MLRreformulates the multi-turn conversational queries into a single turn query, conveys the true intention of users concisely and alleviates the difficulty of the dialogue modeling.…

## Quantifying Notes Revisited

In this survey we review several dynamic epistemic logics with modalitiesrepresenting quantification over information change . Of such logics we presenttypical axioms involving the relation between knowledge or belief and belief andinformative action . We focus on open problems and new directions for research .…

## Generating Fact Checking Explanations

Most existing work on automated fact checking is concerned with predicting veracity of claims based on metadata, social network spread, language usedin claims, and evidence supporting or denying claims . A crucial piece of the puzzle that is still missing is to understand how to automate themost elaborate part of the process — generating justifications for verdicts on claims .…

## Augmentation of the Reconstruction Performance of Fuzzy C Means with an Optimized Fuzzification Factor Vector

FuzzyC-Means (FCM) is one of the most frequently used methods to constructinformation granules . The FCM-based granulation-degranulation mechanism plays apivotal role in GrC . The proposed approach outperforms the generic datareconstruction approach . We offer a thorough analysis of the developed scheme.…

## Exact and Approximate Algorithms for Computing a Second Hamiltonian Cycle

Cedric Smith proved in 1946, using a non-constructive parity argument, that such a second Hamiltonian cycle always exists . Ouralgorithm is based on a fundamental structural property of Thomason’s lollipopalgorithm, which we prove here for the first time . This approximation result also improves the state of the art running time for solving this problem, as well as improving the state-of-the-art running time of the algorithm for solving such a problem .…

## Optimizing Reachability Sets in Temporal Graphs by Delaying

A temporal graph is a dynamic graph where every edge is assigned a set of integer time labels that indicate at which discrete time step the edge is available . In this paper, we study how changes of the time labels,corresponding to delays on the availability of the edges, affect thereachability sets from given sources .…

## Embedded model discrepancy A case study of Zika modeling

Mathematical models of epidemiological systems enable investigation of and predictions about potential disease outbreaks . However, commonly used models are often highly simplified representations of incredibly complex systems . We propose an embedded discrepancy operator, a modification to the model equations that requires modest information about the system and is calibrated by all relevant data .…

## Congruence Preservation Lattices and Recognizability

Some monoids and (semi)rings (natural numbers, integers and p-adicintegers) are residually finite algebras . We prove the equivalence of two ways for a function on such an algebra to behave like the operations of the algebra . The first way is to preservecongruences or stable preorders .…

## Complaint driven Training Data Debugging for Query 2 0

Rain is a complaint-driven training data debuggingsystem . Rain allows users to specify complaints over the query’s intermediateor final output, and aims to return a minimum set of training examples . Rain achieves the highest recall@k among all the baselines while still returns results interactively .…

## A negative case analysis of visual grounding methods for VQA

Existing Visual Question Answering (VQA) methods tend to exploit dataset biases, instead of producing rightanswers for the right reasons . We propose a simpler regularization scheme that does not require any external annotations and yet achieves near state-of-the-art performance on VQA-CPv2 .…

## Workflow Automation for Cyber Physical System Development Processes

Development of Cyber Physical Systems (CPSs) requires close interaction between developers with expertise in many domains to achieve ever-increasing demands for improved performance, reduced cost, and more system autonomy . Eachengineering discipline commonly relies on domain-specific modeling languages . However, integration between these heterogeneous models and tools is lacking .…

## Bypassing or flying above the obstacles A novel multi objective UAV path planning problem

This study proposes a novel multi-objective integer programming model for acollision-free discrete drone path planning problem . Considering the possibility of bypassing obstacles or flying above them, this study aims tominimize the path length, energy consumption, and maximum path risks simultaneously .…

## Explaining Question Answering Models through Text Generation

Large pre-trained language models (LMs) perform well when fine-tuned on tasks that require commonsense and world knowledge . But in end-to-end architectures, it is difficult to explain what is the knowledge in the LM that allows it to make a correct prediction .…

## FBNetV2 Differentiable Neural Architecture Search for Spatial and Channel Dimensions

DMaskingNAS finds models with 0.9% higher accuracy, 15% fewer FLOPs than MobileNetV3-Small . FBNetV2 models are open-sourced athttps://://://www.facebookresearch/mobile-vision.com/FBNetVs2 models . The searched models yield state-of-the-art performance when compared with all previous architectures. FBNetVsV2 outperforms MobileNetVs3 by 2.6% in accuracy, with equivalent model size.…

## Reinforcement Learning via Reasoning from Demonstration

Demonstration is an appealing way for humans to provide assistance toreinforcement-learning agents . Most approaches in this area view demonstrations as sources of behavioral bias . In sparse-reward tasks, humans seem to treat demonstrations more as source of causal knowledge .…

## The Topological and Logical Structure of Concurrency and Dependency via Distributive Lattices

This paper is motivated by the desire to study package management using the toolkit of the semantics of functional languages . It relates dependency structures to lattices in a precise way, establishing a full correspondence with a particular subclass of lattices .…

## Delay Sensitivity Classification of Cloud Gaming Content

Cloud Gaming is an emerging service that catches growing interest in theresearch community as well as industry . Using a cloud gaming service with high latency would harm the interaction of the user with the game, leading to a decrease in playing performance and thusfrustration of players .…

## Image Co skeletonization via Co segmentation

Image co-skeletonization is defined as jointskeleton extraction of objects in an image collection . Object skeletonization in a single natural image is a challenging problem because there is hardly anyprior knowledge about the object . We hope that the commonness prior that exists across theimages may help, just as it does for other joint processing problems such asco-segmentation .…

## Hardware Memory Management for Future Mobile Hybrid Memory Systems

The current mobile applications have rapidly growing memory footprints . Insufficient DRAM mainmemory will incur frequent data swaps between memory and storage . Emergingnon-volatile memory (NVM) has the potential to alleviate these issues due to its higher capacity per cost than DRAM and mini-mal static power .…

## μ Tiles Efficient Intra Process Privilege Enforcement of Memory Regions

The status quo is that Unix-like operating systems do not offer privilegeseparation inside a process . Lack of practical fine-grainedcompartmentalization inside a shared address space leads to private dataleakage through applications’ untrusted dependencies and compromised threads . To this end, we propose a lightweight kernel abstraction and set of security primitives based on mutual distrust .…

## Are Game Engines Software Frameworks A Three perspective Study

Game engines help developers create video games and avoid duplication of codeand effort . Open-source game engines are slightly larger in terms of size and complexity and less engaging than traditional frameworks . Their programming languagesdiffer greatly from frameworks. Engine projects have shorter histories withless releases.…

## Norm violation in online communities A study of Stack Overflow comments

Online communities are also expected to abide by the rules and regulations that are expressed in the code of conduct of a system . Hate speech and abusive language usage are on the rise among StackOverflow users . By identifying andminimising various patterns of norm violations in different SO communities, the community would become less toxic and thereby the community can engage more effectively in its goal of knowledge sharing .…

## Probabilistic Resource Aware Session Types

Session types guarantee that message-passing processes adhere to predefined protocols . Probabilistic session types describe probability distributions over messages and are aconservative extension of intuitionistic (binary) session types . The analysis for expected resource bounds is integratedwith the type system and is a variant of automatic amortized resource analysis.…

## Computing with Continuous Objects A Uniform Co inductive Approach

A uniform approach to computing with infinite objects like real numbers,tuples of these, compacts sets, and uniformly continuous maps is presented . The approach is of the same power as Weihrauch’s Type-Two Theory of Effectivity . It is based on Berger and the present author generalised this approach to complete metric spaces and showed how to deal with compact sets .…

## The ZX calculus A complete graphical calculus for classical circuits using spiders

We give a complete presentation for the fragment, ZX&, of the ZX-calculus generated by the Z and X spiders . A translation to some extension of TOF is a natural choice because of the multiplicative nature of the Toffoli gate .…

## Social rules for agent systems

When creating (open) agent systems it has become common practice to uses social concepts such as social practices, norms and conventions to model the interactions between the agents are regulated . In this paper we will investigate some of the relations between these concepts and also whether they are fundamentally stemming from a single social object or should be seen as different types of objects altogether .…

## Safe Multi Agent Interaction through Robust Control Barrier Functions with Learned Uncertainties

Multi-AgentControl Barrier Functions have emerged as a computationally efficient tool to guarantee safety in multi-agent environments . They assume perfect knowledge of both the robot’s dynamics and other agents’ dynamics . But the heterogeneity of agents in real-world environments means there will always beconsiderable uncertainty in our prediction of other agents .…

## Application of Just Noticeable Difference in Quality as Environment Suitability Test for Crowdsourcing Speech Quality Assessment Task

Crowdsourcing micro-task platforms facilitate subjective media qualityassessment by providing access to a highly scale-able, geographicallydistributed and demographically diverse pool of crowd workers . Environmental noise at the listener’s side and the listening device (loudspeaker or headphone) significantly affect perceived quality, and consequently the reliability and validity of subjective ratings .…

## Analysing Flow Security Properties in Virtualised Computing Systems

This paper studies the problem of reasoning about flow security properties invirtualised computing networks with mobility from perspective of formallanguage . We propose a distributed process algebra CSP_{4v} with securitylabelled processes for the purpose of formal modelling of virtualised computingsystems .…

## WES Agent based User Interaction Simulation on Real Infrastructure

We introduce the Web-Enabled Simulation (WES) research agenda, and describe FACEBOOK’s WW system . We describe the application of WW to reliability, integrity and privacy at FACEBOOK . The WES agenda draws on research from many areas of study, including Machine Learning, Programming Languages, Graph Theory, Game AI, and AI Assisted Game Play .…

## Increasing Validity Through Replication An Illustrative TDD Case

Software Engineering (SE) experiments suffer from threats tovalidity that may impact their results . Replication allows researchers building on top of previous experiments’ weaknesses and increasing the reliability of the findings . Differences across TDD replications’ results might be due to the operationalization of the response variables, the allocation of subjects totreatments, the allowance to work outside the laboratory, the provision of the task, or the task .…

## A Procedure and Guidelines for Analyzing Groups of Software Engineering Replications

Researchers from different groups and institutions are collaborating on building groups of experiments by means of replication (i.e., conductinggroups of replications) Disparate aggregation techniques are being applied toanalyze groups of replication . The application of unsuitable techniques toaggregate replication results may undermine the potential of groups ofreplications to provide in-depth insights from experiment results .…

## Relaxed Dual Optimal Inequalities for Relaxed Columns with Application to Vehicle Routing

We address the problem of accelerating column generation for set cover problems in which we relax the state space of the columns to do efficientpricing . We achieve this by adapting the recently introduced smooth andflexible dual optimal inequalities (DOI) for use with relaxed columns .…

## Robot self other distinction active inference meets neural networks learning in a mirror

The algorithm combines active inference, atheoretical model of perception and action in the brain, with neural networklearning . The robot learns the relation between its actions and its body with the effect produced in the visual field and its sensors .…

## Lightwave Power Transfer for Federated Learning based Wireless Networks

Federated Learning (FL) has been recently presented as a new technique for training shared machine learning models in a distributed manner while respecting data privacy . Implementing FL in wireless networks maysignificantly reduce the lifetime of energy-constrained mobile devices due to their involvement in the construction of the shared learning models .…