Conformance Checking of Mixed paradigm Process Models

Mixed-paradigm process models integrate strengths of procedural and Declare representations . They are specifically interesting for process mining because they allow capturing complex behaviour in a compact way . A key research challenge for the proliferation of process mining is the lack of corresponding conformance checking techniques .…

Studying Taxonomy Enrichment on Diachronic WordNet Versions

Ontologies, taxonomies, and thesauri are used in many NLP tasks . However, studies are focused on the creation of these lexical resources rather than maintenance of the existing ones . We explore the possibilities of taxonomy extension in aresource-poor setting and present methods which are applicable to a largenumber of languages .…

Does BERT Understand Sentiment Leveraging Comparisons Between Contextual and Non Contextual Embeddings to Improve Aspect Based Sentiment Models

When performing Polarity Detection for different words in a sentence, we need to look at the words around to understand the sentiment . We also show that if we finetune a subset ofweights the model built on comparison of BERT and generic word embedding, it can get state of the art results for Polarity detection in Aspect BasedSentiment Classification datasets.…

Development and evaluation of the use of a virtual health filter survey in a private primary education system in Baja California Mexico during the SARS CoV 2 contingency COVID 19

This work reports on the design, implementation and evaluation of a surveyused as a remote sanitary filter, which was applied in the Adventist Educational System of Baja California . Accessible and easily distributed digital resources were used in orderto meet the necessary requirements of distribution, acquisition and management of the information .…

Unsupervised Domain Adaptation of a Pretrained Cross Lingual Language Model

Recent research indicates that pretraining cross-lingual language models on large-scale unlabeled texts yields significant performance improvements overvarious cross and low-resource tasks . We propose a novel unsupervised feature decomposition method that can automatically extract domain-specific features and domain-invariant features from the entangled pretrained language representations, givenunlabeled raw texts in the source language .…

Algorithmic Causal Sets and the Wolfram Model

The Wolfram model can effectively beinterpreted as providing an underlying algorithmic dynamics for causal set evolution . We show how causal invariance of the hypergraph rewriting system can be used to infer conformal involvement of the induced causal partial order, in amanner that is provably compatible with the measure-theoretic arguments ofBombelli, Henson and Sorkin .…

Automatic differentiation of Sylvester Lyapunov and algebraic Riccati equations

Sylvester, Lyapunov, and algebraic Riccati equations are the bread and butter of control theorists . They are used to compute infinite-horizon Gramians, solve optimal control problems in continuous or discrete time, and design observers . Here, we derive the forward and reverse-mode derivatives of the solutions to all three types of equations, and showcase their application on an inverse control problem .…

The Dynamic of Body and Brain Co Evolution

Method permits to co-evolve the body and the controlproperties of robots . It can be used to adapt the morphological traits of robots with a hand-designed morphological bauplan . Our results indicate that robots with co-adapted body and control traits outperform robots with fixed morphologies .…

MEG Multi Evidence GNN for Multimodal Semantic Forensics

Fake news often involves semantic manipulations across modalities such asimage, text, location etc and requires the development of multimodal semanticforensics for its detection . The proposed model outperforms existing state-of-the-art algorithms with an error reduction of up to 25% . Existing methods arelimited to using a single evidence (retrieved package) which ignores potential improvement from the use of multiple evidences .…

A Better and Faster End to End Model for Streaming ASR

End-to-end (E2E) models have shown to outperform state-of-the-art models for streaming speech recognition . However, the model still tends to delay the predictionstowards the end and thus has much higher partial latency compared to aconventional ASR model . We explore replacing the LSTM layers in the encoder of our E2E model withConformer layers [4], which has shown good improvements for ASR .…

On InstaHide Phase Retrieval and Sparse Matrix Factorization

InstaHide is a scheme recently proposed by [Huang, Song, Li and Arora, ICML’20] for preserving the security of private datasets in the context of distributed learning . We show that the answer to this appears to be quite subtle and closelyrelated to the average-case complexity of a new multi-task, missing-dataversion of the classic problem of phase retrieval.…

DeepClimGAN A High Resolution Climate Data Generator

Earth system models (ESMs) are often used to generate future projections of climate change scenarios . Emulators are substantially less expensive but may not have all of the complexity of anESM . Here we demonstrate the use of a conditional generative adversarialnetwork (GAN) to act as an ESM emulator .…

Cost and QoS Efficient Serverless Cloud Computing

Cloud-based serverless computing systems aim to provide the illusion of infinite resources and abstract users from details of the allocation decisions . We explore two main approaches to (A) reuse part of computation needed toprocessing the services and (B) proactively pruning tasks with a low chance of success to improve the overall QoS of the system .…

Arithmetic Expression Construction

When can $n$ given numbers be combined using arithmetic operators to obtain a given target number? Westudy three variations of this problem of Arithmetic Expression Construction: When the expression (1) is unconstrained; (2) has a specified pattern ofparentheses and operators (and only the numbers need to be assigned to blanks) or (3) must match a specified ordering of the numbers (but the operators and parenthesization are free) For each of these variants, and many of the subsetsof $\{+,-,\times,\div\}$ we prove the problem NP-complete .…

Algorithmic random duality theory large scale CLuP

Based on our Random Duality Theory (RDT), we developed a powerful algorithmic mechanism (called CLuP) that can be utilized to solve NP hard optimization problems in polynomial time . Here we move things further and utilize another ofremarkable RDT features that we established in a long line of work in the past .…

Mechanical Search on Shelves using Lateral Access X RAY

LAX-RAY (Lateral Access maXimal Reduction of OccupancY support Area) is a system to automate the mechanical search for occluded objects on shelves . LAx-RAY couples a perception pipelinepredicting a target object occupancy support distribution with a mechanicalsearch policy that sequentially selects occluding objects to push to the sideto reveal the target as efficiently as possible .…

Bi ISCA Bidirectional Inter Sentence Contextual Attention Mechanism for Detecting Sarcasm in User Generated Noisy Short Text

Many online comments on social media platforms are hateful, humorous, orsarcastic . The sarcastic nature of these comments (especially the short ones) alters their actual implied sentiments . This paper proposes a new state-of-the-art deep learning architecture that uses a novel Bidirectional Inter-Sentence Contextual Attention mechanism (Bi-ISCA) to capture inter-sentence dependencies for detecting sarcasm in the user-generated short text using only theconversational context .…

Managing Latency in Edge Cloud Environment

Cyber-physical Systems (CPS) include applications like smart traffic, smart agriculture, smart power grid, etc. Commonly, these systems are distributed and composed of end-user applications and microservices that typically run in the cloud . As thecloud becomes part of the computation loop, the real-time requirements have to be also reflected by the cloud.…

Characterization and Computation of Feasible Trajectories for an Articulated Probe with a Variable Length End Segment

An articulated probe is modeled in the plane as two line segments, $ab$ and $bc$ joined at $b$ . The goal is to compute a feasibleobstacle-avoiding trajectory for the probe so that, after a sequence ofmoves, $c$ coincides with $t$. We prove that, for $n$ line segment obstacles, the smallest length $r$ forwhich there exists a feasible probe trajectory can be found in $O(n^{2+\epsilon)$ time .…

Alone or With Others Understanding Eating Episodes of College Students with Mobile Sensing

Understanding food consumption patterns and contexts using mobile sensing is fundamental to build mobile health applications that require minimal user interaction to generate mobile food diaries . Social context of eating (alone, with friends, with family, with a partner, etc.) is an important self-reported feature that influences aspects such as food type, psychological state while eating, and the amount of food .…

Urgency aware Optimal Routing in Repeated Games through Artificial Currencies

When people choose routes minimizing their individual delay, the aggregatecongestion can be much higher compared to that experienced by acentrally-imposed routing . Yet centralized routing is incompatible with the presence of self-interested agents . In this paper, we propose a fairincentive mechanism based on artificial currencies that routes selfish agents in a system-optimal fashion, while accounting for their temporal preferences .…

Distance based Data Cleaning A Survey Technical Report

Data cleaning approaches are designed to preprocess the dirty data before conducting applications . Distance-based technology plays an important role inthe data cleaning area, says study . Survey provides a classification of four main data cleaning tasks . It also comprehensively reviews the state of the art for each class of the cleaning tasks, i.e.,…

Validity and Reliability of the Scale Internet Users Information Privacy Concern IUIPC Extended Version

Internet Users’ Information Privacy Concerns (IUIPC-10) is widely used in the evaluation of human factors of PETs and the investigation of the privacy paradox . We propose a respecified instrument with improved psychometric properties . The sub-par reliability could yieldspurious and erratic results as well as attenuate relations with other latentvariables, such as behavior .…

Model Predictive Control for Micro Aerial Vehicles A Survey

This paper presents a review of the design and application of modelpredictive control strategies for Micro Aerial Vehicles and specifically multirotor configurations such as quadrotors . The diverse set of works in the domain is organized based on the control law being optimized over linear or nonlinear dynamics, the integration of state and input constraints, possiblefault-tolerant design, if reinforcement learning methods have been utilized and if the controller refers to free-flight or other tasks such as physicalinteraction or load transportation .…

Data Driven Stabilization of Nonlinear Systems with Rational Dynamics

In this paper, we present a data-driven controller design method forcontinuous-time nonlinear systems with rational system dynamics . We use no model knowledge but only measured data affected by noise . We apply robust control techniques to this parametrization . We obtain sum-of-squares based criteria for designing controllers with closed-loop stability guarantees for all continuous-time systems withrational system dynamics which are consistent with the measured data and the assumed noise bound .…

The Chunks and Tasks Matrix Library 2 0

We present a C++ header-only parallel sparse matrix library based on sparsequadtree representation of matrices . The library implements a number of sparse matrix algorithms for distributed memory parallelization that are able to dynamically exploit datalocality to avoid movement of data .…

An off the grid approach to multi compartment magnetic resonance fingerprinting

We propose a novel numerical approach to separate multiple tissuecompartments in image voxels . We estimate quantitatively their nuclearmagnetic resonance (NMR) properties and mixture fractions, given magneticresonance fingerprinting (MRF) measurements . The number of tissues, their types or quantitative properties are not a-priori known, but the image is assumed to be composed of sparse compartments with linearly mixed Bloch magnetisationresponses .…

A Mathematical Dashboard for the Analysis of Italian COVID 19 Epidemic Data

A data analysis of the COVID-19 epidemic is proposed on the basis of thedashboard publicly accessible at https://www.epimox.polimi.it that focuses on the characterization of the first and second epidemic outbreaks in Italy . Thescope of this tool is to foster a deeperinterpretation of available data as well as to provide a hint on the nearfuture evolution of the most relevant epidemic indicators .…

The Bloom Clock for Causality Testing

The probabilistic Bloom clock can determine causality between events with lowerspace, time, and message-space overhead than vector clocks . However, predictions suffer from false positives . The Bloom clock design can serve as a viablespace-, time-, time-and-message-space-efficient alternative to vector clocks if false positives can be tolerated by an application .…