One world versus many: the inadequacy of Everettian accounts of quantum mechanix

There is a compelling intellectual case for exploring whether purely unitaryquantum theory defines a sensible and scientifically adequate theory, asEverett originally proposed. Many different... | Continue reading


@arxiv.org | 2 hours ago

The Web is missing an essential part of infrastructure: an Open Web Index

A proposal for building an index of the Web that separates the infrastructurepart of the search engine - the index - from the services part that will formthe basis for myriad search engines and... | Continue reading


@arxiv.org | 6 hours ago

Fooling automated surveillance: adversarial patches to attack person detector

Adversarial attacks on machine learning models have seen increasing interestin the past years. By making only subtle changes to the input of aconvolutional neural network, the output of the... | Continue reading


@arxiv.org | 22 hours ago

Gentle Measurement of Quantum States and Differential Privacy

In differential privacy (DP), we want to query a database about n users, in away that "leaks at most eps about any individual user," even conditioned on anyoutcome of the query. Meanwhile, in... | Continue reading


@arxiv.org | 2 days ago

Steganography and Steganalysis: Different Approaches [pdf]

Continue reading


@arxiv.org | 2 days ago

Steganography: The Art of Hiding Data [pdf]

Continue reading


@arxiv.org | 2 days ago

A Comprehensive Survey on Deep Learning Approaches (2018)

Deep learning has demonstrated tremendous success in variety of applicationdomains in the past few years. This new field of machine learning has beengrowing rapidly and applied in most of the... | Continue reading


@arxiv.org | 3 days ago

Privacy Loss in Apple’s Implementation of Differential Privacy (2017)

In June 2016, Apple announced that it will deploy differential privacy forsome user data collection in order to ensure privacy of user data, even fromApple. The details of Apple's approach... | Continue reading


@arxiv.org | 4 days ago

Introduction to Multi-Armed Bandits

Multi-armed bandits a simple but very powerful framework for algorithms thatmake decisions over time under uncertainty. An enormous body of work hasaccumulated over the years, covered in several... | Continue reading


@arxiv.org | 4 days ago

Predicting Student Performance Based on Online Study Habits

Online tools provide unique access to research students' study habits andproblem-solving behavior. In MOOCs, this online data can be used to informinstructors and to provide automatic guidance... | Continue reading


@arxiv.org | 4 days ago

Variability in the interpretation of Dutch probability phrases

Verbal probability phrases are often used to express estimated risk. In thisstudy, focus was on the numerical interpretation of 29 Dutch probability andfrequency phrases, including several... | Continue reading


@arxiv.org | 4 days ago

Starlight Deflection Measurements During the 21 August 2017 Total Solar Eclipse

Precise starlight positions near the sun were measured during the 21 August2017 total solar eclipse in order to measure their gravitational deflections.The equipment, procedures, and analysis... | Continue reading


@arxiv.org | 4 days ago

Evaluation of the Riken Post-K Processor Simulator

For the purpose of developing applications for Post-K at an early stage,RIKEN has developed a post-K processor simulator. This simulator is based onthe general-purpose processor simulator gem5.... | Continue reading


@arxiv.org | 5 days ago

GANs for Text to Face Generation

As a sub-domain of text-to-image synthesis, text-to-face generation has hugepotentials in public safety domain. With lack of dataset, there are almost norelated research focusing on text-to-face... | Continue reading


@arxiv.org | 5 days ago

RF-Trojan: Leaking Kernel Data Using Register File Trojan

Register Files (RFs) are the most frequently accessed memories in amicroprocessor for fast and efficient computation and control logic. Segmentregisters and control registers are especially... | Continue reading


@arxiv.org | 5 days ago

A Discussion on Solving Partial Differential Equations Using Neural Networks

Can neural networks learn to solve partial differential equations (PDEs)? Weinvestigate this question for two (systems of) PDEs, namely, the Poissonequation and the steady Navier--Stokes... | Continue reading


@arxiv.org | 5 days ago

From Theory to Systems: A Grounded Approach to Programming Language Education

I present a new approach to teaching a graduate-level programming languagescourse focused on using systems programming ideas and languages likeWebAssembly and Rust to motivate PL theory. Drawing... | Continue reading


@arxiv.org | 5 days ago

Reinforcement Learning with Attention That Works: A Self-Supervised Approach

Attention models have had a significant positive impact on deep learningacross a range of tasks. However previous attempts at integrating attentionwith reinforcement learning have failed to... | Continue reading


@arxiv.org | 6 days ago

On the Nature of Discrete Space-Time

In this work, the relativistic phenomena of Lorentz-Fitzgerald contractionand time dilation are derived using a modified distance formula that isappropriate for discrete space. This new distance... | Continue reading


@arxiv.org | 6 days ago

Metrics for Software Startups – A Multi-Vocal Literature Review

Metrics can be used by businesses to make more objective decisions based ondata. Software startups in particular are characterized by the uncertain oreven chaotic nature of the contexts in which... | Continue reading


@arxiv.org | 6 days ago

Have Mirror Stars Been Observed?

Observations by the MACHO collaboration suggest that a significant proportionof the galactic halo dark matter is in the form of compact objects with typicalmasses $M\sim 0.5M_{\odot}$. One of... | Continue reading


@arxiv.org | 6 days ago

Transparent Metasurfaces Counteracting Fogging by Harnessing Sunlight

Surface fogging is a common phenomenon that can have significant anddetrimental effects on surface transparency and visibility. It affects theperformance in a wide range of applications... | Continue reading


@arxiv.org | 6 days ago

Critical Branching Processes in Memcomputing

Memcomputing is a novel computing paradigm that employs time non-locality(memory) to solve combinatorial optimization problems. It can be realized inpractice by means of non-linear dynamical... | Continue reading


@arxiv.org | 6 days ago

Configurable Memristor-Based Finite Impulse Response Filter

There are two main methods to implement FIR filters: software and hardware.In the software method, an FIR filter can be implemented within the processorby programming; it uses too much memory... | Continue reading


@arxiv.org | 6 days ago

High Performance Reconfigurable Computing Systems

The rapid progress and advancement in electronic chips technology provide avariety of new implementation options for system engineers. The choice variesbetween the flexible programs running on a... | Continue reading


@arxiv.org | 6 days ago

App-Specific VLIW Processor with Vector Instruction Set for CNN Acceleration

In recent years, neural networks have surpassed classical algorithms in areassuch as object recognition, e.g. in the well-known ImageNet challenge. As aresult, great effort is being put into... | Continue reading


@arxiv.org | 6 days ago

Privacy-Preserving, Compute and Data-Intensive Computing Using Heterogeneous Tee

There is an urgent demand for privacy-preserving techniques capable ofsupporting compute and data intensive (CDI) computing in the era of big data.However, none of existing TEEs can truly... | Continue reading


@arxiv.org | 6 days ago

FPGA Co-Design for Deep Neural Nets

While embedded FPGAs are attractive platforms for DNN acceleration onedge-devices due to their low latency and high energy efficiency, the scarcityof resources of edge-scale FPGA devices also... | Continue reading


@arxiv.org | 7 days ago

Hacking Google ReCAPTCHA v3 Using Reinforcement Learning

We present a Reinforcement Learning (RL) methodology to bypass GooglereCAPTCHA v3. We formulate the problem as a grid world where the agent learnshow to move the mouse and click on the reCAPTCHA... | Continue reading


@arxiv.org | 7 days ago

The Android Platform Security Model [pdf]

Android is the most widely deployed end-user focused operating system. Withits growing set of use cases encompassing communication, navigation, mediaconsumption, entertainment, finance, health,... | Continue reading


@arxiv.org | 8 days ago

StegaStamp- Hiding Hyperlinks in Physical Photographs

Imagine a world in which each photo, printed or digitally displayed, hidesarbitrary digital data that can be accessed through an internet-connectedimaging system. Another way to think about this... | Continue reading


@arxiv.org | 8 days ago

Locality of not-so-weak coloring

Many graph problems are locally checkable: a solution is globally feasible ifit looks valid in all constant-radius neighborhoods. This idea is formalized inthe concept of locally checkable... | Continue reading


@arxiv.org | 9 days ago

Two Body Problem: Collaborative Visual Task Completion

Collaboration is a necessary skill to perform tasks that are beyond oneagent's capabilities. Addressed extensively in both conventional and modern AI,multi-agent collaboration has often been... | Continue reading


@arxiv.org | 9 days ago

Non-Locally Encoder-Decoder Convolutional Network for Whole Brain QSM Inversion

Quantitative Susceptibility Mapping (QSM) reconstruction is a challenginginverse problem driven by ill conditioning of its field-to -susceptibilitytransformation. State-of-art QSM reconstruction... | Continue reading


@arxiv.org | 9 days ago

Anomaly Detection Using Rule Extraction for Efficient Intrusion Detection

Huge datasets in cyber security, such as network traffic logs, can beanalyzed using machine learning and data mining methods. However, the amount ofcollected data is increasing, which makes... | Continue reading


@arxiv.org | 9 days ago

Schwarzschild's original paper about black hole solution (1916)

Translation by S. Antoci and A. Loinger of the fundamental memoir, thatcontains the ORIGINAL form of the solution of Schwarzschild's problem. Thesolution is regular in the whole space-time, with... | Continue reading


@arxiv.org | 9 days ago

The Gemini Planet Imager Exoplanet Survey

We present a statistical analysis of the first 300 stars observed by theGemini Planet Imager Exoplanet Survey (GPIES). This subsample includes sixdetected planets and three brown dwarfs; from... | Continue reading


@arxiv.org | 9 days ago

A Selective Overview of Deep Learning

Deep learning has arguably achieved tremendous success in recent years. Insimple words, deep learning uses the composition of many nonlinear functions tomodel the complex dependency between... | Continue reading


@arxiv.org | 9 days ago

Tea: High-Level Language and Runtime System for Automating Statistical Analysis

Though statistical analyses are centered on research questions andhypotheses, current statistical analysis tools are not. Users must firsttranslate their hypotheses into specific statistical... | Continue reading


@arxiv.org | 9 days ago

Community detection over a heterogeneous population of non-aligned networks

Clustering and community detection with multiple graphs have typicallyfocused on aligned graphs, where there is a mapping between nodes across thegraphs (e.g., multi-view, multi-layer, temporal... | Continue reading


@arxiv.org | 9 days ago

Neural Networks for Modeling Source Code Edits [pdf] – Google Brain

Programming languages are emerging as a challenging and interesting domainfor machine learning. A core task, which has received significant attention inrecent years, is building generative... | Continue reading


@arxiv.org | 10 days ago

Environmental Changes and the Dynamics of Musical Identity

Musical tastes reflect our unique values and experiences, our relationshipswith others, and the places where we live. But as each of these things changes,do our tastes also change to reflect the... | Continue reading


@arxiv.org | 10 days ago

Fundamental Limits of Covert Packet Insertion

Covert communication conceals the existence of the transmission from awatchful adversary. We consider the fundamental limits for covertcommunications via packet insertion over packet channels... | Continue reading


@arxiv.org | 10 days ago

An Illustrated History of Black Hole Imaging: Personal Recollections (1972-2002)

The Event Horizon Telescope Consortium is on the verge to provide the firsttelescopic image of massive black holes SgrA* and M87* surrounded by accretiondisks, at a resolution scale comparable... | Continue reading


@arxiv.org | 10 days ago

Deep Painterly Harmonization

Copying an element from a photo and pasting it into a painting is achallenging task. Applying photo compositing techniques in this context yieldssubpar results that look like a collage --- and... | Continue reading


@arxiv.org | 11 days ago

Playing Text-Adventure Games with Graph-Based Deep Reinforcement Learning

Text-based adventure games provide a platform on which to explorereinforcement learning in the context of a combinatorial action space, such asnatural language. We present a deep reinforcement... | Continue reading


@arxiv.org | 11 days ago

Verification Logics for Quantum Programs

We survey the landscape of Hoare logics for quantum programs. We review threepapers: "Reasoning about imperative quantum programs" by Chadha, Mateus andSernadas; "A logic for formal verification... | Continue reading


@arxiv.org | 11 days ago

Nucleus Neural Network for Super Robust Learning

Artificial neural networks which model the neurons and connectingarchitectures in brain have achieved great successes in many problems,especially those with deep layers. In this paper, we... | Continue reading


@arxiv.org | 12 days ago