The remarkable optical properties of the solar gravitational lens (SGL)include major brightness amplification (~1e11 at wavelength of 1 um) andextreme angular resolution (~1e-10 arcsec) in a... | Continue reading
The last decade has witnessed an experimental revolution in data science andmachine learning, epitomised by deep learning methods. Indeed, manyhigh-dimensional learning tasks previously thought... | Continue reading
Machine learning has been increasingly used as a first line of defense forWindows malware detection. Recent work has however shown that learning-basedmalware detectors can be evaded by... | Continue reading
Joint attention - the ability to purposefully coordinate attention withanother agent, and mutually attend to the same thing -- is a critical componentof human social cognition. In this paper, we... | Continue reading
Current approaches to video analysis of human motion focus on raw pixels orkeypoints as the basic units of reasoning. We posit that adding higher-levelmotion primitives, which can capture... | Continue reading
Since its beginning in the 1950s, the field of artificial intelligence hascycled several times between periods of optimistic predictions and massiveinvestment ("AI spring") and periods of... | Continue reading
The Deep Underground Neutrino Experiment (DUNE) will be a powerful tool for avariety of physics topics. The high-intensity proton beams provide a largeneutrino flux, sampled by a near detector... | Continue reading
Unikernels are famous for providing excellent performance in terms of boottimes, throughput and memory consumption, to name a few metrics. However, theyare infamous for making it hard and... | Continue reading
This paper proposes a novel nature-inspired meta-heuristic algorithm calledthe Golden Tortoise Beetle Optimizer (GTBO) to solve optimization problems. Itmimics golden tortoise beetle's behavior... | Continue reading
An alternative to independent pairwise distance estimation is proposed thatuses hyperbolic geometry to jointly estimate pairwise distances subject to aweakening of the four point condition that... | Continue reading
The need for formal definition of the very basis of mathematics arose in thelast century. The scale and complexity of mathematics, along with discoveredparadoxes, revealed the danger of... | Continue reading
The quest to understand consciousness, once the purview of philosophers andtheologians, is now actively pursued by scientists of many stripes. This paperstudies consciousness from the... | Continue reading
Millions of repetitive code snippets are submitted to code repositories everyday. To search from these large codebases using simple natural language querieswould allow programmers to ideate,... | Continue reading
Password managers help users more effectively manage their passwords,encouraging them to adopt stronger passwords across their many accounts. Incontrast to desktop systems where password... | Continue reading
The computation demand for machine learning (ML) has grown rapidly recently,which comes with a number of costs. Estimating the energy cost helps measureits environmental impact and finding... | Continue reading
In this work, we explore "prompt tuning", a simple yet effective mechanismfor learning "soft prompts" to condition frozen language models to performspecific downstream tasks. Unlike the discrete... | Continue reading
During the COVID-19 pandemic, policy makers at the Greater London Authority,the regional governance body of London, UK, are reliant upon prompt andaccurate data sources. Large well-defined... | Continue reading
We present a new generic method for shadow-aware multi-view satellitephotogrammetry of Earth Observation scenes. Our proposed method, the ShadowNeural Radiance Field (S-NeRF) follows recent... | Continue reading
In the paper "On P versus NP," Lev Gordeev attempts to extend the method ofapproximation, which successfully proved exponential lower bounds for monotonecircuits, to the case of De Morgan Normal... | Continue reading
Traditional goal-oriented dialogue systems rely on various components such asnatural language understanding, dialogue state tracking, policy learning andresponse generation. Training each... | Continue reading
The prevalence of memory corruption bugs in the past decades resulted innumerous defenses, such as stack canaries, control flow integrity (CFI), andmemory safe languages. These defenses can... | Continue reading
We tackle the challenge of learning a distribution over complex, realistic,indoor scenes. In this paper, we introduce Generative Scene Networks (GSN),which learns to decompose scenes into a... | Continue reading
Uber's business is highly real-time in nature. PBs of data is continuouslybeing collected from the end users such as Uber drivers, riders, restaurants,eaters and so on everyday. There is a lot... | Continue reading
Detecting and fixing bugs are two of the most important yet frustrating partsof the software development cycle. Existing bug detection tools are basedmainly on static analyzers, which rely on... | Continue reading
The names of variables and functions serve as implicit documentation and areinstrumental for program comprehension. But choosing good meaningful names ishard. We perform a sequence of... | Continue reading
Can linear systems be solved faster than matrix multiplication? While therehas been remarkable progress for the special cases of graph structured linearsystems, in the general setting, the bit... | Continue reading
The Boltzmann Machine (BM) is a neural network composed of stochasticallyfiring neurons that can learn complex probability distributions by adapting thesynaptic interactions between the neurons.... | Continue reading
The modern search for extraterrestrial intelligence (SETI) began with theseminal publications of Cocconi & Morrison (1959) and Schwartz & Townes (1961),who proposed to search for narrow-band... | Continue reading
Advances in experimental neuroscience have transformed our ability to explorethe structure and function of neural circuits. At the same time, advances inmachine learning have unleashed the... | Continue reading
A possible explanation for the impressive performance of masked languagemodel (MLM) pre-training is that such models have learned to represent thesyntactic structures prevalent in classical NLP... | Continue reading
Code review is a key development practice that contributes to improvesoftware quality and to foster knowledge sharing among developers. However,code review usually takes time and demands... | Continue reading
DNS has always been criticized for its inherent design flaws, making thesystem vulnerable to kinds of attacks. Besides, DNS domain names are not fullycontrolled by the users, which can be easily... | Continue reading
To raise the superconducting-transition temperature (Tc) has been the drivingforce for the long, sustained effort in superconductivity research. Recentprogress in hydrides with Tcs up to 287 K... | Continue reading
We review state-of-the-art formal methods applied to the emerging field ofthe verification of machine learning systems. Formal methods can providerigorous correctness guarantees on hardware and... | Continue reading
Superluminal tunneling of light through a barrier has attracted broadinterest in the last several decades. Despite the observation of such phenomenain various systems, it has been under... | Continue reading
We discuss why AI is hard and why physics is simple. We discuss how physicalintuition and the approach of theoretical physics can be brought to bear on thefield of artificial intelligence and... | Continue reading
Observing that the creation of certain types of artistic artifactsnecessitate intelligence, we present the Lovelace 2.0 Test of creativity as analternative to the Turing Test as a means of... | Continue reading
In recent years, a number of prominent computer scientists, along withacademics in fields such as philosophy and physics, have lent credence to thenotion that machines may one day become as... | Continue reading
A small group of postdocs, graduate students, and undergraduatesinadvertently formed a longitudinal study contrasting expected productivitylevels with actual productivity levels. Over the last... | Continue reading
Modern implementations of homomorphic encryption (HE) rely heavily onpolynomial arithmetic over a finite field. This is particularly true of theCKKS, BFV, and BGV HE schemes. Two of the biggest... | Continue reading
A fundamental relation in celestial mechanics is Kepler's equation, linkingan orbit's mean anomaly to its eccentric anomaly and eccentricity. Beingtranscendental, the equation cannot be directly... | Continue reading
Wi-Fi is among the most successful wireless technologies ever invented. AsWi-Fi becomes more and more present in public and private spaces, it becomesnatural to leverage its ubiquitousness to... | Continue reading
We offer an embedding of CPython that runs entirely in memory without"touching" the disk. This in-memory embedding can load Python scripts directlyfrom memory instead these scripts having to be... | Continue reading
The widespread adoption of Free/Libre and Open Source Software (FLOSS) meansthat the ongoing maintenance of many widely used software components relies onthe collaborative effort of volunteers... | Continue reading
In recent years, neural networks showed unprecedented growth that ultimatelyinfluenced dozens of different industries, including signal processing for theelectroencephalography (EEG) process.... | Continue reading
We give a modern computational introduction to the S,K combinators inventedby Moses Schönfinkel in 1920, and present a variety of new results and ideasabout combinators. We explore the... | Continue reading
The overhead of the kernel storage path accounts for half of the accesslatency for new NVMe storage devices. We explore using BPF to reduce thisoverhead, by injecting user-defined functions deep... | Continue reading
Quantum mechanics is not about 'quantum states': it is about values ofphysical variables. I give a short fresh presentation and update on the$relational$ perspective on the theory, and a comment... | Continue reading