Causality Is Graphically Simple

Events in distributed systems include sending or receiving messages, orchanging some state in a node. Not all events are related, but some events cancause and influence how other, later events,... | Continue reading


@arxiv.org | 3 years ago

Voltage Attacks Against Deep Learning Accelerators on Multi-Tenant FPGAs

Field-programmable gate arrays (FPGAs) are becoming widely used acceleratorsfor a myriad of datacenter applications due to their flexibility and energyefficiency. Among these applications, FPGAs... | Continue reading


@arxiv.org | 3 years ago

Real-Time High-Resolution Background Matting

We introduce a real-time, high-resolution background replacement techniquewhich operates at 30fps in 4K resolution, and 60fps for HD on a modern GPU. Ourtechnique is based on background matting,... | Continue reading


@arxiv.org | 3 years ago

Packet2Vec: Utilizing Word2Vec for Feature Extraction in Packet Data

One of deep learning's attractive benefits is the ability to automaticallyextract relevant features for a target problem from largely raw data, insteadof utilizing human engineered and error... | Continue reading


@arxiv.org | 3 years ago

REST vs. GraphQL: A Controlled Experiment

GraphQL is a novel query language for implementing service-based softwarearchitectures. The language is gaining momentum and it is now used by majorsoftware companies, such as Facebook and... | Continue reading


@arxiv.org | 3 years ago

Air-FI: Generating Covert Wi-Fi Signals from Air-Gapped Computers

In this paper, we show that attackers can exfiltrate data from air-gappedcomputers via Wi-Fi signals. Malware in a compromised air-gapped computer cangenerate signals in the Wi-Fi frequency... | Continue reading


@arxiv.org | 3 years ago

Extracting Training Data from Large Language Models

It has become common to publish large (billion parameter) language modelsthat have been trained on private datasets. This paper demonstrates that insuch settings, an adversary can perform a... | Continue reading


@arxiv.org | 3 years ago

Machine Learning and Data Analytics for Design of High-Entropy Materials

This chapter presents an innovative framework for the application of machinelearning and data analytics for the identification of alloys or compositesexhibiting certain desired properties of... | Continue reading


@arxiv.org | 3 years ago

Designing AI Learning Experiences for K-12

Artificial intelligence (AI) literacy is a rapidly growing research area anda critical addition to K-12 education. However, support for designing tools andcurriculum to teach K-12 AI literacy is... | Continue reading


@arxiv.org | 3 years ago

Emergent Quantumness in Neural Networks

It was recently shown that the Madelung equations, that is, a hydrodynamicform of the Schrödinger equation, can be derived from a canonical ensemble ofneural networks where the quantum phase... | Continue reading


@arxiv.org | 3 years ago

Utilising Graph Machine Learning Within Drug Discovery and Development

Graph Machine Learning (GML) is receiving growing interest within thepharmaceutical and biotechnology industries for its ability to modelbiomolecular structures, the functional relationships... | Continue reading


@arxiv.org | 3 years ago

Imitating Interactive Intelligence

A common vision from science fiction is that robots will one day inhabit ourphysical spaces, sense the world as we do, assist our physical labours, andcommunicate with us through natural... | Continue reading


@arxiv.org | 3 years ago

Pay-with-a-Selfie, a human-centred digital payment system (2017)

Mobile payment systems are increasingly used to simplify the way in whichmoney transfers and transactions can be performed. We argue that, to achievetheir full potential as economic boosters in... | Continue reading


@arxiv.org | 3 years ago

Compressed Overlap Index

For analysing text algorithms, for computing superstrings, or for testingrandom number generators, one needs to compute all overlaps between any pairsof words in a given set. The positions of... | Continue reading


@arxiv.org | 3 years ago

A Modern Primer on Processing in Memory

Modern computing systems are overwhelmingly designed to move data tocomputation. This design choice goes directly against at least three key trendsin computing that cause performance,... | Continue reading


@arxiv.org | 3 years ago

Self-supervised learning through the eyes of a child

Within months of birth, children develop meaningful expectations about theworld around them. How much of this early knowledge can be explained throughgeneric learning mechanisms applied to... | Continue reading


@arxiv.org | 3 years ago

A bounded-noise mechanism for differential privacy

Answering multiple counting queries is one of the best-studied problems indifferential privacy. Its goal is to output an approximation of the average$\frac{1}{n}\sum_{i=1}^n \vec{x}^{(i)}$ of... | Continue reading


@arxiv.org | 3 years ago

On the Design of Text Editors

Text editors are written by and for developers. They come with a large set ofdefault and implicit choices in terms of layout, typography, colorization andinteraction that hardly change from one... | Continue reading


@arxiv.org | 3 years ago

The De-democratization of AI [pdf]

Continue reading


@arxiv.org | 3 years ago

CPM: A Large-Scale Generative Chinese Pre-Trained Language Model

Pre-trained Language Models (PLMs) have proven to be beneficial for variousdownstream NLP tasks. Recently, GPT-3, with 175 billion parameters and 570GBtraining data, drew a lot of attention due... | Continue reading


@arxiv.org | 3 years ago

Mathematical Game Theory

These lecture notes attempt a mathematical treatment of game theory akin tomathematical physics. A game instance is defined as a sequence of states of anunderlying system. This viewpoint unifies... | Continue reading


@arxiv.org | 3 years ago

Neural Teleportation

In this paper, we explore a process called neural teleportation, amathematical consequence of applying quiver representation theory to neuralnetworks. Neural teleportation "teleports" a network... | Continue reading


@arxiv.org | 3 years ago

72% of smart TVs and 46% of game consoles hardcode DNS settings

As the smart home IoT ecosystem flourishes, it is imperative to gain a betterunderstanding of the unique challenges it poses in terms of management,security, and privacy. Prior studies are... | Continue reading


@arxiv.org | 3 years ago

The Significance Filter, the Winner's Curse and the Need to Shrink

The "significance filter" refers to focusing exclusively on statisticallysignificant results. Since frequentist properties such as unbiasedness andcoverage are valid only before the data have... | Continue reading


@arxiv.org | 3 years ago

Avoiding Side Effects by Considering Future Tasks

Designing reward functions is difficult: the designer has to specify what todo (what it means to complete the task) as well as what not to do (side effectsthat should be avoided while completing... | Continue reading


@arxiv.org | 3 years ago

AI ethics: race and gender – Timnit Gebru (2019)

From massive face-recognition-based surveillance and machine-learning-baseddecision systems predicting crime recidivism rates, to the move towardsautomated health diagnostic systems, artificial... | Continue reading


@arxiv.org | 3 years ago

Every natural number is the sum of (at most) forty-nine palindromes

It is shown that the set of decimal palindromes is an additive basis for thenatural numbers. Specifically, we prove that every natural number can beexpressed as the sum of forty-nine (possibly... | Continue reading


@arxiv.org | 3 years ago

Every Model Learned by Gradient Descent Is Approximately a Kernel Machine

Deep learning's successes are often attributed to its ability toautomatically discover new representations of the data, rather than relying onhandcrafted features like other learning methods. We... | Continue reading


@arxiv.org | 3 years ago

Who Is Debugging the Debuggers? Exposing Debug Info. Bugs in Optimized Binaries

Despite the advancements in software testing, bugs still plague deployedsoftware and result in crashes in production. When debugging issues --sometimes caused by "heisenbugs" -- there is the... | Continue reading


@arxiv.org | 3 years ago

DNS spoofing has more than doubled in less than seven years

DNS is important in nearly all interactions on the Internet. All large DNSoperators use IP anycast, announcing servers in BGP from multiple physicallocations to reduce client latency and provide... | Continue reading


@arxiv.org | 3 years ago

Measuring and Preventing Supply Chain Attacks on Package Managers

Package managers have become a vital part of the modern software developmentprocess. They allow developers to reuse third-party code, share their own code,minimize their codebase, and simplify... | Continue reading


@arxiv.org | 3 years ago

Centrifugal melt spinning for manufacture of N95 filtering facepiece respirators

The COVID-19 pandemic has caused a global shortage of personal protectiveequipment. While existing supply chains are struggling to meet the surge indemand, the limited supply of N95 filtering... | Continue reading


@arxiv.org | 3 years ago

Coding Guidelines for Prolog (2009)

Coding standards and good practices are fundamental to a disciplined approachto software projects, whatever programming languages they employ. Prologprogramming can benefit from such an... | Continue reading


@arxiv.org | 3 years ago

Equivariant Neural Rendering

We propose a framework for learning neural scene representations directlyfrom images, without 3D supervision. Our key insight is that 3D structure canbe imposed by ensuring that the learned... | Continue reading


@arxiv.org | 3 years ago

The Relevance of Classic Fuzz Testing: Have We Solved This One?

As fuzz testing has passed its 30th anniversary, and in the face of theincredible progress in fuzz testing techniques and tools, the question arisesif the classic, basic fuzz technique is still... | Continue reading


@arxiv.org | 3 years ago

Indirection Stream Semantic Reg. Arch. for Efficient Sparse-Dense Linear Algebra

Sparse-dense linear algebra is crucial in many domains, but challenging tohandle efficiently on CPUs, GPUs, and accelerators alike; multiplications withsparse formats like CSR and CSF require... | Continue reading


@arxiv.org | 3 years ago

An Introduction to Geometric Algebra

This is an introduction to geometric algebra, an alternative to traditionalvector algebra that expands on it in two ways: 1. In addition to scalars and vectors, it defines new objects... | Continue reading


@arxiv.org | 3 years ago

Piuma: Programmable Integrated Unified Memory Architecture

High performance large scale graph analytics is essential to timely analyzerelationships in big data sets. Conventional processor architectures sufferfrom inefficient resource usage and bad... | Continue reading


@arxiv.org | 3 years ago

A Modern Compiler for the French Tax Code

In France, income tax is computed from taxpayers' individual returns, usingan algorithm that is authored, designed and maintained by the French PublicFinances Directorate (DGFiP). This algorithm... | Continue reading


@arxiv.org | 3 years ago

First Observational Tests of Eternal Inflation

The eternal inflation scenario predicts that our observable universe residesinside a single bubble embedded in a vast inflating multiverse. We present thefirst observational tests of eternal... | Continue reading


@arxiv.org | 3 years ago

GuessTheMusic: Song Identification from EEG Response

The music signal comprises of different features like rhythm, timbre, melody,harmony. Its impact on the human brain has been an exciting research topic forthe past several decades.... | Continue reading


@arxiv.org | 3 years ago

A Theoretical Computer Science Perspective on Consciousness [pdf]

Continue reading


@arxiv.org | 3 years ago

Invariant Variation Problems Emmy Noether, M. A. Tavel[Trans]

The problems in variation here concerned are such as to admit a continuousgroup (in Lie's sense); the conclusions that emerge from the correspondingdifferential equations find their most general... | Continue reading


@arxiv.org | 3 years ago

Game Plan: What AI Can Do for Football, and What Football Can Do for AI

The rapid progress in artificial intelligence (AI) and machine learning hasopened unprecedented analytics possibilities in various team and individualsports, including baseball, basketball, and... | Continue reading


@arxiv.org | 3 years ago

A Novel Framework for Explaining Machine Learning Using Shapley Values

A number of techniques have been proposed to explain a machine learningmodel's prediction by attributing it to the corresponding input features.Popular among these are techniques that apply the... | Continue reading


@arxiv.org | 3 years ago

Redistricting Algorithms

Why not have a computer just draw a map? This is something you hear a lotwhen people talk about gerrymandering, and it's easy to think at first thatthis could solve redistricting altogether. But... | Continue reading


@arxiv.org | 3 years ago

A Stochastic Derivation of Classical and Quantum Mechanics

We derive the classical Hamilton-Jacobi equation from first principles as thenatural description for smooth stochastic processes when one neglectsstochastic velocity fluctuations. The... | Continue reading


@arxiv.org | 3 years ago

Survey of System Architectures and Techniques for FPGA Virtualization

FPGA accelerators are gaining increasing attention in both cloud and edgecomputing because of their hardware flexibility, high computational throughput,and low power consumption. However, the... | Continue reading


@arxiv.org | 3 years ago