This report surveys the landscape of potential security threats frommalicious uses of AI, and proposes ways to better forecast, prevent, andmitigate these threats. After analyzing the ways in... | Continue reading
We explore the different meanings of "quantum uncertainty" contained inHeisenberg's seminal paper from 1927, and also some of the precise definitionsthat were explored later. We recount the... | Continue reading
Terahertz communication is emerging as a future technology to supportTerabits per second link (Tbps) with highlighting features as high throughputand negligible latency. However, the unique... | Continue reading
In this work, we examine to what extent the Internet's routing infrastructureneedlessly exposes network traffic to nations geographically irrelevant topacket transmission. We quantify what... | Continue reading
A "hero" project is one where 80% or more of the contributions are made bythe 20% of the developers. In the literature, such projects are deprecatedsince they might cause bottlenecks in... | Continue reading
Multiple web-scale Knowledge Bases, e.g., Freebase, YAGO, NELL, have beenconstructed using semi-supervised or unsupervised information extractiontechniques and many of them, despite their large... | Continue reading
We present a quasi-experiment to investigate whether, and to what extent,sleep deprivation impacts the performance of novice software developers usingthe agile practice of test-first development... | Continue reading
Reproducing, comparing and reusing results from machine learning and systemspapers is a very tedious, ad hoc and time-consuming process. I will demonstratehow to automate this process using... | Continue reading
Many recent news headlines have labeled face recognition technology as biasedor racist. We report on a methodical investigation into differences in facerecognition accuracy between... | Continue reading
We present a deep learning method for singing voice conversion. The proposednetwork is not conditioned on the text or on the notes, and it directlyconverts the audio of one singer to the voice... | Continue reading
The key idea behind the unsupervised learning of disentangled representationsis that real-world data is generated by a few explanatory factors of variationwhich can be recovered by unsupervised... | Continue reading
The recently introduced General Data Protection Regulation (GDPR) is forcingseveral companies to make significant changes to their systems to achievecompliance. Motivated by the finding that... | Continue reading
Memory is increasingly often the bottleneck when training neural networkmodels. Despite this, techniques to lower the overall memory requirements oftraining have been less widely studied... | Continue reading
The vector representations of fixed dimensionality for words (in text)offered by Word2Vec have been shown to be very useful in many applicationscenarios, in particular due to the semantic... | Continue reading
Over the last decades, a class of important mathematical results haverequired an ever increasing amount of human effort to carry out. For some, thehelp of computers is now indispensable. We... | Continue reading
Deep reinforcement learning is the combination of reinforcement learning (RL)and deep learning. This field of research has been able to solve a wide rangeof complex decision-making tasks that... | Continue reading
As the field of Quantum Computing continues to grow, so too has the generalpublic's interest in testing some of the publicly available quantum computers.However, many might find learning all of... | Continue reading
Brette contends that the neural coding metaphor is an invalid basis fortheories of what the brain does. Here, we argue that it is an insufficientguide for building an artificial intelligence... | Continue reading
Vincent van Gogh's painting, The Starry Night, is an iconic piece of art andcultural history. The painting portrays a night sky full of stars, with eddies(spirals) both large and small.... | Continue reading
This article applies the conceptual framework of constructor theory ofinformation to cognition theory. The main result of this work is that cognitiontheory, in specific situations concerning for... | Continue reading
The selection of topics in this text has formed the core of a one semestercourse in applied mathematics at the Arctic University of Norway that has beenrunning continuously since the 1970s. The... | Continue reading
$\textit{Magic: The Gathering}$ is a popular and famously complicated tradingcard game about magical combat. In this paper we show that optimal play inreal-world $\textit{Magic}$ is at least as... | Continue reading
This retrospective paper describes the RowHammer problem in Dynamic RandomAccess Memory (DRAM), which was initially introduced by Kim et al. at the ISCA2014 conference~\cite{rowhammer-isca2014}.... | Continue reading
In recent years, the notion of local robustness (or robustness for short) hasemerged as a desirable property of deep neural networks. Intuitively,robustness means that small perturbations to an... | Continue reading
Road traffic injuries are a leading cause of death worldwide. Properestimation of car accident risk is critical for appropriate allocation ofresources in healthcare, insurance, civil... | Continue reading
Side-channel attacks such as Spectre that utilize speculative execution tosteal application secrets pose a significant threat to modern computingsystems. While program transformations can... | Continue reading
Swarm robotics systems are envisioned to become an important component ofboth academic research and real-world applications. However, in order to reachwidespread adoption, new models that ensure... | Continue reading
The C++ programming language is not only a keystone of thehigh-performance-computing ecosystem but has proven to be a successful base forportable parallel-programming frameworks. As is well... | Continue reading
There is a compelling intellectual case for exploring whether purely unitaryquantum theory defines a sensible and scientifically adequate theory, asEverett originally proposed. Many different... | Continue reading
A proposal for building an index of the Web that separates the infrastructurepart of the search engine - the index - from the services part that will formthe basis for myriad search engines and... | Continue reading
Adversarial attacks on machine learning models have seen increasing interestin the past years. By making only subtle changes to the input of aconvolutional neural network, the output of the... | Continue reading
In differential privacy (DP), we want to query a database about n users, in away that "leaks at most eps about any individual user," even conditioned on anyoutcome of the query. Meanwhile, in... | Continue reading
Deep learning has demonstrated tremendous success in variety of applicationdomains in the past few years. This new field of machine learning has beengrowing rapidly and applied in most of the... | Continue reading
In June 2016, Apple announced that it will deploy differential privacy forsome user data collection in order to ensure privacy of user data, even fromApple. The details of Apple's approach... | Continue reading
Multi-armed bandits a simple but very powerful framework for algorithms thatmake decisions over time under uncertainty. An enormous body of work hasaccumulated over the years, covered in several... | Continue reading
Online tools provide unique access to research students' study habits andproblem-solving behavior. In MOOCs, this online data can be used to informinstructors and to provide automatic guidance... | Continue reading
Verbal probability phrases are often used to express estimated risk. In thisstudy, focus was on the numerical interpretation of 29 Dutch probability andfrequency phrases, including several... | Continue reading
Precise starlight positions near the sun were measured during the 21 August2017 total solar eclipse in order to measure their gravitational deflections.The equipment, procedures, and analysis... | Continue reading
For the purpose of developing applications for Post-K at an early stage,RIKEN has developed a post-K processor simulator. This simulator is based onthe general-purpose processor simulator gem5.... | Continue reading
As a sub-domain of text-to-image synthesis, text-to-face generation has hugepotentials in public safety domain. With lack of dataset, there are almost norelated research focusing on text-to-face... | Continue reading
Register Files (RFs) are the most frequently accessed memories in amicroprocessor for fast and efficient computation and control logic. Segmentregisters and control registers are especially... | Continue reading
Can neural networks learn to solve partial differential equations (PDEs)? Weinvestigate this question for two (systems of) PDEs, namely, the Poissonequation and the steady Navier--Stokes... | Continue reading
I present a new approach to teaching a graduate-level programming languagescourse focused on using systems programming ideas and languages likeWebAssembly and Rust to motivate PL theory. Drawing... | Continue reading