FPGA-Based Accelerators of Deep Learning Networks: A Review

Due to recent advances in digital technologies, and availability of credibledata, an area of artificial intelligence, deep learning, has emerged, and hasdemonstrated its ability and... | Continue reading


@arxiv.org | 5 years ago

Deep Learning on Graphs: A Survey (2018)

Deep learning has been shown successful in a number of domains, ranging fromacoustics, images to natural language processing. However, applying deeplearning to the ubiquitous graph data is... | Continue reading


@arxiv.org | 5 years ago

Elimination of All Bad Local Minima in Deep Learning

In this paper, we theoretically prove that we can eliminate all suboptimallocal minima by adding one neuron per output unit to any deep neural network,for multi-class classification, binary... | Continue reading


@arxiv.org | 5 years ago

Design, Development and Realization of a Quadrupedal Research Platform: Stoch

In this paper, we present a complete description of the hardware design andcontrol architecture of our custom built quadruped robot, called the Stoch. Ourgoal is to realize a robust, modular,... | Continue reading


@arxiv.org | 5 years ago

Graph Neural Networks: A Review of Methods and Applications (2018-2019)

Lots of learning tasks require dealing with graph data which contains richrelation information among elements. Modeling physics system, learningmolecular fingerprints, predicting protein... | Continue reading


@arxiv.org | 5 years ago

Satellite-to-ground quantum key distribution

Quantum key distribution (QKD) uses individual light quanta in quantumsuperposition states to guarantee unconditional communication security betweendistant parties. In practice, the achievable... | Continue reading


@arxiv.org | 5 years ago

Face Recognition: A Survey (2019)

In a world where security issues have been gaining growing importance, facerecognition systems have attracted increasing attention in multiple applicationareas, ranging from forensics and... | Continue reading


@arxiv.org | 5 years ago

Page Cache Attacks

We present a new hardware-agnostic side-channel attack that targets one ofthe most fundamental software caches in modern computer systems: the operatingsystem page cache. The page cache is a... | Continue reading


@arxiv.org | 5 years ago

A Comprehensive Survey on Graph Neural Networks (2019)

Deep learning has revolutionized many machine learning tasks in recent years,ranging from image classification and video processing to speech recognitionand natural language understanding. The... | Continue reading


@arxiv.org | 5 years ago

Kymatio: Scattering Transforms in Python

The wavelet scattering transform is an invariant signal representationsuitable for many signal processing and machine learning applications. Wepresent the Kymatio software package, an... | Continue reading


@arxiv.org | 5 years ago

Deep Convolutional Neural Networks and Caricature: Identity and Image Revealed

Real-world face recognition requires an ability to perceive the uniquefeatures of an individual face across multiple, variable images. The primatevisual system solves the problem of image... | Continue reading


@arxiv.org | 5 years ago

Consequences of Unhappiness While Developing Software [pdf]

The growing literature on affect among software developers mostly reports onthe linkage between happiness, software quality, and developer productivity.Understanding the positive side of... | Continue reading


@arxiv.org | 5 years ago

The Design and Implementation of XiaoIce, an Empathetic Social Chatbot

This paper describes the development of the Microsoft XiaoIce system, themost popular social chatbot in the world. XiaoIce is uniquely designed as an AIcompanion with an emotional connection to... | Continue reading


@arxiv.org | 5 years ago

DeepTraffic: Crowdsourced Hyperparameter Tuning for Dense Traffic Navigation

We present a traffic simulation named DeepTraffic where the planning systemsfor a subset of the vehicles are handled by a neural network as part of amodel-free, off-policy reinforcement learning... | Continue reading


@arxiv.org | 5 years ago

Adversarial WiFi Sensing Using a Single Smartphone

Wireless devices are everywhere, at home, at the office, and on the street.Devices are bombarding us with transmissions across a wide range of RFfrequencies. Many of these invisible... | Continue reading


@arxiv.org | 5 years ago

Learning to Navigate the Web

Learning in environments with large state and action spaces, and sparserewards, can hinder a Reinforcement Learning (RL) agent's learning throughtrial-and-error. For instance, following natural... | Continue reading


@arxiv.org | 5 years ago

The Erdos Paradox

Remarks on the life and work of Paul Erdos. | Continue reading


@arxiv.org | 5 years ago

Dynamic Planning Networks

We introduce Dynamic Planning Networks (DPN), a novel architecture for deepreinforcement learning, that combines model-based and model-free aspects foronline planning. Our architecture learns to... | Continue reading


@arxiv.org | 5 years ago

A Circuit-Level Amoeba-Inspired SAT Solver

AmbSAT is a biologically-inspired stochastic local search (SLS) solver toexplore solutions to the Boolean satisfiability problem (SAT). AmbSAT updatesmultiple variables in parallel at every... | Continue reading


@arxiv.org | 5 years ago

CycleGAN, a Master of Steganography [2017]

CycleGAN (Zhu et al. 2017) is one recent successful approach to learn atransformation between two image distributions. In a series of experiments, wedemonstrate an intriguing property of the... | Continue reading


@arxiv.org | 5 years ago

Donations to arXiv

Continue reading


@arxiv.org | 5 years ago

[Research] Meta Learning for Few-Shot Keyword Spotting

Keyword spotting with limited training data is a challenging task which canbe treated as a few-shot learning problem. In this paper, we present ameta-learning approach which learns a good... | Continue reading


@arxiv.org | 5 years ago

Operational Calculus for Differentiable Programming

In this work we present a theoretical model for differentiable programming.We present an algebraic language that enables both implementations and analysisof differentiable programs by way of... | Continue reading


@arxiv.org | 5 years ago

Wikibook-Bot – Automatic Generation of a Wikipedia Book

A Wikipedia book (known as Wikibook) is a collection of Wikipedia articles ona particular theme that is organized as a book. We propose Wikibook-Bot, amachine-learning based technique for... | Continue reading


@arxiv.org | 5 years ago

Adversarial Video Compression Guided by Soft Edge Detection

We propose a video compression framework using conditional GenerativeAdversarial Networks (GANs). We rely on two encoders: one that deploys astandard video codec and another which generates... | Continue reading


@arxiv.org | 5 years ago

Goal-based Course Recommendation [pdf]

With cross-disciplinary academic interests increasing and academic advisingresources over capacity, the importance of exploring data-assisted methods tosupport student decision making has never... | Continue reading


@arxiv.org | 5 years ago

Massively Multilingual Sentence Embeddings for Zero-Shot Cross-Lingual Transfer

We introduce an architecture to learn joint multilingual sentencerepresentations for 93 languages, belonging to more than 30 different languagefamilies and written in 28 different scripts. Our... | Continue reading


@arxiv.org | 5 years ago

Can VAEs Generate Novel Examples?

An implicit goal in works on deep generative models is that such modelsshould be able to generate novel examples that were not previously seen in thetraining data. In this paper, we investigate... | Continue reading


@arxiv.org | 5 years ago

An Intuitively Complete Analysis of Godel's Incompleteness [pdf]

A detailed and rigorous analysis of Godel's proof of his first incompletenesstheorem is presented. The purpose of this analysis is two-fold. The first is toreveal what Godel actually proved to... | Continue reading


@arxiv.org | 5 years ago

Elites Tweet? Characterizing the Twitter Verified User Network

Social network and publishing platforms, such as Twitter, support the conceptof verification. Verified accounts are deemed worthy of platform-wide publicinterest and are separately authenticated... | Continue reading


@arxiv.org | 5 years ago

When Can a Distributed Ledger Replace a Trusted Third Party?

The functionality that distributed ledger technology provides, i.e., animmutable and fraud-resistant registry with validation and verificationmechanisms, has traditionally been implemented with... | Continue reading


@arxiv.org | 5 years ago

Quantum Chemistry in the Age of Quantum Computing

Practical challenges in simulating quantum systems on classical computershave been widely recognized in the quantum physics and quantum chemistrycommunities over the past century. Although many... | Continue reading


@arxiv.org | 5 years ago

Potential Automorphy over CM fields

Let $F$ be a CM number field. We prove modularity lifting theorems forregular $n$-dimensional Galois representations over $F$ without anyself-duality condition. We deduce that all elliptic... | Continue reading


@arxiv.org | 5 years ago

Fast and accurate object detection in high resolution 4K and 8K video using GPUs

Machine learning has celebrated a lot of achievements on computer visiontasks such as object detection, but the traditionally used models work withrelatively low resolution images. The... | Continue reading


@arxiv.org | 5 years ago

Quantifying the Security of Recognition Passwords: Gestures and Signatures

Gesture and signature passwords are two-dimensional figures created bydrawing on the surface of a touchscreen with one or more fingers. Prior resultsabout their security have used resilience to... | Continue reading


@arxiv.org | 5 years ago

Quantum Chemistry in the Age of Quantum Computing

Continue reading


@arxiv.org | 5 years ago

Differentiable Genetic Programming (2016)

We introduce the use of high order automatic differentiation, implemented viathe algebra of truncated Taylor polynomials, in genetic programming. Using theCartesian Genetic Programming encoding... | Continue reading


@arxiv.org | 5 years ago

On Testing Quantum Programs

A quantum computer (QC) can solve many computational problems moreefficiently than a classic one. The field of QCs is growing: companies (such asDWave, IBM, Google, and Microsoft) are building... | Continue reading


@arxiv.org | 5 years ago

Lenia – Biology of Artificial Life

We report a new model of artificial life called Lenia (from Latin lenis"smooth"), a two-dimensional cellular automaton with continuousspace-time-state and generalized local rule. Computer... | Continue reading


@arxiv.org | 5 years ago

Introducing Neuromodulation to Deep Neural Networks to Learn Adaptive Behaviours

In this paper, we propose a new deep neural network architecture, called NMDnet, that has been specifically designed to learn adaptive behaviours. Thisarchitecture exploits a biological... | Continue reading


@arxiv.org | 5 years ago

Wikipedia2Vec: Optimized Implementation for Learning Embeddings from Wikipedia

We present Wikipedia2Vec, an open source tool for learning embeddings ofwords and entities from Wikipedia. This tool enables users to easily obtainhigh-quality embeddings of words and entities... | Continue reading


@arxiv.org | 5 years ago

[P] Training on the test set? An analysis of Spampinato et al. [31]

A recent paper [31] claims to classify brain processing evoked in subjectswatching ImageNet stimuli as measured with EEG and to use a representationderived from this processing to create a novel... | Continue reading


@arxiv.org | 5 years ago

MiniAgda: Integrating Sized and Dependent Types (2010)

Sized types are a modular and theoretically well-understood tool for checkingtermination of recursive and productivity of corecursive definitions. Theessential idea is to track structural... | Continue reading


@arxiv.org | 5 years ago

Aggregated knowledge from a small number of debates outperforms large crowds

The aggregation of many independent estimates can outperform the mostaccurate individual judgment. This centenarian finding, popularly known as thewisdom of crowds, has been applied to problems... | Continue reading


@arxiv.org | 5 years ago

Towards a Theory of Software Development Expertise

Software development includes diverse tasks such as implementing newfeatures, analyzing requirements, and fixing bugs. Being an expert in thosetasks requires a certain set of skills, knowledge,... | Continue reading


@arxiv.org | 5 years ago

Standardized Project Gutenberg Corpus for Stat Analysis of Natural Languag

The use of Project Gutenberg (PG) as a text corpus has been extremely popularin statistical analysis of language for more than 25 years. However, incontrast to other major linguistic datasets of... | Continue reading


@arxiv.org | 5 years ago

Pseudo-LiDAR from Visual Depth Estimation

3D object detection is an essential task in autonomous driving. Recenttechniques excel with highly accurate detection rates, provided the 3D inputdata is obtained from precise but expensive... | Continue reading


@arxiv.org | 5 years ago

Bayesian Optimization in AlphaGo improves self-play win-rate from 50% to 66.5%

Continue reading


@arxiv.org | 5 years ago