这是indexloc提供的服务,不要输入任何密码
Skip to main content

Showing 1–42 of 42 results for author: Anderson, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2507.02613  [pdf, ps, other

    cs.NI cs.DC eess.SP

    MULTI-SCOUT: Multistatic Integrated Sensing and Communications in 5G and Beyond for Moving Target Detection, Positioning, and Tracking

    Authors: Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sastry Kompella, Gustave Anderson, Jonathan Ashdown

    Abstract: This paper presents a complete signal-processing chain for multistatic integrated sensing and communications (ISAC) using 5G Positioning Reference Signal (PRS). We consider a distributed architecture in which one gNB transmits a periodic OFDM-PRS waveform while multiple spatially separated receivers exploit the same signal for target detection, parameter estimation and tracking. A coherent cross-a… ▽ More

    Submitted 3 July, 2025; originally announced July 2025.

  2. arXiv:2411.10342  [pdf, other

    cs.DB cs.DL

    EHRs Data Harmonization Platform, an easy-to-use shiny app based on recodeflow for harmonizing and deriving clinical features

    Authors: Arian Aminoleslami, Geoffrey M. Anderson, Davide Chicco

    Abstract: Electronic health records (EHRs) contain important longitudinal information on individuals who have received medical care. Traditionally, EHRs have been used to support a wide range of administrative activities such as billing and clinical workflow, but, given the depth and breadth of clinical and demographic data they contain, they are increasingly being used to provide real-world data for resear… ▽ More

    Submitted 15 November, 2024; originally announced November 2024.

    Comments: 15 pages, 10 figures

  3. arXiv:2407.21783  [pdf, other

    cs.AI cs.CL cs.CV

    The Llama 3 Herd of Models

    Authors: Aaron Grattafiori, Abhimanyu Dubey, Abhinav Jauhri, Abhinav Pandey, Abhishek Kadian, Ahmad Al-Dahle, Aiesha Letman, Akhil Mathur, Alan Schelten, Alex Vaughan, Amy Yang, Angela Fan, Anirudh Goyal, Anthony Hartshorn, Aobo Yang, Archi Mitra, Archie Sravankumar, Artem Korenev, Arthur Hinsvark, Arun Rao, Aston Zhang, Aurelien Rodriguez, Austen Gregerson, Ava Spataru, Baptiste Roziere , et al. (536 additional authors not shown)

    Abstract: Modern artificial intelligence (AI) systems are powered by foundation models. This paper presents a new set of foundation models, called Llama 3. It is a herd of language models that natively support multilinguality, coding, reasoning, and tool usage. Our largest model is a dense Transformer with 405B parameters and a context window of up to 128K tokens. This paper presents an extensive empirical… ▽ More

    Submitted 23 November, 2024; v1 submitted 31 July, 2024; originally announced July 2024.

  4. arXiv:2405.16763  [pdf, other

    cs.LG

    Transport of Algebraic Structure to Latent Embeddings

    Authors: Samuel Pfrommer, Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Machine learning often aims to produce latent embeddings of inputs which lie in a larger, abstract mathematical space. For example, in the field of 3D modeling, subsets of Euclidean space can be embedded as vectors using implicit neural representations. Such subsets also have a natural algebraic structure including operations (e.g., union) and corresponding laws (e.g., associativity). How can we l… ▽ More

    Submitted 26 May, 2024; originally announced May 2024.

    Comments: Proceedings of the 41st International Conference on Machine Learning (2024)

  5. arXiv:2403.06348  [pdf, other

    cs.DC cs.DS cs.PF

    Accelerating Sparse Tensor Decomposition Using Adaptive Linearized Representation

    Authors: Jan Laukemann, Ahmed E. Helal, S. Isaac Geronimo Anderson, Fabio Checconi, Yongseok Soh, Jesmin Jahan Tithi, Teresa Ranadive, Brian J Gravelle, Fabrizio Petrini, Jee Choi

    Abstract: High-dimensional sparse data emerge in many critical application domains such as healthcare and cybersecurity. To extract meaningful insights from massive volumes of these multi-dimensional data, scientists employ unsupervised analysis tools based on tensor decomposition (TD) methods. However, real-world sparse tensors exhibit highly irregular shapes and data distributions, which pose significant… ▽ More

    Submitted 14 March, 2025; v1 submitted 10 March, 2024; originally announced March 2024.

    Comments: Accepted to TPDS 2025

  6. arXiv:2312.08286  [pdf, other

    math.DS cs.GT eess.SY math.OC

    Evolutionary Games on Infinite Strategy Sets: Convergence to Nash Equilibria via Dissipativity

    Authors: Brendon G. Anderson, Jingqi Li, Somayeh Sojoudi, Murat Arcak

    Abstract: We consider evolutionary dynamics for population games in which players have a continuum of strategies at their disposal. Models in this setting amount to infinite-dimensional differential equations evolving on the manifold of probability measures. We generalize dissipativity theory for evolutionary games from finite to infinite strategy sets that are compact metric spaces, and derive sufficient c… ▽ More

    Submitted 22 April, 2025; v1 submitted 13 December, 2023; originally announced December 2023.

  7. arXiv:2311.15165  [pdf, other

    cs.LG cs.CV

    Mixing Classifiers to Alleviate the Accuracy-Robustness Trade-Off

    Authors: Yatong Bai, Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Deep neural classifiers have recently found tremendous success in data-driven control systems. However, existing models suffer from a trade-off between accuracy and adversarial robustness. This limitation must be overcome in the control of safety-critical systems that require both high performance and rigorous robustness guarantees. In this work, we develop classifiers that simultaneously inherit… ▽ More

    Submitted 3 June, 2024; v1 submitted 25 November, 2023; originally announced November 2023.

    Comments: arXiv admin note: text overlap with arXiv:2301.12554

    MSC Class: 68T07

  8. arXiv:2310.10872  [pdf, other

    cs.DC

    Computing Sparse Tensor Decompositions via Chapel and C++/MPI Interoperability without Intermediate I/O

    Authors: S. Isaac Geronimo Anderson, Daniel M. Dunlavy

    Abstract: We extend an existing approach for efficient use of shared mapped memory across Chapel and C++ for graph data stored as 1-D arrays to sparse tensor data stored using a combination of 2-D and 1-D arrays. We describe the specific extensions that provide use of shared mapped memory tensor data for a particular C++ tensor decomposition tool called GentenMPI. We then demonstrate our approach on several… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

    Comments: 9 pages, 2 tables

    Report number: SAND2023-11029R

  9. arXiv:2310.04916  [pdf, other

    math.OC cs.LG

    Tight Certified Robustness via Min-Max Representations of ReLU Neural Networks

    Authors: Brendon G. Anderson, Samuel Pfrommer, Somayeh Sojoudi

    Abstract: The reliable deployment of neural networks in control systems requires rigorous robustness guarantees. In this paper, we obtain tight robustness certificates over convex attack sets for min-max representations of ReLU neural networks by developing a convex reformulation of the nonconvex certification problem. This is done by "lifting" the problem to an infinite-dimensional optimization over probab… ▽ More

    Submitted 7 October, 2023; originally announced October 2023.

    Comments: IEEE Conference on Decision and Control, 2023

  10. arXiv:2309.13794  [pdf, other

    cs.LG

    Projected Randomized Smoothing for Certified Adversarial Robustness

    Authors: Samuel Pfrommer, Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Randomized smoothing is the current state-of-the-art method for producing provably robust classifiers. While randomized smoothing typically yields robust $\ell_2$-ball certificates, recent research has generalized provable robustness to different norm balls as well as anisotropic regions. This work considers a classifier architecture that first projects onto a low-dimensional approximation of the… ▽ More

    Submitted 24 September, 2023; originally announced September 2023.

    Comments: Transactions on Machine Learning Research (TMLR) 2023

  11. arXiv:2307.03276  [pdf, other

    cs.DC

    Analyzing the Performance Portability of Tensor Decomposition

    Authors: S. Isaac Geronimo Anderson, Keita Teranishi, Daniel M. Dunlavy, Jee Choi

    Abstract: We employ pressure point analysis and roofline modeling to identify performance bottlenecks and determine an upper bound on the performance of the Canonical Polyadic Alternating Poisson Regression Multiplicative Update (CP-APR MU) algorithm in the SparTen software library. Our analyses reveal that a particular matrix computation, $Φ^{(n)}$, is the critical performance bottleneck in the SparTen CP-… ▽ More

    Submitted 6 July, 2023; originally announced July 2023.

    Comments: 28 pages, 19 figures

    ACM Class: C.1.2; C.1.4; D.4.8; G.4

  12. arXiv:2302.10360  [pdf, other

    cs.ET cs.LG cs.NE physics.app-ph physics.optics

    Optical Transformers

    Authors: Maxwell G. Anderson, Shi-Yuan Ma, Tianyu Wang, Logan G. Wright, Peter L. McMahon

    Abstract: The rapidly increasing size of deep-learning models has caused renewed and growing interest in alternatives to digital computers to dramatically reduce the energy cost of running state-of-the-art neural networks. Optical matrix-vector multipliers are best suited to performing computations with very large operands, which suggests that large Transformer models could be a good target for optical comp… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: 27 pages, 13 figures

    Journal ref: Transactions on Machine Learning Research, 03/2024, https://openreview.net/forum?id=Xxw0edFFQC

  13. arXiv:2302.01961  [pdf, other

    cs.LG

    Asymmetric Certified Robustness via Feature-Convex Neural Networks

    Authors: Samuel Pfrommer, Brendon G. Anderson, Julien Piet, Somayeh Sojoudi

    Abstract: Recent works have introduced input-convex neural networks (ICNNs) as learning models with advantageous training, inference, and generalization properties linked to their convex structure. In this paper, we propose a novel feature-convex neural network architecture as the composition of an ICNN with a Lipschitz feature map in order to achieve adversarial robustness. We consider the asymmetric binar… ▽ More

    Submitted 10 October, 2023; v1 submitted 3 February, 2023; originally announced February 2023.

    Comments: 37th Conference on Neural Information Processing Systems (NeurIPS 2023)

  14. arXiv:2301.12554  [pdf, other

    cs.LG cs.CR cs.CV

    Improving the Accuracy-Robustness Trade-Off of Classifiers via Adaptive Smoothing

    Authors: Yatong Bai, Brendon G. Anderson, Aerin Kim, Somayeh Sojoudi

    Abstract: While prior research has proposed a plethora of methods that build neural classifiers robust against adversarial robustness, practitioners are still reluctant to adopt them due to their unacceptably severe clean accuracy penalties. This paper significantly alleviates this accuracy-robustness trade-off by mixing the output probabilities of a standard classifier and a robust classifier, where the st… ▽ More

    Submitted 21 July, 2024; v1 submitted 29 January, 2023; originally announced January 2023.

    MSC Class: 68T07

  15. arXiv:2301.11374  [pdf, other

    cs.LG cs.AI

    Certifiably Robust Reinforcement Learning through Model-Based Abstract Interpretation

    Authors: Chenxi Yang, Greg Anderson, Swarat Chaudhuri

    Abstract: We present a reinforcement learning (RL) framework in which the learned policy comes with a machine-checkable certificate of provable adversarial robustness. Our approach, called CAROL, learns a model of the environment. In each learning iteration, it uses the current version of this model and an external abstract interpreter to construct a differentiable signal for provable robustness. This signa… ▽ More

    Submitted 26 May, 2023; v1 submitted 26 January, 2023; originally announced January 2023.

  16. arXiv:2209.14148  [pdf, other

    cs.LG

    Guiding Safe Exploration with Weakest Preconditions

    Authors: Greg Anderson, Swarat Chaudhuri, Isil Dillig

    Abstract: In reinforcement learning for safety-critical settings, it is often desirable for the agent to obey safety constraints at all points in time, including during training. We present a novel neurosymbolic approach called SPICE to solve this safe exploration problem. SPICE uses an online shielding layer based on symbolic weakest preconditions to achieve a more precise safety analysis than existing too… ▽ More

    Submitted 27 February, 2023; v1 submitted 28 September, 2022; originally announced September 2022.

  17. arXiv:2208.07464  [pdf, other

    cs.LG math.OC stat.ML

    An Overview and Prospective Outlook on Robust Training and Certification of Machine Learning Models

    Authors: Brendon G. Anderson, Tanmay Gautam, Somayeh Sojoudi

    Abstract: In this discussion paper, we survey recent research surrounding robustness of machine learning models. As learning algorithms become increasingly more popular in data-driven control systems, their robustness to data uncertainty must be ensured in order to maintain reliable safety-critical operations. We begin by reviewing common formalisms for such robustness, and then move on to discuss popular a… ▽ More

    Submitted 27 September, 2022; v1 submitted 15 August, 2022; originally announced August 2022.

  18. arXiv:2207.14293  [pdf, other

    physics.optics cs.ET cs.LG

    Image sensing with multilayer, nonlinear optical neural networks

    Authors: Tianyu Wang, Mandar M. Sohoni, Logan G. Wright, Martin M. Stein, Shi-Yuan Ma, Tatsuhiro Onodera, Maxwell G. Anderson, Peter L. McMahon

    Abstract: Optical imaging is commonly used for both scientific and technological applications across industry and academia. In image sensing, a measurement, such as of an object's position, is performed by computational analysis of a digitized image. An emerging image-sensing paradigm breaks this delineation between data collection and analysis by designing optical components to perform not imaging, but enc… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

    Journal ref: Nat. Photon. 18, 1-8 (2023)

  19. arXiv:2106.00089  [pdf, other

    cs.LG eess.SP

    Node-Variant Graph Filters in Graph Neural Networks

    Authors: Fernando Gama, Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Graph neural networks (GNNs) have been successfully employed in a myriad of applications involving graph signals. Theoretical findings establish that GNNs use nonlinear activation functions to create low-eigenvalue frequency content that can be processed in a stable manner by subsequent graph convolutional filters. However, the exact shape of the frequency content created by nonlinear functions is… ▽ More

    Submitted 4 March, 2022; v1 submitted 31 May, 2021; originally announced June 2021.

  20. arXiv:2104.14335  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    ELF-VC: Efficient Learned Flexible-Rate Video Coding

    Authors: Oren Rippel, Alexander G. Anderson, Kedar Tatwawadi, Sanjay Nair, Craig Lytle, Lubomir Bourdev

    Abstract: While learned video codecs have demonstrated great promise, they have yet to achieve sufficient efficiency for practical deployment. In this work, we propose several novel ideas for learned video compression which allow for improved performance for the low-latency mode (I- and P-frames only) along with a considerable increase in computational efficiency. In this setting, for natural videos our app… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Journal ref: International Conference on Computer Vision, 2021

  21. arXiv:2104.12903  [pdf, other

    cs.RO

    Assessing the Acceptability of a Humanoid Robot for Alzheimer's Disease and Related Dementia Care Using an Online Survey

    Authors: Fengpei Yuan, Joel G. Anderson, Tami Wyatt, Ruth Palan Lopez, Monica Crane, Austin Montgomery, Xiaopeng Zhao

    Abstract: In this work, an online survey was used to understand the acceptability of humanoid robots and users' needs in using these robots to assist with care among people with Alzheimer's disease and related dementias (ADRD), their family caregivers, health care professionals, and the general public. From November 12, 2020 to March 13, 2021, a total of 631 complete responses were collected, including 80 r… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

  22. arXiv:2104.09684  [pdf, other

    cs.LG

    Suppressing simulation bias using multi-modal data

    Authors: Bogdan Kustowski, Jim A. Gaffney, Brian K. Spears, Gemma J. Anderson, Rushil Anirudh, Peer-Timo Bremer, Jayaraman J. Thiagarajan, Michael K. G. Kruse, Ryan C. Nora

    Abstract: Many problems in science and engineering require making predictions based on few observations. To build a robust predictive model, these sparse data may need to be augmented with simulated data, especially when the design space is multi-dimensional. Simulations, however, often suffer from an inherent bias. Estimation of this bias may be poorly constrained not only because of data sparsity, but als… ▽ More

    Submitted 15 March, 2022; v1 submitted 19 April, 2021; originally announced April 2021.

    Report number: LLNL-JRNL-829622

  23. arXiv:2101.09306  [pdf, other

    cs.LG math.OC

    Towards Optimal Branching of Linear and Semidefinite Relaxations for Neural Network Robustness Certification

    Authors: Brendon G. Anderson, Ziye Ma, Jingqi Li, Somayeh Sojoudi

    Abstract: In this paper, we study certifying the robustness of ReLU neural networks against adversarial input perturbations. To diminish the relaxation error suffered by the popular linear programming (LP) and semidefinite programming (SDP) certification methods, we take a branch-and-bound approach to propose partitioning the input uncertainty set and solving the relaxations on each part separately. We show… ▽ More

    Submitted 10 May, 2025; v1 submitted 22 January, 2021; originally announced January 2021.

    Comments: Accepted for publication in the Journal of Machine Learning Research (JMLR). This is an extension of our IEEE CDC 2020 conference paper arXiv:2004.00570

  24. arXiv:2010.13749  [pdf, other

    stat.ML cs.LG physics.plasm-ph

    Meaningful uncertainties from deep neural network surrogates of large-scale numerical simulations

    Authors: Gemma J. Anderson, Jim A. Gaffney, Brian K. Spears, Peer-Timo Bremer, Rushil Anirudh, Jayaraman J. Thiagarajan

    Abstract: Large-scale numerical simulations are used across many scientific disciplines to facilitate experimental development and provide insights into underlying physical processes, but they come with a significant computational cost. Deep neural networks (DNNs) can serve as highly-accurate surrogate models, with the capacity to handle diverse datatypes, offering tremendous speed-ups for prediction and ma… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

  25. arXiv:2010.07532   

    cs.LG math.OC stat.ML

    Certifying Neural Network Robustness to Random Input Noise from Samples

    Authors: Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Methods to certify the robustness of neural networks in the presence of input uncertainty are vital in safety-critical settings. Most certification methods in the literature are designed for adversarial input uncertainty, but researchers have recently shown a need for methods that consider random uncertainty. In this paper, we propose a novel robustness certification method that upper bounds the p… ▽ More

    Submitted 25 January, 2023; v1 submitted 15 October, 2020; originally announced October 2020.

    Comments: This paper has been superseded by arXiv:2010.01171 (merged from arXiv:2010.01171v1 and arXiv:2010.07532)

  26. arXiv:2010.01171  [pdf, other

    cs.LG math.OC stat.ML

    Data-Driven Certification of Neural Networks with Random Input Noise

    Authors: Brendon G. Anderson, Somayeh Sojoudi

    Abstract: Methods to certify the robustness of neural networks in the presence of input uncertainty are vital in safety-critical settings. Most certification methods in the literature are designed for adversarial or worst-case inputs, but researchers have recently shown a need for methods that consider random input noise. In this paper, we examine the setting where inputs are subject to random noise coming… ▽ More

    Submitted 25 January, 2023; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: IEEE Transactions on Control of Network Systems, 2022. This work is a merge of arXiv:2010.01171v1 and arXiv:2010.07532

  27. arXiv:2009.12612  [pdf, other

    cs.LG stat.ML

    Neurosymbolic Reinforcement Learning with Formally Verified Exploration

    Authors: Greg Anderson, Abhinav Verma, Isil Dillig, Swarat Chaudhuri

    Abstract: We present Revel, a partially neural reinforcement learning (RL) framework for provably safe exploration in continuous state and action spaces. A key challenge for provably safe deep RL is that repeatedly verifying neural networks within a learning loop is computationally infeasible. We address this challenge using two policy classes: a general, neurosymbolic class with approximate gradients and a… ▽ More

    Submitted 26 October, 2020; v1 submitted 26 September, 2020; originally announced September 2020.

  28. arXiv:2005.02328  [pdf, other

    stat.ML cs.LG physics.data-an

    Designing Accurate Emulators for Scientific Processes using Calibration-Driven Deep Models

    Authors: Jayaraman J. Thiagarajan, Bindya Venkatesh, Rushil Anirudh, Peer-Timo Bremer, Jim Gaffney, Gemma Anderson, Brian Spears

    Abstract: Predictive models that accurately emulate complex scientific processes can achieve exponential speed-ups over numerical simulators or experiments, and at the same time provide surrogates for improving the subsequent analysis. Consequently, there is a recent surge in utilizing modern machine learning (ML) methods, such as deep neural networks, to build data-driven emulators. While the majority of e… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

  29. arXiv:2004.00570  [pdf, ps, other

    cs.LG math.OC stat.ML

    Tightened Convex Relaxations for Neural Network Robustness Certification

    Authors: Brendon G. Anderson, Ziye Ma, Jingqi Li, Somayeh Sojoudi

    Abstract: In this paper, we consider the problem of certifying the robustness of neural networks to perturbed and adversarial input data. Such certification is imperative for the application of neural networks in safety-critical decision-making and control systems. Certification techniques using convex optimization have been proposed, but they often suffer from relaxation errors that void the certificate. O… ▽ More

    Submitted 17 September, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

    Comments: Proceedings of the 59th IEEE Conference on Decision and Control, 2020

  30. arXiv:1907.04409  [pdf, other

    cs.LG cs.CV math.OC stat.ML

    Global Optimality Guarantees for Nonconvex Unsupervised Video Segmentation

    Authors: Brendon G. Anderson, Somayeh Sojoudi

    Abstract: In this paper, we consider the problem of unsupervised video object segmentation via background subtraction. Specifically, we pose the nonsemantic extraction of a video's moving objects as a nonconvex optimization problem via a sum of sparse and low-rank matrices. The resulting formulation, a nonnegative variant of robust principal component analysis, is more computationally tractable than its com… ▽ More

    Submitted 22 February, 2020; v1 submitted 9 July, 2019; originally announced July 2019.

    Comments: Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing, 2019; added funding source information and notation definitions

    Journal ref: Proceedings of the 57th Annual Allerton Conference on Communication, Control, and Computing, pp. 965--972, 2019

  31. Optimization and Abstraction: A Synergistic Approach for Analyzing Neural Network Robustness

    Authors: Greg Anderson, Shankara Pailoor, Isil Dillig, Swarat Chaudhuri

    Abstract: In recent years, the notion of local robustness (or robustness for short) has emerged as a desirable property of deep neural networks. Intuitively, robustness means that small perturbations to an input do not cause the network to perform misclassifications. In this paper, we present a novel algorithm for verifying robustness properties of neural networks. Our method synergistically combines gradie… ▽ More

    Submitted 1 May, 2019; v1 submitted 22 April, 2019; originally announced April 2019.

  32. arXiv:1811.06981  [pdf, other

    eess.IV cs.CV cs.LG stat.ML

    Learned Video Compression

    Authors: Oren Rippel, Sanjay Nair, Carissa Lew, Steve Branson, Alexander G. Anderson, Lubomir Bourdev

    Abstract: We present a new algorithm for video coding, learned end-to-end for the low-latency mode. In this setting, our approach outperforms all existing video codecs across nearly the entire bitrate range. To our knowledge, this is the first ML-based method to do so. We evaluate our approach on standard video compression test sets of varying resolutions, and benchmark against all mainstream commercial c… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  33. arXiv:1804.04152  [pdf, other

    cs.PL

    Learning Abstractions for Program Synthesis

    Authors: Xinyu Wang, Greg Anderson, Isil Dillig, K. L. McMillan

    Abstract: Many example-guided program synthesis techniques use abstractions to prune the search space. While abstraction-based synthesis has proven to be very powerful, a domain expert needs to provide a suitable abstract domain, together with the abstract transformers of each DSL construct. However, coming up with useful abstractions can be non-trivial, as it requires both domain expertise and knowledge ab… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

  34. arXiv:1705.07199  [pdf, other

    cs.LG

    The High-Dimensional Geometry of Binary Neural Networks

    Authors: Alexander G. Anderson, Cory P. Berg

    Abstract: Recent research has shown that one can train a neural network with binary weights and activations at train time by augmenting the weights with a high-precision continuous latent variable that accumulates small changes from stochastic gradient descent. However, there is a dearth of theoretical analysis to explain why we can effectively capture the features in our data with binary weights and activa… ▽ More

    Submitted 19 May, 2017; originally announced May 2017.

    Comments: 12 pages, 4 Figures

  35. arXiv:1606.07792  [pdf, other

    cs.LG cs.IR stat.ML

    Wide & Deep Learning for Recommender Systems

    Authors: Heng-Tze Cheng, Levent Koc, Jeremiah Harmsen, Tal Shaked, Tushar Chandra, Hrishi Aradhye, Glen Anderson, Greg Corrado, Wei Chai, Mustafa Ispir, Rohan Anil, Zakaria Haque, Lichan Hong, Vihan Jain, Xiaobing Liu, Hemal Shah

    Abstract: Generalized linear models with nonlinear feature transformations are widely used for large-scale regression and classification problems with sparse inputs. Memorization of feature interactions through a wide set of cross-product feature transformations are effective and interpretable, while generalization requires more feature engineering effort. With less feature engineering, deep neural networks… ▽ More

    Submitted 24 June, 2016; originally announced June 2016.

  36. arXiv:1605.08153  [pdf, other

    cs.CV cs.NE

    DeepMovie: Using Optical Flow and Deep Neural Networks to Stylize Movies

    Authors: Alexander G. Anderson, Cory P. Berg, Daniel P. Mossing, Bruno A. Olshausen

    Abstract: A recent paper by Gatys et al. describes a method for rendering an image in the style of another image. First, they use convolutional neural network features to build a statistical model for the style of an image. Then they create a new image with the content of one image but the style statistics of another image. Here, we extend this method to render a movie in a given artistic style. The naive s… ▽ More

    Submitted 26 May, 2016; originally announced May 2016.

    Comments: 11 pages, 5 figures

  37. arXiv:1410.4273  [pdf, other

    cs.DS

    An Efficient Algorithm for Unweighted Spectral Graph Sparsification

    Authors: David G. Anderson, Ming Gu, Christopher Melgaard

    Abstract: Spectral graph sparsification has emerged as a powerful tool in the analysis of large-scale networks by reducing the overall number of edges, while maintaining a comparable graph Laplacian matrix. In this paper, we present an efficient algorithm for the construction of a new type of spectral sparsifier, the unweighted spectral sparsifier. Given a general undirected and unweighted graph… ▽ More

    Submitted 15 December, 2014; v1 submitted 15 October, 2014; originally announced October 2014.

  38. EACOF: A Framework for Providing Energy Transparency to enable Energy-Aware Software Development

    Authors: Hayden Field, Glen Anderson, Kerstin Eder

    Abstract: Making energy consumption data accessible to software developers is an essential step towards energy efficient software engineering. The presence of various different, bespoke and incompatible, methods of instrumentation to obtain energy readings is currently limiting the widespread use of energy data in software development. This paper presents EACOF, a modular Energy-Aware Computing Framework th… ▽ More

    Submitted 31 May, 2014; originally announced June 2014.

    ACM Class: D.2.8; D.2.2; D.2.13

  39. arXiv:1310.6405  [pdf

    cs.LO cs.MA

    Utility-based Decision-making in Distributed Systems Modelling

    Authors: Gabrielle Anderson, Matthew Collinson, David Pym

    Abstract: We consider a calculus of resources and processes as a basis for modelling decision-making in multi-agent systems. The calculus represents the regulation of agents' choices using utility functions that take account of context. Associated with the calculus is a (Hennessy Milner-style) context sensitive modal logic of state. As an application, we show how a notion of `trust domain' can be defined fo… ▽ More

    Submitted 23 October, 2013; originally announced October 2013.

    Comments: 11 pages, Contributed talk at TARK 2013 (arXiv:1310.6382) http://www.tark.org

    Report number: TARK/2013/p8

  40. arXiv:1012.4045  [pdf

    cs.OS

    Application of Global and One-Dimensional Local Optimization to Operating System Scheduler Tuning

    Authors: George Anderson, Tshilidzi Marwala, Fulufhelo Vincent Nelwamondo

    Abstract: This paper describes a study of comparison of global and one-dimensional local optimization methods to operating system scheduler tuning. The operating system scheduler we use is the Linux 2.6.23 Completely Fair Scheduler (CFS) running in simulator (LinSched). We have ported the Hackbench scheduler benchmark to this simulator and use this as the workload. The global optimization approach we use is… ▽ More

    Submitted 17 December, 2010; originally announced December 2010.

    Comments: Proceedings of the Twenty-First Annual Symposium of the Pattern Recognition Association of South Africa 22-23 November 2010 Stellenbosch, South Africa, pp. 7-11

  41. arXiv:1011.1735  [pdf

    cs.OS

    Use of Data Mining in Scheduler Optimization

    Authors: George Anderson, Tshilidzi Marwala, Fulufhelo V. Nelwamondo

    Abstract: The operating system's role in a computer system is to manage the various resources. One of these resources is the Central Processing Unit. It is managed by a component of the operating system called the CPU scheduler. Schedulers are optimized for typical workloads expected to run on the platform. However, a single scheduler may not be appropriate for all workloads. That is, a scheduler may schedu… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: 10 pages

  42. arXiv:cs/0612128  [pdf

    cs.DB

    SASE: Complex Event Processing over Streams

    Authors: Daniel Gyllstrom, Eugene Wu, Hee-Jin Chae, Yanlei Diao, Patrick Stahlberg, Gordon Anderson

    Abstract: RFID technology is gaining adoption on an increasing scale for tracking and monitoring purposes. Wide deployments of RFID devices will soon generate an unprecedented volume of data. Emerging applications require the RFID data to be filtered and correlated for complex pattern detection and transformed to events that provide meaningful, actionable information to end applications. In this work, we… ▽ More

    Submitted 22 December, 2006; originally announced December 2006.

    Comments: This article is published under a Creative Commons License Agreement (http://creativecommons.org/licenses/by/2.5/.) You may copy, distribute, display, and perform the work, make derivative works and make commercial use of the work, but, you must attribute the work to the author and CIDR 2007. 3rd Biennial Conference on Innovative Data Systems Research (CIDR) January 710, 2007, Asilomar, California, USA