Skip to main content

Showing 1–13 of 13 results for author: Dinh, D

Searching in archive cs. Search in all archives.
.
  1. Tight Inapproximability of Nash Equilibria in Public Goods Games

    Authors: Jérémi Do Dinh, Alexandros Hollender

    Abstract: We study public goods games, a type of game where every player has to decide whether or not to produce a good which is public, i.e., neighboring players can also benefit from it. Specifically, we consider a setting where the good is indivisible and where the neighborhood structure is represented by a directed graph, with the players being the nodes. Papadimitriou and Peng (2023) recently showed th… ▽ More

    Submitted 21 February, 2024; originally announced February 2024.

    Journal ref: Information Processing Letters, 186:Article 106486 (2024)

  2. arXiv:2309.07181  [pdf, other

    cs.SE cs.LG

    The Grand Illusion: The Myth of Software Portability and Implications for ML Progress

    Authors: Fraser Mince, Dzung Dinh, Jonas Kgomo, Neil Thompson, Sara Hooker

    Abstract: Pushing the boundaries of machine learning often requires exploring different hardware and software combinations. However, the freedom to experiment across different tooling stacks can be at odds with the drive for efficiency, which has produced increasingly specialized AI hardware and incentivized consolidation around a narrow set of ML frameworks. Exploratory research can be restricted if softwa… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: 28 pages, 13 figures, repo can be found at associated https://github.com/for-ai/portability

  3. arXiv:2305.17648  [pdf, other

    cs.CV

    Z-GMOT: Zero-shot Generic Multiple Object Tracking

    Authors: Kim Hoang Tran, Anh Duy Le Dinh, Tien Phat Nguyen, Thinh Phan, Pha Nguyen, Khoa Luu, Donald Adjeroh, Gianfranco Doretto, Ngan Hoang Le

    Abstract: Despite recent significant progress, Multi-Object Tracking (MOT) faces limitations such as reliance on prior knowledge and predefined categories and struggles with unseen objects. To address these issues, Generic Multiple Object Tracking (GMOT) has emerged as an alternative approach, requiring less prior information. However, current GMOT methods often rely on initial bounding boxes and struggle t… ▽ More

    Submitted 13 June, 2024; v1 submitted 28 May, 2023; originally announced May 2023.

  4. arXiv:2304.03433  [pdf, other

    cs.IT eess.SP

    Multi-User Cooperation for Covert Communication Under Quasi-Static Fading

    Authors: **young Lee, Duc Trung Dinh, Hyeonsik Yeom, Si-Hyeon Lee, Jeongseok Ha

    Abstract: This work studies a covert communication scheme for an uplink multi-user scenario in which some users are opportunistically selected to help a covert user. In particular, the selected users emit interfering signals via an orthogonal resource dedicated to the covert user together with signals for their own communications using orthogonal resources allocated to the selected users, which helps the co… ▽ More

    Submitted 10 April, 2023; v1 submitted 6 April, 2023; originally announced April 2023.

    Comments: 13 pages, 8 figures, This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  5. arXiv:2304.00557  [pdf, other

    cs.CL cs.LG

    Semi-supervised Neural Machine Translation with Consistency Regularization for Low-Resource Languages

    Authors: Viet H. Pham, Thang M. Pham, Giang Nguyen, Long Nguyen, Dien Dinh

    Abstract: The advent of deep learning has led to a significant gain in machine translation. However, most of the studies required a large parallel dataset which is scarce and expensive to construct and even unavailable for some languages. This paper presents a simple yet effective method to tackle this problem for low-resource languages by augmenting high-quality sentence pairs and training NMT models in a… ▽ More

    Submitted 2 April, 2023; originally announced April 2023.

    Comments: TMP and GN contributed equally

  6. arXiv:2209.15092  [pdf, other

    cs.LG stat.ML

    Improving Generative Flow Networks with Path Regularization

    Authors: Anh Do, Duy Dinh, Tan Nguyen, Khuong Nguyen, Stanley Osher, Nhat Ho

    Abstract: Generative Flow Networks (GFlowNets) are recently proposed models for learning stochastic policies that generate compositional objects by sequences of actions with the probability proportional to a given reward function. The central problem of GFlowNets is to improve their exploration and generalization. In this work, we propose a novel path regularization method based on optimal transport theory… ▽ More

    Submitted 29 September, 2022; originally announced September 2022.

    Comments: 28 pages, 2 figures, 5 tables. Anh Do, Duy Dinh, and Tan Nguyen contributed equally to this work

  7. Predicting the Humorousness of Tweets Using Gaussian Process Preference Learning

    Authors: Tristan Miller, Erik-Lân Do Dinh, Edwin Simpson, Iryna Gurevych

    Abstract: Most humour processing systems to date make at best discrete, coarse-grained distinctions between the comical and the conventional, yet such notions are better conceptualized as a broad spectrum. In this paper, we present a probabilistic approach, a variant of Gaussian process preference learning (GPPL), that learns to rank and rate the humorousness of short texts by exploiting human preference ju… ▽ More

    Submitted 26 March, 2021; v1 submitted 3 August, 2020; originally announced August 2020.

    Comments: 8 pages, 1 figure. A previous version of this paper was published as "OFAI-UKP at HAHA@IberLEF2019: Predicting the Humorousness of Tweets Using Gaussian Process Preference Learning" in the Proceedings of the Iberian Languages Evaluation Forum (IberLEF 2019), volume 2421 of CEUR Workshop Proceedings, pages 180-190, 2019

    ACM Class: I.2.7

    Journal ref: Procesamiento del Lenguaje Natural, 64:37-44, March 2020

  8. arXiv:1704.02215  [pdf, other

    cs.CL

    EELECTION at SemEval-2017 Task 10: Ensemble of nEural Learners for kEyphrase ClassificaTION

    Authors: Steffen Eger, Erik-Lân Do Dinh, Ilia Kuznetsov, Masoud Kiaeeha, Iryna Gurevych

    Abstract: This paper describes our approach to the SemEval 2017 Task 10: "Extracting Keyphrases and Relations from Scientific Publications", specifically to Subtask (B): "Classification of identified keyphrases". We explored three different deep learning approaches: a character-level convolutional neural network (CNN), a stacked learner with an MLP meta-classifier, and an attention based Bi-LSTM. From these… ▽ More

    Submitted 10 April, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

    Comments: In revision, changed to pdfTeX output

  9. arXiv:1702.01731  [pdf, other

    cs.CV

    A Deep Convolutional Neural Network for Background Subtraction

    Authors: Mohammadreza Babaee, Duc Tung Dinh, Gerhard Rigoll

    Abstract: In this work, we present a novel background subtraction system that uses a deep Convolutional Neural Network (CNN) to perform the segmentation. With this approach, feature engineering and parameter tuning become unnecessary since the network parameters can be learned from data by training a single CNN that can handle various video scenes. Additionally, we propose a new approach to estimate backgro… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

  10. arXiv:1610.07796  [pdf, ps, other

    cs.CL

    Still not there? Comparing Traditional Sequence-to-Sequence Models to Encoder-Decoder Neural Networks on Monotone String Translation Tasks

    Authors: Carsten Schnober, Steffen Eger, Erik-Lân Do Dinh, Iryna Gurevych

    Abstract: We analyze the performance of encoder-decoder neural models and compare them with well-known established methods. The latter represent different classes of traditional approaches that are applied to the monotone sequence-to-sequence tasks OCR post-correction, spelling correction, grapheme-to-phoneme conversion, and lemmatization. Such tasks are of practical relevance for various higher-level resea… ▽ More

    Submitted 26 October, 2016; v1 submitted 25 October, 2016; originally announced October 2016.

    Comments: Accepted for publication at COLING 2016. See also: https://www.ukp.tu-darmstadt.de/publications/details/?no_cache=1&tx_bibtex_pi1%5Bpub_id%5D=TUD-CS-2016-1450 Version 2: corrected spelling of third author

  11. arXiv:1602.04552  [pdf, other

    cs.DC

    Extending the Nested Parallel Model to the Nested Dataflow Model with Provably Efficient Schedulers

    Authors: David Dinh, Harsha Vardhan Simhadri, Yuan Tang

    Abstract: The nested parallel (a.k.a. fork-join) model is widely used for writing parallel programs. However, the two composition constructs, i.e. "$\parallel$" (parallel) and "$;$" (serial), are insufficient in expressing "partial dependencies" or "partial parallelism" in a program. We propose a new dataflow composition construct "$\leadsto$" to express partial dependencies in algorithms in a processor- an… ▽ More

    Submitted 14 February, 2016; originally announced February 2016.

    ACM Class: D.1.3; G.1.0; G.4

  12. Predicting global usages of resources endowed with local policies

    Authors: Chiara Bodei, Viet Dung Dinh, Gian Luigi Ferrari

    Abstract: The effective usages of computational resources are a primary concern of up-to-date distributed applications. In this paper, we present a methodology to reason about resource usages (acquisition, release, revision, ...), and therefore the proposed approach enables to predict bad usages of resources. Kee** in mind the interplay between local and global information occurring in the application-res… ▽ More

    Submitted 31 July, 2011; originally announced August 2011.

    Comments: In Proceedings FOCLASA 2011, arXiv:1107.5847

    Journal ref: EPTCS 58, 2011, pp. 49-64

  13. Safer in the Clouds (Extended Abstract)

    Authors: Chiara Bodei, Viet Dung Dinh, Gian Luigi Ferrari

    Abstract: We outline the design of a framework for modelling cloud computing systems.The approach is based on a declarative programming model which takes the form of a lambda-calculus enriched with suitable mechanisms to express and enforce application-level security policies governing usages of resources available in the clouds. We will focus on the server side of cloud systems, by adopting a pro-active ap… ▽ More

    Submitted 27 October, 2010; originally announced October 2010.

    Comments: In Proceedings ICE 2010, arXiv:1010.5308

    Journal ref: EPTCS 38, 2010, pp. 45-49