Skip to main content

Showing 1–10 of 10 results for author: Johansson, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.17773  [pdf, other

    cs.CV cs.AI cs.LG cs.MA

    Graph Convolutional Networks for Complex Traffic Scenario Classification

    Authors: Tobias Hoek, Holger Caesar, Andreas Falkovén, Tommy Johansson

    Abstract: A scenario-based testing approach can reduce the time required to obtain statistically significant evidence of the safety of Automated Driving Systems (ADS). Identifying these scenarios in an automated manner is a challenging task. Most methods on scenario classification do not work for complex scenarios with diverse environments (highways, urban) and interaction with other traffic agents. This is… ▽ More

    Submitted 26 October, 2023; originally announced October 2023.

    Comments: Netherlands Conference on Computer Vision (NCCV) 2023 camera-ready + supplementary material

    ACM Class: I.2; I.4; I.5

  2. arXiv:2205.13933  [pdf, other

    cs.LG math.OC

    Standalone Neural ODEs with Sensitivity Analysis

    Authors: Rym Jaroudi, Lukáš Malý, Gabriel Eilertsen, B. Tomas Johansson, Jonas Unger, George Baravdish

    Abstract: This paper presents the Standalone Neural ODE (sNODE), a continuous-depth neural ODE model capable of describing a full deep neural network. This uses a novel nonlinear conjugate gradient (NCG) descent optimization scheme for training, where the Sobolev gradient can be incorporated to improve smoothness of model weights. We also present a general formulation of the neural sensitivity problem and s… ▽ More

    Submitted 8 June, 2022; v1 submitted 27 May, 2022; originally announced May 2022.

    Comments: 25 pages, 15 figures; typos corrected

    MSC Class: 68T07; 34H05; 49N45

  3. arXiv:2202.05766  [pdf, other

    cs.LG math.OC

    Learning via nonlinear conjugate gradients and depth-varying neural ODEs

    Authors: George Baravdish, Gabriel Eilertsen, Rym Jaroudi, B. Tomas Johansson, Lukáš Malý, Jonas Unger

    Abstract: The inverse problem of supervised reconstruction of depth-variable (time-dependent) parameters in a neural ordinary differential equation (NODE) is considered, that means finding the weights of a residual network with time continuous layers. The NODE is treated as an isolated entity describing the full network as opposed to earlier research, which embedded it between pre- and post-appended layers… ▽ More

    Submitted 11 February, 2022; originally announced February 2022.

    Comments: 26 pages, 3 figures

    MSC Class: 68T07; 34H05; 49N45

  4. arXiv:2103.02668  [pdf, ps, other

    cs.CR cs.IT

    Revisiting the Concrete Security of Goldreich's Pseudorandom Generator

    Authors: **g Yang, Qian Guo, Thomas Johansson, Michael Lentmaier

    Abstract: Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad applications in theoretical cryptography. Following Couteau et al.'s work in ASIACRYPT 2018, this paper further studies the concrete security of one important class of local pseudorandom generators, i.e., Goldreich's pseudorandom generators. Our first attack is of the guess-and-determine type. Our r… ▽ More

    Submitted 3 March, 2021; originally announced March 2021.

    Comments: 20 pages, 9 figures

  5. arXiv:2003.12527  [pdf, other

    physics.ins-det cs.NI

    Fakernet -- small and fast FPGA-based TCP and UDP communication

    Authors: H. T. Johansson, A. Furufors, P. Klenze

    Abstract: A common theme of data acquisition systems is the transport of data from digitising front-end modules to stable storage and online analysis. A good choice today is to base this on the ubiquitous, commercially and cheaply available Ethernet technology. A firmware building block to turn already the FPGA of front-end electronics into a TCP data source and UDP control interface using a data-flow archi… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

    Comments: 12 pages, 11 figures, 3 tables

  6. arXiv:1902.00941  [pdf, other

    nucl-th cs.LG stat.ML

    Bayesian optimization in ab initio nuclear physics

    Authors: A. Ekström, C. Forssén, C. Dimitrakakis, D. Dubhashi, H. T. Johansson, A. S. Muhammad, H. Salomonsson, A. Schliep

    Abstract: Theoretical models of the strong nuclear interaction contain unknown coupling constants (parameters) that must be determined using a pool of calibration data. In cases where the models are complex, leading to time consuming calculations, it is particularly challenging to systematically search the corresponding parameter domain for the best fit to the data. In this paper, we explore the prospect of… ▽ More

    Submitted 3 February, 2019; originally announced February 2019.

    Comments: 33 pages, 14 figures

  7. arXiv:1805.05780  [pdf, ps, other

    math.CO cs.DM

    The cover time of a biased random walk on a random regular graph of odd degree

    Authors: Tony Johansson

    Abstract: We consider a random walk process which prefers to visit previously unvisited edges, on the random $r$-regular graph $G_r$ for any odd $r\geq 3$. We show that this random walk process has asymptotic vertex and edge cover times $\frac{1}{r-2}n\log n$ and $\frac{r}{2(r-2)}n\log n$, respectively, generalizing the result from Cooper, Frieze and Johansson from $r = 3$ to any larger odd $r$. This comple… ▽ More

    Submitted 12 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: text overlap with arXiv:1801.00760

  8. arXiv:1801.00760  [pdf, other

    math.CO cs.DS

    The cover time of a biased random walk on a random cubic graph

    Authors: Colin Cooper, Alan Frieze, Tony Johansson

    Abstract: We study a random walk that prefers tou se unvisited edges in the context of random cubic graphs. We establish asymptotically correct estimates for the vertex and edge cover times, these being $\approx n\log n$ and $\approx \frac32n\log n$ respectively.

    Submitted 3 January, 2018; v1 submitted 2 January, 2018; originally announced January 2018.

  9. arXiv:1602.04652  [pdf, ps, other

    cs.DS math.CO

    On the insertion time of random walk cuckoo hashing

    Authors: Alan Frieze, Tony Johansson

    Abstract: Cuckoo Hashing is a hashing scheme invented by Pagh and Rodler. It uses $d\geq 2$ distinct hash functions to insert items into the hash table. It has been an open question for some time as to the expected time for Random Walk Insertion to add items. We show that if the number of hash functions $d=O(1)$ is sufficiently large, then the expected insertion time is $O(1)$ per item.

    Submitted 8 January, 2017; v1 submitted 15 February, 2016; originally announced February 2016.

    Comments: 9 pages

  10. arXiv:1409.0472  [pdf, ps, other

    cs.CR cs.IT

    A New Algorithm for Solving Ring-LPN with a Reducible Polynomial

    Authors: Qian Guo, Thomas Johansson, Carl Löndahl

    Abstract: The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive. We present a new algorithm for solving the RING-LPN problem in the case when the polynomial used is reducible. It greatly outperforms previous algori… ▽ More

    Submitted 1 September, 2014; originally announced September 2014.