-
Rectangle Search: An Anytime Beam Search (Extended Version)
Authors:
Sofia Lemons,
Wheeler Ruml,
Robert C. Holte,
Carlos Linares López
Abstract:
Anytime heuristic search algorithms try to find a (potentially suboptimal) solution as quickly as possible and then work to find better and better solutions until an optimal solution is obtained or time is exhausted. The most widely-known anytime search algorithms are based on best-first search. In this paper, we propose a new algorithm, rectangle search, that is instead based on beam search, a va…
▽ More
Anytime heuristic search algorithms try to find a (potentially suboptimal) solution as quickly as possible and then work to find better and better solutions until an optimal solution is obtained or time is exhausted. The most widely-known anytime search algorithms are based on best-first search. In this paper, we propose a new algorithm, rectangle search, that is instead based on beam search, a variant of breadth-first search. It repeatedly explores alternatives at all depth levels and is thus best-suited to problems featuring deep local minima. Experiments using a variety of popular search benchmarks suggest that rectangle search is competitive with fixed-width beam search and often performs better than the previous best anytime search algorithms.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Delaunay Triangulations in the Hilbert Metric
Authors:
Auguste Gezalyan,
Soo Kim,
Carlos Lopez,
Daniel Skora,
Zofia Stefankovic,
David M. Mount
Abstract:
The Hilbert metric is a distance function defined for points lying within the interior of a convex body. It arises in the analysis and processing of convex bodies, machine learning, and quantum information theory. In this paper, we show how to adapt the Euclidean Delaunay triangulation to the Hilbert geometry defined by a convex polygon in the plane. We analyze the geometric properties of the Hilb…
▽ More
The Hilbert metric is a distance function defined for points lying within the interior of a convex body. It arises in the analysis and processing of convex bodies, machine learning, and quantum information theory. In this paper, we show how to adapt the Euclidean Delaunay triangulation to the Hilbert geometry defined by a convex polygon in the plane. We analyze the geometric properties of the Hilbert Delaunay triangulation, which has some notable differences with respect to the Euclidean case, including the fact that the triangulation does not necessarily cover the convex hull of the point set. We also introduce the notion of a Hilbert ball at infinity, which is a Hilbert metric ball centered on the boundary of the convex polygon. We present a simple randomized incremental algorithm that computes the Hilbert Delaunay triangulation for a set of $n$ points in the Hilbert geometry defined by a convex $m$-gon. The algorithm runs in $O(n (\log n + \log^3 m))$ expected time. In addition we introduce the notion of the Hilbert hull of a set of points, which we define to be the region covered by their Hilbert Delaunay triangulation. We present an algorithm for computing the Hilbert hull in time $O(n h \log^2 m)$, where $h$ is the number of points on the hull's boundary.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
Agile, User-Centered Design and Quality in Software Processes for Mobile Application Development Teaching
Authors:
Manuel Ignacio Castillo López,
Ana Libia Eslava Cervantes,
Gustavo de la Cruz Martínez,
Jorge Luis Ortega Arjona
Abstract:
Agile methods in undergraduate courses have been explored in an effort to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored user-centered Agile process for development of educational digital tools. This process is based on Scrum and Extreme Programming in combination with User Experience (UX) approaches. The c…
▽ More
Agile methods in undergraduate courses have been explored in an effort to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored user-centered Agile process for development of educational digital tools. This process is based on Scrum and Extreme Programming in combination with User Experience (UX) approaches. The course is executed in two phases: the first half of the semester presents theory on Agile and mobile applications development, the latter half is managed as a workshop where students develop for an actual client. The introduction of UX and user-centered design exploiting the close relationship with stakeholders expected from Agile processes allows for different quality features development. Since 2019 two of the projects have been extended and one project has been developed with the described process and course alumni. Students and stakeholders have found value in the generated products and process.
△ Less
Submitted 25 September, 2023;
originally announced November 2023.
-
Applying User Experience and User-Centered Design Software Processes in Undergraduate Mobile Application Development Teaching
Authors:
Manuel Ignacio Castillo López,
Ana Libia Eslava Cervantes,
Gustavo de la Cruz Martínez
Abstract:
Agile methods in undergraduate courses have been explored by various authors looking to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored agile process for development of educational software tools. This process is based on both Scrum and Extreme Programming in combination with User Experience (UX) and User-Ce…
▽ More
Agile methods in undergraduate courses have been explored by various authors looking to close the gap between industry and professional profiles. We have structured an Android application development course based on a tailored agile process for development of educational software tools. This process is based on both Scrum and Extreme Programming in combination with User Experience (UX) and User-Centered Design (UCD) approaches. The course is executed in two phases: the first half of the course's semester presents theory on agile and mobile applications development, the latter half is managed as a workshop where students develop for an actual client. The introduction of UX and UCD exploiting the close relationship with stakeholders expected from an agile process can enhance Quality in Use features. Since 2019 two of the projects have been extended in agreement between the client and students. Students, clients and users have found value in the generated products.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
A study on information disorders on social networks during the Chilean social outbreak and COVID-19 pandemic
Authors:
Marcelo Mendoza,
Sebastián Valenzuela,
Enrique Núñez-Mussa,
Fabián Padilla,
Eliana Providel,
Sebastián Campos,
Renato Bassi,
Andrea Riquelme,
Valeria Aldana,
Claudia López
Abstract:
Information disorders on social media can have a significant impact on citizens' participation in democratic processes. To better understand the spread of false and inaccurate information online, this research analyzed data from Twitter, Facebook, and Instagram. The data was collected and verified by professional fact-checkers in Chile between October 2019 and October 2021, a period marked by poli…
▽ More
Information disorders on social media can have a significant impact on citizens' participation in democratic processes. To better understand the spread of false and inaccurate information online, this research analyzed data from Twitter, Facebook, and Instagram. The data was collected and verified by professional fact-checkers in Chile between October 2019 and October 2021, a period marked by political and health crises. The study found that false information spreads faster and reaches more users than true information on Twitter and Facebook. Instagram, on the other hand, seemed to be less affected by this phenomenon. False information was also more likely to be shared by users with lower reading comprehension skills. True information, on the other hand, tended to be less verbose and generate less interest among audiences. This research provides valuable insights into the characteristics of misinformation and how it spreads online. By recognizing the patterns of how false information diffuses and how users interact with it, we can identify the circumstances in which false and inaccurate messages are prone to become widespread. This knowledge can help us develop strategies to counter the spread of misinformation and protect the integrity of democratic processes.
△ Less
Submitted 25 June, 2023;
originally announced June 2023.
-
MaskedFusion360: Reconstruct LiDAR Data by Querying Camera Features
Authors:
Royden Wagner,
Marvin Klemp,
Carlos Fernandez Lopez
Abstract:
In self-driving applications, LiDAR data provides accurate information about distances in 3D but lacks the semantic richness of camera data. Therefore, state-of-the-art methods for perception in urban scenes fuse data from both sensor types. In this work, we introduce a novel self-supervised method to fuse LiDAR and camera data for self-driving applications. We build upon masked autoencoders (MAEs…
▽ More
In self-driving applications, LiDAR data provides accurate information about distances in 3D but lacks the semantic richness of camera data. Therefore, state-of-the-art methods for perception in urban scenes fuse data from both sensor types. In this work, we introduce a novel self-supervised method to fuse LiDAR and camera data for self-driving applications. We build upon masked autoencoders (MAEs) and train deep learning models to reconstruct masked LiDAR data from fused LiDAR and camera features. In contrast to related methods that use birds-eye-view representations, we fuse features from dense spherical LiDAR projections and features from fish-eye camera crops with a similar field of view. Therefore, we reduce the learned spatial transformations to moderate perspective transformations and do not require additional modules to generate dense LiDAR representations. Code is available at: https://github.com/KIT-MRT/masked-fusion-360
△ Less
Submitted 12 June, 2023;
originally announced June 2023.
-
Infinite matroids in tropical differential algebra
Authors:
F. Aroca,
L. Bossinger,
S. Falkensteiner,
C. Garay Lopez,
L. R. Gonzalez-Ramirez,
C. V. Valencia Negrete
Abstract:
We consider a finite-dimensional vector space $W\subset K^E$ over an arbitrary field $K$ and an arbitrary set $E$. We show that the set $C(W)\subset 2^E$ consisting of the minimal supports of $W$ are the circuits of a matroid on $E$. In particular, we show that this matroid is cofinitary (hence, tame). When the cardinality of $K$ is large enough (with respect to the cardinality of $E$), then the s…
▽ More
We consider a finite-dimensional vector space $W\subset K^E$ over an arbitrary field $K$ and an arbitrary set $E$. We show that the set $C(W)\subset 2^E$ consisting of the minimal supports of $W$ are the circuits of a matroid on $E$. In particular, we show that this matroid is cofinitary (hence, tame). When the cardinality of $K$ is large enough (with respect to the cardinality of $E$), then the set $trop(W)\subset 2^E$ consisting of all the supports of $W$ is a matroid itself.
Afterwards we apply these results to tropical differential algebraic geometry and study the set of supports $trop(Sol(Σ))\subset (2^{\mathbb{N}^{m}})^n$ of spaces of formal power series solutions $\text{Sol}(Σ)$ of systems of linear differential equations $Σ$ in differential variables $x_1,\ldots,x_n$ having coefficients in the ring ${K}[\![t_1,\ldots,t_m]\!]$. If $Σ$ is of differential type zero, then the set $C(Sol(Σ))\subset (2^{\mathbb{N}^{m}})^n$ of minimal supports defines a matroid on $E=\mathbb{N}^{mn}$, and if the cardinality of $K$ is large enough, then the set of supports $trop(Sol(Σ))$ itself is a matroid on $E$ as well. By applying the fundamental theorem of tropical differential algebraic geometry (fttdag), we give a necessary condition under which the set of solutions $Sol(U)$ of a system $U$ of tropical linear differential equations to be a matroid.
We also give a counterexample to the fttdag for systems $Σ$ of linear differential equations over countable fields. In this case, the set $trop(Sol(Σ))$ may not form a matroid.
△ Less
Submitted 29 May, 2023; v1 submitted 8 May, 2023;
originally announced May 2023.
-
Self-supervised pseudo-colorizing of masked cells
Authors:
Royden Wagner,
Carlos Fernandez Lopez,
Christoph Stiller
Abstract:
Self-supervised learning, which is strikingly referred to as the dark matter of intelligence, is gaining more attention in biomedical applications of deep learning. In this work, we introduce a novel self-supervision objective for the analysis of cells in biomedical microscopy images. We propose training deep learning models to pseudo-colorize masked cells. We use a physics-informed pseudo-spectra…
▽ More
Self-supervised learning, which is strikingly referred to as the dark matter of intelligence, is gaining more attention in biomedical applications of deep learning. In this work, we introduce a novel self-supervision objective for the analysis of cells in biomedical microscopy images. We propose training deep learning models to pseudo-colorize masked cells. We use a physics-informed pseudo-spectral colormap that is well suited for colorizing cell topology. Our experiments reveal that approximating semantic segmentation by pseudo-colorization is beneficial for subsequent fine-tuning on cell detection. Inspired by the recent success of masked image modeling, we additionally mask out cell parts and train to reconstruct these parts to further enrich the learned representations. We compare our pre-training method with self-supervised frameworks including contrastive learning (SimCLR), masked autoencoders (MAEs), and edge-based self-supervision. We build upon our previous work and train hybrid models for cell detection, which contain both convolutional and vision transformer modules. Our pre-training method can outperform SimCLR, MAE-like masked image modeling, and edge-based self-supervision when pre-training on a diverse set of six fluorescence microscopy datasets. Code is available at: https://github.com/roydenwa/pseudo-colorize-masked-cells
△ Less
Submitted 28 August, 2023; v1 submitted 12 February, 2023;
originally announced February 2023.
-
Beam Search: Faster and Monotonic
Authors:
Sofia Lemons,
Carlos Linares López,
Robert C. Holte,
Wheeler Ruml
Abstract:
Beam search is a popular satisficing approach to heuristic search problems that allows one to trade increased computation time for lower solution cost by increasing the beam width parameter. We make two contributions to the study of beam search. First, we show how to make beam search monotonic; that is, we provide a new variant that guarantees non-increasing solution cost as the beam width is incr…
▽ More
Beam search is a popular satisficing approach to heuristic search problems that allows one to trade increased computation time for lower solution cost by increasing the beam width parameter. We make two contributions to the study of beam search. First, we show how to make beam search monotonic; that is, we provide a new variant that guarantees non-increasing solution cost as the beam width is increased. This makes setting the beam parameter much easier. Second, we show how using distance-to-go estimates can allow beam search to find better solutions more quickly in domains with non-uniform costs. Together, these results improve the practical effectiveness of beam search.
△ Less
Submitted 6 April, 2022;
originally announced April 2022.
-
Privacy-friendly Synthetic Data for the Development of Face Morphing Attack Detectors
Authors:
Naser Damer,
César Augusto Fontanillo López,
Meiling Fang,
Noémie Spiller,
Minh Vu Pham,
Fadi Boutros
Abstract:
The main question this work aims at answering is: "can morphing attack detection (MAD) solutions be successfully developed based on synthetic data?". Towards that, this work introduces the first synthetic-based MAD development dataset, namely the Synthetic Morphing Attack Detection Development dataset (SMDD). This dataset is utilized successfully to train three MAD backbones where it proved to lea…
▽ More
The main question this work aims at answering is: "can morphing attack detection (MAD) solutions be successfully developed based on synthetic data?". Towards that, this work introduces the first synthetic-based MAD development dataset, namely the Synthetic Morphing Attack Detection Development dataset (SMDD). This dataset is utilized successfully to train three MAD backbones where it proved to lead to high MAD performance, even on completely unknown attack types. Additionally, an essential aspect of this work is the detailed legal analyses of the challenges of using and sharing real biometric data, rendering our proposed SMDD dataset extremely essential. The SMDD dataset, consisting of 30,000 attack and 50,000 bona fide samples, is publicly available for research purposes.
△ Less
Submitted 19 April, 2022; v1 submitted 13 March, 2022;
originally announced March 2022.
-
Privacy-preserving machine learning with tensor networks
Authors:
Alejandro Pozas-Kerstjens,
Senaida Hernández-Santana,
José Ramón Pareja Monturiol,
Marco Castrillón López,
Giannicola Scarpa,
Carlos E. González-Guillén,
David Pérez-García
Abstract:
Tensor networks, widely used for providing efficient representations of low-energy states of local quantum many-body systems, have been recently proposed as machine learning architectures which could present advantages with respect to traditional ones. In this work we show that tensor network architectures have especially prospective properties for privacy-preserving machine learning, which is imp…
▽ More
Tensor networks, widely used for providing efficient representations of low-energy states of local quantum many-body systems, have been recently proposed as machine learning architectures which could present advantages with respect to traditional ones. In this work we show that tensor network architectures have especially prospective properties for privacy-preserving machine learning, which is important in tasks such as the processing of medical records. First, we describe a new privacy vulnerability that is present in feedforward neural networks, illustrating it in synthetic and real-world datasets. Then, we develop well-defined conditions to guarantee robustness to such vulnerability, which involve the characterization of models equivalent under gauge symmetry. We rigorously prove that such conditions are satisfied by tensor-network architectures. In doing so, we define a novel canonical form for matrix product states, which has a high degree of regularity and fixes the residual gauge that is left in the canonical forms based on singular value decompositions. We supplement the analytical findings with practical examples where matrix product states are trained on datasets of medical records, which show large reductions on the probability of an attacker extracting information about the training dataset from the model's parameters. Given the growing expertise in training tensor-network architectures, these results imply that one may not have to be forced to make a choice between accuracy in prediction and ensuring the privacy of the information processed.
△ Less
Submitted 14 July, 2023; v1 submitted 24 February, 2022;
originally announced February 2022.
-
Regional Differences in Information Privacy Concerns After the Facebook-Cambridge Analytica Data Scandal
Authors:
Felipe González-Pizarro,
Andrea Figueroa,
Claudia López,
Cecilia Aragon
Abstract:
While there is increasing global attention to data privacy, most of their current theoretical understanding is based on research conducted in a few countries. Prior work argues that people's cultural backgrounds might shape their privacy concerns; thus, we could expect people from different world regions to conceptualize them in diverse ways. We collected and analyzed a large-scale dataset of twee…
▽ More
While there is increasing global attention to data privacy, most of their current theoretical understanding is based on research conducted in a few countries. Prior work argues that people's cultural backgrounds might shape their privacy concerns; thus, we could expect people from different world regions to conceptualize them in diverse ways. We collected and analyzed a large-scale dataset of tweets about the #CambridgeAnalytica scandal in Spanish and English to start exploring this hypothesis. We employed word embeddings and qualitative analysis to identify which information privacy concerns are present and characterize language and regional differences in emphasis on these concerns. Our results suggest that related concepts, such as regulations, can be added to current information privacy frameworks. We also observe a greater emphasis on data collection in English than in Spanish. Additionally, data from North America exhibits a narrower focus on awareness compared to other regions under study. Our results call for more diverse sources of data and nuanced analysis of data privacy concerns around the globe.
△ Less
Submitted 16 February, 2022; v1 submitted 14 February, 2022;
originally announced February 2022.
-
Simple Fair Power Allocation for NOMA-Based Visible Light Communication Systems
Authors:
Carlos Alberto Rodríguez López,
Vitalio Alfonso Reguera
Abstract:
Non-orthogonal multiple access (NOMA) in the power-domain has been recognized as a promising technique to overcome the bandwidth limitations of current visible light communication (VLC) systems. In this letter, we investigate the power allocation (PA) problem in an NOMA-VLC system under high signal-to-noise-ratio (SNR) regime. A simple fair power allocation strategy (SFPA) is proposed to ensure eq…
▽ More
Non-orthogonal multiple access (NOMA) in the power-domain has been recognized as a promising technique to overcome the bandwidth limitations of current visible light communication (VLC) systems. In this letter, we investigate the power allocation (PA) problem in an NOMA-VLC system under high signal-to-noise-ratio (SNR) regime. A simple fair power allocation strategy (SFPA) is proposed to ensure equitable allocation of transmission resources in a multi-user scenario. SFPA requires minimal channel state information (CSI), making it less prone to channel estimation errors. Results show that NOMA with SFPA provides fairer and higher achievable rates per user (up to 79.5\% higher in the studied setup), without significantly compromising the overall system performance.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Vehicle-counting with Automatic Region-of-Interest and Driving-Trajectory detection
Authors:
Malolan Vasu,
Nelson Abreu,
Raysa Vásquez,
Christian López
Abstract:
Vehicle counting systems can help with vehicle analysis and traffic incident detection. Unfortunately, most existing methods require some level of human input to identify the Region of interest (ROI), movements of interest, or to establish a reference point or line to count vehicles from traffic cameras. This work introduces a method to count vehicles from traffic videos that automatically identif…
▽ More
Vehicle counting systems can help with vehicle analysis and traffic incident detection. Unfortunately, most existing methods require some level of human input to identify the Region of interest (ROI), movements of interest, or to establish a reference point or line to count vehicles from traffic cameras. This work introduces a method to count vehicles from traffic videos that automatically identifies the ROI for the camera, as well as the driving trajectories of the vehicles. This makes the method feasible to use with Pan-Tilt-Zoom cameras, which are frequently used in develo** countries. Preliminary results indicate that the proposed method achieves an average intersection over the union of 57.05% for the ROI and a mean absolute error of just 17.44% at counting vehicles of the traffic video cameras tested.
△ Less
Submitted 21 August, 2021; v1 submitted 16 August, 2021;
originally announced August 2021.
-
Leader Election in Arbitrarily Connected Networks with Process Crashes and Weak Channel Reliability
Authors:
Carlos López,
Sergio Rajsbaum,
Michel Raynal,
Karla Vargas
Abstract:
A channel from a process p to a process q satisfies the ADD property if there are constants K and D, unknown to the processes, such that in any sequence of K consecutive messages sent by p to q, at least one of them is delivered to q at most D time units after it has been sent. This paper studies implementations of an eventual leader, namely, an Ω failure detector, in an arbitrarily connected netw…
▽ More
A channel from a process p to a process q satisfies the ADD property if there are constants K and D, unknown to the processes, such that in any sequence of K consecutive messages sent by p to q, at least one of them is delivered to q at most D time units after it has been sent. This paper studies implementations of an eventual leader, namely, an Ω failure detector, in an arbitrarily connected network of eventual ADD channels, where processes may fail by crashing. It first presents an algorithm that assumes that processes initially know n, the total number of processes, sending messages of size O( log n). Then, it presents a second algorithm that does not assume the processes know n. Eventually the size of the messages sent by this algorithm is also O( log n). These are the first implementations of leader election in the ADD model. In this model, only eventually perfect failure detectors were considered, sending messages of size O(n log n).
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
The 5th AI City Challenge
Authors:
Milind Naphade,
Shuo Wang,
David C. Anastasiu,
Zheng Tang,
Ming-Ching Chang,
Xiaodong Yang,
Yue Yao,
Liang Zheng,
Pranamesh Chakraborty,
Christian E. Lopez,
Anuj Sharma,
Qi Feng,
Vitaly Ablavsky,
Stan Sclaroff
Abstract:
The AI City Challenge was created with two goals in mind: (1) pushing the boundaries of research and development in intelligent video analysis for smarter cities use cases, and (2) assessing tasks where the level of performance is enough to cause real-world adoption. Transportation is a segment ripe for such adoption. The fifth AI City Challenge attracted 305 participating teams across 38 countrie…
▽ More
The AI City Challenge was created with two goals in mind: (1) pushing the boundaries of research and development in intelligent video analysis for smarter cities use cases, and (2) assessing tasks where the level of performance is enough to cause real-world adoption. Transportation is a segment ripe for such adoption. The fifth AI City Challenge attracted 305 participating teams across 38 countries, who leveraged city-scale real traffic data and high-quality synthetic data to compete in five challenge tracks. Track 1 addressed video-based automatic vehicle counting, where the evaluation being conducted on both algorithmic effectiveness and computational efficiency. Track 2 addressed city-scale vehicle re-identification with augmented synthetic data to substantially increase the training set for the task. Track 3 addressed city-scale multi-target multi-camera vehicle tracking. Track 4 addressed traffic anomaly detection. Track 5 was a new track addressing vehicle retrieval using natural language descriptions. The evaluation system shows a general leader board of all submitted results, and a public leader board of results limited to the contest participation rules, where teams are not allowed to use external data in their work. The public leader board shows results more close to real-world situations where annotated data is limited. Results show the promise of AI in Smarter Transportation. State-of-the-art performance for some tasks shows that these technologies are ready for adoption in real-world systems.
△ Less
Submitted 24 May, 2021; v1 submitted 25 April, 2021;
originally announced April 2021.
-
Three computational models and its equivalence
Authors:
Ciro Ivan Garcia Lopez
Abstract:
The study of computability has its origin in Hilbert's conference of 1900, where an adjacent question, to the ones he asked, is to give a precise description of the notion of algorithm. In the search for a good definition arose three independent theories: Turing and the Turing machines, Gödel and the recursive functions, Church and the Lambda Calculus.
Later there were established by Kleene that…
▽ More
The study of computability has its origin in Hilbert's conference of 1900, where an adjacent question, to the ones he asked, is to give a precise description of the notion of algorithm. In the search for a good definition arose three independent theories: Turing and the Turing machines, Gödel and the recursive functions, Church and the Lambda Calculus.
Later there were established by Kleene that the classic models of computation are equivalent. This fact is widely accepted by many textbooks and the proof is omitted since the proof is tedious and unreadable. We intend to fill this gap presenting the proof in a modern way, without forgetting the mathematical details.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Refinement of Predicted Missing Parts Enhance Point Cloud Completion
Authors:
Alexis Mendoza,
Alexander Apaza,
Ivan Sipiran,
Cristian Lopez
Abstract:
Point cloud completion is the task of predicting complete geometry from partial observations using a point set representation for a 3D shape. Previous approaches propose neural networks to directly estimate the whole point cloud through encoder-decoder models fed by the incomplete point set. By predicting the complete model, the current methods compute redundant information because the output also…
▽ More
Point cloud completion is the task of predicting complete geometry from partial observations using a point set representation for a 3D shape. Previous approaches propose neural networks to directly estimate the whole point cloud through encoder-decoder models fed by the incomplete point set. By predicting the complete model, the current methods compute redundant information because the output also contains the known incomplete input geometry. This paper proposes an end-to-end neural network architecture that focuses on computing the missing geometry and merging the known input and the predicted point cloud. Our method is composed of two neural networks: the missing part prediction network and the merging-refinement network. The first module focuses on extracting information from the incomplete input to infer the missing geometry. The second module merges both point clouds and improves the distribution of the points. Our experiments on ShapeNet dataset show that our method outperforms the state-of-the-art methods in point cloud completion. The code of our methods and experiments is available in \url{https://github.com/ivansipiran/Refinement-Point-Cloud-Completion}.
△ Less
Submitted 8 October, 2020;
originally announced October 2020.
-
Secure Internal Communication of a Trustzone-Enabled Heterogeneous Soc Lightweight Encryption
Authors:
El Mehdi Benhani,
Cuauhtemoc Mancillas Lopez,
Lilian Bossuet
Abstract:
Security in TrustZone-enabled heterogeneous system-on-chip (SoC) is gaining increasing attention for several years. Mainly because this type of SoC can be found in more and more applications in servers or in the cloud. The inside-SoC communication layer is one of the main element of heterogeneous SoC; indeed all the data goes through it. Monitoring and controlling inside-SoC communications enables…
▽ More
Security in TrustZone-enabled heterogeneous system-on-chip (SoC) is gaining increasing attention for several years. Mainly because this type of SoC can be found in more and more applications in servers or in the cloud. The inside-SoC communication layer is one of the main element of heterogeneous SoC; indeed all the data goes through it. Monitoring and controlling inside-SoC communications enables to fend off attacks before system corruption. In this article, we study the feasibility of encrypted data exchange between the secure software executed in a trusted execution environment (TEE) and the secure logic part of an heterogeneous SoC. Experiment are done with a Xilinx Zynq-7010 SoC and two lightweight stream ciphers. We show that using lightweight stream ciphers is an efficient solution without excessive overheads.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
MT-Adapted Datasheets for Datasets: Template and Repository
Authors:
Marta R. Costa-jussà,
Roger Creus,
Oriol Domingo,
Albert Domínguez,
Miquel Escobar,
Cayetana López,
Marina Garcia,
Margarita Geleta
Abstract:
In this report we are taking the standardized model proposed by Gebru et al. (2018) for documenting the popular machine translation datasets of the EuroParl (Koehn, 2005) and News-Commentary (Barrault et al., 2019). Within this documentation process, we have adapted the original datasheet to the particular case of data consumers within the Machine Translation area. We are also proposing a reposito…
▽ More
In this report we are taking the standardized model proposed by Gebru et al. (2018) for documenting the popular machine translation datasets of the EuroParl (Koehn, 2005) and News-Commentary (Barrault et al., 2019). Within this documentation process, we have adapted the original datasheet to the particular case of data consumers within the Machine Translation area. We are also proposing a repository for collecting the adapted datasheets in this research area
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
Risk-Aware High-level Decisions for Automated Driving at Occluded Intersections with Reinforcement Learning
Authors:
Danial Kamran,
Carlos Fernandez Lopez,
Martin Lauer,
Christoph Stiller
Abstract:
Reinforcement learning is nowadays a popular framework for solving different decision making problems in automated driving. However, there are still some remaining crucial challenges that need to be addressed for providing more reliable policies. In this paper, we propose a generic risk-aware DQN approach in order to learn high level actions for driving through unsignalized occluded intersections.…
▽ More
Reinforcement learning is nowadays a popular framework for solving different decision making problems in automated driving. However, there are still some remaining crucial challenges that need to be addressed for providing more reliable policies. In this paper, we propose a generic risk-aware DQN approach in order to learn high level actions for driving through unsignalized occluded intersections. The proposed state representation provides lane based information which allows to be used for multi-lane scenarios. Moreover, we propose a risk based reward function which punishes risky situations instead of only collision failures. Such rewarding approach helps to incorporate risk prediction into our deep Q network and learn more reliable policies which are safer in challenging situations. The efficiency of the proposed approach is compared with a DQN learned with conventional collision based rewarding scheme and also with a rule-based intersection navigation policy. Evaluation results show that the proposed approach outperforms both of these methods. It provides safer actions than collision-aware DQN approach and is less overcautious than the rule-based policy.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Understanding the perception of COVID-19 policies by mining a multilanguage Twitter dataset
Authors:
Christian E. Lopez,
Malolan Vasu,
Caleb Gallemore
Abstract:
The objective of this work is to explore popular discourse about the COVID-19 pandemic and policies implemented to manage it. Using Natural Language Processing, Text Mining, and Network Analysis to analyze corpus of tweets that relate to the COVID-19 pandemic, we identify common responses to the pandemic and how these responses differ across time. Moreover, insights as to how information and misin…
▽ More
The objective of this work is to explore popular discourse about the COVID-19 pandemic and policies implemented to manage it. Using Natural Language Processing, Text Mining, and Network Analysis to analyze corpus of tweets that relate to the COVID-19 pandemic, we identify common responses to the pandemic and how these responses differ across time. Moreover, insights as to how information and misinformation were transmitted via Twitter, starting at the early stages of this pandemic, are presented. Finally, this work introduces a dataset of tweets collected from all over the world, in multiple languages, dating back to January 22nd, when the total cases of reported COVID-19 were below 600 worldwide. The insights presented in this work could help inform decision makers in the face of future pandemics, and the dataset introduced can be used to acquire valuable knowledge to help mitigate the COVID-19 pandemic.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Academic viewpoints and concerns on CSCW education and training in Latin America
Authors:
Francisco J. Gutierrez,
Yazmin Magallanes,
Laura S. Gaytán-Lugo,
Claudia López,
Cleidson R. B. de Souza
Abstract:
Computer-Supported Cooperative Work, or simply CSCW, is the research area that studies the design and use of socio-technical technology for supporting group work. CSCW has a long tradition in interdisciplinary work exploring technical, social, and theoretical challenges for the design of technologies to support cooperative and collaborative work and life activities. However, most of the research t…
▽ More
Computer-Supported Cooperative Work, or simply CSCW, is the research area that studies the design and use of socio-technical technology for supporting group work. CSCW has a long tradition in interdisciplinary work exploring technical, social, and theoretical challenges for the design of technologies to support cooperative and collaborative work and life activities. However, most of the research tradition, methods, and theories in the field follow a strong trend grounded in social and cultural aspects from North America and Western Europe. Therefore, it is inevitable that some of the underlying, and established, knowledge in the field will not be directly transferrable or applicable to other populations. This paper presents the results of an interview study conducted with Latin American faculty on the feasability, viability, and prospect of a curriculum proposal for CSCW Education in Latin America: To this end, we conducted nine interviews with faculty currently based in six countries of the region, aiming to understand how a CSCW course targeted to undergraduate and/or graduate students in Latin America might be deployed. Our findings suggest that there are specific traits that need to be addressed in such a course, such as: tailoring foundational CSCW concepts to the diversity of local cultures, motivating the involvement of students by tackling relevant problems to their local communities, and revitalizing CSCW research and practice in the continent.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
Information Privacy Opinions on Twitter: A Cross-Language Study
Authors:
Felipe González,
Andrea Figueroa,
Claudia López,
Cecilia Aragón
Abstract:
The Cambridge Analytica scandal triggered a conversation on Twitter about data practices and their implications. Our research proposes to leverage this conversation to extend the understanding of how information privacy is framed by users worldwide. We collected tweets about the scandal written in Spanish and English between April and July 2018. We created a word embedding to create a reduced mult…
▽ More
The Cambridge Analytica scandal triggered a conversation on Twitter about data practices and their implications. Our research proposes to leverage this conversation to extend the understanding of how information privacy is framed by users worldwide. We collected tweets about the scandal written in Spanish and English between April and July 2018. We created a word embedding to create a reduced multi-dimensional representation of the tweets in each language. For each embedding, we conducted open coding to characterize the semantic contexts of key concepts: "information", "privacy", "company" and "users" (and their Spanish translations). Through a comparative analysis, we found a broader emphasis on privacy-related words associated with companies in English. We also identified more terms related to data collection in English and fewer associated with security mechanisms, control, and risks. Our findings hint at the potential of cross-language comparisons of text to extend the understanding of worldwide differences in information privacy perspectives.
△ Less
Submitted 5 December, 2019;
originally announced December 2019.
-
Global Reactions to the Cambridge Analytica Scandal: An Inter-Language Social Media Study
Authors:
Felipe González,
Yihan Yu,
Andrea Figueroa,
Claudia López,
Cecilia Aragon
Abstract:
Currently, there is a limited understanding of how data privacy concerns vary across the world. The Cambridge Analytica scandal triggered a wide-ranging discussion on social media about user data collection and use practices. We conducted an inter-language study of this online conversation to compare how people speaking different languages react to data privacy breaches. We collected tweets about…
▽ More
Currently, there is a limited understanding of how data privacy concerns vary across the world. The Cambridge Analytica scandal triggered a wide-ranging discussion on social media about user data collection and use practices. We conducted an inter-language study of this online conversation to compare how people speaking different languages react to data privacy breaches. We collected tweets about the scandal written in Spanish and English between April and July 2018. We used the Meaning Extraction Method in both datasets to identify their main topics. They reveal a similar emphasis on Zuckerberg's hearing in the US Congress and the scandal's impact on political issues. However, our analysis also shows that while English speakers tend to attribute responsibilities to companies, Spanish speakers are more likely to connect them to people. These findings show the potential of inter-language comparisons of social media data to deepen the understanding of cultural differences in data privacy perspectives.
△ Less
Submitted 14 October, 2019;
originally announced October 2019.
-
Development of Computational Thinking in High School Students: A Case Study in Chile
Authors:
Felipe González,
Claudia López,
Carlos Castro
Abstract:
Most efforts to incorporate computational thinking in K-12 education have been focused on students in their first cycles of school education and have used visual tools, such as Scratch and Alice. Fewer research projects have studied the development of computational thinking in students in their last years of school, who usually have not had early formal preparation to acquire these skills. This st…
▽ More
Most efforts to incorporate computational thinking in K-12 education have been focused on students in their first cycles of school education and have used visual tools, such as Scratch and Alice. Fewer research projects have studied the development of computational thinking in students in their last years of school, who usually have not had early formal preparation to acquire these skills. This study provides evidence of the effectiveness of teaching programming in C++ (a low-level language) to develop computational thinking in high school students in Chile. By applying a test before and after a voluntary C ++ programming workshop, the results show a significant improvement in computational thinking at the end of the workshop. However, we also observed that there was a tendency to drop out of the workshop among students with lower levels of initial computational thinking. Tenth-grade students obtained lower final scores than eleventh and twelfth-grade students. These results indicate that teaching a low-level programming language is useful, but it has high entry-barriers.
△ Less
Submitted 3 October, 2019;
originally announced October 2019.
-
SMILK, linking natural language and data from the web
Authors:
Cédric Lopez,
Molka Dhouib,
Elena Cabrio,
Catherine Faron Zucker,
Fabien Gandon,
Frédérique Segond
Abstract:
As part of the SMILK Joint Lab, we studied the use of Natural Language Processing to: (1) enrich knowledge bases and link data on the web, and conversely (2) use this linked data to contribute to the improvement of text analysis and the annotation of textual content, and to support knowledge extraction. The evaluation focused on brand-related information retrieval in the field of cosmetics. This a…
▽ More
As part of the SMILK Joint Lab, we studied the use of Natural Language Processing to: (1) enrich knowledge bases and link data on the web, and conversely (2) use this linked data to contribute to the improvement of text analysis and the annotation of textual content, and to support knowledge extraction. The evaluation focused on brand-related information retrieval in the field of cosmetics. This article describes each step of our approach: the creation of ProVoc, an ontology to describe products and brands; the automatic population of a knowledge base mainly based on ProVoc from heterogeneous textual resources; and the evaluation of an application which that takes the form of a browser plugin providing additional knowledge to users browsing the web.
△ Less
Submitted 20 December, 2018;
originally announced January 2019.
-
A Study of Delay Drifts on Massive MIMO Wideband Channel Models
Authors:
Carlos F. Lopez,
Cheng-Xiang Wang
Abstract:
In this paper, we study the effects of the variations of the propagation delay over large-scale antenna-arrays used in massive multiple-input multiple-output (MIMO) wideband communication systems on the statistical properties of the channel. Due to its simplicity and popularity, the Elliptical geometry-based stochastic channel model (GBSM) is employed to demonstrate new non-stationary properties o…
▽ More
In this paper, we study the effects of the variations of the propagation delay over large-scale antenna-arrays used in massive multiple-input multiple-output (MIMO) wideband communication systems on the statistical properties of the channel. Due to its simplicity and popularity, the Elliptical geometry-based stochastic channel model (GBSM) is employed to demonstrate new non-stationary properties of the channel in the frequency and spatial domains caused by the drift of delays. In addition, we show that the time of travel of multi-path components (MPCs) over large-scale arrays may result in overlooked frequency and spatial decorrelation effects. These are theoretically demonstrated by deriving the space-time-frequency correlation functions (STFCFs) of both narrowband and wideband Elliptical models. Closed-form expressions of the array-variant frequency correlation function (FCF), power delay profile (PDP), mean delay, and delay spread of single- and multi-confocal Elliptical models are derived when the angles of arrival (AOAs) are von Mises distributed. In such conditions, we find that the large dimensions of the antenna array may limit the narrowband characteristic of the single-ellipse model and alter the wideband characteristics (PDP and FCF) of the multi-confocal Elliptical channel model. Although we present and analyze numerical and simulation results for a particular GBSM, similar conclusions can be extended to other GBSMs.
△ Less
Submitted 22 March, 2018;
originally announced March 2018.
-
Co-simulation for Cyber Security Analysis: Data Attacks against Energy Management System
Authors:
Kaikai Pan,
André Teixeira,
Claudio López,
Peter Palensky
Abstract:
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that…
▽ More
It is challenging to assess the vulnerability of a cyber-physical power system to data attacks from an integral perspective. In order to support vulnerability assessment except analytic analysis, suitable platform for security tests needs to be developed. In this paper we analyze the cyber security of energy management system (EMS) against data attacks. First we extend our analytic framework that characterizes data attacks as optimization problems with the objectives specified as security metrics and constraints corresponding to the communication network properties. Second, we build a platform in the form of co-simulation - coupling the power system simulator DIgSILENT PowerFactory with communication network simulator OMNeT++, and Matlab for EMS applications (state estimation, optimal power flow). Then the framework is used to conduct attack simulations on the co-simulation based platform for a power grid test case. The results indicate how vulnerable of EMS to data attacks and how co-simulation can help assess vulnerability.
△ Less
Submitted 28 August, 2017;
originally announced August 2017.
-
CAp 2017 challenge: Twitter Named Entity Recognition
Authors:
Cédric Lopez,
Ioannis Partalas,
Georgios Balikas,
Nadia Derbas,
Amélie Martin,
Coralie Reutenauer,
Frédérique Segond,
Massih-Reza Amini
Abstract:
The paper describes the CAp 2017 challenge. The challenge concerns the problem of Named Entity Recognition (NER) for tweets written in French. We first present the data preparation steps we followed for constructing the dataset released in the framework of the challenge. We begin by demonstrating why NER for tweets is a challenging problem especially when the number of entities increases. We detai…
▽ More
The paper describes the CAp 2017 challenge. The challenge concerns the problem of Named Entity Recognition (NER) for tweets written in French. We first present the data preparation steps we followed for constructing the dataset released in the framework of the challenge. We begin by demonstrating why NER for tweets is a challenging problem especially when the number of entities increases. We detail the annotation process and the necessary decisions we made. We provide statistics on the inter-annotator agreement, and we conclude the data description part with examples and statistics for the data. We, then, describe the participation in the challenge, where 8 teams participated, with a focus on the methods employed by the challenge participants and the scores achieved in terms of F$_1$ measure. Importantly, the constructed dataset comprising $\sim$6,000 tweets annotated for 13 types of entities, which to the best of our knowledge is the first such dataset in French, is publicly available at \url{http://cap2017.imag.fr/competition.html} .
△ Less
Submitted 24 July, 2017;
originally announced July 2017.
-
A Study of Concurrency Bugs and Advanced Development Support for Actor-based Programs
Authors:
Carmen Torres Lopez,
Stefan Marr,
Hanspeter Mössenböck,
Elisa Gonzalez Boix
Abstract:
The actor model is an attractive foundation for develo** concurrent applications because actors are isolated concurrent entities that communicate through asynchronous messages and do not share state. Thereby, they avoid concurrency bugs such as data races, but are not immune to concurrency bugs in general. This study taxonomizes concurrency bugs in actor-based programs reported in literature. Fu…
▽ More
The actor model is an attractive foundation for develo** concurrent applications because actors are isolated concurrent entities that communicate through asynchronous messages and do not share state. Thereby, they avoid concurrency bugs such as data races, but are not immune to concurrency bugs in general. This study taxonomizes concurrency bugs in actor-based programs reported in literature. Furthermore, it analyzes the bugs to identify the patterns causing them as well as their observable behavior. Based on this taxonomy, we further analyze the literature and find that current approaches to static analysis and testing focus on communication deadlocks and message protocol violations. However, they do not provide solutions to identify livelocks and behavioral deadlocks. The insights obtained in this study can be used to improve debugging support for actor-based programs with new debugging techniques to identify the root cause of complex concurrency bugs.
△ Less
Submitted 24 April, 2018; v1 submitted 22 June, 2017;
originally announced June 2017.
-
A Concurrency-Agnostic Protocol for Multi-Paradigm Concurrent Debugging Tools
Authors:
Stefan Marr,
Carmen Torres Lopez,
Dominik Aumayr,
Elisa Gonzalez Boix,
Hanspeter Mössenböck
Abstract:
Today's complex software systems combine high-level concurrency models. Each model is used to solve a specific set of problems. Unfortunately, debuggers support only the low-level notions of threads and shared memory, forcing developers to reason about these notions instead of the high-level concurrency models they chose.
This paper proposes a concurrency-agnostic debugger protocol that decouple…
▽ More
Today's complex software systems combine high-level concurrency models. Each model is used to solve a specific set of problems. Unfortunately, debuggers support only the low-level notions of threads and shared memory, forcing developers to reason about these notions instead of the high-level concurrency models they chose.
This paper proposes a concurrency-agnostic debugger protocol that decouples the debugger from the concurrency models employed by the target application. As a result, the underlying language runtime can define custom breakpoints, step** operations, and execution events for each concurrency model it supports, and a debugger can expose them without having to be specifically adapted.
We evaluated the generality of the protocol by applying it to SOMns, a Newspeak implementation, which supports a diversity of concurrency models including communicating sequential processes, communicating event loops, threads and locks, fork/join parallelism, and software transactional memory. We implemented 21 breakpoints and 20 step** operations for these concurrency models. For none of these, the debugger needed to be changed. Furthermore, we visualize all concurrent interactions independently of a specific concurrency model. To show that tooling for a specific concurrency model is possible, we visualize actor turns and message sends separately.
△ Less
Submitted 29 October, 2017; v1 submitted 1 June, 2017;
originally announced June 2017.
-
A novel 2D non-stationary wideband massive MIMO channel model
Authors:
C. F. Lopez,
C. -X. Wang,
R. Feng
Abstract:
In this paper, a novel two-dimensional (2D) non-stationary wideband geometry-based stochastic model (GBSM) for massive multiple-input multiple-output (MIMO) communication systems is proposed. Key characteristics of massive MIMO channels such as near field effects and cluster evolution along the array are addressed in this model. Near field effects are modelled by a second-order approximation to sp…
▽ More
In this paper, a novel two-dimensional (2D) non-stationary wideband geometry-based stochastic model (GBSM) for massive multiple-input multiple-output (MIMO) communication systems is proposed. Key characteristics of massive MIMO channels such as near field effects and cluster evolution along the array are addressed in this model. Near field effects are modelled by a second-order approximation to spherical wavefronts, i.e., parabolic wavefronts, leading to linear drifts of the angles of multipath components (MPCs) and non-stationarity along the array. Cluster evolution along the array involving cluster (dis)appearance and smooth average power variations is considered. Cluster (dis)appearance is modeled by a two-state Markov process and smooth average power variations are modelled by a spatial lognormal process. Statistical properties of the channel model such as time autocorrelation function (ACF), spatial cross-correlation function (CCF), and cluster average power and Rician factor variations over the array are derived. Finally, simulation results are presented and analyzed, demonstrating that parabolic wavefronts and cluster soft evolution are good candidates to model important massive MIMO channel characteristics.
△ Less
Submitted 2 November, 2016;
originally announced November 2016.
-
Tollan-Xicocotitlan: A reconstructed City by augmented reality
Authors:
Martha Rosa Cordero Lopez,
Marco Antonio Dorantes Gonzalez
Abstract:
This project presents the analysis, design, implementation and results of Reconstruction Xicocotitlan Tollan-through augmented reality, which will release information about the Toltec culture supplemented by presenting an overview of the main premises of the Xicocotitlan Tollan city supported dimensional models based on the augmented reality technique showing the user a virtual representation of b…
▽ More
This project presents the analysis, design, implementation and results of Reconstruction Xicocotitlan Tollan-through augmented reality, which will release information about the Toltec culture supplemented by presenting an overview of the main premises of the Xicocotitlan Tollan city supported dimensional models based on the augmented reality technique showing the user a virtual representation of buildings in Tollan.
△ Less
Submitted 19 June, 2014;
originally announced June 2014.
-
Model Reuse through Hardware Design Patterns
Authors:
Fernando Rincon,
Francisco Moya,
Jesus Barba,
Juan Carlos Lopez
Abstract:
Increasing reuse opportunities is a well-known problem for software designers as well as for hardware designers. Nonetheless, current software and hardware engineering practices have embraced different approaches to this problem. Software designs are usually modelled after a set of proven solutions to recurrent problems called design patterns. This approach differs from the component-based reuse…
▽ More
Increasing reuse opportunities is a well-known problem for software designers as well as for hardware designers. Nonetheless, current software and hardware engineering practices have embraced different approaches to this problem. Software designs are usually modelled after a set of proven solutions to recurrent problems called design patterns. This approach differs from the component-based reuse usually found in hardware designs: design patterns do not specify unnecessary implementation details. Several authors have already proposed translating structural design patterns concepts to hardware design. In this paper we extend the discussion to behavioural design patterns. Specifically, we describe how the hardware version of the Iterator can be used to enhance model reuse.
△ Less
Submitted 25 October, 2007;
originally announced October 2007.