-
BraTS-Path Challenge: Assessing Heterogeneous Histopathologic Brain Tumor Sub-regions
Authors:
Spyridon Bakas,
Siddhesh P. Thakur,
Shahriar Faghani,
Mana Moassefi,
Ujjwal Baid,
Verena Chung,
Sarthak Pati,
Shubham Innani,
Bhakti Baheti,
Jake Albrecht,
Alexandros Karargyris,
Hasan Kassem,
MacLean P. Nasrallah,
Jared T. Ahrendsen,
Valeria Barresi,
Maria A. Gubbiotti,
Giselle Y. López,
Calixto-Hope G. Lucas,
Michael L. Miller,
Lee A. D. Cooper,
Jason T. Huse,
William R. Bell
Abstract:
Glioblastoma is the most common primary adult brain tumor, with a grim prognosis - median survival of 12-18 months following treatment, and 4 months otherwise. Glioblastoma is widely infiltrative in the cerebral hemispheres and well-defined by heterogeneous molecular and micro-environmental histopathologic profiles, which pose a major obstacle in treatment. Correctly diagnosing these tumors and as…
▽ More
Glioblastoma is the most common primary adult brain tumor, with a grim prognosis - median survival of 12-18 months following treatment, and 4 months otherwise. Glioblastoma is widely infiltrative in the cerebral hemispheres and well-defined by heterogeneous molecular and micro-environmental histopathologic profiles, which pose a major obstacle in treatment. Correctly diagnosing these tumors and assessing their heterogeneity is crucial for choosing the precise treatment and potentially enhancing patient survival rates. In the gold-standard histopathology-based approach to tumor diagnosis, detecting various morpho-pathological features of distinct histology throughout digitized tissue sections is crucial. Such "features" include the presence of cellular tumor, geographic necrosis, pseudopalisading necrosis, areas abundant in microvascular proliferation, infiltration into the cortex, wide extension in subcortical white matter, leptomeningeal infiltration, regions dense with macrophages, and the presence of perivascular or scattered lymphocytes. With these features in mind and building upon the main aim of the BraTS Cluster of Challenges https://www.synapse.org/brats2024, the goal of the BraTS-Path challenge is to provide a systematically prepared comprehensive dataset and a benchmarking environment to develop and fairly compare deep-learning models capable of identifying tumor sub-regions of distinct histologic profile. These models aim to further our understanding of the disease and assist in the diagnosis and grading of conditions in a consistent manner.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
Defending Against Indirect Prompt Injection Attacks With Spotlighting
Authors:
Keegan Hines,
Gary Lopez,
Matthew Hall,
Federico Zarfati,
Yonatan Zunger,
Emre Kiciman
Abstract:
Large Language Models (LLMs), while powerful, are built and trained to process a single text input. In common applications, multiple inputs can be processed by concatenating them together into a single stream of text. However, the LLM is unable to distinguish which sections of prompt belong to various input sources. Indirect prompt injection attacks take advantage of this vulnerability by embeddin…
▽ More
Large Language Models (LLMs), while powerful, are built and trained to process a single text input. In common applications, multiple inputs can be processed by concatenating them together into a single stream of text. However, the LLM is unable to distinguish which sections of prompt belong to various input sources. Indirect prompt injection attacks take advantage of this vulnerability by embedding adversarial instructions into untrusted data being processed alongside user commands. Often, the LLM will mistake the adversarial instructions as user commands to be followed, creating a security vulnerability in the larger system. We introduce spotlighting, a family of prompt engineering techniques that can be used to improve LLMs' ability to distinguish among multiple sources of input. The key insight is to utilize transformations of an input to provide a reliable and continuous signal of its provenance. We evaluate spotlighting as a defense against indirect prompt injection attacks, and find that it is a robust defense that has minimal detrimental impact to underlying NLP tasks. Using GPT-family models, we find that spotlighting reduces the attack success rate from greater than {50}\% to below {2}\% in our experiments with minimal impact on task efficacy.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Improving the quality of individual-level online information tracking: challenges of existing approaches and introduction of a new content- and long-tail sensitive academic solution
Authors:
Silke Adam,
Mykola Makhortykh,
Michaela Maier,
Viktor Aigenseer,
Aleksandra Urman,
Teresa Gil Lopez,
Clara Christner,
Ernesto de León,
Roberto Ulloa
Abstract:
This article evaluates the quality of data collection in individual-level desktop information tracking used in the social sciences and shows that the existing approaches face sampling issues, validity issues due to the lack of content-level data and their disregard of the variety of devices and long-tail consumption patterns as well as transparency and privacy issues. To overcome some of these pro…
▽ More
This article evaluates the quality of data collection in individual-level desktop information tracking used in the social sciences and shows that the existing approaches face sampling issues, validity issues due to the lack of content-level data and their disregard of the variety of devices and long-tail consumption patterns as well as transparency and privacy issues. To overcome some of these problems, the article introduces a new academic tracking solution, WebTrack, an open source tracking tool maintained by a major European research institution. The design logic, the interfaces and the backend requirements for WebTrack, followed by a detailed examination of strengths and weaknesses of the tool, are discussed. Finally, using data from 1185 participants, the article empirically illustrates how an improvement in the data collection through WebTrack leads to new innovative shifts in the processing of tracking data. As WebTrack allows collecting the content people are exposed to on more than classical news platforms, we can strongly improve the detection of politics-related information consumption in tracking data with the application of automated content analysis compared to traditional approaches that rely on the list-based identification of news.
△ Less
Submitted 5 March, 2024;
originally announced March 2024.
-
Design and Development of a Remotely-enabled Modular Release Mechanism for Autonomous Underwater Vehicles
Authors:
Demetrious T. Kutzke,
Gustavo E. Miranda López,
Robert J. Herman,
Harryel Philippeaux
Abstract:
We introduce a launch device, called the remotely-enabled modular release mechanism, to augment rapid testing and prototy** of cooperative autonomy maritime applications by facilitating autonomous deployment of an autonomous underwater vehicle (AUV) from an autonomous surface vessel (ASV). While we focus our development on a specific application of deploying an AUV from a catamaran style ASV, th…
▽ More
We introduce a launch device, called the remotely-enabled modular release mechanism, to augment rapid testing and prototy** of cooperative autonomy maritime applications by facilitating autonomous deployment of an autonomous underwater vehicle (AUV) from an autonomous surface vessel (ASV). While we focus our development on a specific application of deploying an AUV from a catamaran style ASV, the release mechanism can be adapted to different deployable objects and towing vehicles, such as buoys and sensors for oceanographic surveys or mono-hull ASVs. In this paper we explore a number of hardware and software design considerations to facilitate ease of integration with existing maritime autonomy systems. We expound on bench tests and in-water tests used to explore the utility of the release system and diagnose system issues. Additionally, we make a first-principles argument, based on a hydrodynamics physics model, for assured deployment that is virtually independent of sea state, making the release system a suitable alternative for different maritime applications in varying environmental conditions.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Virtual Harassment, Real Understanding: Using a Serious Game and Bayesian Networks to Study Cyberbullying
Authors:
Jaime Pérez,
Mario Castro,
Edmond Awad,
Gregorio López
Abstract:
Cyberbullying among minors is a pressing concern in our digital society, necessitating effective prevention and intervention strategies. Traditional data collection methods often intrude on privacy and yield limited insights. This study explores an innovative approach, employing a serious game - designed with purposes beyond entertainment - as a non-intrusive tool for data collection and education…
▽ More
Cyberbullying among minors is a pressing concern in our digital society, necessitating effective prevention and intervention strategies. Traditional data collection methods often intrude on privacy and yield limited insights. This study explores an innovative approach, employing a serious game - designed with purposes beyond entertainment - as a non-intrusive tool for data collection and education. In contrast to traditional correlation-based analyses, we propose a causality-based approach using Bayesian Networks to unravel complex relationships in the collected data and quantify result uncertainties. This robust analytical tool yields interpretable outcomes, enhances transparency in assumptions, and fosters open scientific discourse. Preliminary pilot studies with the serious game show promising results, surpassing the informative capacity of traditional demographic and psychological questionnaires, suggesting its potential as an alternative methodology. Additionally, we demonstrate how our approach facilitates the examination of risk profiles and the identification of intervention strategies to mitigate this cybercrime. We also address research limitations and potential enhancements, considering the noise and variability of data in social studies and video games. This research advances our understanding of cyberbullying and showcase the potential of serious games and causality-based approaches in studying complex social issues.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Reducing Computational Costs in Sentiment Analysis: Tensorized Recurrent Networks vs. Recurrent Networks
Authors:
Gabriel Lopez,
Anna Nguyen,
Joe Kaul
Abstract:
Anticipating audience reaction towards a certain text is integral to several facets of society ranging from politics, research, and commercial industries. Sentiment analysis (SA) is a useful natural language processing (NLP) technique that utilizes lexical/statistical and deep learning methods to determine whether different-sized texts exhibit positive, negative, or neutral emotions. Recurrent net…
▽ More
Anticipating audience reaction towards a certain text is integral to several facets of society ranging from politics, research, and commercial industries. Sentiment analysis (SA) is a useful natural language processing (NLP) technique that utilizes lexical/statistical and deep learning methods to determine whether different-sized texts exhibit positive, negative, or neutral emotions. Recurrent networks are widely used in machine-learning communities for problems with sequential data. However, a drawback of models based on Long-Short Term Memory networks and Gated Recurrent Units is the significantly high number of parameters, and thus, such models are computationally expensive. This drawback is even more significant when the available data are limited. Also, such models require significant over-parameterization and regularization to achieve optimal performance. Tensorized models represent a potential solution. In this paper, we classify the sentiment of some social media posts. We compare traditional recurrent models with their tensorized version, and we show that with the tensorized models, we reach comparable performances with respect to the traditional models while using fewer resources for the training.
△ Less
Submitted 16 June, 2023;
originally announced June 2023.
-
Generation of Probabilistic Synthetic Data for Serious Games: A Case Study on Cyberbullying
Authors:
Jaime Pérez,
Mario Castro,
Edmond Awad,
Gregorio López
Abstract:
Synthetic data generation has been a growing area of research in recent years. However, its potential applications in serious games have not been thoroughly explored. Advances in this field could anticipate data modelling and analysis, as well as speed up the development process. To try to fill this gap in the literature, we propose a simulator architecture for generating probabilistic synthetic d…
▽ More
Synthetic data generation has been a growing area of research in recent years. However, its potential applications in serious games have not been thoroughly explored. Advances in this field could anticipate data modelling and analysis, as well as speed up the development process. To try to fill this gap in the literature, we propose a simulator architecture for generating probabilistic synthetic data for serious games based on interactive narratives. This architecture is designed to be generic and modular so that it can be used by other researchers on similar problems. To simulate the interaction of synthetic players with questions, we use a cognitive testing model based on the Item Response Theory framework. We also show how probabilistic graphical models (in particular Bayesian networks) can be used to introduce expert knowledge and external data into the simulation. Finally, we apply the proposed architecture and methods in a use case of a serious game focused on cyberbullying. We perform Bayesian inference experiments using a hierarchical model to demonstrate the identifiability and robustness of the generated data.
△ Less
Submitted 3 July, 2023; v1 submitted 2 June, 2023;
originally announced June 2023.
-
Infinite matroids in tropical differential algebra
Authors:
F. Aroca,
L. Bossinger,
S. Falkensteiner,
C. Garay Lopez,
L. R. Gonzalez-Ramirez,
C. V. Valencia Negrete
Abstract:
We consider a finite-dimensional vector space $W\subset K^E$ over an arbitrary field $K$ and an arbitrary set $E$. We show that the set $C(W)\subset 2^E$ consisting of the minimal supports of $W$ are the circuits of a matroid on $E$. In particular, we show that this matroid is cofinitary (hence, tame). When the cardinality of $K$ is large enough (with respect to the cardinality of $E$), then the s…
▽ More
We consider a finite-dimensional vector space $W\subset K^E$ over an arbitrary field $K$ and an arbitrary set $E$. We show that the set $C(W)\subset 2^E$ consisting of the minimal supports of $W$ are the circuits of a matroid on $E$. In particular, we show that this matroid is cofinitary (hence, tame). When the cardinality of $K$ is large enough (with respect to the cardinality of $E$), then the set $trop(W)\subset 2^E$ consisting of all the supports of $W$ is a matroid itself.
Afterwards we apply these results to tropical differential algebraic geometry and study the set of supports $trop(Sol(Σ))\subset (2^{\mathbb{N}^{m}})^n$ of spaces of formal power series solutions $\text{Sol}(Σ)$ of systems of linear differential equations $Σ$ in differential variables $x_1,\ldots,x_n$ having coefficients in the ring ${K}[\![t_1,\ldots,t_m]\!]$. If $Σ$ is of differential type zero, then the set $C(Sol(Σ))\subset (2^{\mathbb{N}^{m}})^n$ of minimal supports defines a matroid on $E=\mathbb{N}^{mn}$, and if the cardinality of $K$ is large enough, then the set of supports $trop(Sol(Σ))$ itself is a matroid on $E$ as well. By applying the fundamental theorem of tropical differential algebraic geometry (fttdag), we give a necessary condition under which the set of solutions $Sol(U)$ of a system $U$ of tropical linear differential equations to be a matroid.
We also give a counterexample to the fttdag for systems $Σ$ of linear differential equations over countable fields. In this case, the set $trop(Sol(Σ))$ may not form a matroid.
△ Less
Submitted 29 May, 2023; v1 submitted 8 May, 2023;
originally announced May 2023.
-
Tackling Universal Properties of Minimal Trap Spaces of Boolean Networks
Authors:
Sara Riva,
Jean-Marie Lagniez,
Gustavo Magaña López,
Loïc Paulevé
Abstract:
Minimal trap spaces (MTSs) capture subspaces in which the Boolean dynamics is trapped, whatever the update mode. They correspond to the attractors of the most permissive mode. Due to their versatility, the computation of MTSs has recently gained traction, essentially by focusing on their enumeration. In this paper, we address the logical reasoning on universal properties of MTSs in the scope of tw…
▽ More
Minimal trap spaces (MTSs) capture subspaces in which the Boolean dynamics is trapped, whatever the update mode. They correspond to the attractors of the most permissive mode. Due to their versatility, the computation of MTSs has recently gained traction, essentially by focusing on their enumeration. In this paper, we address the logical reasoning on universal properties of MTSs in the scope of two problems: the reprogramming of Boolean networks for identifying the permanent freeze of Boolean variables that enforce a given property on all the MTSs, and the synthesis of Boolean networks from universal properties on their MTSs. Both problems reduce to solving the satisfiability of quantified propositional logic formula with 3 levels of quantifiers ($\exists\forall\exists$). In this paper, we introduce a Counter-Example Guided Refinement Abstraction (CEGAR) to efficiently solve these problems by coupling the resolution of two simpler formulas. We provide a prototype relying on Answer-Set Programming for each formula and show its tractability on a wide range of Boolean models of biological networks.
△ Less
Submitted 20 July, 2023; v1 submitted 3 May, 2023;
originally announced May 2023.
-
An Efficient Off-Policy Reinforcement Learning Algorithm for the Continuous-Time LQR Problem
Authors:
Victor G. Lopez,
Matthias A. Müller
Abstract:
In this paper, an off-policy reinforcement learning algorithm is designed to solve the continuous-time LQR problem using only input-state data measured from the system. Different from other algorithms in the literature, we propose the use of a specific persistently exciting input as the exploration signal during the data collection step. We then show that, using this persistently excited data, the…
▽ More
In this paper, an off-policy reinforcement learning algorithm is designed to solve the continuous-time LQR problem using only input-state data measured from the system. Different from other algorithms in the literature, we propose the use of a specific persistently exciting input as the exploration signal during the data collection step. We then show that, using this persistently excited data, the solution of the matrix equation in our algorithm is guaranteed to exist and to be unique at every iteration. Convergence of the algorithm to the optimal control input is also proven. Moreover, we formulate the policy evaluation step as the solution of a Sylvester-transpose equation, which increases the efficiency of its solution. Finally, a method to determine a stabilizing policy to initialize the algorithm using only measured data is proposed.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
Serious Games and AI: Challenges and Opportunities for Computational Social Science
Authors:
Jaime Pérez,
Mario Castro,
Gregorio López
Abstract:
The video game industry plays an essential role in the entertainment sphere of our society. However, from Monopoly to Flight Simulators, serious games have also been appealing tools for learning a new language, conveying values, or training skills. Furthermore, the resurgence of Artificial Intelligence (AI) and data science in the last decade has created a unique opportunity since the amount of da…
▽ More
The video game industry plays an essential role in the entertainment sphere of our society. However, from Monopoly to Flight Simulators, serious games have also been appealing tools for learning a new language, conveying values, or training skills. Furthermore, the resurgence of Artificial Intelligence (AI) and data science in the last decade has created a unique opportunity since the amount of data collected through a game is immense, as is the amount of data needed to feed such AI algorithms. This paper aims to identify relevant research lines using Serious Games as a novel research tool, especially in Computational Social Sciences. To contextualize, we also conduct a (non-systematic) literature review of this field. We conclude that the synergy between games and data can foster the use of AI for good and open up new strategies to empower humanity and support social research with novel computational tools. We also discuss the challenges and new opportunities that arise from aspiring to such lofty goals.
△ Less
Submitted 1 February, 2023;
originally announced February 2023.
-
Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks
Authors:
Juniper Lovato,
Laurent Hébert-Dufresne,
Jonathan St-Onge,
Randall Harp,
Gabriela Salazar Lopez,
Sean P. Rogers,
Ijaz Ul Haq,
Jeremiah Onaolapo
Abstract:
Social media platforms often assume that users can self-correct against misinformation. However, social media users are not equally susceptible to all misinformation as their biases influence what types of misinformation might thrive and who might be at risk. We call "diverse misinformation" the complex relationships between human biases and demographics represented in misinformation. To investiga…
▽ More
Social media platforms often assume that users can self-correct against misinformation. However, social media users are not equally susceptible to all misinformation as their biases influence what types of misinformation might thrive and who might be at risk. We call "diverse misinformation" the complex relationships between human biases and demographics represented in misinformation. To investigate how users' biases impact their susceptibility and their ability to correct each other, we analyze classification of deepfakes as a type of diverse misinformation. We chose deepfakes as a case study for three reasons: 1) their classification as misinformation is more objective; 2) we can control the demographics of the personas presented; 3) deepfakes are a real-world concern with associated harms that must be better understood. Our paper presents an observational survey (N=2,016) where participants are exposed to videos and asked questions about their attributes, not knowing some might be deepfakes. Our analysis investigates the extent to which different users are duped and which perceived demographics of deepfake personas tend to mislead. We find that accuracy varies by demographics, and participants are generally better at classifying videos that match them. We extrapolate from these results to understand the potential population-level impacts of these biases using a mathematical model of the interplay between diverse misinformation and crowd correction. Our model suggests that diverse contacts might provide "herd correction" where friends can protect each other. Altogether, human biases and the attributes of misinformation matter greatly, but having a diverse social group may help reduce susceptibility to misinformation.
△ Less
Submitted 13 January, 2024; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Emotion Analysis using Multi-Layered Networks for Graphical Representation of Tweets
Authors:
Anna Nguyen,
Antonio Longa,
Massimiliano Luca,
Joe Kaul,
Gabriel Lopez
Abstract:
Anticipating audience reaction towards a certain piece of text is integral to several facets of society ranging from politics, research, and commercial industries. Sentiment analysis (SA) is a useful natural language processing (NLP) technique that utilizes both lexical/statistical and deep learning methods to determine whether different sized texts exhibit a positive, negative, or neutral emotion…
▽ More
Anticipating audience reaction towards a certain piece of text is integral to several facets of society ranging from politics, research, and commercial industries. Sentiment analysis (SA) is a useful natural language processing (NLP) technique that utilizes both lexical/statistical and deep learning methods to determine whether different sized texts exhibit a positive, negative, or neutral emotion. However, there is currently a lack of tools that can be used to analyse groups of independent texts and extract the primary emotion from the whole set. Therefore, the current paper proposes a novel algorithm referred to as the Multi-Layered Tweet Analyzer (MLTA) that graphically models social media text using multi-layered networks (MLNs) in order to better encode relationships across independent sets of tweets. Graph structures are capable of capturing meaningful relationships in complex ecosystems compared to other representation methods. State of the art Graph Neural Networks (GNNs) are used to extract information from the Tweet-MLN and make predictions based on the extracted graph features. Results show that not only does the MLTA predict from a larger set of possible emotions, delivering a more accurate sentiment compared to the standard positive, negative or neutral, it also allows for accurate group-level predictions of Twitter data.
△ Less
Submitted 22 August, 2022; v1 submitted 2 July, 2022;
originally announced July 2022.
-
Masterful: A Training Platform for Computer Vision Models
Authors:
Samuel Wookey,
Yaoshiang Ho,
Tom Rikert,
Juan David Gil Lopez,
Juan Manuel Muñoz Beancur,
Santiago Cortes,
Ray Tawil,
Aaron Sabin,
Jack Lynch,
Travis Harper,
Nikhil Gajendrakumar
Abstract:
Masterful is a software platform to train deep learning computer vision models. Data and model architecture are inputs to the platform, and the output is a trained model. The platform's primary goal is to maximize a trained model's accuracy, which it achieves through its regularization and semi-supervised learning implementations. The platform's secondary goal is to minimize the amount of manual e…
▽ More
Masterful is a software platform to train deep learning computer vision models. Data and model architecture are inputs to the platform, and the output is a trained model. The platform's primary goal is to maximize a trained model's accuracy, which it achieves through its regularization and semi-supervised learning implementations. The platform's secondary goal is to minimize the amount of manual experimentation typically required to tune training hyperparameters, which it achieves via multiple metalearning algorithms which are custom built to control the platform's regularization and semi-supervised learning implementations. The platform's tertiary goal is to minimize the computing resources required to train a model, which it achieves via another set of metalearning algorithms which are purpose built to control Tensorflow's optimization implementations. The platform builds on top of Tensorflow's data management, architecture, automatic differentiation, and optimization implementations.
△ Less
Submitted 20 May, 2022;
originally announced May 2022.
-
Prevalence, Common Causes and Effects of Technical Debt: Results from a Family of Surveys with the IT Industry
Authors:
Robert Ramač,
Vladimir Mandić,
Nebojša Taušan,
Nicolli Rios,
Sávio Freire,
Boris Pérez,
Camilo Castellanos,
Darío Correal,
Alexia Pacheco,
Gustavo Lopez,
Clemente Izurieta,
Carolyn Seaman,
Rodrigo Spinola
Abstract:
The technical debt (TD) metaphor describes actions made during various stages of software development that lead to a more costly future regarding system maintenance and evolution. According to recent studies, on average 25% of development effort is spent, i.e. wasted, on TD caused issues in software development organizations. However, further research is needed to investigate the relations between…
▽ More
The technical debt (TD) metaphor describes actions made during various stages of software development that lead to a more costly future regarding system maintenance and evolution. According to recent studies, on average 25% of development effort is spent, i.e. wasted, on TD caused issues in software development organizations. However, further research is needed to investigate the relations between various software development activities and TD. The objective of this study is twofold. First, to get empirical insight on the understanding and the use of the TD concept in the IT industry. Second, to contribute towards precise conceptualization of the TD concept through analysis of causes and effects. In order to address the research objective a family of surveys was designed as a part of an international initiative that congregates researchers from 12 countries -- InsighTD. At country level, national teams ran survey replications with industry practitioners from the respective countries. In total 653 valid responses were collected from 6 countries. Regarding the prevalence of the TD concept 22% of practitioners have only theoretical knowledge about it, and 47% have some practical experiences with TD identification or management. Further analysis indicated that senior practitioners who work in larger organizations, larger teams, and on larger systems are more likely to be experienced with TD management. Time pressure or deadline was the single most cited cause of TD. Regarding the effects of TD: delivery delay, low maintainability, and rework were the most cited. InsighTD is the first family of surveys on technical debt in software engineering. It provided a methodological framework that allowed multiple replication teams to conduct research activities and to contribute to a single dataset. Future work will focus on more specific aspects of TD management.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Structure-aware scale-adaptive networks for cancer segmentation in whole-slide images
Authors:
Yibao Sun,
Giussepi Lopez,
Yaqi Wang,
Xingru Huang,
Huiyu Zhou,
Qianni Zhang
Abstract:
Cancer segmentation in whole-slide images is a fundamental step for viable tumour burden estimation, which is of great value for cancer assessment. However, factors like vague boundaries or small regions dissociated from viable tumour areas make it a challenging task. Considering the usefulness of multi-scale features in various vision-related tasks, we present a structure-aware scale-adaptive fea…
▽ More
Cancer segmentation in whole-slide images is a fundamental step for viable tumour burden estimation, which is of great value for cancer assessment. However, factors like vague boundaries or small regions dissociated from viable tumour areas make it a challenging task. Considering the usefulness of multi-scale features in various vision-related tasks, we present a structure-aware scale-adaptive feature selection method for efficient and accurate cancer segmentation. Based on a segmentation network with a popular encoder-decoder architecture, a scale-adaptive module is proposed for selecting more robust features to represent the vague, non-rigid boundaries. Furthermore, a structural similarity metric is proposed for better tissue structure awareness to deal with small region segmentation. In addition, advanced designs including several attention mechanisms and the selective-kernel convolutions are applied to the baseline network for comparative study purposes. Extensive experimental results show that the proposed structure-aware scale-adaptive networks achieve outstanding performance on liver cancer segmentation when compared to top ten submitted results in the challenge of PAIP 2019. Further evaluation on colorectal cancer segmentation shows that the scale-adaptive module improves the baseline network or outperforms the other excellent designs of attention mechanisms when considering the tradeoff between efficiency and accuracy.
△ Less
Submitted 26 September, 2021;
originally announced September 2021.
-
What Makes Agile Software Development Agile?
Authors:
Marco Kuhrmann,
Paolo Tell,
Regina Hebig,
Jil Klünder,
Jürgen Münch,
Oliver Linssen,
Dietmar Pfahl,
Michael Felderer,
Christian R. Prause,
Stephen G. MacDonell,
Joyce Nakatumba-Nabende,
David Raffo,
Sarah Beecham,
Eray Tüzün,
Gustavo López,
Nicolas Paez,
Diego Fontdevila,
Sherlock A. Licorish,
Steffen Küpper,
Günther Ruhe,
Eric Knauss,
Özden Özcan-Top,
Paul Clarke,
Fergal McCaffery,
Marcela Genero
, et al. (22 additional authors not shown)
Abstract:
Together with many success stories, promises such as the increase in production speed and the improvement in stakeholders' collaboration have contributed to making agile a transformation in the software industry in which many companies want to take part. However, driven either by a natural and expected evolution or by contextual factors that challenge the adoption of agile methods as prescribed by…
▽ More
Together with many success stories, promises such as the increase in production speed and the improvement in stakeholders' collaboration have contributed to making agile a transformation in the software industry in which many companies want to take part. However, driven either by a natural and expected evolution or by contextual factors that challenge the adoption of agile methods as prescribed by their creator(s), software processes in practice mutate into hybrids over time. Are these still agile? In this article, we investigate the question: what makes a software development method agile? We present an empirical study grounded in a large-scale international survey that aims to identify software development methods and practices that improve or tame agility. Based on 556 data points, we analyze the perceived degree of agility in the implementation of standard project disciplines and its relation to used development methods and practices. Our findings suggest that only a small number of participants operate their projects in a purely traditional or agile manner (under 15%). That said, most project disciplines and most practices show a clear trend towards increasing degrees of agility. Compared to the methods used to develop software, the selection of practices has a stronger effect on the degree of agility of a given discipline. Finally, there are no methods or practices that explicitly guarantee or prevent agility. We conclude that agility cannot be defined solely at the process level. Additional factors need to be taken into account when trying to implement or improve agility in a software company. Finally, we discuss the field of software process-related research in the light of our findings and present a roadmap for future research.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Winter wheat yield prediction using convolutional neural networks from environmental and phenological data
Authors:
Amit Kumar Srivastava,
Nima Safaei,
Saeed Khaki,
Gina Lopez,
Wenzhi Zeng,
Frank Ewert,
Thomas Gaiser,
Jaber Rahimi
Abstract:
Crop yield forecasting depends on many interactive factors, including crop genotype, weather, soil, and management practices. This study analyzes the performance of machine learning and deep learning methods for winter wheat yield prediction using an extensive dataset of weather, soil, and crop phenology variables in 271 counties across Germany from 1999 to 2019. We proposed a Convolutional Neural…
▽ More
Crop yield forecasting depends on many interactive factors, including crop genotype, weather, soil, and management practices. This study analyzes the performance of machine learning and deep learning methods for winter wheat yield prediction using an extensive dataset of weather, soil, and crop phenology variables in 271 counties across Germany from 1999 to 2019. We proposed a Convolutional Neural Network (CNN) model, which uses a 1-dimensional convolution operation to capture the time dependencies of environmental variables. We used eight supervised machine learning models as baselines and evaluated their predictive performance using RMSE, MAE, and correlation coefficient metrics to benchmark the yield prediction results. Our findings suggested that nonlinear models such as the proposed CNN, Deep Neural Network (DNN), and XGBoost were more effective in understanding the relationship between the crop yield and input data compared to the linear models. Our proposed CNN model outperformed all other baseline models used for winter wheat yield prediction (7 to 14% lower RMSE, 3 to 15% lower MAE, and 4 to 50% higher correlation coefficient than the best performing baseline across test data). We aggregated soil moisture and meteorological features at the weekly resolution to address the seasonality of the data. We also moved beyond prediction and interpreted the outputs of our proposed CNN model using SHAP and force plots which provided key insights in explaining the yield prediction results (importance of variables by time). We found DUL, wind speed at week ten, and radiation amount at week seven as the most critical features in winter wheat yield prediction.
△ Less
Submitted 25 February, 2022; v1 submitted 4 May, 2021;
originally announced May 2021.
-
PyTorch Geometric Temporal: Spatiotemporal Signal Processing with Neural Machine Learning Models
Authors:
Benedek Rozemberczki,
Paul Scherer,
Yixuan He,
George Panagopoulos,
Alexander Riedel,
Maria Astefanoaei,
Oliver Kiss,
Ferenc Beres,
Guzmán López,
Nicolas Collignon,
Rik Sarkar
Abstract:
We present PyTorch Geometric Temporal a deep learning framework combining state-of-the-art machine learning algorithms for neural spatiotemporal signal processing. The main goal of the library is to make temporal geometric deep learning available for researchers and machine learning practitioners in a unified easy-to-use framework. PyTorch Geometric Temporal was created with foundations on existin…
▽ More
We present PyTorch Geometric Temporal a deep learning framework combining state-of-the-art machine learning algorithms for neural spatiotemporal signal processing. The main goal of the library is to make temporal geometric deep learning available for researchers and machine learning practitioners in a unified easy-to-use framework. PyTorch Geometric Temporal was created with foundations on existing libraries in the PyTorch eco-system, streamlined neural network layer definitions, temporal snapshot generators for batching, and integrated benchmark datasets. These features are illustrated with a tutorial-like case study. Experiments demonstrate the predictive performance of the models implemented in the library on real world problems such as epidemiological forecasting, ridehail demand prediction and web-traffic management. Our sensitivity analysis of runtime shows that the framework can potentially operate on web-scale datasets with rich temporal features and spatial structure.
△ Less
Submitted 10 June, 2021; v1 submitted 15 April, 2021;
originally announced April 2021.
-
Serverless Predictions: 2021-2030
Authors:
Pedro Garcia Lopez,
Aleksander Slominski,
Michael Behrendt,
Bernard Metzler
Abstract:
Within the next 10 years, advances on resource disaggregation will enable full transparency for most Cloud applications: to run unmodified single-machine applications over effectively unlimited remote computing resources. In this article, we present five serverless predictions for the next decade that will realize this vision of transparency -- equivalent to Tim Wagner's Serverless SuperComputer o…
▽ More
Within the next 10 years, advances on resource disaggregation will enable full transparency for most Cloud applications: to run unmodified single-machine applications over effectively unlimited remote computing resources. In this article, we present five serverless predictions for the next decade that will realize this vision of transparency -- equivalent to Tim Wagner's Serverless SuperComputer or AnyScale's Infinite Laptop proposals.
△ Less
Submitted 7 April, 2021;
originally announced April 2021.
-
Catching up with Method and Process Practice: An Industry-Informed Baseline for Researchers
Authors:
Jil Klünder,
Regina Hebig,
Paolo Tell,
Marco Kuhrmann,
Joyce Nakatumba-Nabende,
Rogardt Heldal,
Stephan Krusche,
Masud Fazal-Baqaie,
Michael Felderer,
Marcela Fabiana Genero Bocco,
Steffen Küpper,
Sherlock A. Licorish,
Gustavo Lòpez,
Fergal McCaffery,
Özden Özcan Top,
Christian R. Prause,
Rafael Prikladnicki,
Eray Tüzün,
Dietmar Pfahl,
Kurt Schneider,
Stephen G. MacDonell
Abstract:
Software development methods are usually not applied by the book. Companies are under pressure to continuously deploy software products that meet market needs and stakeholders' requests. To implement efficient and effective development processes, companies utilize multiple frameworks, methods and practices, and combine these into hybrid methods. A common combination contains a rich management fram…
▽ More
Software development methods are usually not applied by the book. Companies are under pressure to continuously deploy software products that meet market needs and stakeholders' requests. To implement efficient and effective development processes, companies utilize multiple frameworks, methods and practices, and combine these into hybrid methods. A common combination contains a rich management framework to organize and steer projects complemented with a number of smaller practices providing the development teams with tools to complete their tasks. In this paper, based on 732 data points collected through an international survey, we study the software development process use in practice. Our results show that 76.8% of the companies implement hybrid methods. Company size as well as the strategy in devising and evolving hybrid methods affect the suitability of the chosen process to reach company or project goals. Our findings show that companies that combine planned improvement programs with process evolution can increase their process' suitability by up to 5%.
△ Less
Submitted 28 January, 2021;
originally announced January 2021.
-
A Refined SVD Algorithm for Collaborative Filtering
Authors:
Marko Kabić,
Gabriel Duque López,
Daniel Keller
Abstract:
Collaborative filtering tries to predict the ratings of a user over some items based on opinions of other users with similar taste. The ratings are usually given in the form of a sparse matrix, the goal being to find the missing entries (i.e. ratings). Various approaches to collaborative filtering exist, some of the most popular ones being the Singular Value Decomposition (SVD) and K-means cluster…
▽ More
Collaborative filtering tries to predict the ratings of a user over some items based on opinions of other users with similar taste. The ratings are usually given in the form of a sparse matrix, the goal being to find the missing entries (i.e. ratings). Various approaches to collaborative filtering exist, some of the most popular ones being the Singular Value Decomposition (SVD) and K-means clustering. One of the challenges in the SVD approach is finding a good initialization of the unknown ratings. A possible initialization is suggested by [1]. In this paper we explain how K-means approach can be used to achieve the further refinement of this initialization for SVD. We show that our technique outperforms both initialization techniques used separately.
△ Less
Submitted 12 December, 2020;
originally announced December 2020.
-
Adaptive Stress Testing of Trajectory Predictions in Flight Management Systems
Authors:
Robert J. Moss,
Ritchie Lee,
Nicholas Visser,
Joachim Hochwarth,
James G. Lopez,
Mykel J. Kochenderfer
Abstract:
To find failure events and their likelihoods in flight-critical systems, we investigate the use of an advanced black-box stress testing approach called adaptive stress testing. We analyze a trajectory predictor from a developmental commercial flight management system which takes as input a collection of lateral waypoints and en-route environmental conditions. Our aim is to search for failure event…
▽ More
To find failure events and their likelihoods in flight-critical systems, we investigate the use of an advanced black-box stress testing approach called adaptive stress testing. We analyze a trajectory predictor from a developmental commercial flight management system which takes as input a collection of lateral waypoints and en-route environmental conditions. Our aim is to search for failure events relating to inconsistencies in the predicted lateral trajectories. The intention of this work is to find likely failures and report them back to the developers so they can address and potentially resolve shortcomings of the system before deployment. To improve search performance, this work extends the adaptive stress testing formulation to be applied more generally to sequential decision-making problems with episodic reward by collecting the state transitions during the search and evaluating at the end of the simulated rollout. We use a modified Monte Carlo tree search algorithm with progressive widening as our adversarial reinforcement learner. The performance is compared to direct Monte Carlo simulations and to the cross-entropy method as an alternative importance sampling baseline. The goal is to find potential problems otherwise not found by traditional requirements-based testing. Results indicate that our adaptive stress testing approach finds more failures and finds failures with higher likelihood relative to the baseline approaches.
△ Less
Submitted 4 November, 2020;
originally announced November 2020.
-
Three computational models and its equivalence
Authors:
Ciro Ivan Garcia Lopez
Abstract:
The study of computability has its origin in Hilbert's conference of 1900, where an adjacent question, to the ones he asked, is to give a precise description of the notion of algorithm. In the search for a good definition arose three independent theories: Turing and the Turing machines, Gödel and the recursive functions, Church and the Lambda Calculus.
Later there were established by Kleene that…
▽ More
The study of computability has its origin in Hilbert's conference of 1900, where an adjacent question, to the ones he asked, is to give a precise description of the notion of algorithm. In the search for a good definition arose three independent theories: Turing and the Turing machines, Gödel and the recursive functions, Church and the Lambda Calculus.
Later there were established by Kleene that the classic models of computation are equivalent. This fact is widely accepted by many textbooks and the proof is omitted since the proof is tedious and unreadable. We intend to fill this gap presenting the proof in a modern way, without forgetting the mathematical details.
△ Less
Submitted 26 October, 2020;
originally announced October 2020.
-
Runtime Safety Assurance Using Reinforcement Learning
Authors:
Christopher Lazarus,
James G. Lopez,
Mykel J. Kochenderfer
Abstract:
The airworthiness and safety of a non-pedigreed autopilot must be verified, but the cost to formally do so can be prohibitive. We can bypass formal verification of non-pedigreed components by incorporating Runtime Safety Assurance (RTSA) as mechanism to ensure safety. RTSA consists of a meta-controller that observes the inputs and outputs of a non-pedigreed component and verifies formally specifie…
▽ More
The airworthiness and safety of a non-pedigreed autopilot must be verified, but the cost to formally do so can be prohibitive. We can bypass formal verification of non-pedigreed components by incorporating Runtime Safety Assurance (RTSA) as mechanism to ensure safety. RTSA consists of a meta-controller that observes the inputs and outputs of a non-pedigreed component and verifies formally specified behavior as the system operates. When the system is triggered, a verified recovery controller is deployed. Recovery controllers are designed to be safe but very likely disruptive to the operational objective of the system, and thus RTSA systems must balance safety and efficiency. The objective of this paper is to design a meta-controller capable of identifying unsafe situations with high accuracy. High dimensional and non-linear dynamics in which modern controllers are deployed along with the black-box nature of the nominal controllers make this a difficult problem. Current approaches rely heavily on domain expertise and human engineering. We frame the design of RTSA with the Markov decision process (MDP) framework and use reinforcement learning (RL) to solve it. Our learned meta-controller consistently exhibits superior performance in our experiments compared to our baseline, human engineered approach.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Decentralize the feedback infrastructure!
Authors:
Pedro Garcia Lopez
Abstract:
The decentralized architecture of Internet sparkled techno-utopian visions of a virtual freedom space for humanity. Peer-to-peer systems, collaborative creation (wikipedia), open source software (Linux), universal shared knowledge, and the hopes for disintermediation contributed to this major vision.
However, the reality is bleak: centralization is reigning in the cyberspace, with huge technolog…
▽ More
The decentralized architecture of Internet sparkled techno-utopian visions of a virtual freedom space for humanity. Peer-to-peer systems, collaborative creation (wikipedia), open source software (Linux), universal shared knowledge, and the hopes for disintermediation contributed to this major vision.
However, the reality is bleak: centralization is reigning in the cyberspace, with huge technological corporations controlling our data, and re-intermediation and control are stronger than ever in the so-called "sharing" economy. The Internet is also fragmented by countries, with many states imposing heavy controls to information and communication services.
The XXI century will witness the major clash between centralization and decentralization in human history. And the major struggle will be around the communication and feedback technologies that will intermediate and govern every interaction in our lives.
Unlike previous approaches that propose to socialize the feedback infrastructure or to use anti-monopoly laws to break Big Tech companies, in this article we advocate for the decentralization of the information and communication infrastructure. And the key to this decentralization is the creation of standards enabling interoperability between data platforms. This will in turn produce a true disintermediation from well established technological players and open competition to small third parties. In this article, we sketch such a decentralized open infrastructure including communication, sharing, matchmaking, and reputation services that can be constructed over open source technologies and standards.
△ Less
Submitted 22 October, 2020; v1 submitted 7 October, 2020;
originally announced October 2020.
-
ExerSense: Real-Tme Physical Exercise Segmentation, Classification, and Counting Algorithm Using an IMU Sensor
Authors:
Shun Ishii,
Kizito Nkurikiyeyezu,
Anna Yokokubo,
Guillaume Lopez
Abstract:
Even though it is well known that physical exercises have numerous emotional and physical health benefits, maintaining a regular exercise routine is quite challenging. Fortunately, there exist technologies that promote physical activity. Nonetheless, almost all of these technologies only target a narrow set of physical activities (e.g., either running or walking but not both) and are only applicab…
▽ More
Even though it is well known that physical exercises have numerous emotional and physical health benefits, maintaining a regular exercise routine is quite challenging. Fortunately, there exist technologies that promote physical activity. Nonetheless, almost all of these technologies only target a narrow set of physical activities (e.g., either running or walking but not both) and are only applicable either in indoor or in outdoor environments, but do not work well in both environments. This paper introduces a real-time segmentation and classification algorithm that recognizes physical exercises and that works well in both indoor and outdoor environments. The proposed algorithm achieves a 95\% classification accuracy for five indoor and outdoor exercises, including segmentation error. This accuracy is similar or better than previous works that handled only indoor workouts and those use a vision-based approach. Moreover, while comparable machine learning-based approaches need a lot of training data, the proposed correlation-based method needs one sample of motion data of each target exercises.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Model for Thermal Comfort and Energy Saving Based on Individual Sensation Estimation
Authors:
Guillaume Lopez,
Takuya Aoki,
Kizito Nkurikiyeyezu,
Anna Yokokubo
Abstract:
In office spaces, the ratio of energy consumption of air conditioning and lighting for maintaining the environment comfort is about 70%. On the other hand, many people claim being dissatisfied with the temperature of the air conditioning. Therefore, there is concern about work efficiency reduction caused by the current air conditioning control. In this research, we propose an automatic control sys…
▽ More
In office spaces, the ratio of energy consumption of air conditioning and lighting for maintaining the environment comfort is about 70%. On the other hand, many people claim being dissatisfied with the temperature of the air conditioning. Therefore, there is concern about work efficiency reduction caused by the current air conditioning control. In this research, we propose an automatic control system that improves both energy-saving and thermal comfort of all indoor users by quantifying individual differences in thermal comfort from vital information, on the basis of which the optimal settings of both air conditioning and wearable systems that can directly heat and cool individuals are determined. Various environments were simulated with different room sizes, numbers of users in a room, and heating/cooling conditions. The simulation results demonstrated the efficiency of the proposed system for both energy saving and comfort maximization.
△ Less
Submitted 9 March, 2020;
originally announced March 2020.
-
Practice meets Principle: Tracking Software and Data Citations to Zenodo DOIs
Authors:
Stephanie van de Sandt,
Lars Holm Nielsen,
Alexandros Ioannidis,
August Muench,
Edwin Henneken,
Alberto Accomazzi,
Chiara Bigarella,
Jose Benito Gonzalez Lopez,
Sünje Dallmeier-Tiessen
Abstract:
Data and software citations are crucial for the transparency of research results and for the transmission of credit. But they are hard to track, because of the absence of a common citation standard. As a consequence, the FORCE11 recently proposed data and software citation principles as guidance for authors. Zenodo is recognized for the implementation of DOIs for software on a large scale. The min…
▽ More
Data and software citations are crucial for the transparency of research results and for the transmission of credit. But they are hard to track, because of the absence of a common citation standard. As a consequence, the FORCE11 recently proposed data and software citation principles as guidance for authors. Zenodo is recognized for the implementation of DOIs for software on a large scale. The minting of complementary DOIs for the version and concept allows measuring the impact of dynamic software. This article investigates characteristics of 5,456 citations to Zenodo data and software that were captured by the Asclepias Broker in January 2019. We analyzed the current state of data and software citation practices and the quality of software citation recommendations with regard to the impact of recent standardization efforts. Our findings prove that current citation practices and recommendations do not match proposed citation standards. We consequently suggest practical first steps towards the implementation of the software citation principles.
△ Less
Submitted 1 November, 2019;
originally announced November 2019.
-
Affect-aware thermal comfort provision in intelligent buildings
Authors:
Kizito Nkurikiyeyezu,
Anna Yokokubo,
Guillaume Lopez
Abstract:
Predominant thermal comfort provision technologies are energy-hungry, and yet they perform crudely because they overlook the requisite precursors to thermal comfort. They also fail to exclusively cool or heat the parts of the body (e.g., the wrist, the feet, and the head) that influence the most a person's thermal comfort satisfaction. Instead, they waste energy by heating or cooling the whole roo…
▽ More
Predominant thermal comfort provision technologies are energy-hungry, and yet they perform crudely because they overlook the requisite precursors to thermal comfort. They also fail to exclusively cool or heat the parts of the body (e.g., the wrist, the feet, and the head) that influence the most a person's thermal comfort satisfaction. Instead, they waste energy by heating or cooling the whole room. This research investigates the influence of neck-coolers on people's thermal comfort perception and proposes an effective method that delivers thermal comfort depending on people's heart rate variability (HRV). Moreover, because thermal comfort is idiosyncratic and depends on unforeseeable circumstances, only person-specific thermal comfort models are adequate for this task. Unfortunately, using person-specific models would be costly and inflexible for deployment in, e.g., a smart building because a system that uses person-specific models would require collecting extensive training data from each person in the building. As a compromise, we devise a hybrid, cost-effective, yet satisfactory technique that derives a personalized person-specific-like model from samples collected from a large population. For example, it was possible to double the accuracy of a generic model (from 47.77% to 96.11%) using only 400 person-specific calibration samples. Finally, we propose a practical implementation of a real-time thermal comfort provision system that uses this strategy and highlighted its advantages and limitations.
△ Less
Submitted 31 December, 2019; v1 submitted 3 October, 2019;
originally announced October 2019.
-
The Effect of Person-Specific Biometrics in Improving Generic Stress Predictive Models
Authors:
Kizito Nkurikiyeyezu,
Anna Yokokubo,
Guillaume Lopez
Abstract:
Because stress is subjective and is expressed differently from one person to another, generic stress prediction models (i.e., models that predict the stress of any person) perform crudely. Only person-specific ones (i.e., models that predict the stress of a preordained person) yield reliable predictions, but they are not adaptable and costly to deploy in real-world environments. For illustration,…
▽ More
Because stress is subjective and is expressed differently from one person to another, generic stress prediction models (i.e., models that predict the stress of any person) perform crudely. Only person-specific ones (i.e., models that predict the stress of a preordained person) yield reliable predictions, but they are not adaptable and costly to deploy in real-world environments. For illustration, in an office environment, a stress monitoring system that uses person-specific models would require collecting new data and training a new model for every employee. Moreover, once deployed, the models would deteriorate and need expensive periodic upgrades because stress is dynamic and depends on unforeseeable factors. We propose a simple, yet practical and cost effective calibration technique that derives an accurate and personalized stress prediction model from physiological samples collected from a large population. We validate our approach on two stress datasets. The results show that our technique performs much better than a generic model. For instance, a generic model achieved only a 42.5% accuracy. However, with only 100 calibration samples, we raised its accuracy to 95.2% We also propose a blueprint for a stress monitoring system based on our strategy, and we debate its merits and limitation. Finally, we made public our source code and the relevant datasets to allow other researchers to replicate our findings.
△ Less
Submitted 31 December, 2019; v1 submitted 3 October, 2019;
originally announced October 2019.
-
Please, do not decentralize the Internet with (permissionless) blockchains!
Authors:
Pedro Garcia Lopez,
Alberto Montresor,
Anwitaman Datta
Abstract:
The old mantra of decentralizing the Internet is coming again with fanfare, this time around the blockchain technology hype. We have already seen a technology supposed to change the nature of the Internet: peer-to-peer. The reality is that peer-to-peer naming systems failed, peer-to-peer social networks failed, and yes, peer-to-peer storage failed as well. In this paper, we will review the researc…
▽ More
The old mantra of decentralizing the Internet is coming again with fanfare, this time around the blockchain technology hype. We have already seen a technology supposed to change the nature of the Internet: peer-to-peer. The reality is that peer-to-peer naming systems failed, peer-to-peer social networks failed, and yes, peer-to-peer storage failed as well. In this paper, we will review the research on distributed systems in the last few years to identify the limits of open peer-to-peer networks. We will address issues like system complexity, security and frailty, instability and performance. We will show how many of the aforementioned problems also apply to the recent breed of permissionless blockchain networks. The applicability of such systems to mature industrial applications is undermined by the same properties that make them so interesting for a libertarian audience: namely, their openness, their pseudo-anonymity and their unregulated cryptocurrencies. As such, we argue that permissionless blockchain networks are unsuitable to be the substrate for a decentralized Internet. Yet, there is still hope for more decentralization, albeit in a form somewhat limited with respect to the libertarian view of decentralized Internet: in cooperation rather than in competition with the superpowerful datacenters that dominate the world today. This is derived from the recent surge in interest in byzantine fault tolerance and permissioned blockchains, which opens the door to a world where use of trusted third parties is not the only way to arbitrate an ensemble of entities. The ability of establish trust through permissioned blockchains enables to move the control from the datacenters to the edge, truly realizing the promises of edge-centric computing.
△ Less
Submitted 30 April, 2019;
originally announced April 2019.
-
ROS2Learn: a reinforcement learning framework for ROS 2
Authors:
Yue Leire Erro Nuin,
Nestor Gonzalez Lopez,
Elias Barba Moral,
Lander Usategui San Juan,
Alejandro Solano Rueda,
Víctor Mayoral Vilches,
Risto Kojcev
Abstract:
We propose a novel framework for Deep Reinforcement Learning (DRL) in modular robotics to train a robot directly from joint states, using traditional robotic tools. We use an state-of-the-art implementation of the Proximal Policy Optimization, Trust Region Policy Optimization and Actor-Critic Kronecker-Factored Trust Region algorithms to learn policies in four different Modular Articulated Robotic…
▽ More
We propose a novel framework for Deep Reinforcement Learning (DRL) in modular robotics to train a robot directly from joint states, using traditional robotic tools. We use an state-of-the-art implementation of the Proximal Policy Optimization, Trust Region Policy Optimization and Actor-Critic Kronecker-Factored Trust Region algorithms to learn policies in four different Modular Articulated Robotic Arm (MARA) environments. We support this process using a framework that communicates with typical tools used in robotics, such as Gazebo and Robot Operating System 2 (ROS 2). We evaluate several algorithms in modular robots with an empirical study in simulation.
△ Less
Submitted 18 March, 2019; v1 submitted 14 March, 2019;
originally announced March 2019.
-
gym-gazebo2, a toolkit for reinforcement learning using ROS 2 and Gazebo
Authors:
Nestor Gonzalez Lopez,
Yue Leire Erro Nuin,
Elias Barba Moral,
Lander Usategui San Juan,
Alejandro Solano Rueda,
Víctor Mayoral Vilches,
Risto Kojcev
Abstract:
This paper presents an upgraded, real world application oriented version of gym-gazebo, the Robot Operating System (ROS) and Gazebo based Reinforcement Learning (RL) toolkit, which complies with OpenAI Gym. The content discusses the new ROS 2 based software architecture and summarizes the results obtained using Proximal Policy Optimization (PPO). Ultimately, the output of this work presents a benc…
▽ More
This paper presents an upgraded, real world application oriented version of gym-gazebo, the Robot Operating System (ROS) and Gazebo based Reinforcement Learning (RL) toolkit, which complies with OpenAI Gym. The content discusses the new ROS 2 based software architecture and summarizes the results obtained using Proximal Policy Optimization (PPO). Ultimately, the output of this work presents a benchmarking system for robotics that allows different techniques and algorithms to be compared using the same virtual conditions. We have evaluated environments with different levels of complexity of the Modular Articulated Robotic Arm (MARA), reaching accuracies in the millimeter scale. The converged results show the feasibility and usefulness of the gym-gazebo 2 toolkit, its potential and applicability in industrial use cases, using modular robots.
△ Less
Submitted 18 March, 2019; v1 submitted 14 March, 2019;
originally announced March 2019.
-
Comparison of FaaS Orchestration Systems
Authors:
Pedro García López,
Marc Sánchez-Artigas,
Gerard París,
Daniel Barcelona Pons,
Álvaro Ruiz Ollobarren,
David Arroyo Pinto
Abstract:
Since the appearance of Amazon Lambda in 2014, all major cloud providers have embraced the Function as a Service (FaaS) model, because of its enormous potential for a wide variety of applications. As expected (and also desired), the competition is fierce in the serverless world, and includes aspects such as the run-time support for the orchestration of serverless functions. In this regard, the thr…
▽ More
Since the appearance of Amazon Lambda in 2014, all major cloud providers have embraced the Function as a Service (FaaS) model, because of its enormous potential for a wide variety of applications. As expected (and also desired), the competition is fierce in the serverless world, and includes aspects such as the run-time support for the orchestration of serverless functions. In this regard, the three major production services are currently Amazon Step Functions (December 2016), Azure Durable Functions (June 2017), and IBM Composer (October 2017), still young and experimental projects with a long way ahead. In this article, we will compare and analyze these three serverless orchestration systems under a common evaluation framework. We will study their architectures, programming and billing models, and their effective support for parallel execution, among others. Through a series of experiments, we will also evaluate the run-time overhead of the different infrastructures for different types of workflows.
△ Less
Submitted 25 January, 2019; v1 submitted 30 July, 2018;
originally announced July 2018.
-
Extending the OpenAI Gym for robotics: a toolkit for reinforcement learning using ROS and Gazebo
Authors:
Iker Zamora,
Nestor Gonzalez Lopez,
Victor Mayoral Vilches,
Alejandro Hernandez Cordero
Abstract:
This paper presents an extension of the OpenAI Gym for robotics using the Robot Operating System (ROS) and the Gazebo simulator. The content discusses the software architecture proposed and the results obtained by using two Reinforcement Learning techniques: Q-Learning and Sarsa. Ultimately, the output of this work presents a benchmarking system for robotics that allows different techniques and al…
▽ More
This paper presents an extension of the OpenAI Gym for robotics using the Robot Operating System (ROS) and the Gazebo simulator. The content discusses the software architecture proposed and the results obtained by using two Reinforcement Learning techniques: Q-Learning and Sarsa. Ultimately, the output of this work presents a benchmarking system for robotics that allows different techniques and algorithms to be compared using the same virtual conditions.
△ Less
Submitted 7 February, 2017; v1 submitted 19 August, 2016;
originally announced August 2016.
-
Study of decoherence of entangled states made up of two basic states in a linear chain of three qubits
Authors:
Gustavo V. Lopez,
Gustavo Montes
Abstract:
Using Lindblad approach to study decoherence of quantum systems, we study the decoherence and decay of entangled states, formed by two basic states of a chain of thee qubits. We look on these states for a possible regular dependence on their decay as a function of their energy separation between the basic states under different type of environments. We found not regular or significant dependence o…
▽ More
Using Lindblad approach to study decoherence of quantum systems, we study the decoherence and decay of entangled states, formed by two basic states of a chain of thee qubits. We look on these states for a possible regular dependence on their decay as a function of their energy separation between the basic states under different type of environments. We found not regular or significant dependence on this energy separation for the type of environment considered .
△ Less
Submitted 11 March, 2015;
originally announced March 2015.